Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts122/v4/83/01/0d/83010d06-096a-9281-d806-69d503227a43/mza_12837184525763599952.jpeg/600x600bb.jpg
The Core Podcast
Core To Cloud
76 episodes
3 months ago
Cyber threats pose a constant challenge to businesses and individuals worldwide. These threats range from seemingly innocuous phishing attempts to complex ransomware attacks and highly orchestrated data breaches that result in the exposure of sensitive data. Join industry experts and leaders as we unpack the latest security challenges we face and explore how we can work together to address them. In this podcast, powered by Core to Cloud, discover the interconnected issues facing industries around the world and learn about potential solutions.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Technology
RSS
All content for The Core Podcast is the property of Core To Cloud and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Cyber threats pose a constant challenge to businesses and individuals worldwide. These threats range from seemingly innocuous phishing attempts to complex ransomware attacks and highly orchestrated data breaches that result in the exposure of sensitive data. Join industry experts and leaders as we unpack the latest security challenges we face and explore how we can work together to address them. In this podcast, powered by Core to Cloud, discover the interconnected issues facing industries around the world and learn about potential solutions.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
Technology
Episodes (20/76)
The Core Podcast
VPNs: Very Predictable Nightmares!

Join Core to Cloud with Adam stepping in for Kelly this week, discussing the dawn of Work From Home and the implications it has had on the security of businesses. Joined by Simon Eappariello Senior VP at iboss who has been spearheading the move to Zero Trust Network Architecture for years.


What sort of security risks do legacy VPNs pose? How easy are they to break into and move laterally? Is Zero Trust Network Architecture a valid resoponse? And how on earth do we make the transition?


Take a listen and learn all the answers!


Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
36 minutes 39 seconds

The Core Podcast
Invisible Emissions: The Growing Environmental Impact of Cloud Computing

Summary


In this episode, Kelly sits down with Sophia Willows to explore the environmental impact of cloud computing and the wider internet. They discuss the significant energy demands of data centres, the role of network communication in energy consumption, and the tech industry’s innovative efforts to reduce its carbon footprint. Focusing on algorithmic and software improvements, sustainable development practices, and real-world examples, this episode offers valuable insights into how tech professionals can contribute to a greener future.


Kelly and Sophia delve into the efficiency of hardware and software in cutting carbon emissions, citing examples like upgrading to PHP 7 and optimising Uber’s garbage collector. They highlight the lack of awareness and consumer demand for climate-friendly software and underscore the need for ethical considerations in software engineering. The discussion covers the energy consumption of AI models, the importance of adopting renewable energy sources, and the necessity for companies to prioritise climate-friendly features. This episode emphasises the critical need for raising awareness and taking action to create a more sustainable digital future.


Connect with us and our guests:


Follow our main LinkedIn: / core-to-cloud

Follow our Podcast: / the-core-cyber-podcast

Kelly Allen: / Kelly Allen

Sophia Willows: Sophia Willows


Production Credits:


Production Manager: / Daniel Aldred

Audio Engineering and Editing: / Adam Titmuss


Want to be a guest?


Register here:


Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
58 minutes 15 seconds

The Core Podcast
How AI and Deepfakes can Steal your Identity

Summary


In this gripping episode, a Brooklyn couple receives a distressing call from the wife’s mother-in-law, demanding money for her safety. The husband, a law enforcement officer, tries to buy time by engaging the caller and following instructions to transfer money. Later, they uncover that the caller used AI to replicate their loved one’s voice.


As AI scams and deepfake technology become more common, new challenges arise in cybersecurity. Jake Moore shares his firsthand experience with AI voice cloning, where he successfully mimicked a CEO’s voice to convince someone within the company to transfer money to his account. This incident highlights the importance of trust and the difficulties in combating voice scams.


Jake and Kelly explore the broader implications of AI-generated content, discussing issues like identity theft, social media oversharing, and deepfake technology’s impact. They also cover the challenges of verifying information on platforms like TikTok and the need for robust cybersecurity measures.


Jake stresses the importance of educating children about AI and misinformation, while Kelly discusses AI’s implications for dating and political propaganda. This episode underscores the critical need for increased awareness and vigilance in our digital age. Join us for an insightful conversation on the risks and precautions necessary to navigate today’s cybersecurity landscape.


