Podcasts

Episode #2: Breach Science

Wade Baker and Dave Highlander, the minds behind Verizon’s Data Breach Investigation Report, discuss measuring risk and analyzing cyber breach data.

by Nikhil Chawla

Listen to the episode
2:49
3:37

Episode #2: Breach Science

Wade Baker and Dave Highlander, the minds behind Verizon’s Data Breach Investigation Report, discuss measuring risk and analyzing cyber breach data.

On the go? Listen to our podcast on your favorite platforms.

You might also like

How to get people to care about security when they don’t report to you

How to get people to care about security when they don’t report to you

Getting executive sign-off on a new control? Hard. Getting peer buy-in on security initiatives when they don’t report to you? Harder. In modern organizations, cybersecurity professionals often find themselves in the ultimate matrix of organizational challenges: you need buy-in from every department within the organization – operations, sales, HR, and finance – but none of […]

Why vendor discovery matters now (and how most organizations get it wrong)

Why vendor discovery matters now (and how most organizations get it wrong)

The average enterprise relies on hundreds—sometimes thousands—of third-party vendors to operate. Yet when security leaders are asked for a complete inventory of these vendors, the response is often a patchwork of spreadsheets, outdated procurement lists, and educated guesses. This vendor blindness isn’t just an operational inconvenience—it’s a critical business risk that’s becoming increasingly expensive to […]

The healthcare cybersecurity crisis that’s costing organizations millions in damages

The healthcare cybersecurity crisis that’s costing organizations millions in damages

The U.S. healthcare sector faces an unprecedented cybersecurity crisis. With 168 million healthcare records breached in 2023 and ransomware attacks surging 32% in 2024, the industry confronts threats that have evolved beyond data theft to sophisticated campaigns capable of paralyzing critical patient care infrastructure. Despite these trends, cybersecurity often receives insufficient leadership attention. A 2025 […]

Cyber resiliency starts here.

Request Demo