<img alt="" src="https://secure.hiss3lark.com/173130.png" style="display:none;">

Podcasts

Our podcasts are part of our knowledge-share initiative which covers cybersecurity news and updates along with other relevant topics with a fun twist

The Hash-Time Show

The Hash-Time Show

The Hash-Time Show is part of our knowledge share initiative which covers cybersecurity news and updates along with other relevant topics. The Hash-Time Show is DATASHIELD's flagship podcasted hosted by Dave Norlin (Director of Security Operations), Chris Vincent (Head of Marketing) and Jeff Marsha, (CISO). The show includes Cyber Security News and InfoSec Industry updates along with stories, games, humor and surprise guests.

Recent Posts:

THTS Episode 4: Ranking Hacking Movies

Listen Now   Episode 4 Discusses: The Trend Micro Hack & Symantec Denies Claims of “Fxmsp” Breach plus ranking the best and worst hacking movies of all time. Including discussion of the following films: The Matrix (1999), Hackers (1995), WarGames (1983), Swordfish (2001), Ghost in the Shell (1996), Live Free or Die Hard (2007), Blackhat (2015), AntiTrust (2001), Johnny Mneomic (1995), The Net (1995).

THTS Episode 3: The Packet Advantage

Listen Now

THTS Episode 2: Cyber Detectives

Listen Now

THTS Episode 1: Why Passwords Must Die

Listen Now

    Transcript

    Sample Transcript Goes Here

    Blog Header

    This section is for the blog sub header

    Strong Showing For Datashield Partners In 2021 Gartner Magic Quadrant

    With a clear separation in the market among the considered vendors, the newest Gartner Magic Quadrant for EPP, showcases 4 Datashield partners who are...


    Learn More

    How Datashield and ExtraHop Work Together

    Learn how Datashield partners with ExtraHop, our premier Network Detection and Response (NDR) partner, from our Director of Product Management Mike He...


    Learn More

    What is Cyber Insurance?

    Statistics show that the fallout from successful cybersecurity incidents has both financial and business-related consequences. A data breach costs the...


    Learn More