<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet href="https://rss.buzzsprout.com/styles.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:psc="http://podlove.org/simple-chapters" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <atom:link href="https://feeds.buzzsprout.com/1779404.rss" rel="self" type="application/rss+xml" />
  <atom:link href="https://pubsubhubbub.appspot.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom" />
  <title>Bytesize Technology</title>

  <lastBuildDate>Wed, 04 Mar 2026 14:55:50 -0500</lastBuildDate>
  <link>https://bytesizetechnology.buzzsprout.com</link>
  <language>en-us</language>
  <copyright>© 2026 Bytesize Technology</copyright>
  <podcast:locked>yes</podcast:locked>
    <podcast:guid>53783fa0-7c5f-5dc5-b230-d204c89187a7</podcast:guid>
  <itunes:author>Bytes</itunes:author>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <description><![CDATA[During these sessions Bytes hosts will be aiming to educate and entertain you on everything IT & Technology all in Bytesize chunks.]]></description>
  <generator>Buzzsprout (https://www.buzzsprout.com)</generator>
  <itunes:owner>
    <itunes:name>Bytes</itunes:name>
  </itunes:owner>
  <image>
     <url>https://storage.buzzsprout.com/69t3wndvx2yh4pefgoul9324ojdn?.jpg</url>
     <title>Bytesize Technology</title>
     <link></link>
  </image>
  <itunes:image href="https://storage.buzzsprout.com/69t3wndvx2yh4pefgoul9324ojdn?.jpg" />
  <itunes:category text="Technology" />
  <item>
    <itunes:title>Training for Tomorrow: User Awareness ft. Mimecast</itunes:title>
    <title>Training for Tomorrow: User Awareness ft. Mimecast</title>
    <itunes:summary><![CDATA[Join Courtney Williams, Bytes Cyber Security Solution Specialist, and Malcolm Murphy, Senior Director Sales Engineering at Proofpoint, for an engaging podcast that delves into the importance and impact of User Awareness in Cyber Security.  In this episode, they discuss:  - Recent Innovations - Human Risk Management - Common Challenges - Maintaining Security Baseline - Human Risk Landscape  If you're interested in this topic and eager to learn more, reach out to your dedicated Bytes Account Ma...]]></itunes:summary>
    <description><![CDATA[<p>Join Courtney Williams, Bytes Cyber Security Solution Specialist, and Malcolm Murphy, Senior Director Sales Engineering at Proofpoint, for an engaging podcast that delves into the importance and impact of User Awareness in Cyber Security.<br/><br/>In this episode, they discuss:<br/><br/>- Recent Innovations<br/>- Human Risk Management<br/>- Common Challenges<br/>- Maintaining Security Baseline<br/>- Human Risk Landscape<br/><br/>If you&apos;re interested in this topic and eager to learn more, reach out to your dedicated Bytes Account Manager or email tellmemore@bytes.co.uk. We&apos;d love to hear from you!</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Join Courtney Williams, Bytes Cyber Security Solution Specialist, and Malcolm Murphy, Senior Director Sales Engineering at Proofpoint, for an engaging podcast that delves into the importance and impact of User Awareness in Cyber Security.<br/><br/>In this episode, they discuss:<br/><br/>- Recent Innovations<br/>- Human Risk Management<br/>- Common Challenges<br/>- Maintaining Security Baseline<br/>- Human Risk Landscape<br/><br/>If you&apos;re interested in this topic and eager to learn more, reach out to your dedicated Bytes Account Manager or email tellmemore@bytes.co.uk. We&apos;d love to hear from you!</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/16767808-training-for-tomorrow-user-awareness-ft-mimecast.mp3" length="14483799" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16767808</guid>
    <pubDate>Mon, 10 Mar 2025 20:00:00 +0000</pubDate>
    <itunes:duration>1203</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Data Security Unlocked ft. Netskope</itunes:title>
    <title>Data Security Unlocked ft. Netskope</title>
    <itunes:summary><![CDATA[Join Lorna Burrows, Bytes Cyber Security Solution Specialist, and Rich Beckett, Senior Product Marketing Manager at Netskope, for an engaging podcast that unlocks the value and importance of Data Security.   In this episode, they discuss: - Data Challenges in 2025 – themes of visibility, GenAI, personal app and Hybrid work - The Foundation of Visibility  - Control and Role of Analytics – themes of where data is flowing and how it links to AI/hybrid work - Compliance with data protec...]]></itunes:summary>
    <description><![CDATA[<p>Join Lorna Burrows, Bytes Cyber Security Solution Specialist, and Rich Beckett, Senior Product Marketing Manager at Netskope, for an engaging podcast that unlocks the value and importance of Data Security. <br/><br/>In this episode, they discuss:<br/>- Data Challenges in 2025 – themes of visibility, GenAI, personal app and Hybrid work<br/>- The Foundation of Visibility <br/>- Control and Role of Analytics – themes of where data is flowing and how it links to AI/hybrid work<br/>- Compliance with data protection law when using AI <br/>- How hybrid work impacts data security<br/>- The Power of Zero Trust<br/><br/>If you&apos;re interested in this topic and eager to learn more, reach out to your dedicated Bytes Account Manager or email tellmemore@bytes.co.uk. We&apos;d love to hear from you!</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Join Lorna Burrows, Bytes Cyber Security Solution Specialist, and Rich Beckett, Senior Product Marketing Manager at Netskope, for an engaging podcast that unlocks the value and importance of Data Security. <br/><br/>In this episode, they discuss:<br/>- Data Challenges in 2025 – themes of visibility, GenAI, personal app and Hybrid work<br/>- The Foundation of Visibility <br/>- Control and Role of Analytics – themes of where data is flowing and how it links to AI/hybrid work<br/>- Compliance with data protection law when using AI <br/>- How hybrid work impacts data security<br/>- The Power of Zero Trust<br/><br/>If you&apos;re interested in this topic and eager to learn more, reach out to your dedicated Bytes Account Manager or email tellmemore@bytes.co.uk. We&apos;d love to hear from you!</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/16767259-data-security-unlocked-ft-netskope.mp3" length="18518434" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16767259</guid>
    <pubDate>Mon, 10 Mar 2025 19:00:00 +0000</pubDate>
    <itunes:duration>1540</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guardians of the Cloud ft. Tenable</itunes:title>
    <title>Guardians of the Cloud ft. Tenable</title>
    <itunes:summary><![CDATA[Join Ed Fenton, Bytes Cyber Security Solution Specialist, and Peter Hall, Cloud Security Sales Specialist, Tenable, for an insightful podcast exploring Cloud Security. In this episode, they cover: The Evolving Threat Landscape – What security teams aren’t prepared forThe Vulnerability Management Paradox – Why organizations struggle despite having toolsCyber Hygiene vs. Cyber Resilience – Going beyond the basicsSecuring the Cloud: Myths vs. Reality – Common misconceptions and real risksAI, Aut...]]></itunes:summary>
    <description><![CDATA[<p>Join Ed Fenton, Bytes Cyber Security Solution Specialist, and Peter Hall, Cloud Security Sales Specialist, Tenable, for an insightful podcast exploring <b>Cloud Security</b>.</p><p><b>In this episode, they cover:</b></p><ul><li>The Evolving Threat Landscape – What security teams aren’t prepared for</li><li>The Vulnerability Management Paradox – Why organizations struggle despite having tools</li><li>Cyber Hygiene vs. Cyber Resilience – Going beyond the basics</li><li>Securing the Cloud: Myths vs. Reality – Common misconceptions and real risks</li><li>AI, Automation &amp; The Future of Cybersecurity – Risks, opportunities, and what’s next</li></ul><p><b>If you&apos;re interested in this topic and eager to learn more, reach out to your dedicated Bytes Account Manager or email 📧 </b><a href='mailto:tellmemore@bytes.co.uk'><b>tellmemore@bytes.co.uk</b></a><b>. We&apos;d love to hear from you!</b></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Join Ed Fenton, Bytes Cyber Security Solution Specialist, and Peter Hall, Cloud Security Sales Specialist, Tenable, for an insightful podcast exploring <b>Cloud Security</b>.</p><p><b>In this episode, they cover:</b></p><ul><li>The Evolving Threat Landscape – What security teams aren’t prepared for</li><li>The Vulnerability Management Paradox – Why organizations struggle despite having tools</li><li>Cyber Hygiene vs. Cyber Resilience – Going beyond the basics</li><li>Securing the Cloud: Myths vs. Reality – Common misconceptions and real risks</li><li>AI, Automation &amp; The Future of Cybersecurity – Risks, opportunities, and what’s next</li></ul><p><b>If you&apos;re interested in this topic and eager to learn more, reach out to your dedicated Bytes Account Manager or email 📧 </b><a href='mailto:tellmemore@bytes.co.uk'><b>tellmemore@bytes.co.uk</b></a><b>. We&apos;d love to hear from you!</b></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/16740132-guardians-of-the-cloud-ft-tenable.mp3" length="20754095" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16740132</guid>
