Sign up to save your podcastsEmail addressPasswordRegisterOrContinue with GoogleAlready have an account? Log in here.
May 13, 20247. Timeless Cybersecurity Lesson from 600 BCE27 minutesPlayThis unique episode takes us back to ancient China.We break down Sun Tzu's legendary writings called "The Art of War" tounderstand what it teaches us about leadership, strategy, andrelationships.In spite of its old age, this book still hod incredibly useful insightson how to defeat adversaries. And guess what? That is exactly what we doeveryday in cybersecurity....moreShareView all episodesBy Mathieu PeteauMay 13, 20247. Timeless Cybersecurity Lesson from 600 BCE27 minutesPlayThis unique episode takes us back to ancient China.We break down Sun Tzu's legendary writings called "The Art of War" tounderstand what it teaches us about leadership, strategy, andrelationships.In spite of its old age, this book still hod incredibly useful insightson how to defeat adversaries. And guess what? That is exactly what we doeveryday in cybersecurity....more
This unique episode takes us back to ancient China.We break down Sun Tzu's legendary writings called "The Art of War" tounderstand what it teaches us about leadership, strategy, andrelationships.In spite of its old age, this book still hod incredibly useful insightson how to defeat adversaries. And guess what? That is exactly what we doeveryday in cybersecurity.
May 13, 20247. Timeless Cybersecurity Lesson from 600 BCE27 minutesPlayThis unique episode takes us back to ancient China.We break down Sun Tzu's legendary writings called "The Art of War" tounderstand what it teaches us about leadership, strategy, andrelationships.In spite of its old age, this book still hod incredibly useful insightson how to defeat adversaries. And guess what? That is exactly what we doeveryday in cybersecurity....more
This unique episode takes us back to ancient China.We break down Sun Tzu's legendary writings called "The Art of War" tounderstand what it teaches us about leadership, strategy, andrelationships.In spite of its old age, this book still hod incredibly useful insightson how to defeat adversaries. And guess what? That is exactly what we doeveryday in cybersecurity.