<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Expert Insights Podcast]]></title><description><![CDATA[The Experts Insights Podcast brings you insights and knowledge from cybersecurity and technology experts.]]></description><link>https://podcasts.expertinsights.com</link><image><url>https://substackcdn.com/image/fetch/$s_!0brs!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F184b3036-224b-461d-97d5-c1ea9050033a_1000x1000.png</url><title>Expert Insights Podcast</title><link>https://podcasts.expertinsights.com</link></image><generator>Substack</generator><lastBuildDate>Sun, 19 Apr 2026 19:21:22 GMT</lastBuildDate><atom:link href="https://podcasts.expertinsights.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Expert Insights]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[contact@expertinsights.com]]></webMaster><itunes:owner><itunes:email><![CDATA[contact@expertinsights.com]]></itunes:email><itunes:name><![CDATA[Expert Insights Podcast]]></itunes:name></itunes:owner><itunes:author><![CDATA[Expert Insights Podcast]]></itunes:author><googleplay:owner><![CDATA[contact@expertinsights.com]]></googleplay:owner><googleplay:email><![CDATA[contact@expertinsights.com]]></googleplay:email><googleplay:author><![CDATA[Expert Insights Podcast]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[#89. AI Is Superpowering Phishing: How Can We Fight Back?]]></title><description><![CDATA[Watch now | David Badanes, Human Risk Leader at Hoxhunt in conversation with Joel Witts, Expert Insights.]]></description><link>https://podcasts.expertinsights.com/p/89-hoxhunt-david-badanes</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/89-hoxhunt-david-badanes</guid><dc:creator><![CDATA[Alex]]></dc:creator><pubDate>Tue, 07 Apr 2026 12:04:06 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/193446238/88f5ecdb087e537d14d8c4f6f9343062.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Phishing attacks are more convincing, more frequent, and harder to detect than ever. AI has lowered the barrier to entry for attackers, while raising the stakes for every organization.</p><p>In this episode, Expert Insights speaks with David Badanes, Human Risk Leader at Hoxhunt, about the findings from Hoxhunt&#8217;s 2026 Phishing Trends Report and what they mean for security teams trying to keep pace with AI-powered threats.<br>In this episode:</p><ul><li><p>Why AI has made high-quality phishing attacks accessible to any threat actor</p></li><li><p>How phishing has expanded beyond email into calendars, SMS, and social platforms</p></li><li><p>Why human-centric security training is now a business-critical investment</p></li><li><p>How to spot AI-generated phishing emails before your users click</p></li></ul><p>Recommended for CISOs, security awareness leads, and HR and risk leaders building a human-centered approach to cyber defense.</p><p><em>Sponsored by Hoxhunt.</em></p>]]></content:encoded></item><item><title><![CDATA[AI vs AI at RSAC: What 8 Security Leaders Really Think ]]></title><description><![CDATA[What are the key takeaways from RSAC 2026 that you need to know?]]></description><link>https://podcasts.expertinsights.com/p/rsac-2026-roundup</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/rsac-2026-roundup</guid><dc:creator><![CDATA[Alex]]></dc:creator><pubDate>Thu, 02 Apr 2026 11:01:50 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/192858048/1496f8a4f49f3381029f6d3f0fe473c4.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Last week, our team was on the ground at RSAC 2026, speaking with CISOs, security leaders, and innovators on the frontlines of AI-driven change.</p><p>In this episode, we share insights from 8 leaders at the conference, from the rise of shadow AI and autonomous agents to the reality that humans can&#8217;t keep up with machine-speed threats.</p><p>We explore how phishing is evolving, why agents are becoming a new insider risk, and how CISOs are being pushed to their limits as governance struggles to keep pace.</p><p>The big takeaway? Cybersecurity is becoming AI vs AI, and the organizations that put the right guardrails in place will come out ahead.</p><p><strong>Key Timestamps:</strong></p><ul><li><p><strong>00:49</strong> - Everyone&#8217;s a developer now (The rise of AI agents)</p></li><li><p><strong>01:22 </strong>&#8211; Shadow AI is already out of control</p></li><li><p><strong>05:04 </strong>&#8211; The tipping point: AI vs AI security</p></li><li><p><strong>09:25</strong> &#8211; Phishing at machine speed</p></li><li><p><strong>12:44</strong> &#8211; The CISO breaking point (and what comes next)</p></li></ul>]]></content:encoded></item><item><title><![CDATA[How AI Agents Are Reshaping Security Operations]]></title><description><![CDATA[Chris Jacob, Field CISO at Securonix in conversation with Joel Witts, Expert Insights]]></description><link>https://podcasts.expertinsights.com/p/87-chris-jacob-securonix</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/87-chris-jacob-securonix</guid><dc:creator><![CDATA[Alex]]></dc:creator><pubDate>Thu, 19 Mar 2026 08:46:12 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/191235815/ee53277bbf1770bac6c219b16bee1e3e.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>SOC teams are overwhelmed by alerts and losing analysts to burnout. Better integration and smarter automation are changing that.<br><br>In this episode, Expert Insights speaks with Chris Jacob, Field CISO at Securonix and former founding executive at ThreatQuotient, about how AI is changing security operations.