Defense in Depth

Defense in Depth

by

Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.

Recent Episodes

  • What Are the Cybersecurity Trends We Need To Follow?

    1 day ago
  • Is It Even Possible to Fast-Track Your Way Into Cybersecurity?

    1 week ago
  • What's the Most Efficient Way to Rate Third Party Vendors?

    2 weeks ago
  • Don't Ask "Can" We Secure It, But "How" Can We Secure It

    3 weeks ago
  • Has the Shared Security Model for SaaS Shifted?

    1 month ago
  • Improving the Efficiency of Your Threat Intelligence

    1 month ago
  • Why Cybersecurity Professionals Lie on Their Resumes

    2 months ago
  • What Should Be in a CISO Job Description?

    2 months ago
  • The CISO's Job Is Impossible

    2 months ago
  • Can You Have a Secure Software Environment Without Traditional Vulnerability Management?

    2 months ago