The CISO Perspective by TCP Media

  • Home
  • About Us
  • YouTube
  • Articles
  • Contact Us
    • YouTube
The CISO Perspective by TCP Media

|





  • Hacking Two Factor Authentication: Four Methods for Bypassing 2FA and MFA

    Hacking 2FA and MFA When MFA is implemented correctly, it can be an extremely powerful and low-cost way to protect against the weakest link in…

    April 13, 2025
    Exploits, Security Concepts, Security Strategy, Security Technologies
  • What is XDR vs EDR vs MDR? Extended Detection and Response Explained

    EDR and XDR: What Do They Do? Dwell time refers to the length of time an attacker is able to roam free on your network…

    April 3, 2025
    Endpoint, Endpoint Protection, Security Concepts, Security Technologies
  • What is Machine Learning ? A.I., Models, Algorithm and Learning Explained

    What is Machine Learning? Machine learning has been referred to as “the science of getting computers to act without being explicitly programmed.” What is machine…

    March 5, 2025
    A.I., Security Concepts, Security Technologies
  • What is Open-Source Intelligence (OSINT)?  

    What is OSINT? In “Breaking the Kill Chain: A Defensive Approach,” we took a look at the seven steps an attacker generally goes through in…

    February 23, 2025
    Security Concepts, Security Strategy
  • Active Reconnaissance: Overview, Methodology and Tools

    Active Reconnaissance The cybersecurity kill chain by Lockheed Martin walks us through the seven sequential steps an attacker will commonly follow during an attack. Previously,…

    February 21, 2025
    Security Concepts, Security Strategy
  • What Is SASE? Secure Access Service Edge Explained

    Secure Access Service Edge, or SASE, is a term coined by Gartner that combines multiple network and security technologies into a single offering. The goal…

    February 4, 2025
    Cloud, Endpoint, Security Concepts, Security Technologies
Prev
1 2 3 4 5 6
Next

About the ciso perspective

The CISO Perspective is a thought leadership platform focused on demystifying complex topics in cybersecurity, AI, and emerging tech. With decades of hands-on experience leading product and security teams, we deliver clear, actionable insights through videos, blogs, podcasts, and more..

Subscribe for updates

Join our mailing list and get notified when we release new episodes and blog posts. No spam, we guarantee.

YouTube

Apple Podcast

Spotify

RSS

  • Subscribe Subscribed
    • The CISO Perspective by TCP Media
    • Already have a WordPress.com account? Log in now.
    • The CISO Perspective by TCP Media
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar