www.withsecure.com Open in urlscan Pro
2a02:26f0:3500:14::1724:a254  Public Scan

Submitted URL: https://click.e.f-secure.com/?qs=4c7813a67736f42629bcf530845f1f65ac124e477e0c682d5d7973e779f53487d93ee92b7be6f539bf9f24bb85b9...
Effective URL: https://www.withsecure.com/en/whats-new/podcasts?utm_source=sfmc&utm_medium=email&utm_campaign=WithSecure_SPHERE22+global+i...
Submission: On April 30 via api from BE — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

ABOUT US

Who we are
Company facts
Careers at WithSecure™
Open jobs
Company contacts
Our Offices
Sales contact
24/7 incident response hotline
Brand ambassadors
Investor relations
Share information
Financials
Calendar
Materials
Governance
Corporate Social Responsibility
Legal
Terms
Privacy
General Privacy Policy


WHAT'S NEW

Pressroom
Media library
Events
Podcasts
Social media
Email preferences


SUPPORT

Product support
Quick start
User guides
Support articles
Support tools
Product updates
Product lifecycle announcements
Help forum
Download Center

CONTACT SUPPORT

Call support
Email support
Renew subscription
Submit a sample

IMPORTANT UPDATES

Security advisories for our software
Service status and DB updates

CUSTOMER PORTAL LOGIN

Partner portal
Countercept portal
Elements Security Center


SELECT A LANGUAGE

Global

Global

Denmark

Danish

coming soon



Belgium

Dutch

coming soon
| French
coming soon



Sweden

Swedish

coming soon



United States

English

United Kingdom

English

Poland

Polish

coming soon



Norway

English | Norwegian

coming soon



Japan

Japanese

Netherlands

English | Dutch

coming soon



Italy

Italian

coming soon



Spain

Spanish

coming soon



France

French

Finland

Finnish

Germany

German



{{title}} {{url}}


Looking for:


Customer support Contact sales 24/7 Assistance Research Partner program Offering
Open jobs Resources
 * About us
 * What's new
 * Support
 * Global
 * 

 * Security Outcomes
   
   CONTINUOUSLY MANAGE RISKS
   
   Sharpen your organization's approach to cyber risk
   Meet and exceed regulatory requirements
   
   MAXIMIZE OPERATIONAL EFFICIENCY
   
   Run a cost-effective security program
   Minimize unplanned work and wasted effort
   
   PREVENT AND PROTECT
   
   Ensure resilience against malware and ransomware
   Safeguard your critical data
   Achieve visibility across your environment
   Accelerate your cloud journey with confidence
   
   DETECT AND RESPOND
   
   Optimize your detection and response capabilities
   Reduce cost and impact of cyber incidents
   
   
   HIGHLIGHTS
   
   THE 7 HIDDEN TRUTHS OF CLOUD SECURITY
   
   Read more
   
   THE BENEFITS OF MOVING SECURITY MANAGEMENT TO THE CLOUD
   
   Read more
   
   SALESFORCE DATA PROTECTION 101 – WHAT IS SALESFORCE SECURITY MODEL?
   
   Read more
   Read more
 * Solutions
   
   
   SOFTWARE AND SERVICES
   
   Unified cloud-based security platform
   WithSecure™ Elements
   Endpoint protection
   WithSecure™ Elements Endpoint Protection
   WithSecure™ Business Suite
   Endpoint detection and response
   WithSecure™ Elements Endpoint Detection and Response
   Vulnerability management
   WithSecure™ Elements Vulnerability Management
   Cloud protection
   WithSecure™ Elements Collaboration Protection
   WithSecure™ Cloud Protection for Salesforce
   
   Partner success services
   
   
   CONSULTING
   
   Security strategy and risk management
   Security Strategy
   Resilience development
   Secure Cloud Transformation
   Adversary Simulation
   Attack Detection
   Security assurance
   External Asset Mapping
   Application Security
   Embedded Systems Security
   Cloud Security
   Network Security
   Operational Technology Security
   
   Security training
   Innovative security hardware
   USB armory
   Armory Drive
   
   
   MANAGED SERVICES
   
   Countercept Managed Detection and Response
   Attack Surface Management
   Cloud Security Posture Management
   Incident readiness and response
   
   
   HIGHLIGHTS
   
   WITHSECURE™ ELEMENTS
   
   Read more
   
   WITHSECURE™ COUNTERCEPT
   
   Read more
   
   CLOUD SECURITY CONSULTING
   
   Read more
 * Expertise
   Expertise
   People
   Success stories
   Resources
   
   RESEARCH & INNOVATION
   
   Innovation programs
   Threat Research
   WithSecure Labs™
   
   ACHIEVEMENTS
   
   Industry recognition
   Accreditations & Certifications
   
   
   HIGHLIGHTS
   
   SUCCESS STORY - YAHOO JAPAN CORPORATION
   
   Read more
   
   WITHSECURE™ FOUNDRY
   
   Read more
   
   STRATEGIC LEADER IN AV-COMPARATIVES ENDPOINT PREVENTION AND RESPONSE
   
   Read more
 * Partners
   Partner offering
   Managed Service Providers
   Resellers
   Find a partner
   Partner portal access
   