    <pubDate>Wed, 05 Mar 2025 17:00:00 +0000</pubDate>
    <itunes:duration>1726</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Human Risk Factor Ft. Proofpoint</itunes:title>
    <title>The Human Risk Factor Ft. Proofpoint</title>
    <itunes:summary><![CDATA[Join Courtney Williams, Bytes Cyber Security Solution Specialist, and Carl Leonard, Cyber Security Strategist EMEA at Proofpoint, for an engaging podcast that delves into the Human Risk Factor in Cyber Security. In this episode, they discuss: The concept of human-centric securityThe appeal of a human-centric security approachThe latest trends in the threat landscapeTools and mitigation strategies available to businessesIf you're interested in this topic and eager to learn more, reach out to y...]]></itunes:summary>
    <description><![CDATA[<p>Join Courtney Williams, Bytes Cyber Security Solution Specialist, and Carl Leonard, Cyber Security Strategist EMEA at Proofpoint, for an engaging podcast that delves into the <b>Human Risk Factor</b> in Cyber Security.</p><p><b>In this episode, they discuss:</b></p><ul><li>The concept of human-centric security</li><li>The appeal of a human-centric security approach</li><li>The latest trends in the threat landscape</li><li>Tools and mitigation strategies available to businesses</li></ul><p><b>If you&apos;re interested in this topic and eager to learn more, reach out to your dedicated Bytes Account Manager or email </b><a href='mailto:tellmemore@bytes.co.uk'><b>tellmemore@bytes.co.uk</b></a><b>. We&apos;d love to hear from you!</b></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Join Courtney Williams, Bytes Cyber Security Solution Specialist, and Carl Leonard, Cyber Security Strategist EMEA at Proofpoint, for an engaging podcast that delves into the <b>Human Risk Factor</b> in Cyber Security.</p><p><b>In this episode, they discuss:</b></p><ul><li>The concept of human-centric security</li><li>The appeal of a human-centric security approach</li><li>The latest trends in the threat landscape</li><li>Tools and mitigation strategies available to businesses</li></ul><p><b>If you&apos;re interested in this topic and eager to learn more, reach out to your dedicated Bytes Account Manager or email </b><a href='mailto:tellmemore@bytes.co.uk'><b>tellmemore@bytes.co.uk</b></a><b>. We&apos;d love to hear from you!</b></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/16739537-the-human-risk-factor-ft-proofpoint.mp3" length="21405175" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16739537</guid>
    <pubDate>Wed, 05 Mar 2025 16:00:00 +0000</pubDate>
    <itunes:duration>1780</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Securing the Future: DSPM with Bytes &amp; Varonis</itunes:title>
    <title>Securing the Future: DSPM with Bytes &amp; Varonis</title>
    <itunes:summary><![CDATA[In this episode of Bytes Talks, we welcome Varonis, one of our key Strategic Partners, to discuss the trending topic of Data Security Posture Management (DSPM). Special guest Matt Lock, Technical Director UK at Varonis, and Joe Hepburn, Data Management Practice Lead at Bytes, delve into the importance of DSPM and why more customers are adopting this platform. Our experts will explain what DSPM is, its significance in the current market, and the challenges it helps organisations tackle. Discov...]]></itunes:summary>
    <description><![CDATA[<p>In this episode of Bytes Talks, we welcome Varonis, one of our key Strategic Partners, to discuss the trending topic of Data Security Posture Management (DSPM). Special guest Matt Lock, Technical Director UK at Varonis, and Joe Hepburn, Data Management Practice Lead at Bytes, delve into the importance of DSPM and why more customers are adopting this platform.</p><p>Our experts will explain what DSPM is, its significance in the current market, and the challenges it helps organisations tackle. Discover how DSPM is a powerful tool designed to help organisations discover, map, monitor, and protect their data across various environments. We&apos;ll explore how Varonis automatically finds and classifies sensitive data, ensuring you know exactly where your critical information is stored.</p><p>We&apos;ll also cover the platform&apos;s risk remediation capabilities, which not only identify risks but also automatically fix them by removing excessive permissions and addressing risky misconfigurations. Learn about Varonis&apos;s real-time threat detection and response features that alert you to abnormal behavior and automate threat responses.<br/><br/>Varonis is highly rated for its comprehensive coverage and automated approach, making it a top choice for organisations looking to enhance their data security posture. This isn&apos;t one to miss!</p><p>If you&apos;d like to hear more about Varonis&apos; Data Risk Assessment free trial, please reach out to the team at <a href='mailto:tellmemore@bytes.co.uk'>tellmemore@bytes.co.uk</a>.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode of Bytes Talks, we welcome Varonis, one of our key Strategic Partners, to discuss the trending topic of Data Security Posture Management (DSPM). Special guest Matt Lock, Technical Director UK at Varonis, and Joe Hepburn, Data Management Practice Lead at Bytes, delve into the importance of DSPM and why more customers are adopting this platform.</p><p>Our experts will explain what DSPM is, its significance in the current market, and the challenges it helps organisations tackle. Discover how DSPM is a powerful tool designed to help organisations discover, map, monitor, and protect their data across various environments. We&apos;ll explore how Varonis automatically finds and classifies sensitive data, ensuring you know exactly where your critical information is stored.</p><p>We&apos;ll also cover the platform&apos;s risk remediation capabilities, which not only identify risks but also automatically fix them by removing excessive permissions and addressing risky misconfigurations. Learn about Varonis&apos;s real-time threat detection and response features that alert you to abnormal behavior and automate threat responses.<br/><br/>Varonis is highly rated for its comprehensive coverage and automated approach, making it a top choice for organisations looking to enhance their data security posture. This isn&apos;t one to miss!</p><p>If you&apos;d like to hear more about Varonis&apos; Data Risk Assessment free trial, please reach out to the team at <a href='mailto:tellmemore@bytes.co.uk'>tellmemore@bytes.co.uk</a>.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/16533239-securing-the-future-dspm-with-bytes-varonis.mp3" length="22508921" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16533239</guid>
    <pubDate>Fri, 31 Jan 2025 11:00:00 +0000</pubDate>
    <itunes:duration>1872</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tackling ITAM &amp; SaaS Complexity ft Flexera </itunes:title>
    <title>Tackling ITAM &amp; SaaS Complexity ft Flexera </title>
    <itunes:summary><![CDATA[Join Maria Singleton, our Head of IT Value Management, Lee Martin, Product Director at Flexera, and Michael Burbidge, the Regional Vice President UKI, Flexera, where we cover challenges around IT visibility and management of ITAM assets.  In this episode, you can learn how to demystify these challenges with Snow Atlas – learn how you can get visibility of and manage your SaaS and IT Estate, including hardware, software and cloud costs. We can support you get to a level of IT visibility w...]]></itunes:summary>
