The cybersecurity industry operates on a fundamental misconception: that consumers want to understand and manage their digital security. After 17 years at F-Secure and extensive consumer research, Dmitri Vellikok has reached a different conclusion—people simply want security problems to disappear without their involvement.
The decision to leave a successful corporate position and start a company requires more than just identifying a market opportunity. For Shankar Somasundaram, it required witnessing firsthand how traditional cybersecurity approaches consistently failed in the environments that matter most to society: hospitals, manufacturing plants, power facilities, and critical infrastructure.
Cyber risk touches legal obligations, operational priorities, and even geopolitical decisions. This episode explores a consulting model that puts business understanding first—and builds security around it.
This episode explores how dynamic, context-aware access controls can eliminate the friction between security and productivity. Learn how a Zero Standing Privilege approach protects both human and AI identities while enabling organizations to operate at full speed without compromising safety.
ThreatLocker introduced DAC configuration monitoring and achieved FedRAMP certification at Black Hat 2025, strengthening zero trust capabilities while expanding government market access through practical security solutions.
Winners in the cybersecurity game will safeguard data without constraining business. Learn how Zoltán Györkő, CEO and co-Founder of Balabit, achieves success with real-time user analysis and authentication.
How does a startup CEO with no cybersecurity experience end up a leader in runtime application security? Read about Prevoty co-founder and CEO Julien Bellanger’s journey in infosec in this exclusive ITSPmagazine interview.