<br><br><strong>In this episode:</strong></p><ul><li><p>Why identity management is now the top attack vector</p></li><li><p>How agentic AI can reduce alert fatigue and analyst burnout</p></li><li><p>Why AI is becoming the new security perimeter</p></li><li><p>How to rethink your SOC strategy with a platform-first approach</p></li></ul><p><br>Recommended for CISOs, SOC leaders, and security analysts looking at AI-powered security operations.<br><em>Sponsored by Securonix</em></p>]]></content:encoded></item><item><title><![CDATA[#86 - Why Secrets Sprawl Is One Of The Biggest Hidden Risks In Cybersecurity]]></title><description><![CDATA[Doppler CEO, Amber Britton, in conversation with Joel Witts, Expert Insights]]></description><link>https://podcasts.expertinsights.com/p/86-doppler-amber-britton</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/86-doppler-amber-britton</guid><dc:creator><![CDATA[Alex]]></dc:creator><pubDate>Wed, 18 Mar 2026 14:32:22 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/191356700/b60a2ecfd35ec92e5cbff67fa6c1fff3.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Twenty-four million secrets were leaked via GitHub in a single year. As organizations scale across multiple clouds, microservices, and AI workflows, managing API keys, tokens, and credentials is becoming harder to control.</p><p>In this episode, Expert Insights speaks with Amber Britton, CEO of <a href="https://www.doppler.com/?utm_campaign=EI">Doppler</a>, about why secrets sprawl is one of the most underestimated risks in cybersecurity today.<br><br>In this episode:</p><ul><li><p>Why secrets sprawl is a growing and often overlooked security risk</p></li><li><p>How AI agents are reshaping secrets management</p></li><li><p>How to think about non-human identities in your security strategy</p></li><li><p>Why developer experience is central to building a more secure organization</p></li></ul><p>Recommended for CISOs, security engineers, and developers working on secrets management, cloud security, or AI-driven workflows.<br><em>Sponsored by Doppler</em></p>]]></content:encoded></item><item><title><![CDATA[#85 - OpenText World Roundup]]></title><description><![CDATA[Interviews from the OpenText World conference in Nashville]]></description><link>https://podcasts.expertinsights.com/p/85-eset-world-roundup</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/85-eset-world-roundup</guid><dc:creator><![CDATA[Alex]]></dc:creator><pubDate>Thu, 04 Dec 2025 16:03:06 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/180686846/22166f20009aa0c1558ca1b4b84cc4bc.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Over the past week, our Reporter, Mirren McDade has been in Nashville attending OpenText World. Over the week she attended a series of keynotes, interviewed leading minds, and connected with cybersecurity innovators from across the world.</p><p>In this episode, we&#8217;ve included two of the interviews that Mirren conducted during the week. The first is from Scott Richards, SVP, AI &amp; Discovery, and Cybersecurity, and the other from Muhi Majzoub, EVP of Cybersecurity Engineering at OpenText. The guests discuss the evolving nature of cybersecurity regulation, AI advances, and the steps that organizations need to take to protect themselves.</p>]]></content:encoded></item><item><title><![CDATA[#84. Lessons From The Fastest Growing Private Software Company In The USA]]></title><description><![CDATA[Mike Walters, Co-founder of Action1, explains how a laser focus on patching turned Action1 into the fastest-growing private software company in the US.]]></description><link>https://podcasts.expertinsights.com/p/84-mike-walters</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/84-mike-walters</guid><dc:creator><![CDATA[Alex]]></dc:creator><pubDate>Thu, 20 Nov 2025 10:27:46 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/179343807/4030b0ebbfad7114b3a5423fd70026e9.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Many founders build a single company, take their exit, and step back. Mike Walters has done it twice.</p><p>First with Netwrix, and now with Action1, Walters has a track record of building highly successful cybersecurity companies, laser focused on a specific niche.</p><p>What set Walters on this path?</p><p>It began with writing software. An early appreciation of scale and the realization that writing code alone couldn&#8217;t deliver impact fast enough pushed him and business partner Alex Vovk toward executing their own product vision.</p><p>From here, the pair launched Netwrix and Action1 into profitable, founder led businesses with no outside capital or investor pressure. Today, Netwrix is a multibillion-dollar organization with thousands of employees.</p><p>With Action1, Walters and Vovk are doing it again&#8212;but with even bigger ambition. They reinvested $20 million of their own capital to build a cloud-native platform engineered for the remote-work era. The bet has paid off. Action1 is now the fastest-growing private software company in America.</p><p>In this episode, Expert Insights&#8217; Head of Content, Joel Witts, sits down with Mike Walters to explore his career and how patching is an often overlooked area of cybersecurity - as well as the parallels between building a company and surfing.