    <description><![CDATA[<p>Join Maria Singleton, our Head of IT Value Management, Lee Martin, Product Director at Flexera, and Michael Burbidge, the Regional Vice President UKI, Flexera, where we cover challenges around IT visibility and management of ITAM assets. </p><p>In this episode, you can learn how to <b>demystify </b>these challenges with <b>Snow Atlas</b> – learn how you can get <b>visibility </b>of and manage your SaaS and IT Estate, including <b>hardware</b>, <b>software </b>and <b>cloud </b>costs. We can support you get to a level of IT visibility with Snow Atlas.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Join Maria Singleton, our Head of IT Value Management, Lee Martin, Product Director at Flexera, and Michael Burbidge, the Regional Vice President UKI, Flexera, where we cover challenges around IT visibility and management of ITAM assets. </p><p>In this episode, you can learn how to <b>demystify </b>these challenges with <b>Snow Atlas</b> – learn how you can get <b>visibility </b>of and manage your SaaS and IT Estate, including <b>hardware</b>, <b>software </b>and <b>cloud </b>costs. We can support you get to a level of IT visibility with Snow Atlas.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/16221583-tackling-itam-saas-complexity-ft-flexera.mp3" length="19749737" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16221583</guid>
    <pubDate>Wed, 04 Dec 2024 16:00:00 +0000</pubDate>
    <itunes:duration>1606</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Managing Your Storage Needs in Hybrid Cloud Environments </itunes:title>
    <title>Managing Your Storage Needs in Hybrid Cloud Environments </title>
    <itunes:summary><![CDATA[In this episode, we explore the game-changing value of adopting a unified platform to manage both containerised workloads and virtual machines—unlocking new levels of efficiency and delivering powerful organizational benefits. Joining us are Fraser Price (Bytes), Luke Price (IBM) and Richard Foster (Redhat), who dive into the evolving landscape of virtualisation. Together, we discuss why businesses are reconsidering their options, particularly in light of recent changes to VMware’s offerings ...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, we explore the game-changing value of adopting a <b>unified platform</b> to manage both containerised workloads and virtual machines—unlocking new levels of efficiency and delivering powerful organizational benefits.</p><p>Joining us are <b>Fraser Price</b> (Bytes), <b>Luke Price</b> (IBM) and <b>Richard Foster</b> (Redhat), who dive into the evolving landscape of virtualisation. Together, we discuss why businesses are reconsidering their options, particularly in light of recent changes to VMware’s offerings and strategy.</p><p>💡 As an <b>IBM Platinum Partner</b>, we bring unmatched expertise to help businesses implement best practices with <b>OpenShift</b>, a leading platform for containers and hybrid cloud environments. Whether you&apos;re navigating containerisation or virtualisation, we’re here to guide you through these shifts with confidence and clarity.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, we explore the game-changing value of adopting a <b>unified platform</b> to manage both containerised workloads and virtual machines—unlocking new levels of efficiency and delivering powerful organizational benefits.</p><p>Joining us are <b>Fraser Price</b> (Bytes), <b>Luke Price</b> (IBM) and <b>Richard Foster</b> (Redhat), who dive into the evolving landscape of virtualisation. Together, we discuss why businesses are reconsidering their options, particularly in light of recent changes to VMware’s offerings and strategy.</p><p>💡 As an <b>IBM Platinum Partner</b>, we bring unmatched expertise to help businesses implement best practices with <b>OpenShift</b>, a leading platform for containers and hybrid cloud environments. Whether you&apos;re navigating containerisation or virtualisation, we’re here to guide you through these shifts with confidence and clarity.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/16221520-managing-your-storage-needs-in-hybrid-cloud-environments.mp3" length="18390054" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16221520</guid>
    <pubDate>Wed, 04 Dec 2024 16:00:00 +0000</pubDate>
    <itunes:duration>1485</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>FinOps: The ‘IT’ word</itunes:title>
    <title>FinOps: The ‘IT’ word</title>
    <itunes:summary><![CDATA[In this episode, we’re diving deep into one of the hottest topics in IT today: FinOps. From exploring its evolution to uncovering actionable insights for your organisation, we’re here to help you stay ahead in this rapidly shifting landscape. Join Chris Colledge, Head of Technical Account Management at Bytes, Ben De Mora, Head of FinOps Strategic Advisory at IBM, and Nick Hallam, Head of Consulting Pre-Sales at Bytes, as they share their expertise and real-world advice. 💡 FinOps is more than ...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, we’re diving deep into one of the hottest topics in IT today: <b>FinOps</b>. From exploring its evolution to uncovering actionable insights for your organisation, we’re here to help you stay ahead in this rapidly shifting landscape.</p><p>Join <b>Chris Colledge</b>, Head of Technical Account Management at Bytes, <b>Ben De Mora</b>, Head of FinOps Strategic Advisory at IBM, and <b>Nick Hallam</b>, Head of Consulting Pre-Sales at Bytes, as they share their expertise and real-world advice.</p><p>💡 FinOps is more than just a buzzword—it’s a journey. It’s an ongoing process that’s about far more than cost-effective procurement. Think bigger savings, sharper strategies, and smarter decision-making.</p><p>As an IBM Platinum Partner, we’re equipped with the knowledge and tools to help you build a winning FinOps strategy—complete with the right reporting and communication pathways to drive success.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, we’re diving deep into one of the hottest topics in IT today: <b>FinOps</b>. From exploring its evolution to uncovering actionable insights for your organisation, we’re here to help you stay ahead in this rapidly shifting landscape.</p><p>Join <b>Chris Colledge</b>, Head of Technical Account Management at Bytes, <b>Ben De Mora</b>, Head of FinOps Strategic Advisory at IBM, and <b>Nick Hallam</b>, Head of Consulting Pre-Sales at Bytes, as they share their expertise and real-world advice.</p><p>💡 FinOps is more than just a buzzword—it’s a journey. It’s an ongoing process that’s about far more than cost-effective procurement. Think bigger savings, sharper strategies, and smarter decision-making.</p><p>As an IBM Platinum Partner, we’re equipped with the knowledge and tools to help you build a winning FinOps strategy—complete with the right reporting and communication pathways to drive success.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/16220796-finops-the-it-word.mp3" length="22132380" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16220796</guid>
    <pubDate>Wed, 04 Dec 2024 16:00:00 +0000</pubDate>
    <itunes:duration>1799</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Data Assurance Insights: Navigating Cyber Threats in Healthcare</itunes:title>
    <title>Data Assurance Insights: Navigating Cyber Threats in Healthcare</title>
    <itunes:summary><![CDATA[In this podcast episode, we dive deep into the crucial topic of Data Assurance in Healthcare.   Join Robert Knott, who heads up our Bytes Healthcare team, Rich Feltham, Blue Light Lead for IBM Storage, and Fraser Price, Multi-Cloud Solutions Architect at Bytes, as they discuss: The evolution of data assurance from traditional data protection and cyber resilience.The importance of data recoverability in the NHS amidst rising cyber threats.Real-life impacts of cyber attacks on healthcare, ...]]></itunes:summary>
