Episodes

  • The Predictions Episode 2025
    Jan 2 2025
    What does 2025 have in store for us? If it is anything like 2024, it will be interesting times indeed. In this episode, host Steve Prentice has a virtual fireside chat with David Holmes, CTO for Application Security, Imperva, a Thales company. The two of them chat about Salt Typhoon, ransomware, AI as a threat surface, quantum computing, the software supply chain, the importance of having a breach coach, and why there are so few young people in cybersecurity. It’s a can’t miss summary of the year just past, and a peek into what lies ahead.
    Show More Show Less
    38 mins
  • The Three Dimensions of Data Sovereignty
    Nov 22 2024
    Data sovereignty has three dimensions: data residency, access to data, and stewardship of data. Besides deciding where to store data, it is essential to determine who can have access to it - which becomes more crucial as we consider priorities such as access to cloud across national borders, as well as using the data for training AI models. Furthermore, many organizations do not have complete knowledge of where their data is stored, and others do not have complete control of the encryption keys that keep their cloud data safe. The deeper we get into a data dependent ecosystem, the more complex the issues of data sovereignty, access and security become.
    Show More Show Less
    28 mins
  • Post Quantum Cryptography - Let’s Do the Math
    Oct 30 2024
    The quantum computing revolution is almost upon us, and this means a new world of cryptography, cybersecurity and, of course, cybercrime. Not all of us are aware of the magnitude of the change that needs to be made. It’s not like swapping out one component of a network for a newer bigger one. There are many small parts holding the cyber world together. Moving toward the age of post quantum cryptography and repositioning our existing data security infrastructure around it relies on timely adaptation and immediate action, with a budget to match. How ready are we? How ready are you to hear that when it comes to a quantum-based world, one plus one might no longer equal two?
    Show More Show Less
    31 mins
  • The Stealthy Success of Passkeys
    Sep 26 2024
    Passkeys are a groundbreaking technology that leaves traditional passwords in the dust. They are designed to be resistant to phishing attacks thanks to their relationship to specific websites or services, and they significantly reduce the risk of credential theft. As organizations struggle with the noise of cybersecurity issues such as ransomware and social engineering, the widescale adoption of passkeys seems to be a little drowned out. Which is a shame, since it really is a solution to many of our security problems. This episode looks a little more closely at where we are with passkey technology. Episode: S4E5
    Show More Show Less
    25 mins
  • Behind the Power of the Cloud
    Jul 10 2024
    Cloud technology may be efficient and vital to the global economy, but it comes at a substantial cost in terms of the power to make it run. This will only increase as more sophisticated forms of computing such as AI become normalized. But there are solutions for making this elastic and ubiquitous technology more ecologically responsible, ranging from using innovative cooling techniques through to shared responsibility and even Carbon FinOps. Our guests from AWS and Thales will make it all clear.
    Show More Show Less
    29 mins
  • Lessons in Resilience from DORA
    May 16 2024
    Information and communication technology (ICT) risk management is a vital part of daily practice for organizations in any industry. For those in the EU financial sector, a new set of regulations is being put in place in the form of the Digital Operational Resilience Act aka DORA. But it doesn’t just affect European financial companies – it affects anyone in the world that does business with them, as well as being a good lesson in ICT overall.
    Show More Show Less
    31 mins
  • Protecting Data and All Paths to It
    Apr 12 2024
    In discussing the recent acquisition of Imperva into the Thales fold, Nanhi Singh, VP Application Security and Customer Success at Imperva, and Todd Moore, Global Head of Data Security Products at Thales, dive deep into the many areas of security that will be positively affected, including APIs, bots and of course, generative AI. This is not a self-congratulation conversation: it’s a roadmap for heightened data security, with host Steve Prentice.
    Show More Show Less
    32 mins
  • What is Your Formula for Digital Trust?
    Mar 6 2024
    Guests: James Leaton Gray, Director at The Privacy Practice, a firm that specializes in privacy and data protection and Haider Iqbal Manager of Product Marketing for Thales Identity and Access Management business. Trust is vital to the relationship between companies and their customers, especially when it comes to protecting data. But companies have been traditionally confronted by a resistance on the part of consumers to adopt safe online practices like MFA. But is this changing now. James and Haider join host Steve Prentice for a lively discussion on the nature of trust, security technology and the findings within the Digital Trust Index report. They present some intriguing new strategies for companies looking to keep their customers and their operations safe.
    Show More Show Less
    40 mins