At the Edge
Have you ever thought that we’re selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively?
In order for cybersecurity to be truly effective we must operationalize it. We must make it transparent, break down the communications surrounding the methods, services, and technologies that the industry offers so that it can truly protect and bring value to our businesses, our communities, and our society.
Our conversations At The Edge do just that.
This column is made possible by the generosity of our Sponsors:
Latest At The Edge Episode
Upcoming Discussions At the Edge
Redefining Cybersecurity with Artificial Intelligence | Guests: Perry Carpenter, Mike Harasimowicz, Robert McNutt, Bülent Yener
The Quantum Revolution Is Coming - Are We Prepared? | Guests: Donna Dodson, Christopher Monroe
A day in the life of a SOC analyst—exploring tools, tactics, and techniques | Guest(s): TBA
Dissecting the world of mobile cybersecurity standards (NIST and beyond) | Guest(s): TBA
CCPA — Can California Protect …| Guests: TBA
5G: The impact of speed and scale on security and privacy | Guest(s): TBA
Mobile Device Security: Corporate-Owned vs Personally-Enabled | Guest(s): TBA
A day in the life of a pentester—exploring tools, tactics, and techniques | Guest(s): TBA
Legal Ramifications Of Federal IoT Legislature | Guest(s): TBA
A day in the life of a bug bounty hunter—exploring tools, tactics, and techniques | Guest(s): TBA
A Look at the Tech Behind Smart Manufacturing | Guest(s): TBA
Unpacking the NIST CyberSecurity Framework | Guest(s): TBA
SecOps’ Role in Protecting the Employee at Home | Guest(s): TBA
Security Apps UX Sucks | Guest(s): TBA
Here Are The Latest Podcasts On At The Edge