    <description><![CDATA[<p>In this podcast episode, we dive deep into the crucial topic of Data Assurance in Healthcare. <br/><br/>Join Robert Knott, who heads up our Bytes Healthcare team, Rich Feltham, Blue Light Lead for IBM Storage, and Fraser Price, Multi-Cloud Solutions Architect at Bytes, as they discuss:</p><ul><li>The evolution of data assurance from traditional data protection and cyber resilience.</li><li>The importance of data recoverability in the NHS amidst rising cyber threats.</li><li>Real-life impacts of cyber attacks on healthcare, including prolonged recovery times and financial costs.</li><li>Innovative solutions like active and dormant threat detection, secure copies, and immutability.</li><li>How technologies like Predator can help NHS trusts enhance their cyber resilience.</li></ul><p>This episode is a must-listen for anyone in the healthcare sector looking to safeguard their data and ensure operational continuity. <br/><br/>Bytes, as an IBM Platinum Partner, can support you in your data assurance journey. Contact us today at tellmemore@bytes.co.uk to find out more.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In this podcast episode, we dive deep into the crucial topic of Data Assurance in Healthcare. <br/><br/>Join Robert Knott, who heads up our Bytes Healthcare team, Rich Feltham, Blue Light Lead for IBM Storage, and Fraser Price, Multi-Cloud Solutions Architect at Bytes, as they discuss:</p><ul><li>The evolution of data assurance from traditional data protection and cyber resilience.</li><li>The importance of data recoverability in the NHS amidst rising cyber threats.</li><li>Real-life impacts of cyber attacks on healthcare, including prolonged recovery times and financial costs.</li><li>Innovative solutions like active and dormant threat detection, secure copies, and immutability.</li><li>How technologies like Predator can help NHS trusts enhance their cyber resilience.</li></ul><p>This episode is a must-listen for anyone in the healthcare sector looking to safeguard their data and ensure operational continuity. <br/><br/>Bytes, as an IBM Platinum Partner, can support you in your data assurance journey. Contact us today at tellmemore@bytes.co.uk to find out more.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/16214202-data-assurance-insights-navigating-cyber-threats-in-healthcare.mp3" length="17085086" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-16214202</guid>
    <pubDate>Tue, 03 Dec 2024 15:00:00 +0000</pubDate>
    <itunes:duration>1374</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Misaddressed Email Dilemma ft. Proofpoint</itunes:title>
    <title>The Misaddressed Email Dilemma ft. Proofpoint</title>
    <itunes:summary><![CDATA[In today’s podcast we have our host, Courtney Williams, Cyber Security Solutions Specialist at Bytes, alongside Alistair Mills, Proofpoint’s Director of Sales Engineering - Northern Europe, Middle East &amp; Africa. They’ll be discussing all things around misaddressed email, such as: Misaddressed Email Protection Cybersecurity and Data ProtectionImpact of Misdirected EmailsTechnical AspectsBehavioural Change and User EngagementPractical ImplementationWe hope you enjoy the podcast and are...]]></itunes:summary>
    <description><![CDATA[<p>In today’s podcast we have our host, Courtney Williams, Cyber Security Solutions Specialist at Bytes, alongside Alistair Mills, Proofpoint’s Director of Sales Engineering - Northern Europe, Middle East &amp; Africa. They’ll be discussing all things around misaddressed email, such as:</p><ul><li>Misaddressed Email Protection </li><li>Cybersecurity and Data Protection</li><li>Impact of Misdirected Emails</li><li>Technical Aspects</li><li>Behavioural Change and User Engagement</li><li>Practical Implementation</li></ul><p>We hope you enjoy the podcast and are enjoying Cyber Security Awareness month as much as we are here at Bytes! </p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In today’s podcast we have our host, Courtney Williams, Cyber Security Solutions Specialist at Bytes, alongside Alistair Mills, Proofpoint’s Director of Sales Engineering - Northern Europe, Middle East &amp; Africa. They’ll be discussing all things around misaddressed email, such as:</p><ul><li>Misaddressed Email Protection </li><li>Cybersecurity and Data Protection</li><li>Impact of Misdirected Emails</li><li>Technical Aspects</li><li>Behavioural Change and User Engagement</li><li>Practical Implementation</li></ul><p>We hope you enjoy the podcast and are enjoying Cyber Security Awareness month as much as we are here at Bytes! </p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15968541-the-misaddressed-email-dilemma-ft-proofpoint.mp3" length="11068227" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15968541</guid>
    <pubDate>Tue, 22 Oct 2024 12:00:00 +0100</pubDate>
    <itunes:duration>919</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cloud Conversations: VMware Innovations ft. RedHat &amp; TD Synnex </itunes:title>
    <title>Cloud Conversations: VMware Innovations ft. RedHat &amp; TD Synnex </title>
    <itunes:summary><![CDATA[In this podcast episode Bytes RedHat Vendor Business Manager, Mitch Slaney, Kail Mistry at RedHat, and Daryl Kelly, Solution Architect at TD Synnex discuss the Broadcom changes and how they are effecting customers today, and how this is driving customers to evaluate alternative solutions.   RedHat OpenShift Virtualisation is emerging as a robust alternative to VMware. Discover the benefits of integrating OpenShift Virtualisation into your infrastructure, including the ability to manage v...]]></itunes:summary>
    <description><![CDATA[<p>In this podcast episode Bytes RedHat Vendor Business Manager, Mitch Slaney, Kail Mistry at RedHat, and Daryl Kelly, Solution Architect at TD Synnex discuss the Broadcom changes and how they are effecting customers today, and how this is driving customers to evaluate alternative solutions. <br/><br/>RedHat OpenShift Virtualisation is emerging as a robust alternative to VMware. Discover the benefits of integrating OpenShift Virtualisation into your infrastructure, including the ability to manage virtual machines and containers on a single platform, cost-effectiveness, and strong community support. We also explore real-world use cases and success stories, providing you with practical insights and actionable advice. Whether you&apos;re considering a migration from VMware or simply looking to enhance your virtualisation strategy, this episode is packed with valuable information you won&apos;t want to miss.</p><p>Tune in to learn how RedHat OpenShift Virtualisation can help you maximise your existing virtualisation investments while embracing modern cloud-native architectures.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In this podcast episode Bytes RedHat Vendor Business Manager, Mitch Slaney, Kail Mistry at RedHat, and Daryl Kelly, Solution Architect at TD Synnex discuss the Broadcom changes and how they are effecting customers today, and how this is driving customers to evaluate alternative solutions. <br/><br/>RedHat OpenShift Virtualisation is emerging as a robust alternative to VMware. Discover the benefits of integrating OpenShift Virtualisation into your infrastructure, including the ability to manage virtual machines and containers on a single platform, cost-effectiveness, and strong community support. We also explore real-world use cases and success stories, providing you with practical insights and actionable advice. Whether you&apos;re considering a migration from VMware or simply looking to enhance your virtualisation strategy, this episode is packed with valuable information you won&apos;t want to miss.</p><p>Tune in to learn how RedHat OpenShift Virtualisation can help you maximise your existing virtualisation investments while embracing modern cloud-native architectures.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15960896-cloud-conversations-vmware-innovations-ft-redhat-td-synnex.mp3" length="18250160" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15960896</guid>
    <pubDate>Mon, 21 Oct 2024 09:00:00 +0100</pubDate>
    <itunes:duration>1517</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Human Risk Revolution ft. Mimecast</itunes:title>
    <title>Human Risk Revolution ft. Mimecast</title>
    <itunes:summary><![CDATA[In honour of Cyber Security Awareness Month, join us for this podcast as our host, Toby Noble, Cyber Security Solutions Lead at Bytes, and Justin White, Mimecast’ Senior Sales Engineer, various questions around Human Risk Management including: User-Centric SecurityBehavioural AnalysisSimulated vs. Real RiskHuman Risk FactorsFuture of HRMMake sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>In honour of Cyber Security Awareness Month, join us for this podcast as our host, Toby Noble, Cyber Security Solutions Lead at Bytes, and Justin White, Mimecast’ Senior Sales Engineer, various questions around Human Risk Management including:</p><ul><li>User-Centric Security</li><li>Behavioural Analysis</li><li>Simulated vs. Real Risk</li><li>Human Risk Factors</li><li>Future of HRM</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In honour of Cyber Security Awareness Month, join us for this podcast as our host, Toby Noble, Cyber Security Solutions Lead at Bytes, and Justin White, Mimecast’ Senior Sales Engineer, various questions around Human Risk Management including:</p><ul><li>User-Centric Security</li><li>Behavioural Analysis</li><li>Simulated vs. Real Risk</li><li>Human Risk Factors</li><li>Future of HRM</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15943650-human-risk-revolution-ft-mimecast.mp3" length="16695607" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15943650</guid>
    <pubDate>Thu, 17 Oct 2024 16:00:00 +0100</pubDate>
    <itunes:duration>1388</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cloud Conversations: VMware Innovations ft. 11:11 Systems</itunes:title>
    <title>Cloud Conversations: VMware Innovations ft. 11:11 Systems</title>
    <itunes:summary><![CDATA[In this podcast snippet Bytes Pre-Sales Solutions Consultant, Anthony Arrand and Sam Woodcock, Senior Director of Cloud Strategy at 11:11 Systems discuss the significance of selecting the right cloud strategy to drive your business.  Learn how 11:11 Systems integrates VMware NSX Edge firewalls to ensure perimeter security, offers a consumption-based OPEX model, and provides a simple migration path built on familiar VMware architecture. Whether you're hosting mission-critical systems, planning...]]></itunes:summary>
    <description><![CDATA[<p>In this podcast snippet Bytes Pre-Sales Solutions Consultant, Anthony Arrand and Sam Woodcock, Senior Director of Cloud Strategy at 11:11 Systems discuss the significance of selecting the right cloud strategy to drive your business.<br/><br/>Learn how 11:11 Systems integrates VMware NSX Edge firewalls to ensure perimeter security, offers a consumption-based OPEX model, and provides a simple migration path built on familiar VMware architecture. Whether you&apos;re hosting mission-critical systems, planning for disaster recovery, or building next-generation applications, discover how 11:11 Systems&apos; high-spec private infrastructure and enhanced security suite can support your business needs.</p><p>Tune in to explore how 11:11 Systems&apos; VMware solution can help you maximise resources, save costs, and maintain robust security.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In this podcast snippet Bytes Pre-Sales Solutions Consultant, Anthony Arrand and Sam Woodcock, Senior Director of Cloud Strategy at 11:11 Systems discuss the significance of selecting the right cloud strategy to drive your business.<br/><br/>Learn how 11:11 Systems integrates VMware NSX Edge firewalls to ensure perimeter security, offers a consumption-based OPEX model, and provides a simple migration path built on familiar VMware architecture. Whether you&apos;re hosting mission-critical systems, planning for disaster recovery, or building next-generation applications, discover how 11:11 Systems&apos; high-spec private infrastructure and enhanced security suite can support your business needs.</p><p>Tune in to explore how 11:11 Systems&apos; VMware solution can help you maximise resources, save costs, and maintain robust security.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15935890-cloud-conversations-vmware-innovations-ft-11-11-systems.mp3" length="22189518" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15935890</guid>
    <pubDate>Wed, 16 Oct 2024 12:00:00 +0100</pubDate>
    <itunes:duration>1845</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Inside Threat Intelligence: Ransomware, Geopolitics &amp; More ft. Secureworks</itunes:title>
    <title>Inside Threat Intelligence: Ransomware, Geopolitics &amp; More ft. Secureworks</title>
    <itunes:summary><![CDATA[In today's podcast we are joined by Rafe Pilling, Director of Threat Intelligence - Counter Threat Unit at Secureworks and our Senior Threat Intelligence Analyst, Ellen Hallam.   Together they are going to be deep diving into the Threat Trends they are seeing at the moment and going into things like: Ransomeware TrendsGeopolitical Influences on Cyber ThreatsAdversary-in-the-Middle PhishingEmerging Cyber Security TrendsWant to find out more about Threat Intelligence? Secureworks are hosti...]]></itunes:summary>
    <description><![CDATA[<p>In today&apos;s podcast we are joined by Rafe Pilling, Director of Threat Intelligence - Counter Threat Unit at Secureworks and our Senior Threat Intelligence Analyst, Ellen Hallam. <br/><br/>Together they are going to be deep diving into the Threat Trends they are seeing at the moment and going into things like:</p><ul><li>Ransomeware Trends</li><li>Geopolitical Influences on Cyber Threats</li><li>Adversary-in-the-Middle Phishing</li><li>Emerging Cyber Security Trends</li></ul><p>Want to find out more about Threat Intelligence? Secureworks are hosting their Global Threat Intelligence Summit on October 3rd, offering deep dives into current and emerging cyber threats. <a href='https://secureworks.brighttalk.com/?utm_medium=partner-ad&amp;utm_source=bytes&amp;utm_campaign=25q3-gl-webinar-brighttalk-ti-summit&amp;utm_content=webinar'>Register here.</a><br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In today&apos;s podcast we are joined by Rafe Pilling, Director of Threat Intelligence - Counter Threat Unit at Secureworks and our Senior Threat Intelligence Analyst, Ellen Hallam. <br/><br/>Together they are going to be deep diving into the Threat Trends they are seeing at the moment and going into things like:</p><ul><li>Ransomeware Trends</li><li>Geopolitical Influences on Cyber Threats</li><li>Adversary-in-the-Middle Phishing</li><li>Emerging Cyber Security Trends</li></ul><p>Want to find out more about Threat Intelligence? Secureworks are hosting their Global Threat Intelligence Summit on October 3rd, offering deep dives into current and emerging cyber threats. <a href='https://secureworks.brighttalk.com/?utm_medium=partner-ad&amp;utm_source=bytes&amp;utm_campaign=25q3-gl-webinar-brighttalk-ti-summit&amp;utm_content=webinar'>Register here.</a><br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15693540-inside-threat-intelligence-ransomware-geopolitics-more-ft-secureworks.mp3" length="26174688" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15693540</guid>
    <pubDate>Wed, 04 Sep 2024 10:00:00 +0100</pubDate>
    <itunes:duration>2178</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ransomware Rundown ft. Sophos</itunes:title>
    <title>Ransomware Rundown ft. Sophos</title>
    <itunes:summary><![CDATA[In this episode, we dive deep into the ever-evolving world of ransomware.   Join Ellen Hallam, Senior Threat Intelligence Analyst at Bytes and Peter Mackenzie, Director of Incident Response at Sophos, as they explore: Ransomware TrendsRansom DemandsInitial Attack VectorsBackup Compromise AttemptsRansom Payment FundingRecovery CostThey emphasise the importance of a comprehensive cyber security strategy to combat these threats.   Join us as we discuss how to Prevent, Protect, Detect, Respo...]]></itunes:summary>
    <description><![CDATA[<p>In this episode, we dive deep into the ever-evolving world of ransomware. <br/><br/>Join <b>Ellen Hallam</b>, Senior Threat Intelligence Analyst at Bytes and <b>Peter Mackenzie</b>, Director of Incident Response at Sophos, as they explore:</p><ul><li>Ransomware Trends</li><li>Ransom Demands</li><li>Initial Attack Vectors</li><li>Backup Compromise Attempts</li><li>Ransom Payment Funding</li><li>Recovery Cost</li></ul><p>They emphasise the importance of a comprehensive cyber security strategy to combat these threats. <br/><br/>Join us as we discuss how to Prevent, Protect, Detect, Respond, and Plan and Prepare for cyber attacks, ensuring robust defenses and swift recovery.<br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In this episode, we dive deep into the ever-evolving world of ransomware. <br/><br/>Join <b>Ellen Hallam</b>, Senior Threat Intelligence Analyst at Bytes and <b>Peter Mackenzie</b>, Director of Incident Response at Sophos, as they explore:</p><ul><li>Ransomware Trends</li><li>Ransom Demands</li><li>Initial Attack Vectors</li><li>Backup Compromise Attempts</li><li>Ransom Payment Funding</li><li>Recovery Cost</li></ul><p>They emphasise the importance of a comprehensive cyber security strategy to combat these threats. <br/><br/>Join us as we discuss how to Prevent, Protect, Detect, Respond, and Plan and Prepare for cyber attacks, ensuring robust defenses and swift recovery.<br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15667617-ransomware-rundown-ft-sophos.mp3" length="24270585" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15667617</guid>
