• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
Mobile menu toggle
  • Blog on X
  • Blog on Youtube
  • RSS feed X

Decipher Logo Home

  • Articles
  • Video
  • AI
  • Applw
  • General
  • Government
  • Intrusions
  • Law Enforcement
  • Open Source Software Security
  • Podcast
  • Supply Chain
  • Vulnerabilities
  • All Topics
  • Home
  • Articles
  • Video
  • Blog on X
  • Blog on Youtube
  • RSS feed X

All topics


Video


29 Posts

The New Age of Cloud Security and Multi-Cloud Defense

Longtime cloud security educator and researcher Rich Mogull joins Decipher editor Dennis Fisher to dive into the challenges of securing multi-cloud environments, how cloud security has evolved, and how enterprises are learning to handle those changes.

By Dennis Fisher

July 24, 2025 | 1 min read

CISO

Wendy Nather on the ‘Topics That Are Distracting CISOs’

Wendy Nather, distinguished cybersecurity leader, talks to Lindsey O’Donnell-Welch, editor with Decipher, at Black Hat 2024 about the biggest “topics that are distracting CISOs” including the pandemic’s lasting impacts on security programs, personal liabilities and supply-chain security.

By Lindsey O'Donnell-Welch

July 24, 2025 | 1 min read

CISOVideo

The Lasting Repercussions of the Sony Hack

The Sony Pictures hack in 2014 by the North Korean Lazarus Group was a seminal event both in Hollywood and in the security community, bringing to light the capabilities and ambitions of North Korean attackers and showing the damage a leak of sensitive data can be. Brian Raftery joins Dennis Fisher to discuss his new Ringer podcast, The […]

By Dennis Fisher

July 24, 2025 | 1 min read

Data breachNorth Korea

The ‘Sleeping Time Bomb’ of Third-Party Cybersecurity Risk

In the final part of this four-part video series, Decipher editor Lindsey O’Donnell-Welch talks to Merritt Baer, CISO at Reco, Neda Pitt, CISO at Belk, and Danielle Snyder, cyber and compliance lead at Raytheon, about third-party risk, why it’s a “sleeping time bomb” and how organizations can approach this complex issue.

By Lindsey O'Donnell-Welch

July 24, 2025 | 1 min read

CISO

Decipher: Security Without Fear

By Dennis Fisher

July 23, 2025 | 0 min read

Video
  • «
  • Page 1
  • Interim pages omitted …
  • Page 3
  • Page 4
  • Page 5

sidebar

  • Blog on X
  • Blog on Youtube
  • RSS feed X
Home
  • Term & Conditions
  • ©2026 Decipher
  • Articles
  • Video

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by