</p><p></p>]]></content:encoded></item><item><title><![CDATA[10 Bold Truths from Cyber's Most Influential Women]]></title><description><![CDATA[Hear from Cait and Alex as they discuss their top takeaways from across the season of Women In Cyber.]]></description><link>https://podcasts.expertinsights.com/p/10-unmissable-lessons-from-women</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/10-unmissable-lessons-from-women</guid><dc:creator><![CDATA[Alex]]></dc:creator><pubDate>Mon, 17 Nov 2025 16:02:34 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/178682694/8825a7d5f1bb5d68546a25b54624baff.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>The Women in Cyber podcast wraps up its first series by reflecting on key takeaways from across the series, emphasizing the importance of continuous learning, diversity, collaboration, and community in the cybersecurity field. </p><p>Host, Caitlin Harris, and Producer, Alex Zawalnyski, discuss insights from guests about work-life balance, the role of AI, compliance, and building a strong security culture, highlighting the unique perspectives women bring to the industry.</p><ul><li><p>(00:53) - Reflections on the Podcast Journey</p></li><li><p>(03:05) - The Importance of Continuous Learning in Cybersecurity</p></li><li><p>(05:40) - Diversity of Backgrounds in Cybersecurity</p></li><li><p>(08:44) - Work-Life Balance and Avoiding Burnout</p></li><li><p>(11:34) - Collaboration in Cybersecurity</p></li><li><p>(14:42) - The Role of AI in Cybersecurity</p></li><li><p>(17:29) - Compliance as a Springboard for Security Success</p></li><li><p>(19:16) - Building a Strong Security Culture</p></li></ul>]]></content:encoded></item><item><title><![CDATA[The CISO Survival Guide]]></title><description><![CDATA[Being a CISO comes with immense pressures&#8212;from managing high-stakes risks to navigating ever-changing regulations.]]></description><link>https://podcasts.expertinsights.com/p/the-ciso-survival-guide</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/the-ciso-survival-guide</guid><pubDate>Mon, 10 Nov 2025 16:02:59 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/175507488/1439bec7aa28e2e191ffb75416e67335.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this final panel of <em>Women In Cyber</em>, host Caitlin Harris talks with Dana Simberkoff (Chief Risk, Privacy, and Information Security Officer at AvePoint) and Tia Hopkins (Chief Cyber Resilience Officer &amp; Field CTO, eSentire) about the real challenges, lessons learned, and strategies of leading a team at the front line of cybersecurity.</p><p>Dana and Tia share decades of experience and industry accolades, offering actionable advice that any cybersecurity professional&#8212;or aspiring leader&#8212;can use to improve their career, team, and organization.</p><p><strong>Listen now</strong> to hear from two of the top women shaping cybersecurity leadership today.</p><p><strong>Inside this episode:</strong></p><p>(01:20) - Introduction</p><p>(07:30) - The biggest challenges that modern CISOs are facing</p><p>(14:20) - How Agentic AI changes everything</p><p>(18:25) - The one thing that would make life easier</p><p>(26:30) - Fostering a culture of collaboration and accessibility</p><p>(32:55) - What does the future hold?</p><p><strong>About Expert Insights</strong></p><p>Expert Insights helps security and IT professionals make smarter, faster cybersecurity decisions. We cut through the noise with clear, free, and unbiased shortlists, guides, and expert articles, so you can find the right tools, faster.</p>]]></content:encoded></item><item><title><![CDATA[Secrets From The Cyber C-Suite]]></title><description><![CDATA[What can we learn from the women leading some of the most well-known companies in the industry?]]></description><link>https://podcasts.expertinsights.com/p/secrets-from-the-cyber-c-suite</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/secrets-from-the-cyber-c-suite</guid><pubDate>Mon, 03 Nov 2025 16:00:00 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/175506610/c5e0b14f28a851b80f140e27789f06c2.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of <em>Women In Cyber</em>, host Caitlin Harris sits down with Janine Seebeck (CEO, BeyondTrust), Siroui Mushegian (CIO, Barracuda Networks), and Libby McIlhany (CPO, Pax8) to explore the challenges, strategies, and realities of women in the C-Suite.</p><p>Janine, Siroui, and Libby share decades of executive experience, offering practical insights for aspiring leaders, current executives, and anyone curious about the realities of running a tech organization.</p><p><strong>Press play now</strong> to learn from the women shaping the future of cybersecurity from the top.</p><p><strong>Inside this episode:</strong></p><p>(01:20) - Introduction</p><p>(03:15) - The Role of Cybersecurity in boardroom decisions</p><p>(09:10) - Communication strategies for technical topics</p><p>(15:00) - The perception of women in the C-suite</p><p>(21:00) - Advice for people looking to forage a career in the C-suite</p><p>(28:20) - The CEO difference</p><p>(32:50) - Baking security into every decision</p><p>(40:45) - What sort of legacy do you want to leave?</p><p><strong>About Expert Insights</strong></p><p>Expert Insights helps security and IT professionals make smarter, faster cybersecurity decisions. We cut through the noise with clear, free, and unbiased shortlists, guides, and expert articles, so you can find the right tools, faster.</p>]]></content:encoded></item><item><title><![CDATA[Creating A Culture Of Security]]></title><description><![CDATA[Cybersecurity tools alone won't make your organization as secure as creating getting your team on board.]]></description><link>https://podcasts.expertinsights.com/p/creating-a-culture-of-security</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/creating-a-culture-of-security</guid><pubDate>Mon, 27 Oct 2025 16:00:50 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/173925233/75e8b8e8bcb2a81a16793ee23ea281d8.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Q: What does it take to build a security strategy that actually sticks?</p><p>A: A culture that makes employees actually care about the security of their business.</p><p>And we&#8217;re not <em>just</em> talking about awareness training and password policies.</p><p>In this episode of <em>Women In Cyber</em>, host Caitlin Harris talks with Anne Cutler (Keeper Security), Molly McLain Sterling (Proofpoint), and Khush Kashyap (Vanta) about how you can cultivate a strong security mindset across your entire organization.</p><p>Anne, Molly, and Khush share decades of experience leading global cybersecurity strategy, education, and governance initiatives, offering practical advice and inspiration for anyone looking to strengthen their organization&#8217;s security culture.</p><p><strong>Listen now</strong> to learn how these women are making security more human&#8212;and more effective.</p><p><strong>Inside this episode:</strong></p><p>(01:20) - Introduction</p><p>(02:50) - Strategies for creating an effective, organization-wide security culture</p><p>(08:00) - How to make security a shared responsibility</p><p>(13:10) - The role of employee training</p><p>(21:10) - Measuring success of culture changes</p><p>(30:20) - The importance of GRC in building a strategy</p><p>(36:45) - The place for empathy within cybersecurity</p><p>(39:00) - The changes that women are making today</p><p><strong>About Expert Insights</strong></p><p>Expert Insights helps security and IT professionals make smarter, faster cybersecurity decisions. We cut through the noise with clear, free, and unbiased shortlists, guides, and expert articles, so you can find the right tools, faster.</p>]]></content:encoded></item><item><title><![CDATA[The Truth About AI]]></title><description><![CDATA[Everyone is talking about how AI will transform the cybersecurity industry&#8212;but what does it really mean for the people on the frontlines?]]></description><link>https://podcasts.expertinsights.com/p/the-truth-about-ai</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/the-truth-about-ai</guid><pubDate>Mon, 20 Oct 2025 15:03:41 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/173924964/3435c9b668586dd8e1a2cf75163c3bd3.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of <em>Women In Cyber</em>, host Caitlin Harris talks with Nicole Carignan (Darktrace), Laura Ellis (Rapid7), and Emanuela Zaccone (Sysdig) about the cultural, technical, and strategic shifts AI is bringing to the field.</p><p>Nicole, Laura, and Emanuela bring decades of experience across threat intelligence, data strategy, and AI product innovation, offering insights and inspiration for anyone looking to innovate at the intersection of AI and cybersecurity.</p><p><strong>Listen now</strong> to learn from the women shaping the future of AI in cyber.</p><p><strong>Inside this episode:</strong></p><p>(01:30) &#8211; Introduction</p><p>(06:50) - The rise of Agentic AI</p><p>(13:25) - The risks and rewards of deploying AI in the SOC</p><p>(17:50) - The cases where AI shouldn&#8217;t be used</p><p>(25:00) - How do you expect threat actors to harness AI?</p><p>(30:00) - How women in cyber becomes a way of life</p><p>(33:20) - Developing AI for technical and non-technical users</p><p>(36:10) - Advice for breaking into the Cyber AI space</p><p><strong>About Expert Insights</strong></p><p>Expert Insights helps security and IT professionals make smarter, faster cybersecurity decisions. We cut through the noise with clear, free, and unbiased shortlists, guides, and expert articles, so you can find the right tools, faster.</p>]]></content:encoded></item><item><title><![CDATA[Navigating The Cyber Policy Maze]]></title><description><![CDATA[How are evolving regulations shaping the way organizations manage cybersecurity risk?]]></description><link>https://podcasts.expertinsights.com/p/wic-navigating-the-cyber-policy-maze</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/wic-navigating-the-cyber-policy-maze</guid><pubDate>Mon, 13 Oct 2025 15:01:14 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/173924796/2c88c219ebd0d91765ef780c01fcc665.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of <em>Women In Cyber</em>, host Caitlin Harris speaks with Sezaneh Seymour (Coalition) and Courtney Maug&#233; (NFP Insurance) about the high-stakes world of cybersecurity policy and risk management.</p><p>Sezaneh and Courtney share decades of experience at the intersection of policy, risk management, and national security, providing actionable insights for anyone looking to understand or influence the evolving regulatory landscape.</p><p><strong>Play now</strong> to hear from the women shaping the rules of cybersecurity.