Key Takeaways:


1: AI-Driven Scams: Scammers are using AI to replicate voices and create convincing deepfakes, leading to increased fraud and misinformation. Individuals must stay vigilant and verify suspicious requests through multiple communication channels.

2: Importance of Trust and Verification: Trust plays a critical role in voice scams, making it essential to implement robust procedures, policies, and validation processes to prevent fraudulent activities and protect sensitive information.

3: Cybersecurity Awareness: Oversharing personal information on social media and the challenge of verifying content on platforms like TikTok underscore the need for heightened cybersecurity measures and awareness.

4: Educational Imperative: Educating adults and children about AI, deepfakes, and misinformation is crucial for safely and responsibly navigating the digital world.


Connect with us and our guests:


Follow our main LinkedIn: / core-to-cloud

Follow our Podcast: / the-core-cyber-podcast

Kelly Allen: / Kelly Allen

Jake Moore: / Jake Moore


Production Credits:


Production Manager: / Daniel Aldred

Audio Engineering and Editing: / Adam Titmuss


Want to be a guest?

Register here:



Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
1 hour 2 minutes 5 seconds

The Core Podcast
Avoid Getting Hacked: Lessons from NASA's 1999 Cyber Attack

Summary


In this conversation, Kelly Allen interviews Andy Schneider about the illusion of security preparedness. They discuss Andy's background in cybersecurity, the NASA cyber attack in 1999, the importance of cloud security posture, and best practices for enhancing security in the cloud. They also touch on the talent shortage in the cybersecurity industry and the need for continuous detection capabilities. Andy shares the story of the NotPetya cyber attack as an example of the impact of cybersecurity on geopolitical events. The conversation covers various topics related to cybersecurity, including the impact of cyber attacks, the evolving nature of cybersecurity, the importance of human connection, and the role of technology in defense. The guest, Andy Schneider, emphasizes the need for continuous learning in the cybersecurity field and highlights the different career opportunities available. He also provides recommendations for building a comprehensive cybersecurity tool stack and selecting the right technology partner.


Chapters


00:00: The Evolution of Cyber Warfare: From 1999 to the Present

03:56: Unveiling the Illusion of Security Preparedness: A Cybersecurity Journey

09:41: The Role of Cloud Security Posture Management in Cyber Defense

36:08: Human Connection and Trust in Cybersecurity

50:02: Continuous Learning and Adaptation in the Cybersecurity Industry


Takeaways


  • The evolution of cyber warfare has led to a shift in the nature of cyber attacks and the actors involved.
  • The NASA cyber attack of 1999 serves as a relevant case study highlighting the impact of cyber attacks and the vulnerabilities of digital infrastructure.
  • Cloud security posture management (CSPM) is a crucial aspect of cybersecurity, but it is not the only defense mechanism needed to protect against cyber threats.
  • The cybersecurity industry faces a talent shortage, and there is a need for upskilling and adapting to the evolving landscape.
  • Human connection and trust play a significant role in cybersecurity, and the industry requires continuous learning and adaptation to stay ahead of cyber threats.

 

Keywords

security preparedness, cybersecurity, illusion, NASA cyber attack, cloud security posture, talent shortage, detection capabilities, NotPetya cyber attack, cybersecurity, cyber attacks, evolving nature, human connection, technology, defense, continuous learning, career opportunities, tool stack, technology partner


Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
51 minutes 16 seconds

The Core Podcast
Exposing Insider Threats: Expert Secrets from Cyber Risk Expert

Summary


Join Kelly as she sits down for an illuminating conversation with none other than James Moncrieff, the Global Cyber Risk Lead at GFK, who shares his journey from being a police officer to transitioning into the information security field. The two discuss James' childhood dream of becoming a firefighter and how he accidentally ended up in the police force. James also highlights his challenges in entering the cybersecurity industry and the importance of persistence and self-belief.


In this conversation, James discusses the importance of understanding the risk of shadow IT and the need to shift from a culture of exception to accountability in cybersecurity. He highlights the complexity of insider threats and the different types of insiders that businesses must be aware of. James also stresses the limitations of security controls and the importance of preventing small attacks from escalating. He explains the role of human intelligence in cybersecurity and the process of sanitising intelligence for protection.


