HomePodcastSecurity You Should Know

Security You Should Know

SECURITY YOU SHOULD KNOW

Get Ahead of Cyber Threats—Before They Get Ahead of You

Cybercriminals are relentless. They constantly scan for weaknesses, waiting for the perfect moment to strike. While the ThreatLocker Zero Trust Protection Platform delivers the...

Ditch the Extra Tools: A Smarter Way to Secure Web Access Without Additional Third-Party Gaps

Web access control is essential for cybersecurity, but it means adding yet another third-party tool to your already complex security environment: more vendors, more...

Easier Patch Management with ThreatLocker

Rob Allen, chief product officer, ThreatLocker shows how their platform solves what legacy tools miss, like portable apps and items hiding in your downloads...

Cognitive Automation Will Transform Security Operations

You must start planning how your security operations team will function with AI. Cognitive automation provides autonomous alert investigations with expert-level reasoning. It’s not...

Use ThreatLocker’s Elevation Control to fill the gaps of Privileged Access Managenet (PAM)

Join David Spark as he talks with Rob Allen, chief product officer, ThreatLocker about ThreatLocker’s innovative Elevation Control feature, a powerful tool for Privileged...

Don’t Just Patch It — Control It 

One way to stay ahead of cyber threats is to stay on top of your patching. Threat actors are quick to exploit known vulnerabilities,...

Is Your Open Source Software a Security Time Bomb?

Open source software (OSS) powers modern business. It's fast, flexible, and foundational to everything from product development to operations. However, when OSS reaches end-of-life...

Maximizing the Value of MDR with ThreatLocker

Security teams today are expected to manage two fronts—building and maintaining proactive defenses, and staying ready to respond at any moment to threats that...

Stopping AI Oversharing with Knostic

Large language models are most useful to your business when they have access to your data. But these models also overshare by default, providing...

Navigating Unauthorized Site Access with ThreatLocker

Unauthorized site access remains a significant security concern for organizations. But why does this issue persist, and how can it be effectively addressed? In this...

How You Can Lock Down Privileges While Maintaining Productivity

The admin privilege dilemma: A risk you can’t ignore Working in cybersecurity is a balancing act: Users need permission to do their jobs, but too...

Getting Linux Visibility with Sandfly Security

Linux is the backbone of critical infrastructure, yet it often flies under the radar when it comes to endpoint monitoring. From legacy servers to...

How to Control Your Network Security Beyond Traditional Firewall

Firewalls and VPNs were once the gold standard for network security, and in many environments, they still play an important role. But with the...

Solving Patch Management with ThreatLocker

For years, patch management has been treated as a solved problem—until reality strikes. Outdated applications, portable executables, patch conflicts, and shadow software leave organizations...

Beating the Bots with Kasada

Automated attacks are growing in speed and sophistication, far outpacing the human defenses most organizations rely on. Whether it’s credential stuffing, scraping, or denial-of-wallet...