    <pubDate>Fri, 30 Aug 2024 10:00:00 +0100</pubDate>
    <itunes:duration>2019</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Exploring the Depths of API Security ft. F5</itunes:title>
    <title>Exploring the Depths of API Security ft. F5</title>
    <itunes:summary><![CDATA[ Join us as we put a spotlight on API Security with our special guest, Keiron Shepherd, Solution Architect EMEA from F5!   In this episode, Tatenda Chikukwa, Cloud &amp; Network Security Solutions Specialist at Bytes, asks Keiron a series of questions covering:  What is API security and why it’s crucialThe evolution and growing importance of APIsKey challenges and risks associated with APIsThe three pillars of API security: Discovery, Monitoring, and SecuringThe impact of AI on...]]></itunes:summary>
    <description><![CDATA[<p> Join us as we put a spotlight on API Security with our special guest,<b> </b><a href='https://www.linkedin.com/company/3199831/admin/page-posts/published/?share=true#'><b>Keiron Shepherd</b></a><b>,</b> Solution Architect EMEA from <a href='https://www.linkedin.com/company/3199831/admin/page-posts/published/?share=true#'>F5</a>!  </p><p>In this episode, <b>Tatenda Chikukwa</b>, Cloud &amp; Network Security Solutions Specialist at Bytes, asks Keiron a series of questions covering: </p><ul><li>What is API security and why it’s crucial</li><li>The evolution and growing importance of APIs</li><li>Key challenges and risks associated with APIs</li><li>The three pillars of API security: Discovery, Monitoring, and Securing</li><li>The impact of AI on API security</li><li>Real-world examples of API vulnerabilities and breaches</li></ul><p>Evaluate your API security posture by taking F5&apos;s short API security quiz - click <a href='https://www.f5.com/go/quiz/api-security'><b>here.</b></a><b><br/></b><br/>#APISecurity #CyberSecurity #TechPodcast </p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p> Join us as we put a spotlight on API Security with our special guest,<b> </b><a href='https://www.linkedin.com/company/3199831/admin/page-posts/published/?share=true#'><b>Keiron Shepherd</b></a><b>,</b> Solution Architect EMEA from <a href='https://www.linkedin.com/company/3199831/admin/page-posts/published/?share=true#'>F5</a>!  </p><p>In this episode, <b>Tatenda Chikukwa</b>, Cloud &amp; Network Security Solutions Specialist at Bytes, asks Keiron a series of questions covering: </p><ul><li>What is API security and why it’s crucial</li><li>The evolution and growing importance of APIs</li><li>Key challenges and risks associated with APIs</li><li>The three pillars of API security: Discovery, Monitoring, and Securing</li><li>The impact of AI on API security</li><li>Real-world examples of API vulnerabilities and breaches</li></ul><p>Evaluate your API security posture by taking F5&apos;s short API security quiz - click <a href='https://www.f5.com/go/quiz/api-security'><b>here.</b></a><b><br/></b><br/>#APISecurity #CyberSecurity #TechPodcast </p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15593027-exploring-the-depths-of-api-security-ft-f5.mp3" length="25710691" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15593027</guid>
    <pubDate>Fri, 16 Aug 2024 12:00:00 +0100</pubDate>
    <itunes:duration>2139</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Rapid Monthly Threat Assessment Digest: July Edition</itunes:title>
    <title>Rapid Monthly Threat Assessment Digest: July Edition</title>
    <itunes:summary><![CDATA[Listen in to our short podcast where our Senior Threat Intelligence Analyst, Ellen Hallam, provides all the highlights from our June Threat Assessment.   She covers the main highlights in July within threats such as: CrowdStrike OutageLabour's Plans for Cyber SecurityThreats to the Paris OlympicsNATO Aid to UkraineFind out more in our Monthly Threat Assessment here. Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Listen in to our short podcast where our Senior Threat Intelligence Analyst, Ellen Hallam, provides all the highlights from our June Threat Assessment. <br/><br/>She covers the main highlights in July within threats such as:</p><ul><li>CrowdStrike Outage</li><li>Labour&apos;s Plans for Cyber Security</li><li>Threats to the Paris Olympics</li><li>NATO Aid to Ukraine</li></ul><p>Find out more in our Monthly Threat Assessment <a href='https://www.bytes.co.uk/gated/bytes-threat-assessment-update-july-2024'><b>here.</b></a></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Listen in to our short podcast where our Senior Threat Intelligence Analyst, Ellen Hallam, provides all the highlights from our June Threat Assessment. <br/><br/>She covers the main highlights in July within threats such as:</p><ul><li>CrowdStrike Outage</li><li>Labour&apos;s Plans for Cyber Security</li><li>Threats to the Paris Olympics</li><li>NATO Aid to Ukraine</li></ul><p>Find out more in our Monthly Threat Assessment <a href='https://www.bytes.co.uk/gated/bytes-threat-assessment-update-july-2024'><b>here.</b></a></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15519043-rapid-monthly-threat-assessment-digest-july-edition.mp3" length="8995268" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15519043</guid>
    <pubDate>Fri, 02 Aug 2024 10:00:00 +0100</pubDate>
    <itunes:duration>746</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Tackling FinOps: Alignment, Innovation, and Cost Savings</itunes:title>
    <title>Tackling FinOps: Alignment, Innovation, and Cost Savings</title>
    <itunes:summary><![CDATA[Listen in as Matt Keable - Head of Cloud Sales, Chris Colledge - Multi-Cloud Pre-Sales Manager &amp; Alameen AlYasiri - Service Lead (Cloud Computing Optimisation) discuss the importance of aligning FinOps with your business goals. Our Cloud Specialists offer insights on:   Best practices when it comes to achieving efficiency and maximising cost savingsExploring innovative approaches to FinOps that enable efficient growth, scalability, and faster product deliveryWhat support Bytes offer in en...]]></itunes:summary>
    <description><![CDATA[<p>Listen in as Matt Keable - Head of Cloud Sales, Chris Colledge - Multi-Cloud Pre-Sales Manager &amp; Alameen AlYasiri - Service Lead (Cloud Computing Optimisation) discuss the importance of aligning FinOps with your business goals. Our Cloud Specialists offer insights on:<br/><br/></p><ul><li>Best practices when it comes to achieving efficiency and maximising cost savings</li><li>Exploring innovative approaches to FinOps that enable efficient growth, scalability, and faster product delivery</li><li>What support Bytes offer in enabling your organisation to automate your FinOps strategy through data-driven analysis</li><li>Recommendations of the right tools to maximise efficiency in the most cost-effective way</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Listen in as Matt Keable - Head of Cloud Sales, Chris Colledge - Multi-Cloud Pre-Sales Manager &amp; Alameen AlYasiri - Service Lead (Cloud Computing Optimisation) discuss the importance of aligning FinOps with your business goals. Our Cloud Specialists offer insights on:<br/><br/></p><ul><li>Best practices when it comes to achieving efficiency and maximising cost savings</li><li>Exploring innovative approaches to FinOps that enable efficient growth, scalability, and faster product delivery</li><li>What support Bytes offer in enabling your organisation to automate your FinOps strategy through data-driven analysis</li><li>Recommendations of the right tools to maximise efficiency in the most cost-effective way</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15468377-tackling-finops-alignment-innovation-and-cost-savings.mp3" length="22489672" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15468377</guid>
    <pubDate>Wed, 24 Jul 2024 16:00:00 +0100</pubDate>
    <itunes:duration>1774</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title> Cloud Control: Mastering Security with Microsoft Cloud Defender</itunes:title>
    <title> Cloud Control: Mastering Security with Microsoft Cloud Defender</title>
    <itunes:summary><![CDATA[Tune in as Chris Gath - Azure Customer Success Manager, Nicole Chesworth - Microsoft Security Specialist, and James Marshall - Senior Azure Success Manager explore the features of Microsoft’s Cloud Defender and discuss proactive strategies for safeguarding your cloud environment. Our Azure Specialists offer insights on:  Ensuring cloud system security, whether you’re a seasoned user or just beginningIdentifying and addressing common issues faced by businessesUtilising the Microsoft tools avai...]]></itunes:summary>