Finally, we explore the importance of creating a culture of trust and protection and the opportunities available in cybersecurity.


Chapters


00:00 The Journey from Law Enforcement to Cybersecurity

16:36 The Power of Persistence and Self-Belief in Career Transition

27:07 Stepping Outside Your Lane: Understanding Security Principles

33:55 The Strategic Role of GRC in Cybersecurity

34:25 The Foundation of InfoSec: GRC Work and Risk Management

36:21 Navigating Insider Threats and Human Intelligence in Cybersecurity

01:04:09 Embracing Diversity and Unique Backgrounds in InfoSec


Takeaways


  • Transitioning from law enforcement to information security can be challenging, requiring persistence and self-belief.
  • Diversity in problem-solving and different perspectives can lead to innovative solutions in the cybersecurity field.
  • Understanding security principles and stepping outside one's lane can enhance the effectiveness of security professionals.
  • The role of GRC (Governance, Risk, and Compliance) in cybersecurity goes beyond checklists and policies, requiring a broader understanding and strategic approach. GRC work is the foundation of InfoSec, encompassing risk management, governance, policies, and coordination of security development.
  • Understanding the impact of systemic issues on the business is crucial for effective risk management and security posture.
  • Insider threats are complex and can range from accidental to malicious, requiring a nuanced approach to detection and prevention.
  • Human intelligence plays a vital role in cybersecurity, and a process to protect and utilize intelligence from individuals on the ground is needed.
  • Diversity in InfoSec is essential, and individuals with unique backgrounds and skills bring valuable perspectives and problem-solving abilities to the industry.


Keywords


  • cybersecurity, career transition, police officer, persistence, self-belief, diversity, problem-solving, security principles, GRC, challenges, GRC work, risk management, governance, policies, vulnerability management, security development, SOC, insider threats, human intelligence, cybersecurity, diversity, unique backgrounds, InfoSec

 

 


Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
1 hour 9 minutes 18 seconds

The Core Podcast
Jamie McAnsh Reveals the Secret:

Summary


In this episode, Kelly meets with Jamie McAnsh, who shares his inspiring journey from a challenging childhood to becoming a successful entrepreneur and speaker. Jamie discusses the importance of overcoming obstacles and finding purpose in life.


We also explore AI's potential for promoting inclusion and levelling the playing field for individuals with neurodiversity. In this conversation, Jamie discusses the use of AI in communication and writing, highlighting its benefits in improving efficiency and inclusivity. He emphasises the importance of embracing diversity in problem-solving, particularly in industries like cybersecurity. Jamie also explores the role of AI in idea generation and the potential for AI to create more opportunities for diverse talent. He addresses the challenges of ensuring ethical and unbiased AI and emphasises the need for diverse people to monitor and input non-biased information.


The episode concludes with Jamie's advocacy for a work environment that values and invests in its employees, promoting equity over equality.


Takeaways


  • AI can be a valuable tool in communication and writing, improving efficiency and inclusivity.
  • Diversity is crucial in problem-solving, particularly in industries like cybersecurity.
  • AI can enhance idea generation and provide opportunities for diverse talent.
  • Ensuring ethical and unbiased AI requires a diverse group of people to monitor and input non-biased information.
  • A work environment that values and invests in its employees promotes equity and creates a better future.


Chapters


00:00 Introduction and Background

06:41 Overcoming Challenges and Finding Purpose

28:16 The Use of AI in Communication and Writing

31:12 The Role of Diversity and Inclusion in Problem Solving

36:11 The Benefits of AI in Problem Solving and Idea Generation

37:57 Ensuring Ethical and Unbiased AI

47:02 Creating a Better Work Environment through Diversity and Equity

52:51 The Importance of Equity over Equality

55:31 The Future Outlook for Diversity and Tech




Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
56 minutes 52 seconds

The Core Podcast
Unveiling Cybersecurity Realities: From AI Challenges to Neurodiversity Superpowers

Summary


Join Lisa Ventura, founder of Cybersecurity Unity, as she takes us on a journey through the dynamic world of cybersecurity.


