
Defense in Depth
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Latest Episode
How Are You Managing the Flow of AI Data (04.09.2025)
Previous Episodes
- How to Deal with Last Minute Compliance Requirements 28.08.2025
- Do You Have a Functional Policy or Did You Just Write One? 21.08.2025
- Where are We Struggling with Zero Trust 14.08.2025
- Cybersecurity Has a Prioritization Problem 07.08.2025
- How Can AI Provide Useful Guidance from Fragmented Security Data? 31.07.2025
- Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem 24.07.2025
- What Are the Cybersecurity Trends We Need To Follow? 17.07.2025
- Is It Even Possible to Fast-Track Your Way Into Cybersecurity? 10.07.2025
- What's the Most Efficient Way to Rate Third Party Vendors? 03.07.2025
- Don't Ask "Can" We Secure It, But "How" Can We Secure It 26.06.2025
- Has the Shared Security Model for SaaS Shifted? 12.06.2025
- Improving the Efficiency of Your Threat Intelligence 05.06.2025
- Why Cybersecurity Professionals Lie on Their Resumes 29.05.2025
- What Should Be in a CISO Job Description? 22.05.2025
- The CISO's Job Is Impossible 15.05.2025
- Can You Have a Secure Software Environment Without Traditional Vulnerability Management? 08.05.2025
- How Much Should Salespeople Know About Their Product? 01.05.2025
- Why Are We Still Struggling to Fix Application Security? 24.04.2025
- What Can Someone with No Experience Do in Cybersecurity? 17.04.2025
- Are New Gartner-Created Categories/Acronyms Helping or Hurting the Cybersecurity Industry? 10.04.2025