    <description><![CDATA[<div>Tune in as Chris Gath - Azure Customer Success Manager, Nicole Chesworth - Microsoft Security Specialist, and James Marshall - Senior Azure Success Manager explore the features of Microsoft’s Cloud Defender and discuss proactive strategies for safeguarding your cloud environment. Our Azure Specialists offer insights on:<br/><br/></div><ul><li>Ensuring cloud system security, whether you’re a seasoned user or just beginning</li><li>Identifying and addressing common issues faced by businesses</li><li>Utilising the Microsoft tools available to protect your Azure cloud estate</li><li>The crucial role of cloud service providers, like Bytes, in enhancing cloud security</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<div>Tune in as Chris Gath - Azure Customer Success Manager, Nicole Chesworth - Microsoft Security Specialist, and James Marshall - Senior Azure Success Manager explore the features of Microsoft’s Cloud Defender and discuss proactive strategies for safeguarding your cloud environment. Our Azure Specialists offer insights on:<br/><br/></div><ul><li>Ensuring cloud system security, whether you’re a seasoned user or just beginning</li><li>Identifying and addressing common issues faced by businesses</li><li>Utilising the Microsoft tools available to protect your Azure cloud estate</li><li>The crucial role of cloud service providers, like Bytes, in enhancing cloud security</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15466584-cloud-control-mastering-security-with-microsoft-cloud-defender.mp3" length="25367232" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15466584</guid>
    <pubDate>Wed, 24 Jul 2024 11:00:00 +0100</pubDate>
    <itunes:duration>1998</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Managing and Optimising IT Spend ft. License Dashboard</itunes:title>
    <title>Managing and Optimising IT Spend ft. License Dashboard</title>
    <itunes:summary><![CDATA[Tune into our latest podcast with Sean Robinson, the founder and director of License Dashboard, and our very own Dan Krayenbrink, our Divisional Director for Service Sales and Nick Hallam, Head of Consulting Technical Pre-Sales - we dive into what License Dashboard is, the benefits and how it can support you in effectively managing your IT expenditure, whilst minimising your costs, optimising software utilisation and streamlining your asset lifecycle, from top to bottom.   If you want to watc...]]></itunes:summary>
    <description><![CDATA[<p>Tune into our latest podcast with Sean Robinson, the founder and director of License Dashboard, and our very own Dan Krayenbrink, our Divisional Director for Service Sales and Nick Hallam, Head of Consulting Technical Pre-Sales - we dive into what License Dashboard is, the benefits and how it can support you in effectively managing your IT expenditure, whilst minimising your costs, optimising software utilisation and streamlining your asset lifecycle, from top to bottom. <br/><br/>If you want to watch the video version of this podcast, visit <a href='https://youtu.be/u0qVaDD6Azk'>here</a>.<br/><br/>To get started, get in touch with our team at tellmemore@bytes.co.uk.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Tune into our latest podcast with Sean Robinson, the founder and director of License Dashboard, and our very own Dan Krayenbrink, our Divisional Director for Service Sales and Nick Hallam, Head of Consulting Technical Pre-Sales - we dive into what License Dashboard is, the benefits and how it can support you in effectively managing your IT expenditure, whilst minimising your costs, optimising software utilisation and streamlining your asset lifecycle, from top to bottom. <br/><br/>If you want to watch the video version of this podcast, visit <a href='https://youtu.be/u0qVaDD6Azk'>here</a>.<br/><br/>To get started, get in touch with our team at tellmemore@bytes.co.uk.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15460745-managing-and-optimising-it-spend-ft-license-dashboard.mp3" length="30486774" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15460745</guid>
    <pubDate>Tue, 23 Jul 2024 14:00:00 +0100</pubDate>
    <itunes:duration>2349</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Human Factor: Why People Matter in Cyber Security Strategy - ft. Mimecast</itunes:title>
    <title>The Human Factor: Why People Matter in Cyber Security Strategy - ft. Mimecast</title>
    <itunes:summary><![CDATA[Join us for an enlightening conversation with David Rawle, our Chief Technology Officer, and Michael Paisley, Chief Security &amp; Resilience Officer at Mimecast, as they delve into the critical world of cyber security. Topics of Discussion: Navigating the complexities of Security Risk ManagementUnpacking the intricacies of Email SecurityUnderstanding the Human Factors in SecurityThe art of Decision Making in SecurityDon’t miss out on this opportunity to gain valuable insights from industry l...]]></itunes:summary>
    <description><![CDATA[<p>Join us for an enlightening conversation with <b>David Rawle</b>, our Chief Technology Officer, and <b>Michael Paisley</b>, Chief Security &amp; Resilience Officer at Mimecast, as they delve into the critical world of cyber security.</p><p><b>Topics of Discussion:</b></p><ul><li>Navigating the complexities of <b>Security Risk Management</b></li><li>Unpacking the intricacies of <b>Email Security</b></li><li>Understanding the <b>Human Factors in Security</b></li><li>The art of <b>Decision Making in Security</b></li></ul><p>Don’t miss out on this opportunity to gain valuable insights from industry leaders on how to fortify your digital defences.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Join us for an enlightening conversation with <b>David Rawle</b>, our Chief Technology Officer, and <b>Michael Paisley</b>, Chief Security &amp; Resilience Officer at Mimecast, as they delve into the critical world of cyber security.</p><p><b>Topics of Discussion:</b></p><ul><li>Navigating the complexities of <b>Security Risk Management</b></li><li>Unpacking the intricacies of <b>Email Security</b></li><li>Understanding the <b>Human Factors in Security</b></li><li>The art of <b>Decision Making in Security</b></li></ul><p>Don’t miss out on this opportunity to gain valuable insights from industry leaders on how to fortify your digital defences.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15451366-the-human-factor-why-people-matter-in-cyber-security-strategy-ft-mimecast.mp3" length="23907370" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15451366</guid>
    <pubDate>Mon, 22 Jul 2024 09:00:00 +0100</pubDate>
    <itunes:duration>1989</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Rapid Monthly Threat Assessment Digest: June Edition</itunes:title>
    <title>Rapid Monthly Threat Assessment Digest: June Edition</title>
    <itunes:summary><![CDATA[Listen in to our short podcast where our Senior Threat Intelligence Analyst, Ellen Hallam, provides all the highlights from our June Threat Assessment.   She covers the main highlights in June within threats such as: Ties between geopolitical events and cyber threats, with a focus on upcoming elections.Capture of Scattered Spider group's leader.Cyber incidents at Billericay School and London hospitals.TikTok's election interference and CopyCop network's news story manipulations.Snowflake...]]></itunes:summary>