   
   
   
   HIGHLIGHTS
   
   THE CISOS' NEW DAWN
   
   The CISOS' New Dawn
   
   Read more
   
   PODCASTS
   
   Read more
   
   KEY INGREDIENTS OF A PROFITABLE MANAGED SECURITY SERVICE
   
   Read more

 * 24/7 Incident hotline
 * Contact us


PODCASTS

The podcast for sweating out the hot topics in security.


 1. Home
 2. Home
 3. What's new
 4. Podcasts


CYBER SECURITY SAUNA

To ancients of the north, the steam rising from the hot stones of a sauna was
akin to the very life force of man. To this day, deals are struck and decisions
made in saunas, where movers and shakers gather to exchange ideas.

We invite you to Cyber Security Sauna (#CyberSauna), a podcast bringing you
expert guests with sizzling insight into the latest information security trends
and topics. WithSecure's self-proclaimed "cyber translator" Janne Kauhanen hosts
the show to make sure you know all you need to about the hotter-than-ever
infosec game.




SUBSCRIBE

APPLE PODCASTS

Subscribe via Apple Podcasts

Subscribe

SOUNDCLOUD

Follow us on Soundcloud

Follow us

SPOTIFY

Follow us on Spotify

Follow us

RSS

Subscribe via RSS

Subscribe


LATEST PODCASTS

2022 2021 2020 2019 2018 2017

April 5, 2022


066| CO-SECURITY: COLLABORATION, COOPERATION AND CYBER SECURITY

There’s many different ways to collaborate on infosec problems. There’s no
shortage of associations, conferences, and other frameworks that organizations
can use to find others to work with. And there’s a healthy supply of security
companies to choose from. But do any of these offer concrete benefits to
organizations? Will organizations somehow achieve better outcomes by working
with others? Or is it more complicated than that? Today, we’re joined by
UK-based Julia Ward, WithSecure’s Principal Client & Markets Liaison, and Tom
Van de Wiele from Denmark, a former red teamer and current Principal Threats and
Technology Researcher for WithSecure™, to hear more about cooperative approaches
to security.

February 28, 2022


065| SECURITY FOR NON-PROFIT ORGANIZATIONS

Non-profit organizations play a crucial role in our well-being. In many parts of
the world, they’re a major source of education, health care, social services,
and more. And while they’re not in it for the money, they remain a target for
cyber attacks, just like other organizations. Why is this case? What can and
should be done about this? In this episode, Adrien Ogee, Chief Operating Officer
for the CyberPeace Institute, a non-governmental organization that helps defend
the security, dignity, and equity of people in cyber space; and Heikki Stark, a
security consultant with F-Secure who recently won an award for his work with
the KyberVPK Community Cyber Response Force, which helps providers of critical
services fight and recover from cyber attacks, gave us their thoughts on how
NPOs can and should tackle the challenges they face in cyber security.

January 24, 2022


064| 2021, 2022 AND BEYOND - PART 2

With 2021 now behind us, it’s time to revisit the highs and lows of the past 12
months, and look ahead to what we can expect in the months ahead. To mark the
year’s end, we recorded a special two-part episode of Cyber Security Sauna.
F-Secure’s Chief Research Officer Mikko Hypponen, Security Consultant Adriana
Verhagen, and AI researcher Andy Patel join episode 64 to share their key
takeaways from 2021, and thoughts on important issues we’ll face in 2022 and
beyond. In this episode: regulating social media networks, cloudification,
AI-powered attacks, security in an age of unlimited computing power, NFTs, and
more.

 

Links:

Episode 64 transcript

Scroll to load more

WithSecure™ is the trusted cyber security partner
Company
 * Pressroom
 * Events
 * Media library
 * For Investors
 * WithSecure™ Labs
 * F-Secure for consumers

Support
 * Quick start
 * User guides
 * Support articles
 * Email support
 * Call support
 * Submit a sample

Contact
 * Company contact
 * Our offices
 * Sales contact
 * Become a partner
 * Find a partner
 * 24/7 incident hotline

Portals
 * Partner portal
 * Countercept portal
 * Elements Security Center


Newsletter

 * Terms of service
 * Privacy policy
 * Modern slavery statement
 * Cookies

en
© WithSecure 2022

By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts.

Cookies Settings Reject All Accept All Cookies



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


PERFORMANCE COOKIES



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices