
Sign up to save your podcasts
Or
All links and images for this episode can be found on CISO Series.
In order to get any work done we try to shut out all possible distractions. That includes messaging apps. But those people who want to connect become annoyed that they can't reach you.
This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our guest is Howard Holton, CTO, GigaOm.
Thanks to our podcast sponsor, Cyolo
Too many critical assets and systems remain exposed because traditional secure access solutions are not able to protect the high-risk access scenarios and legacy applications that keep business operations running. With its trustless zero-trust access solution, Cyolo gives organizations the visibility and access control they need to secure every connection.
In this episode:
4.8
185185 ratings
All links and images for this episode can be found on CISO Series.
In order to get any work done we try to shut out all possible distractions. That includes messaging apps. But those people who want to connect become annoyed that they can't reach you.
This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our guest is Howard Holton, CTO, GigaOm.
Thanks to our podcast sponsor, Cyolo
Too many critical assets and systems remain exposed because traditional secure access solutions are not able to protect the high-risk access scenarios and legacy applications that keep business operations running. With its trustless zero-trust access solution, Cyolo gives organizations the visibility and access control they need to secure every connection.
In this episode:
1,981 Listeners
364 Listeners
639 Listeners
370 Listeners
182 Listeners
1,013 Listeners
314 Listeners
408 Listeners
7,921 Listeners
163 Listeners
311 Listeners
76 Listeners
128 Listeners
43 Listeners
168 Listeners