</p><p><strong>Inside this episode:</strong></p><p>(01:30) - Introduction</p><p>(4:50) - Proactive cybersecurity risk management</p><p>(08:55) - Understanding cybersecurity insurance misconceptions</p><p>(13:50) - Quantifying risk in an evolving landscape</p><p>(18:00) - The geopolitical risks of cybersecurity policies</p><p>(25:00) - The accessibility of cybersecurity resources</p><p>(29:15) - Aligning security with business goals</p><p><strong>About Expert Insights</strong></p><p>Expert Insights helps security and IT professionals make smarter, faster cybersecurity decisions. We cut through the noise with clear, free, and unbiased shortlists, guides, and expert articles, so you can find the right tools, faster.</p>]]></content:encoded></item><item><title><![CDATA[Innovating For The Future Of Cybersecurity]]></title><description><![CDATA[How do cybersecurity developers keep up with the ever-evolving threat landscape?]]></description><link>https://podcasts.expertinsights.com/p/innovating-for-the-future-of-cybersecurity</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/innovating-for-the-future-of-cybersecurity</guid><pubDate>Mon, 06 Oct 2025 15:01:32 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/173924621/d29263413e06f69b1b3be759efdb6b25.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of <em>Women In Cyber</em>, host Caitlin Harris talks with Margaret Cunningham (Darktrace), Kavita Varadarajan (Exaforce), and April Lenhard (Qualys) about how they drive product innovation in the fast-moving world of cybersecurity.</p><p>Margaret, Kavita, and April share their experiences leading product strategy, developing enterprise solutions, and combining technical expertise with user-focused design&#8212;offering actionable insights for anyone working at the intersection of cybersecurity, technology, and innovation.</p><p><strong>Listen now</strong> to learn how these women are shaping the next generation of cybersecurity products.</p><p><strong>Inside this episode:</strong></p><p>(01:30) - Introduction</p><p>(06:20) - Balancing innovation with governance in security products</p><p>(13:00) - The role of user feedback in shaping impactful solutions</p><p>(19:20) - The role of Agentic AI in the future of cybersecurity</p><p>(27:40) - The intersection between cybersecurity and national security policy</p><p>(37:40) - How can you build trust with new security tools</p><p><strong>About Expert Insights</strong></p><p>Expert Insights helps security and IT professionals make smarter, faster cybersecurity decisions. We cut through the noise with clear, free, and unbiased shortlists, guides, and expert articles, so you can find the right tools, faster.</p>]]></content:encoded></item><item><title><![CDATA[From Intel To Action - The Human Side Of Cyber Threat Intelligence]]></title><description><![CDATA[What does it take to stay ahead in cybersecurity?]]></description><link>https://podcasts.expertinsights.com/p/from-intel-to-action-the-human-side</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/from-intel-to-action-the-human-side</guid><pubDate>Mon, 29 Sep 2025 15:01:49 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/173924389/c03832ed784632c58caa5ffcdfde9125.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of <em>Women In Cyber</em>, host Caitlin Harris sits down with Melissa Bischoping (Tanium), Rebecca Taylor (Secureworks, a Sophos company), and Kristina Balaam (Lookout) to explore the fast-paced world of security research and threat intelligence.</p><p>Melissa, Rebecca, and Kristina share their journeys into threat research, revealing insights that can help any threat analyst, SOC, or IT team stay ahead of the curve.</p><p><strong>Listen now</strong> to learn from the women uncovering threats before they hit.</p><p><strong>Inside this episode:</strong>(00:00) &#8211; Introduction</p><p>(02:49) &#8211; Finding a path into cybersecurity research</p><p>(08:51) &#8211; A day in the life of a threat intelligence expert</p><p>(12:12) &#8211; Challenges and opportunities within security research</p><p>(19:31) &#8211; Traits for success in security research</p><p>(23:44) &#8211; The role of collaboration in cybersecurity</p><p>(26:02) &#8211; Emerging threats and trends shaping the industry</p><p>(31:16) &#8211; How the security research space needs to evolve</p><p>(35:00) &#8211; Translating threat intelligence into actionable defenses</p><p><strong>About Expert Insights</strong></p><p>Expert Insights helps security and IT professionals make smarter, faster cybersecurity decisions. We cut through the noise with clear, free, and unbiased shortlists, guides, and expert articles, so you can find the right tools, faster.</p>]]></content:encoded></item><item><title><![CDATA[Breaking Into Cybersecurity]]></title><description><![CDATA[Want to break into cybersecurity&#8212;or take your career to the next level?]]></description><link>https://podcasts.expertinsights.com/p/wic-breaking-into-cybersecurity</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/wic-breaking-into-cybersecurity</guid><pubDate>Mon, 22 Sep 2025 15:01:28 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/173255876/4261cbf9a282d14f82e206e54e74849d.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>In this episode of&#8239;<em>Women In Cyber</em>, host Caitlin Harris chats with Audra Streetman (Splunk) and Olga Polishchuck (ZeroFox) to reveal how to navigate one of tech&#8217;s fastest-moving, high-pressure industries.</p><p>Audra and Olga share their journeys from &#8220;ground zero&#8221; to leadership, offering actionable lessons for anyone aiming to succeed in cybersecurity.