loader from loading.io

Understanding Application Control with ThreatLocker

Security You Should Know

Release Date: 04/14/2025

Reducing SIEM Costs with Scanner show art Reducing SIEM Costs with Scanner

Security You Should Know

SIEM costs are spiraling out of control for organizations. Increasing log volumes, longer compliance-driven retention requirements, and the habit of collecting everything "just in case," the list goes on. Traditional SIEM architecture forces painful choices between cost control and security visibility, with teams constantly fighting to keep log volumes down while still maintaining adequate coverage for investigations. In this episode, , co-founder and CEO of , explains how their data lake approach can reduce SIEM costs by 80-90% while giving organizations full custody of their data in their...

info_outline
Evolving Security Awareness with Adaptive Security show art Evolving Security Awareness with Adaptive Security

Security You Should Know

All links and images can be found on Security awareness is critical to cultivate in your organization. But security awareness training can often miss the mark. Traditional training is slow and reactive. As deepfakes and LLM-enhanced attacks become common, organizations need training solutions that can adapt and provide relevant training. In this episode, , CEO of , explains how their platform provides engaging training that can be customized in a matter of minutes. Joining him are , CISO at , and , CISO at . Huge thanks to our sponsor, Adaptive Security AI-powered social engineering...

info_outline
Securing the Human Element with Trustmi show art Securing the Human Element with Trustmi

Security You Should Know

All links and images can be found on . Wire fraud and payment security remain persistent challenges for organizations, with the in BEC losses between 2023 and 2024. The complexity of B2B payment processes creates multiple attack vectors that traditional email security solutions can't fully address. In this episode, , co-founder and CEO of , explains how their platform connects the dots across the entire payment ecosystem to prevent fraud before money leaves the organization. By integrating with existing payment workflows and leveraging AI to build behavioral baselines, Trustmi aims to...

info_outline
Navigating Cloud Security with TrustOnCloud show art Navigating Cloud Security with TrustOnCloud

Security You Should Know

Implmenting new technologies for the business is already a daunting task. Cloud and SaaS have made some of the implementation easier, but it also makes it easier to not fully comprehend the risks you're taking on. All it can take is a company credit card. Organizations struggle with shadow IT, misconfigurations, and unauthorized access across multiple cloud environments, often lacking visibility into their actual cloud assets. In this episode, , CTO of , explains how their platform provides constantly updated threat models for major cloud services, helping organizations implement controls...

info_outline
Coordinating Security Tools with Tines show art Coordinating Security Tools with Tines

Security You Should Know

Security orchestration sounds great in theory, but in practice, coordinating between different security tools remains a headache. As workflows need to move faster to keep pace with AI-driven attacks, security professionals find themselves overwhelmed with manual "muck work" rather than focusing on business enablement. In this episode, , field CISO at , explains how their no-code workflow automation platform helps security teams eliminate manual work that bogs them down. Joining him are , information security advisor at , and , CISO at . Huge thanks to our sponsor, Tines   Build,...

info_outline
Embracing AI-Native DLP with Orion Security show art Embracing AI-Native DLP with Orion Security

Security You Should Know

All links and information can be found on DLP can be a bit of a four-letter word in cybersecurity. False positives are a major problem with any traditional DLP solution because setting the right policy for your organization's needs is always a moving target. In this episode, , co-founder and CEO of , explains how they provide a "zero-policy" approach to DLP that brings in the missing piece of context to the category. Joining him are , former CISO at Hyundai Capital America, and , CISO at . Huge thanks to our sponsor, Orion Security Orion is the first AI-native DLP that prevents data...

info_outline
Quantifying, Prioritizing, and Remediating Risk with Qualys show art Quantifying, Prioritizing, and Remediating Risk with Qualys

Security You Should Know

Managing risk is the name of the game for a CISO. Quantification is a major part of that job, but it doesn't end there. Without a means of communicating that quantification to the rest of the business, quantification just adds to the noise. In this episode, , Senior Director of Product Management, Partner Programs at explains how they provide a comprehensive solution for the Risk Operations Center, with comprehensive ways to ingest data from your applications, make sense of the data, and give your organization the tools to make the right priorities with it. Joining him are our panelists, ,...

info_outline
Maximizing the Value of MDR with ThreatLocker show art Maximizing the Value of MDR with ThreatLocker

Security You Should Know

Security teams today are expected to manage two fronts—building and maintaining proactive defenses, and staying ready to respond at any moment to threats that slip through. But unless someone actively watches those alerts 24/7, your detection tools are expensive noise generators. In this episode, , chief product officer at , lays out why their Cyber Hero® MDR offering is built not as a standalone security strategy, but as a complement to a deny-by-default, proactively hardened environment. With real-time visibility, flexible communication, one-click remediation, and human-backed...

info_outline
Stopping AI Oversharing with Knostic show art Stopping AI Oversharing with Knostic

Security You Should Know

Large language models are most useful to your business when they have access to your data. But these models also overshare by default, providing need-to-know information without sophisticated access controls. But organizations that try to limit the data accessed by an LLM risk undersharing within their organization, not giving the information users need to do their jobs more efficiently. In this episode, Sounil Yu, CTO at Knostic, explains how they address internal knowledge segmentation, offer continuous assessments, and help prevent oversharing while also identifying under-sharing...

info_outline
Navigating Unauthorized Site Access with ThreatLocker show art Navigating Unauthorized Site Access with ThreatLocker

Security You Should Know

Unauthorized site access remains a significant security concern for organizations. But why does this issue persist, and how can it be effectively addressed? In this episode, , chief product officer at , discusses the core functionality of ThreatLocker's Web Control solution: blocking access to unauthorized sites without meddling with DNS servers—a common pitfall among other tools. Rob explains that the simplicity of defining where employees can and cannot access is pivotal. This approach not only helps keep users away from malicious sites but also steers them clear of non-productive ones,...

info_outline
 
More Episodes

Managing application control amid increasing ransomware threats while not impeding business flow remains a challenge. Organizations need a layered defense to bolster their security posture without overinvesting in overlapping tooling.

In this episode, Rob Allen, chief product officer at ThreatLocker, discusses how their deny-by-default approach to application control helps simplify this persistent challenge. Rob is joined by our panelists, Janet Heins, CISO at ChenMed, and Shaun Marion, vp, CSO at Xcel Energy.

Huge thanks to our sponsor, ThreatLocker

ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.