Resources

Currently displaying:
    Podcast
    FIDO is the Future, But Not for Security

    FIDO is the Future, But Not for Security

    This Cybersecurity Hot Takes episode discusses how FIDO is the future and what that looks like.
    View
    Podcast
    Security is a UX Problem

    Security is a UX Problem

    This Cybersecurity Hot Takes episode discusses why considering security from a UX side of things sets you up for success.
    View
    Podcast
    API Security Starts With Authentication

    API Security Starts With Authentication

    This Cybersecurity Hot Takes episode discusses why the market needs an easy way for people to block API attacks or attempted API attacks.
    View
    Podcast
    Turn Off Push-Based MFA Today

    Turn Off Push-Based MFA Today!

    This Cybersecurity Hot Takes episode discusses why push notifications as a factor need to be eliminated.
    View
    Podcast
    Identity Should Be Self-Sovereign

    Identity Should Be Self-Sovereign

    This Cybersecurity Hot Takes episode discusses why identity should be self-sovereign and why people should care.
    View
    Podcast
    The Cybersecurity Labor Shortage is a Population Problem

    The Cybersecurity Labor Shortage is a Population Problem

    This Cybersecurity Hot Takes unpacks how a declining population impacts cybersecurity jobs.
    View
    Podcast
    Strong Authentication is the Nexus of Zero Trust

    Strong Authentication is the Nexus of Zero Trust

    This Cybersecurity Hot Takes features Patrick McBride and Marcos Christodonte II discussing how zero trust and strong authentication work together.
    View
    Podcast
    Zero Trust Doesn't Mean "Don't Trust Anything"

    Zero Trust Doesn't Mean "Don't Trust Anything"

    This Cybersecurity Hot Takes episode discusses if zero trust is really the minimal axioms of security trust necessary to prove outcomes.
    View
    Podcast
    Security Analogies Are Misleading

    Security Analogies Are Misleading

    This Cybersecurity Hot Takes episode discusses whether or not security analogies are overly simplistic and can lead to misunderstandings.
    View