CyberScoop Radio Podcast
1) Cisco's Linda Michels and David Gormley on defending against insider threats
Cisco security experts argue that the solution to rising internal cyber risks isn't just about blocking bad actors but enabling unwitting employees with invisible security, precise policies, and power...Show More
Cisco's Linda Michels and David Gormley on defending against insider threats
11:52 | Aug 19th, 2025
2) Optiv + ClearShark's Michael Saintcross discusses 'zero standing privilege'
As identity sprawl grows, Optiv + ClearShark’s Michael Saintcross says cybersecurity leaders must pivot from traditional ICAM strategies to solutions that offer granular control and "zero standing pri...Show More
Optiv + ClearShark's Michael Saintcross discusses 'zero standing privilege'
15:55 | Jul 17th, 2025
3) Trinity Cyber's Mike Denning on the power of Full Content Inspection technology
As AI-driven assaults add a new dimension to the escalating volume of cyberattacks, chief information security officers— and the traditional cybersecurity tools they rely on — are struggling to keep u...Show More
Trinity Cyber's Mike Denning on the power of Full Content Inspection technology
10:49 | Jul 8th, 2025
4) Lenovo’s Nima Baiati and SentinelOne’s Melissa K. Smith on the necessity of endpoint security
As AI-enabled workloads introduce complex and unseen security vulnerabilities, Lenovo’s Nima Baiati and SentinelOne’s Melissa K. Smith say securing the endpoint is paramount for IT professionals. This...Show More
5) The evolving landscape of detection in a zero-trust environment | ThreatLocker's Danny Jenkins
Episode 5 of 5: Behavior-based detection and dynamic threat intelligence are essential to enhancing security operations and reducing cyber threat response times, says ThreatLocker CEO Danny Jenkins. T...Show More
6) Managing the risks of local administrator privileges | ThreatLocker's Danny Jenkins
ThreatLocker CEO Danny Jenkins emphasizes the importance of limiting local administrator privileges. He also advocates for Enterprise Privilege Management (EPM) solutions and effective user communicat...Show More
Managing the risks of local administrator privileges | ThreatLocker's Danny Jenkins
06:02 | Jan 10th, 2025
7) How do you find a ransomware gang on the dark web?
In this episode, Greg Otto talks with Adam Darrah, director of intelligence at Vigilante, about hacker gangs on the dark web, how they run their ransomware operations, and if the cybersecurity communi...Show More
8) What happened with the Vault 7 trial?
Right before the world drastically changed due to the COVID-19 pandemic, the craziest story in cybersecurity was the Vault 7 trial. With that ending in a mistrial, Greg Otto and Jeff Stone look at how...Show More
9) How to embrace zero trust into network security with John Kindervag from Palo Alto Networks
The creator behind the zero-trust network model, John Kindervag, talks about why “trust” has become a vulnerability that needs to be mitigated like other vulnerabilities and where to start. Sponsored ...Show More
10) Episode 2 - Upguard's Chris Vickery and Mike Baukes
One of the bigger stipulations in GDPR is that third-party service providers, including companies who run the ever-ubiquitous cloud, will also be responsible for following the correct protocols when i...Show More