AI Security: Risks, Myths, and Best Practices - Webinar with Ashish Rajan, CISO of Kaizanteq
Jeremy Snyder, the CEO and Co-Founder of FireTail, talks to Teja Yenamandra of Gun.io about his entrepreneurial journey, insights on various tech trends and FireTail's mission to secure the world's APIs.
Jeremy Snyder, founder and CEO of FireTail.io, a leading cloud security & cybersecurity company. Discover the crucial importance of API security in today's cloud-based world.
Jeremy Snyder introduces several best practices for securing APIs and the various apps that they connect with.
Jeremy Snyder talks about his experience with APIs, API security, and shares some tips, common mistakes, and more!
In this episode of the Ask a CISO podcast, we talk about threat modeling with guest Adam Shostack.
In this episode of the Ask a CISO podcast, we talk about application security with guest Tanya Janca.
After a brief hiatus, we are back with Season 3 of the Ask A CISO podcast. There are quite a few things we are doing differently this season (details below), but first, let's welcome our first guest for the new season: Fausto Lendeborg, Co-Founder and Chief Customer Officer of Secberus, and learn more about his start in cybersecurity, DDoS attacks, dealing with alert fatigue, and understanding what IaC, SaC, and PaC are.
Join us on this episode of the Ask A CISO podcast as we discuss AI and ML in cybersecurity with Diana Kelley, CISO and co-founder of Cyberize. With International Women's Day in a week, we also look at the challenges of recruiting women and diversity in the tech sphere.
On this podcast episode, we learn about mobile security from Amit Modi, the Chief Technology Officer (CTO) and CISO of Movius Interactive Corporation, a leading global provider of cloud-based secure mobile communications software. The company helps enterprises deliver better engagement for their clients., and connect with their customers in more convenient, cost-effective, and compliant ways.
On this episode, we had the opportunity to speak to Tyler Young, the CISO at BigID, a leading modern data security vendor that helps organizations with their data security, privacy, compliance, and governance.
In this last episode, we speak to our CEO, Paul Hadjy, Natasha, and Adi from our Indonesia office, Raphael Peyret, Vice-President of Product, and our US host, Jeremy Snyder, about their experience hosting the podcast.
Veteran cybersecurity professional and our U.S.-based host Jeremy Snyder sits in the guest seat this week to talk about his new startup, FireTail.io, a company that offers simple yet effective API security.
Host Evgeniy Kharam of the Cyber Inspiration podcast invites Jeremy Snyder on to speak about his experience as FireTail CEO.
Sounil Yu, the bestselling author of The #Cyber #Defense #Matrix, joins host Jeremy Snyder this week to talk about his book, and what we could all learn from it.
This week, we are joined by Mikko Hypponen, bestselling author of If It's Smart, It's Vulnerable.
How does cloud cost indicate cloud hygiene problems, and what is the implication for cybersecurity?
In this episode, we are joined George Finney, author of Well Aware and Zero Trust.
Jeremy Snyder, Founder and CEO of FireTail.io joins Reece and Nelson to chat about the integral role that strong authentication plays in API security.
We speak to Harlan Carvey, Senior Incident Responder in R&D at Huntress, to understand what threat hunting is, and even learn how surprisingly easy it is to tell if an account has been compromised!
Jeremy Snyder hosted an episode of the Ask a CISO podcast with Eric Basu from World of Haiku
Dan Lohrmann, award-winning CISO, keynote speaker, mentor, columnist, and bestselling co-author of the book Cyber Mayday and the Day After joins us this week to talk about cybersecurity.
Dr. Chase Cunningham is Chief Strategy Officer at Ericom Software, a company that provides web isolation and remote application access software to businesses.
Physical tradeshows are back, and our host Jeremy Snyder and guest James McKinlay were both at the recently-concluded InfoSecurity Europe 2022.
How do you balance people, process, and technology, the three pillars of information security, to achieve a balanced security program? What can you do to bolster each pillar?
Chuck Brooks is a world-renowned cybersecurity expert and an Adjunct Professor at Georgetown University where he teaches courses on risk management, homeland security, and cybersecurity.
Most cybersecurity programs work against human nature instead of with our innate behaviors, resulting in breaches even though your organizations may already have spent large amounts of money on security technologies.
Many security leaders refer to Gartner's Magic Quadrant to decide on which security tool to purchase and deploy to secure their environments.
Jeremy gives us a glimpse of where cloud security is heading and three practical tips on how you can get started on your cloud security journey.
By using this website, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.