</p><p><strong>Press play now</strong>&#8239;to learn from women who&#8217;ve navigated the path and paved the way.</p><p><strong>Inside this episode:</strong></p><p>(00:00) &#8211; Introduction</p><p>(02:32) &#8211; Landing your first cybersecurity role, even with a non-traditional background</p><p>(08:18) &#8211; The power of cross-skilling in a fast-evolving field</p><p>(12:05) &#8211; Navigating entry-level challenges</p><p>(14:35) &#8211; Real-world strategies for thriving under pressure and maintaining a healthy work-life balance</p><p>(23:06) &#8211; Imposter syndrome and gender bias: tips for building an inclusive work environment</p><p>(26:57) &#8211; Career growth, sponsorship, and mentoring opportunities</p><p><strong>About Expert Insights</strong></p><p>Expert Insights helps security and IT professionals make smarter, faster cybersecurity decisions. We cut through the noise with clear, free, and unbiased shortlists, guides, and expert articles, so you can find the right tools, faster.&#8239;</p>]]></content:encoded></item><item><title><![CDATA[How To Build A Cyber Startup]]></title><description><![CDATA[What does it really take to build a successful cybersecurity company from the ground up?]]></description><link>https://podcasts.expertinsights.com/p/wic-build-a-cyber-startup</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/wic-build-a-cyber-startup</guid><pubDate>Mon, 15 Sep 2025 15:03:26 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/173255592/1f28f514940f3f576e8a84dbb20d8829.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>What does it really take to build a successful cybersecurity company from the ground up?</p><p>In this episode of&#8239;<em>Women In Cyber</em>, host Caitlin Harris sits down with Poornima DeBolle (Menlo Security) and Kris Bondi (Mimoto), to uncover the triumphs, challenges, and lessons learned along their founding journeys.</p><p>Poornima and Kris share their firsthand insights as industry pioneers, innovators, and leaders shaping cybersecurity today.</p><p><strong>Listen now</strong>&#8239;to get insider stories and actionable lessons from women who are rewriting the rules of tech entrepreneurship.</p><p><strong>Inside this episode:</strong></p><p>(00:00) &#8211; Introduction</p><p>(03:12) &#8211; The pivotal moments that sparked their startup journeys</p><p>(07:56) &#8211; The role of co-founders and team dynamics</p><p>(11:45) &#8211; Balancing career ambitions and personal life</p><p>(16:29) &#8211; Moments of validation as a founder</p><p>(20:27) &#8211; Lessons that could make&#8212;or break&#8212;a cybersecurity startup</p><p><strong>About Expert Insights</strong></p><p>Expert Insights helps security and IT professionals make smarter, faster cybersecurity decisions. We cut through the noise with clear, free, and unbiased shortlists, guides, and expert articles, so you can find the right tools, faster.&#8239;</p>]]></content:encoded></item><item><title><![CDATA[Introducing... Women In Cyber]]></title><description><![CDATA[Women in Cyber, brought to you by Expert Insights, explores not only the technical side of cybersecurity, but also the personal stories, diverse career paths, and unique perspectives that women bring to this field.]]></description><link>https://podcasts.expertinsights.com/p/introduction-to-women-in-cyber</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/introduction-to-women-in-cyber</guid><pubDate>Mon, 08 Sep 2025 15:02:38 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/172757310/428c7db77da2fa4f7c284b747561aa37.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p><strong>Women in Cyber, brought to you by Expert Insights, explores not only the technical side of cybersecurity, but also the personal stories, diverse career paths, and unique perspectives that women bring to this field.</strong></p><p>In this first introduction, host Caitlin Harris and producer Alex Zawalnyski reveal how <em>Women In Cyber</em> came to life&#8212;from the spark that inspired it, to the vision behind the series. It is a podcast designed to amplify voices too often left out of the cybersecurity conversation.</p><p>This season, they&#8217;ll spotlight brilliant minds and spark conversations that challenge the traditional assumptions of who belongs in cybersecurity.</p><p>This is your front-row seat to the stories often overlooked within cybersecurity.</p><p><strong>Hit play and get inspired.</strong></p><p><strong>Inside this episode:</strong></p><p>(00:00) &#8211; Introducing the Women In Cyber podcast</p><p>(01:09) &#8211; Introducing Caitlin and Alex</p><p>(02:22) &#8211; The moment that inspired the podcast</p><p>(05:05) &#8211; How this series will spotlight the personal stories, diverse career paths, and unique perspectives of women in cybersecurity</p><p>(07:52) &#8211; Key themes and highlights that emerged during recording</p><p>(13:29) &#8211; Choosing a name</p><p><strong>About Expert Insights</strong></p><p>Expert Insights helps security and IT professionals make smarter, faster cybersecurity decisions. We cut through the noise with clear, free, and unbiased shortlists, guides, and expert articles, so you can find the right tools, faster.</p>]]></content:encoded></item><item><title><![CDATA[Women In Cyber: Trailer]]></title><description><![CDATA[Listen now (2 mins) | Hello, and welcome to the Women in Cyber Podcast, brought to you by Expert Insights.]]