
Defense in Depth
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Latest Episode
Do You Have a Functional Policy or Did You Just Write One? (21.08.2025)
Previous Episodes
- Where are We Struggling with Zero Trust 14.08.2025
- Cybersecurity Has a Prioritization Problem 07.08.2025
- How Can AI Provide Useful Guidance from Fragmented Security Data? 31.07.2025
- Why Salespeople's Knowledge of Cybersecurity Is Critical for the Ecosystem 24.07.2025
- What Are the Cybersecurity Trends We Need To Follow? 17.07.2025
- Is It Even Possible to Fast-Track Your Way Into Cybersecurity? 10.07.2025
- What's the Most Efficient Way to Rate Third Party Vendors? 03.07.2025
- Don't Ask "Can" We Secure It, But "How" Can We Secure It 26.06.2025
- Has the Shared Security Model for SaaS Shifted? 12.06.2025
- Improving the Efficiency of Your Threat Intelligence 05.06.2025
- Why Cybersecurity Professionals Lie on Their Resumes 29.05.2025
- What Should Be in a CISO Job Description? 22.05.2025
- The CISO's Job Is Impossible 15.05.2025
- Can You Have a Secure Software Environment Without Traditional Vulnerability Management? 08.05.2025
- How Much Should Salespeople Know About Their Product? 01.05.2025
- Why Are We Still Struggling to Fix Application Security? 24.04.2025
- What Can Someone with No Experience Do in Cybersecurity? 17.04.2025
- Are New Gartner-Created Categories/Acronyms Helping or Hurting the Cybersecurity Industry? 10.04.2025
- Can AI improve Third-Party Risk Management (TPRM) 03.04.2025
- Cybersecurity Is NOT an Entry-Level Position 27.03.2025