a unique perspective on technology
…
continue reading
TechSpective Podcasts
1
From Polymorphic Attacks to Deepfakes: The Shifting Threat Landscape
53:17
53:17
Play later
Play later
Lists
Like
Liked
53:17One thing I’ve learned after years of covering cybersecurity is that the “state of the threat landscape” rarely sits still long enough to fit neatly into a headline. Every time you think you’ve understood the latest trend, something shifts under […] The post From Polymorphic Attacks to Deepfakes: The Shifting Threat Landscape appeared first on Tech…
…
continue reading
1
Why AI Agents Need Guardrails — And Why Everyone’s Talking About It
55:20
55:20
Play later
Play later
Lists
Like
Liked
55:20The latest episode of the TechSpective Podcast dives straight into one of the most pressing questions in cybersecurity right now: what happens when the vast majority of identities in your environment aren’t human anymore? I sat down with Danny Brickman, […] The post Why AI Agents Need Guardrails — And Why Everyone’s Talking About It appeared first …
…
continue reading
1
From Alert Fatigue to Cyber Resilience: Rethinking the Future of the SOC with AI
52:02
52:02
Play later
Play later
Lists
Like
Liked
52:02Cybersecurity has a long memory—and an even longer list of recurring frustrations. Chief among them: alert fatigue. For as long as security teams have existed, they’ve been drowning in notifications, dashboards, and blinking red lights. Each new platform promises to […] The post From Alert Fatigue to Cyber Resilience: Rethinking the Future of the S…
…
continue reading
1
Fighting Machines with Machines: How AI Is Redefining the SOC
45:35
45:35
Play later
Play later
Lists
Like
Liked
45:35Cybersecurity has always been a race against time—but in the era of artificial intelligence, it’s become a race against the machine. In this episode of the TechSpective Podcast, I sit down with Ankur Singla, founder and CEO of Exaforce, to […] The post Fighting Machines with Machines: How AI Is Redefining the SOC appeared first on TechSpective.…
…
continue reading
For years, phishing has been the king of cyberattacks. It’s simple, cheap, and it works. Most of us have learned to spot the obvious red flags in email—strange senders, misspelled domains, suspicious links. But the threat has started to evolve. […] The post When the Phish Leaves the Inbox appeared first on TechSpective.…
…
continue reading
1
When Security Automation Meets Agentic AI
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41Security teams know the pressure all too well: attackers move faster, the attack surface expands every year, and the tools meant to protect enterprises often create more friction than clarity. Traditional SOAR platforms promised efficiency but often delivered complexity, inflexibility, […] The post When Security Automation Meets Agentic AI appeared…
…
continue reading
1
Rethinking Cybersecurity in the Age of AI and Digital Twins
53:29
53:29
Play later
Play later
Lists
Like
Liked
53:29Artificial intelligence is transforming nearly every industry, and cybersecurity is no exception. On the latest episode of the TechSpective Podcast, I spoke with Kevin Simzer, COO of Trend Micro, about how generative and agentic AI are reshaping development and defense […] The post Rethinking Cybersecurity in the Age of AI and Digital Twins appeare…
…
continue reading
1
The Evolving Face of Ransomware — and How We Can Stay Ahead of It
48:59
48:59
Play later
Play later
Lists
Like
Liked
48:59Ransomware has been part of the cybersecurity conversation for years, but if you think it’s yesterday’s problem, think again. The headlines might be dominated by AI these days, yet behind the scenes, ransomware continues to disrupt organizations of every size […] The post The Evolving Face of Ransomware — and How We Can Stay Ahead of It appeared fi…
…
continue reading
1
Why Data Must Be the Heart of Cybersecurity
49:42
49:42
Play later
Play later
Lists
Like
Liked
49:42Cybersecurity strategy has evolved over the years—first focusing on keeping the bad guys out, then on detecting and responding to threats faster, and now on cyber resilience and the notion of ensuring business continuity no matter what happens. In the […] The post Why Data Must Be the Heart of Cybersecurity appeared first on TechSpective.…
…
continue reading
1
Retail Under Fire: Why Hackers Love Shopping Season
1:09:45
1:09:45
Play later
Play later
Lists
Like
Liked
1:09:45When it comes to cybersecurity, it’s easy to fall into the trap of thinking in binaries—good guys and bad guys, black hats and white hats, defenders and attackers. But the reality is far more complex, especially in an age where […] The post Retail Under Fire: Why Hackers Love Shopping Season appeared first on TechSpective.…
…
continue reading