></description><link>https://podcasts.expertinsights.com/p/trailer</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/trailer</guid><pubDate>Wed, 03 Sep 2025 14:51:38 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/172685734/dea3176e5593ba05c4e70013362a34cd.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<p>Hello, and welcome to the Women in Cyber Podcast, brought to you by Expert Insights.</p><p>This is a space dedicated to amplifying the voices of women across the cybersecurity industry. In each episode, we&#8217;ll host a panel conversation that showcases not only the technical side of cybersecurity, but also the personal stories, diverse career paths, and unique perspectives that women bring to this field.</p><p>Our goal is simple: to create a community where women can share experiences, celebrate achievements, and spark conversations that challenge the traditional assumptions of who belongs in cybersecurity.</p><p>So whether you&#8217;re just starting out, growing your career, or leading the way, this podcast is for you. Let&#8217;s learn, connect, and build a stronger, more inclusive cybersecurity community&#8212;together.</p>]]></content:encoded></item><item><title><![CDATA[#83. Vibe Coding: A More Secure Future?]]></title><description><![CDATA[Expert Insights interviews Manoj Nair, Chief Innovation Officer at Snyk.]]></description><link>https://podcasts.expertinsights.com/p/82-manoj-nair</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/82-manoj-nair</guid><dc:creator><![CDATA[Expert Insights Podcast]]></dc:creator><pubDate>Tue, 02 Sep 2025 03:30:22 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/171384104/836198bf99f206baa50825144887c580.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!8reA!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36bb11ca-5adc-41cc-97c2-5d73634dc6f8_1000x1000.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!8reA!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36bb11ca-5adc-41cc-97c2-5d73634dc6f8_1000x1000.heic 424w, https://substackcdn.com/image/fetch/$s_!8reA!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36bb11ca-5adc-41cc-97c2-5d73634dc6f8_1000x1000.heic 848w, https://substackcdn.com/image/fetch/$s_!8reA!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36bb11ca-5adc-41cc-97c2-5d73634dc6f8_1000x1000.heic 1272w, https://substackcdn.com/image/fetch/$s_!8reA!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36bb11ca-5adc-41cc-97c2-5d73634dc6f8_1000x1000.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!8reA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36bb11ca-5adc-41cc-97c2-5d73634dc6f8_1000x1000.heic" width="282" height="282" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/36bb11ca-5adc-41cc-97c2-5d73634dc6f8_1000x1000.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:1000,&quot;resizeWidth&quot;:282,&quot;bytes&quot;:92866,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://podcasts.expertinsights.com/i/171384104?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36bb11ca-5adc-41cc-97c2-5d73634dc6f8_1000x1000.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!8reA!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36bb11ca-5adc-41cc-97c2-5d73634dc6f8_1000x1000.heic 424w, https://substackcdn.com/image/fetch/$s_!8reA!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36bb11ca-5adc-41cc-97c2-5d73634dc6f8_1000x1000.heic 848w, https://substackcdn.com/image/fetch/$s_!8reA!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36bb11ca-5adc-41cc-97c2-5d73634dc6f8_1000x1000.heic 1272w, https://substackcdn.com/image/fetch/$s_!8reA!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F36bb11ca-5adc-41cc-97c2-5d73634dc6f8_1000x1000.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>What if <em>vibe coding</em> &#8212; the wave of developers using AI assistants to generate code &#8212; could actually lead to <strong>better security outcomes</strong>?</p><p>Today, host Joel Witts is joined by <strong>Manoj Nair, Chief Innovation Officer at Snyk</strong>, to explore how AI is transforming the way we build and secure software.</p><p>From his early work pioneering data leakage prevention at RSA, through to leading cloud startups, and now driving innovation at Snyk, Manoj has had a front-row seat to cybersecurity&#8217;s biggest shifts.</p><p>We&#8217;ll dive into why traditional approaches to AppSec are no longer enough, how &#8220;shift left&#8221; is evolving in the AI era, and why &#8212; with the right guardrails &#8212; AI-generated code could actually be more secure than code written by humans.</p><p><strong>Takeaways</strong></p><ul><li><p>Vibe coding <em>could</em> lead to better security outcomes with the right guardrails.</p></li><li><p>Shift left is evolving in the age of AI, moving security earlier in the development process.</p></li><li><p>Almost every company is now a software company, making custom software the crown jewels.</p></li><li><p>Security teams need to enable developers rather than act as gatekeepers.</p></li><li><p>AI is being used in offensive ways, creating new vulnerabilities.</p></li><li><p>The awareness of security risks is increasing among leading companies.</p></li><li><p>AI-generated code can be more insecure than human-generated code.</p></li><li><p>Proactive security measures are essential in the AI era.</p></li><li><p>Secure code generation should be integrated into the development pipeline.</p></li><li><p>Understanding and visibility of AI components in code is crucial for security.