Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


1 Encore: Will Poulter, Dave Beran, and The Bear 52:22
The right tool for the job: Finding and evaluating security tools with James Berthoty
Manage episode 397306479 series 3516169
In this episode, James Berthoty shares insights into his project, Latio Tech, which provides a comprehensive list of cloud security tools and resources. James highlights the challenges of vendor assessments and the importance of bridging knowledge gaps in cloud security. He also shares trends in the security tooling industry and offers advice for smaller teams or organizations with limited budgets seeking effective security solutions. This episode is perfect for anyone looking into purchasing new security tools or wanting to understand the purchasing process. Show Links: Latio Tech - https://www.latio.tech/ James Linkedin - https://www.linkedin.com/in/james-berthoty/
96 episodes
Manage episode 397306479 series 3516169
In this episode, James Berthoty shares insights into his project, Latio Tech, which provides a comprehensive list of cloud security tools and resources. James highlights the challenges of vendor assessments and the importance of bridging knowledge gaps in cloud security. He also shares trends in the security tooling industry and offers advice for smaller teams or organizations with limited budgets seeking effective security solutions. This episode is perfect for anyone looking into purchasing new security tools or wanting to understand the purchasing process. Show Links: Latio Tech - https://www.latio.tech/ James Linkedin - https://www.linkedin.com/in/james-berthoty/
96 episodes
All episodes
×
1 Educate, Empower, Prepare: Building Inclusive Cybersecurity With Rebekah Skeete 23:26

1 Bridging the Gap Between Dev and Sec: Tools, Culture, and Careers - Thomas Jost 24:49

1 What Tools Miss and Why Humans Matter in AppSec - Yash Shahani 18:02

1 Visualizing Data Poisoning and Rethinking Threat Detection Through Graphs – Maria Khodak 21:05

1 Building Human-Centric Security and Hacker Communities in Argentina - Ailin Castellucci 23:04

1 From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski 20:03

1 Quarantine Policies and Cloud Security Strategies for AWS – Bleon Proko 23:06

1 Helping Developers Use Open Source Security Tools & Improving Defense With AI - Mackenzie Jackson 24:19

1 How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard Johansen 22:20

1 Navigating And Defining The Evolving Role Of The CISO In Government Security - Josh Kuntz 22:53

1 The State And Future Of Cybersecurity Training and AIShaping The Role - Zach Hill 22:36

1 Secrets Management With The OpenPao Project And Open Source Security - Alex Scheel 22:15

1 Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna Jonssen 22:45

1 Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John Poulin 41:51

1 What Does It Mean To Be A Security Lead - A Conversion With Kayssar Daher 42:21

1 Understanding Security Champions and Making Human Connections - Dustin Lehr 48:29

1 Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett 37:54

1 Observability ownership, monitoring apps at scale, and learning DevOps like a language- Josh Lee 30:59

1 The Freedom Of Information Act, Ethical AI, And NerdCore Music - Stephanie Honore 36:39

1 Securing Workload Identities And Working On Conjure - Jody Hunt 43:31

1 The Updated OWASP Top 10 for LLM Applications and the AI landscape - Talesh Seeparsan 42:37

1 Securing Flight Simulators And Other Operational Technology - Coburn Slay 45:02

1 Getting Out Of Walled Gardens By Running Your Own Email - Michael Harrison 36:03

1 Understanding Psychological Safety And Asking Questions To Stay Relevant - Deanna Stanley 37:37

1 Phone Phreaking, The History Of The Security Community, And Social Engineering - Matt Scheurer 41:39

1 Getting Started In Offensive Security: A Journey Into Tech - Alexis Diediker 33:14

1 Securing Human Access Through Privileged Access Management and Just In Time Access - Aria Langer 33:58

1 Undocumented Hacking - Applying Pentesting Skills To Navigating Bureaucracy - José Martinez 27:13

1 STIR/SHAKEN and Password Policies- Per Thorsheim 34:14

1 Being a Lifeguard Instead of a Police Officer and Compliance Is NOT Security - David Hawthorne 31:05
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.