In this episode, Lisa delves into:


  1. Her personal journey into cybersecurity and the vital role of collaboration and information sharing.
  2. The impact of generative AI on cybersecurity, focusing on the challenges of identifying phishing emails and addressing biases in AI-generated content.
  3. The importance of early education and awareness in safeguarding individuals from cyber threats.
  4. Addressing the gender gap in cybersecurity and advocating for inclusivity and diversity.
  5. Lisa's insights on neurodiversity and how it can be a superpower in the cybersecurity field.


This enlightening conversation covers a wide array of topics, including workplace challenges, managing stress, overcoming imposter syndrome, and identifying narcissistic personality traits. Tune in to gain valuable insights into creating inclusive work environments and enhancing communication in interviews.


Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
1 hour 2 minutes 47 seconds

The Core Podcast
Navigating the Frontlines of Cybersecurity:

Chris Hodson shares his journey into cybersecurity, driven by curiosity and a passion for understanding how things work. He emphasises the importance of gaining visibility and control in today's interconnected landscape.


Chris also discusses the integration of AI in cybersecurity and the need for security products to solve real problems. He highlights the significance of effective communication and the need to bridge the gap between technical jargon and business understanding.


The conversation covers various topics related to cybersecurity, including crisis simulation, the importance of understanding the business impact of cybersecurity, cloud security, effective communication to leadership, and the future of cybercrime.


The key takeaway is the need for cybersecurity professionals to focus on the 'why' of cybersecurity solutions and to effectively communicate the business risks and impact to leadership. Additionally, there is a need for scenario-oriented and frequent security education and a focus on foundational strategies for managing and monitoring the cloud.



Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
48 minutes 31 seconds

The Core Podcast
Women Leading the Way in Cybersecurity
Gonxhe and Ilvana from Sense Cyber Research Centre share their inspiring journeys into the cybersecurity industry. They talk about the importance of having more women in cybersecurity and provide practical tips to bridge the gender gap. They also discuss the challenges women face in the industry and offer strategies to overcome barriers to entry. The conversation encourages critical thinking and inspires women to join the field.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
50 minutes 58 seconds

The Core Podcast
The Crucial Intersection of Community and Cybersecurity

In this conversation, Kelly Allen and Stephen Mann discuss the importance of community in cybersecurity. They explore the challenges of building diverse and inclusive communities, the role of community in building resilience, and the benefits of sharing experiences and knowledge within a community. They also discuss the challenges of networking and vendor experiences at events and explore potential solutions to improve these interactions. In this conversation, Kelly Allen and Stephen Mann discuss various topics related to personal routines, communication, transparency in business, the future of community in cybersecurity, supporting others in the cybersecurity community, and the reasons to join the cybersecurity industry.


Takeaways


  • Diversity, equity, and inclusion are important in cybersecurity, and there is a growing pool of diverse talent ready to enter the field.
  • Community plays a crucial role in building resilience in cybersecurity, providing support, knowledge sharing, and opportunities for growth.
  • In-person interactions and networking are still valuable in the digital age, as they allow for deeper connections and more meaningful conversations.
  • Creating inclusive and collaborative events can help overcome challenges in networking and vendor experiences, fostering a sense of community and providing value for participants. Having a consistent bedtime routine can contribute to better sleep and overall well-being.
  • Managing personal commitments and communication can be challenging, but setting boundaries and being transparent can help.
  • Transparency and honesty in business are important for building trust and maintaining strong relationships.
  • The future of community in cybersecurity involves providing diverse and accessible opportunities for learning and networking.
  • Supporting and helping others in the cybersecurity community is crucial for personal and professional growth.
  • The cybersecurity industry offers diverse career opportunities and the chance to make a meaningful impact in society.