</p></li></ul><p><strong>Chapters</strong></p><p>00:00 The Evolution of Application Security in the AI Era</p><p>10:01 Vibe Coding: Risks and Opportunities</p><p>19:55 The Future of AI in Cybersecurity</p><p><strong>About Expert Insights</strong></p><p>Expert Insights saves you time and hassle by rigorously analyzing cybersecurity solutions and cutting through the hype to deliver clear, actionable shortlists. We specialize in cybersecurity. So, our focus is sharper, our knowledge is deeper, and our insights are better. What&#8217;s more, our advice is completely impartial.</p><p>In a world saturated with information, we exist to arm experts with the insights they need to protect their organization. That is why over 1 million businesses have used us to inform their cybersecurity research.</p>]]></content:encoded></item><item><title><![CDATA[#82. What’s The Next $20bn+ Cybersecurity Acquisition?]]></title><description><![CDATA[Expert Insights interviews Deepak Jeevankumar, Managing Director at Dell Technologies Capital.]]></description><link>https://podcasts.expertinsights.com/p/82-deepak-jeevankumar</link><guid isPermaLink="false">https://podcasts.expertinsights.com/p/82-deepak-jeevankumar</guid><dc:creator><![CDATA[Expert Insights Podcast]]></dc:creator><pubDate>Tue, 26 Aug 2025 03:30:30 GMT</pubDate><enclosure url="https://api.substack.com/feed/podcast/171384098/fe70ad1f5e10bb0405da56107788141a.mp3" length="0" type="audio/mpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!wrJl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4962a9f0-db7c-4405-9e5e-ad7baa651b11_1000x1000.heic" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!wrJl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4962a9f0-db7c-4405-9e5e-ad7baa651b11_1000x1000.heic 424w, https://substackcdn.com/image/fetch/$s_!wrJl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4962a9f0-db7c-4405-9e5e-ad7baa651b11_1000x1000.heic 848w, https://substackcdn.com/image/fetch/$s_!wrJl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4962a9f0-db7c-4405-9e5e-ad7baa651b11_1000x1000.heic 1272w, https://substackcdn.com/image/fetch/$s_!wrJl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4962a9f0-db7c-4405-9e5e-ad7baa651b11_1000x1000.heic 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!wrJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4962a9f0-db7c-4405-9e5e-ad7baa651b11_1000x1000.heic" width="324" height="324" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4962a9f0-db7c-4405-9e5e-ad7baa651b11_1000x1000.heic&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:1000,&quot;resizeWidth&quot;:324,&quot;bytes&quot;:119095,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/heic&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://podcasts.expertinsights.com/i/171384098?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4962a9f0-db7c-4405-9e5e-ad7baa651b11_1000x1000.heic&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!wrJl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4962a9f0-db7c-4405-9e5e-ad7baa651b11_1000x1000.heic 424w, https://substackcdn.com/image/fetch/$s_!wrJl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4962a9f0-db7c-4405-9e5e-ad7baa651b11_1000x1000.heic 848w, https://substackcdn.com/image/fetch/$s_!wrJl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4962a9f0-db7c-4405-9e5e-ad7baa651b11_1000x1000.heic 1272w, https://substackcdn.com/image/fetch/$s_!wrJl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4962a9f0-db7c-4405-9e5e-ad7baa651b11_1000x1000.heic 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>This year, we have seen the two biggest cybersecurity acquisitions ever made: Google Cloud&#8217;s acquisition of Wiz, for $32bn USD, and Palo Alto Networks&#8217; $25bn deal to acquire CyberArk. And it&#8217;s only August!</p><p>Cybersecurity investment continues to grow at a staggering pace. According to <em><a href="https://www.returnonsecurity.com/p/security-funded-205">Return On Security</a>, </em>cybersecurity funding is up 202% in Q2/3 2025 compared to the same period last year, with M&amp;A deals up 92%.</p><p>What&#8217;s driving these trends? What are the hottest areas to invest in cybersecurity today? Who are the hottest companies to watch, and who could be next in line for a $20bn USD+ acquisition?</p><p>At Black Hat USA 2025, we spoke with Deepak Jeevankumar, Managing Director at Dell Technologies Capital, to cover these questions, and much more. </p><p><strong>Chapters</strong></p><p>00:00 Cybersecurity Investment Surge</p><p>02:35 Trends in Cybersecurity: Evergreen vs. Cyclical</p><p>05:43 The Importance of Identity in Cybersecurity</p><p>08:42 AI's Impact on Cybersecurity</p><p>11:37 Navigating the Evolving AI Security Landscape</p><p>14:21 Challenges and Opportunities for Startups</p><p>17:20 Future Predictions in Cybersecurity Acquisitions</p><p><strong>About Expert Insights</strong></p><p>Expert Insights saves you time and hassle by rigorously analyzing cybersecurity solutions and cutting through the hype to deliver clear, actionable shortlists. We specialize in cybersecurity. So, our focus is sharper, our knowledge is deeper, and our insights are better. What&#8217;s more, our advice is completely impartial.</p><p>In a world saturated with information, we exist to arm experts with the insights they need to protect their organization. That is why over 1 million businesses have used us to inform their cybersecurity research.</p>]]></content:encoded></item></channel></rss>