markderijkDec 21, 20212 minLog4j - a TLDR summary for SME IT leadersTLDR Log4J is a logging library for Java applications for which critical vulnerabilities was discovered. An unauthenticated remote actor...
markderijkJul 8, 202120 minHow to differentiate your business with Diversity and Inclusion with Colleen Tartow Ph.D.Intro Hi and welcome to today's SME Business podcast, your host, Mark, will be joining you to interview a founder of an SME business each...
markderijkJun 17, 20213 minWhat is a canary in the field of cyber securityWhat is a Canary? Other than obviously being a bird, back in the day, a canary would be a prized possession for miners around the world....
markderijkMay 28, 20215 minWhat is vCISO?What is a vCISO? A vCISO is a virtual chief information security officer who helps organisations like yourself with no existing...
markderijkMay 4, 202125 minOpportunities in this pandemic and how to start with Zitah McMillan from Predictive BlackOpportunities in this pandemic and how now it is the right time to start with Zitah McMillan from Predictive Black Mark de Rijk Hi and...
markderijkNov 25, 202030 minNew ways of ideation and prototypingMark de Rijk Dear listeners, thank you for tuning in for the next episode of the SME Business podcast. Today we are joined by Jonathan...
markderijkOct 19, 202032 minWhy UX matters and renewable energy is here to take over. Mark de Rijk Hi, dear listeners, thank you for tuning in for the next episode of the SME business podcast. Today we are joined by Jared...
markderijkSep 30, 202030 minSales Strategies for the new normal.I started a new podcast to highlight small and medium-sized businesses. Often a lot of the media attention is focused on the large...
andreaciocasMay 20, 20204 minCybersecurity for startups: What you can do as a founder to secure your firm Part1: NIST CSFSome sobering statistics on small business impacts A startup like regular smaller companies has competing priorities for the amount of...
andreaciocasMay 20, 20206 minCybersecurity for startups: What do as a founder to secure your firm: Part 2 - Identify (ID)Introduction With plenty of data providing the evidence that attacks are getting more commonplace, and the impacts are also increasing,...