Chapters


00:00 Introduction and Background

03:09 Diversity and Inclusion in Cybersecurity

10:25 The Importance of Community in Cybersecurity

16:10 Building Resilience through Community

21:55 The Challenges of Building and Engaging Communities

28:53 Creating Inclusive and Collaborative Events

35:45 Improving Networking and Vendor Experiences

40:36 Bedtime routines and personal schedules

41:22 Managing personal commitments and communication

42:09 Transparency and honesty in business

43:34 The future of community in cybersecurity

49:49 Helping and supporting others in the cybersecurity community

53:29 Why join the cybersecurity industry

54:37 Contacting Stephen Mann





Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
48 minutes 28 seconds

The Core Podcast
Women Leading the Way in Cybersecurity

In this conversation, Liv discusses her role at Core to Cloud and her journey from aspiring writer to marketing professional. She highlights the importance of diversity in the industry and the need for different voices and perspectives. The conversation also touches on the importance of reaching out to different audiences and making events and messaging more inclusive. Liv shares her insights on exploring marketing as a career and the exciting opportunities in the tech industry.


Takeaways:

  • Diversity in the industry is essential to have different perspectives and voices.
  • Reaching out to different audiences and making events and messaging inclusive is crucial.
  • Marketing offers various career opportunities, including events management and partner marketing.
  • The tech industry is fast-growing and offers exciting and constantly evolving opportunities.



Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
6 minutes 19 seconds

The Core Podcast
Women Leading the Way in Cybersecurity:
In this episode, we explore the impactful role of Women in Tech Cyber Security Hub (WITCH) in bringing together women nationwide to discuss tech and cyber issues. Our guest, Jess, a solicitor specialising in technology and data law, shares insights into her career and the importance of diversity within the legal and tech realms.

Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
27 minutes 7 seconds

The Core Podcast
Women Leading the Way in Cybersecurity

In this conversation, Anna discusses her role as a sales development representative at Core to Cloud and her experience joining the company. She shares her journey into the cybersecurity industry and highlights the importance of career progression. Anna also discusses the presence of women in leadership positions at Core to Cloud and the value of diversity in the workplace, including cultural perspectives.


Takeaways:


Career progression is an appealing aspect of the cybersecurity industry, offering opportunities for growth and development.

Anyone can join the cybersecurity industry with a willingness to learn and put in effort.

Having women in leadership positions can provide relatability and inspiration for career aspirations.

Diversity, including cultural perspectives, brings different opinions and insights to the workplace.



Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
7 minutes 45 seconds

The Core Podcast
Women Leading the Way in Cybersecurity

Lizzie shares her journey into cybersecurity, starting with a career change from teaching. She discovered her passion for IT and cybersecurity while working at an IT distribution company. Lizzie discusses the gender diversity in the industry and the lack of female role models. She highlights role models' importance and the progress made in gender diversity. Lizzie also touches on the topic of menopause and women's health in the workplace. She emphasizes the need for a diverse and supportive team to create a successful and inclusive work environment.


Chapters


00:00 Introduction and Background

01:01 Career Change

04:20 Gender Diversity in Cybersecurity

06:14 Lack of Female Role Models

08:38 Progress in Gender Diversity

10:54 Importance of Role Models

13:17 Diversity in the Workplace

14:10 Menopause and Women's Health

16:27 Challenges for Women in Leadership


We hope you enjoy!



Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
18 minutes 11 seconds

The Core Podcast
Women Leading the Way in Cybersecurity

Join us for an incredible story and discussion with our technical writer, Robyn MacMillan, as part of our series "Women Leading the Way in Cybersecurity."


In recent years, there has been a growing recognition of the importance of diversity and inclusion in the technology industry. However, one area that still requires significant attention is the representation and participation of women, particularly in technical roles and technical writing. This podcast episode explores women's critical role in technology and why their voices are indispensable in technical writing within the industry.


Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
45 minutes 23 seconds

The Core Podcast
Women Leading the Way in Cybersecurity

Welcome to the inaugural episode of The Core Podcast, titled "Women Leading the Way in Cybersecurity". We are celebrating International Women's Day on March 8th, 2024, and have decided to extend the celebration for the entire month of March. We firmly believe that women deserve more than just a day to be acknowledged and recognised.


This series we are delving into cybersecurity and exploring the critical role diversity and women play in shaping the future of this dynamic field. Your host, Kelly Allen unravels the layers of importance surrounding diversity and women in cybersecurity with two very special guests.


Drenusha Salihu and Elza Latifi, two very interesting women who share their experiences and thoughts working in the cybersecurity industry.


Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
59 minutes 18 seconds

The Core Podcast
Navigating Cyber Security and SaaS Platforms

Summary


This episode of The Core Podcast discusses the importance of securing SaaS platforms and navigating the cybersecurity challenges they present. The conversation covers the definition and evolution of SaaS platforms, the associated risks and vulnerabilities, and the need for regulations and compliance in SaaS security. The episode also highlights the role of AppOmni in providing solutions for securing SaaS platforms and offers foundational best practices for organisations to follow. Overall, the episode emphasizes the need for organisations to prioritise the security of their SaaS platforms and take proactive measures to protect sensitive data.


Takeaways


  • SaaS platforms have become integral to modern business operations, but they also pose cybersecurity risks and vulnerabilities.
  • Misconfigurations and data exposures in SaaS systems are common and can lead to unauthorised access and leakage of sensitive data.
  • Regulations and compliance standards are emerging to address the security challenges in SaaS platforms, but organizations must take proactive measures to secure their systems.
  • Fourth-party risk and supply chain vulnerabilities are significant concerns in SaaS security, as interconnected systems can provide entry points for attackers.
  • AppOmni offers solutions for securing SaaS platforms and helps organizations automate security processes and achieve a more excellent security posture.



Sound Bites


Chapters


00:00 Introduction and Importance of Securing SaaS Platforms

04:12 Definition and Evolution of SaaS Platforms

10:46 Security Challenges and Risks in SaaS Platforms

14:59 Misconfigurations and Data Exposures in SaaS Systems

23:26 Fourth Party Risk and Supply Chain Vulnerabilities

24:44 Foundational Best Practices for Securing SaaS Platforms

30:37 AppOmni's Solution and Value in SaaS Security

35:05 Conclusion and Call to Action



Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
41 minutes 17 seconds

The Core Podcast
The Crucial Role of Full Network Visibility in Cybersecurity:

This podcast episode delves into the critical aspect of achieving full visibility on your network and its paramount importance in enhancing cybersecurity measures.


David Atkinson, founder of SenseOn, sheds light on the significance of understanding every nook and cranny of your digital landscape to safeguard against evolving cyber threats effectively.


Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
54 minutes 27 seconds

The Core Podcast
A deep dive into the world of File Transfer

We're excited to announce that the focus of the latest episode of The Core Podcast is file transfer! We have two special guests joining us, Chris Payne from Pro2col and Andrew Wragg, who closely collaborates with our marketing and tech teams at Core to Cloud.


This episode will give you everything you need about file transfer. We will be exploring data security in file exchange technology.


Pro2col specialises in file transfer and automation technology. Chris Payne, our guest from Pro2col, has been working with solutions of this nature for the past 17 years. Together, we have completed over 1600 projects in 35 countries over a 20-year period.


Chris has significant expertise in the channel and has spent his entire career working in it. He even started his own reseller company, which he specialised in file transfer. By using marketing automation and working hard, he took his company to nearly 1 million in revenue with around 75 customers. He sold it to Pro2col in December 2021. He also spent four years in Norway and ran his company from there.


Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
59 minutes 45 seconds

The Core Podcast
Securing Your Digital Ecosystem: Mastering Third-Party Risk Management

Cybersecurity experts Kelly and Matt explore advanced tactics for understanding and improving cyber-risk postures in this podcast episode. The discussion emphasises the importance of strengthening relationships between companies and third parties to mitigate cybersecurity risks effectively. The episode explores practical strategies and insights for organisations seeking to elevate their cybersecurity measures beyond fundamental approaches.



Hosted on Acast. See acast.com/privacy for more information.

Show more...
1 year ago
34 minutes 21 seconds

The Core Podcast
Cyber threats pose a constant challenge to businesses and individuals worldwide. These threats range from seemingly innocuous phishing attempts to complex ransomware attacks and highly orchestrated data breaches that result in the exposure of sensitive data. Join industry experts and leaders as we unpack the latest security challenges we face and explore how we can work together to address them. In this podcast, powered by Core to Cloud, discover the interconnected issues facing industries around the world and learn about potential solutions.

Hosted on Acast. See acast.com/privacy for more information.