
086| Why showing value is more important for CISOs than ever
CISOs find themselves at the forefront of safeguarding sensitive information, ensuring regulatory compliance, and protecting their organizat...
Radio and PodcastLive Radio & PodcastsOpening Radio and Podcast...

Radio and PodcastLive Radio & PodcastsFetching podcast shows and categories...
Radio and PodcastLive Radio & PodcastsFetching podcast episodes...

Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. F-Secure's Janne Kauhanen hosts the show to make sure you know all...

CISOs find themselves at the forefront of safeguarding sensitive information, ensuring regulatory compliance, and protecting their organizat...

The NIST Cyber Security Framework has helped secure organizations for nearly a decade and while it's proven to be an invaluable tool, it's g...

A successful cyber defense should protect an organization's critical assets from today's threats, not yesterday's. For this episode, we sat...

The term Shifting Left has not been traditionally associated with cyber security. In this episode, WithSecure CISO Christine Bejerasco lays...

As Mikko Hyppönen said recently, we are indeed in the midst of the hottest AI summer ever, and the hype level is off the charts. Yes, AI pre...

We have the pleasure of being joined by the one and only Peiter "Mudge" Zatko, network security expert, open-source programmer, writer, and...

As security is primarily about stopping bad things from happening, victories are often silent. At the same time, failures are often very pub...

T he time that an attacker spends on a network before attempting to achieve their objective is decreasing rapidly, making many organizations...

The development of new sustainable technologies undoubtedly benefits society, but it also ope ns the door to new cyber security challenges....

Russia's invasion of Ukraine changed the entire geopolitical landscape. For this episode, we were on-site at SPHERE23 with security and fore...

Advanced persistent threats, or APTs, are generally seen as a sort of apex predator in the cyber threat landscape. And while they're certain...

Security protects organizations from cyber attacks. However, studies show that limiting your understanding of security to this basic premise...

Vulnerabilities and security gaps are increasingly being identified in software and applications daily. Attackers are often quick to act whe...

In our last episode, we were joined by c yber security advisor Paul Brucciani and WithSecure Intelligence Researcher Andy Patel to discuss s...

As the year draws to a close, it's time for us to review and reflect on notable infosec events and trends from 2022, and also what might hap...

Until recently, AI-generated synthetic content has been more commonly used for gaming and art creation, where the tech is still relatively n...

In this Cyber Security Sauna special edition podcast, we cover new developments in the data breach of Finnish Psychotherapy provider Vastaam...

Bug bounties (also known as vulnerability reward programs) crowdsource security expertise to address vulnerabilities in products or services...

Geo-political conflicts are increasingly being played out in cyberspace, and organizations, whether they are aware or not, are often caught...

Co-founder & CMO at RELEX Solutions, Johanna Småros, joined us in our cyber sauna recording booth at SPHERE22 , the world's first co-securit...

CISO and cybersecurity Strategist, Matthew Rosenquist, joined us in our cyber sauna recording booth at SPHERE22 , the world's first co-secur...

In this episode, we're joined by Frank Fransen, Senior Scientist in Cyber Security at TNO, and Technical Coordinator of the EU's SOCCRATES p...

Serial entrepreneur, scientist and futurist, Sari Stenfors, joined us in our cyber sauna recording booth at SPHERE22 , the world's first co-...

Chairman and Founder of F-Secure & WithSecure, Risto Siilasmaa, joined us in our cyber sauna recording booth at SPHERE22 , the world's first...

WithSecure CTO, Christine Bejerasco, joined us in our cyber sauna recording booth at SPHERE22 , the world's first co-security unconference,...

Mikko Hyppönen is one of the world's most renowned cyber security experts and has investigated cybercrime for over 25 years. From the days o...

Swedish inventor and world-famous YouTuber, Simone Giertz joined us in our cyber sauna recording booth at SPHERE22 , the world's first co-se...

TED speaker and Pulitzer-nominated journalist Carole Cadwalladr joined us in our cyber sauna recording booth at SPHERE22 , the world's first...

Spymaster-turned-journalist Philip Ingram joined us in our cyber sauna recording booth at SPHERE22 , the world's first co-security unconfere...

There's many different ways to collaborate on infosec problems. There's no shortage of associations, conferences, and other frameworks that...

Non-profit organizations play a crucial role in our well-being. In many parts of the world, they're a major source of education, health care...

With 2021 now behind us, it's time to revisit the highs and lows of the past 12 months, and look ahead to what we can expect in the months a...

2021 is drawing to a close, and it's time to look back on the events of the past year. At the same time we look ahead to the brand new year...

The remotely exploitable Log4j zero day vulnerability disclosed just a few days ago has been called one of the most serious vulnerabilities...

The topic of application security has never been more important. So how are companies approaching appsec? What should companies do to ensure...

Biometrics have gotten a lot of attention in recent years. Biometric authentication systems have the potential to take the place of password...

Cyber crime is a constantly evolving game. As soon as new technology is introduced, attackers start figuring out how to exploit it for malic...

Data breaches and other security incidents have become a frequent, severe problem for organizations. But with incident responders in short s...

After data breaches and ransomware attacks, we often hear that customer information was leaked to the dark web. This obviously can have seri...

Ransomware payment amounts have skyrocketed over the past year. As threat actors keep getting richer, they have more resources to fuel their...

AI and machine learning are shaping our online experience, from product recommendations, to customer support chatbots, to virtual assistants...

The fallout from a ransomware attack is every organization's worst nightmare. But it doesn't necessarily have to be, if you can respond to a...

The role of a chief information security officer demands technical knowledge, but it also requires soft skills of leading and influencing -...

Cloud computing was one of the last decade's most transformative technologies. It helped organizations launch exciting new applications and...

Phishing is the number one vector leading to data breaches. It's an easy, effective way for attackers to trick users into giving up credenti...

Infosec conferences give cybersecurity professionals a chance to network, hear the latest research, exchange ideas, and demo hacks and new t...

We thought locking up data and demanding a ransom to decrypt it was bad. But ransomware criminals have stooped even lower and now, threats o...

2020 has been a year no one predicted. COVID-19 made remote work the norm and shook up the attack landscape. Through it all, breaches and ra...

With the holiday season upon us, the already accelerated pace of online shopping is picking up even more. And more online transactions means...

Is iOS really more secure than Android, and why? What are the pros and cons of biometric authentication? How can you know which apps are saf...