    <description><![CDATA[<p>Listen in to our short podcast where our Senior Threat Intelligence Analyst, Ellen Hallam, provides all the highlights from our June Threat Assessment. <br/><br/>She covers the main highlights in June within threats such as:</p><ul><li>Ties between geopolitical events and cyber threats, with a focus on upcoming elections.</li><li>Capture of Scattered Spider group&apos;s leader.</li><li>Cyber incidents at Billericay School and London hospitals.</li><li>TikTok&apos;s election interference and CopyCop network&apos;s news story manipulations.</li><li>Snowflake attack on cloud storage and LockBit&apos;s claim against the US Federal Reserve.</li><li>US-China relations, North Korea&apos;s cyber activities, and regional conflicts impacting cybersecurity.</li></ul><p>Find out more in our Monthly Threat Assessment. </p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Listen in to our short podcast where our Senior Threat Intelligence Analyst, Ellen Hallam, provides all the highlights from our June Threat Assessment. <br/><br/>She covers the main highlights in June within threats such as:</p><ul><li>Ties between geopolitical events and cyber threats, with a focus on upcoming elections.</li><li>Capture of Scattered Spider group&apos;s leader.</li><li>Cyber incidents at Billericay School and London hospitals.</li><li>TikTok&apos;s election interference and CopyCop network&apos;s news story manipulations.</li><li>Snowflake attack on cloud storage and LockBit&apos;s claim against the US Federal Reserve.</li><li>US-China relations, North Korea&apos;s cyber activities, and regional conflicts impacting cybersecurity.</li></ul><p>Find out more in our Monthly Threat Assessment. </p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15348709-rapid-monthly-threat-assessment-digest-june-edition.mp3" length="8551395" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15348709</guid>
    <pubDate>Tue, 02 Jul 2024 15:00:00 +0100</pubDate>
    <itunes:duration>709</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Rebooting Identity: A Journey from Past to Present</itunes:title>
    <title>Rebooting Identity: A Journey from Past to Present</title>
    <itunes:summary><![CDATA[Tune into our latest Bytesize Technology Podcast episode: “Rebooting Identity.”   Dive into the latest on identity management with insights from our experts Toby Noble &amp; Christian Sullivan. Discover the shift to cloud environments, the critical role of user training, and the emergence of next-gen email security. Embrace the zero-trust methodology for robust security in the digital age. Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Tune into our latest Bytesize Technology Podcast episode: “Rebooting Identity.” <br/><br/>Dive into the latest on identity management with insights from our experts Toby Noble &amp; Christian Sullivan. Discover the shift to cloud environments, the critical role of user training, and the emergence of next-gen email security. Embrace the zero-trust methodology for robust security in the digital age.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Tune into our latest Bytesize Technology Podcast episode: “Rebooting Identity.” <br/><br/>Dive into the latest on identity management with insights from our experts Toby Noble &amp; Christian Sullivan. Discover the shift to cloud environments, the critical role of user training, and the emergence of next-gen email security. Embrace the zero-trust methodology for robust security in the digital age.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15328503-rebooting-identity-a-journey-from-past-to-present.mp3" length="19313422" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15328503</guid>
    <pubDate>Fri, 28 Jun 2024 16:00:00 +0100</pubDate>
    <itunes:duration>1606</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Rapid Monthly Threat Assessment Digest: May Edition</itunes:title>
    <title>Rapid Monthly Threat Assessment Digest: May Edition</title>
    <itunes:summary><![CDATA[Listen in to our short podcast where our Senior Threat Intelligence Analyst, Ellen Hallam, provides all the highlights from our May Threat Assessment.   She covers the main highlights in May within threats such as: Geopolitical Threat TrendsPhishing CampaignsRansomware RoundupBreachesDeep fakes &amp; AIMake sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Listen in to our short podcast where our Senior Threat Intelligence Analyst, Ellen Hallam, provides all the highlights from our May Threat Assessment. <br/><br/>She covers the main highlights in May within threats such as:</p><ul><li>Geopolitical Threat Trends</li><li>Phishing Campaigns</li><li>Ransomware Roundup</li><li>Breaches</li><li>Deep fakes &amp; AI</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Listen in to our short podcast where our Senior Threat Intelligence Analyst, Ellen Hallam, provides all the highlights from our May Threat Assessment. <br/><br/>She covers the main highlights in May within threats such as:</p><ul><li>Geopolitical Threat Trends</li><li>Phishing Campaigns</li><li>Ransomware Roundup</li><li>Breaches</li><li>Deep fakes &amp; AI</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15232030-rapid-monthly-threat-assessment-digest-may-edition.mp3" length="7649295" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15232030</guid>
    <pubDate>Wed, 12 Jun 2024 15:00:00 +0100</pubDate>
    <itunes:duration>634</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Guardians of the Cloud: Securing the Digital Skies</itunes:title>
    <title>Guardians of the Cloud: Securing the Digital Skies</title>
    <itunes:summary><![CDATA[Cloud Security enables you to: Protect against breachesEstablish effective disaster recovery managementAchieve compliance across regulationsReduce costsAchieve risk-free work managementListen as Bytes' Network Security Specialist, Andy Lee, and Check Points' Cloud Security Architect, Stuart Green, discuss the state of cloud security, and the importance of enabling effective approaches and tools to establish powerful, agile protection and security of their cloud environments.  Make sure t...]]></itunes:summary>
    <description><![CDATA[<p>Cloud Security enables you to:</p><ul><li>Protect against breaches</li><li>Establish effective disaster recovery management</li><li>Achieve compliance across regulations</li><li>Reduce costs</li><li>Achieve risk-free work management</li></ul><p>Listen as Bytes&apos; Network Security Specialist, Andy Lee, and Check Points&apos; Cloud Security Architect, Stuart Green, discuss the state of cloud security, and the importance of enabling effective approaches and tools to establish powerful, agile protection and security of their cloud environments. </p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Cloud Security enables you to:</p><ul><li>Protect against breaches</li><li>Establish effective disaster recovery management</li><li>Achieve compliance across regulations</li><li>Reduce costs</li><li>Achieve risk-free work management</li></ul><p>Listen as Bytes&apos; Network Security Specialist, Andy Lee, and Check Points&apos; Cloud Security Architect, Stuart Green, discuss the state of cloud security, and the importance of enabling effective approaches and tools to establish powerful, agile protection and security of their cloud environments. </p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/15034503-guardians-of-the-cloud-securing-the-digital-skies.mp3" length="12431896" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-15034503</guid>
    <pubDate>Wed, 08 May 2024 17:00:00 +0100</pubDate>
    <itunes:duration>1032</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Protect Your Cloud: Unpacking Cloud Security Posture Management ft. Tenable</itunes:title>
    <title>Protect Your Cloud: Unpacking Cloud Security Posture Management ft. Tenable</title>
    <itunes:summary><![CDATA[Cloud Security Posture Management enables you to: Monitor your multicloud security posturePrioritise risks with contextual insightsGet agent-based and agentless vulnerability scanningMaintain compliance with multicloud benchmarksListen as Bytes' Cyber Security Solutions Specialist, Ed Fenton, and Tenable’s Cloud Security Specialist for UK&amp;I and South Africa, Peter Hall,  discuss the importance of securing cloud environments by ensuring management of cloud identities &amp; compliance,...]]></itunes:summary>
    <description><![CDATA[<p>Cloud Security Posture Management enables you to:</p><ul><li>Monitor your multicloud security posture</li><li>Prioritise risks with contextual insights</li><li>Get agent-based and agentless vulnerability scanning</li><li>Maintain compliance with multicloud benchmarks</li></ul><p>Listen as Bytes&apos; Cyber Security Solutions Specialist, Ed Fenton, and Tenable’s Cloud Security Specialist for UK&amp;I and South Africa, Peter Hall,  discuss the importance of securing cloud environments by ensuring management of cloud identities &amp; compliance, and misconfiguration &amp; risk remediation.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Cloud Security Posture Management enables you to:</p><ul><li>Monitor your multicloud security posture</li><li>Prioritise risks with contextual insights</li><li>Get agent-based and agentless vulnerability scanning</li><li>Maintain compliance with multicloud benchmarks</li></ul><p>Listen as Bytes&apos; Cyber Security Solutions Specialist, Ed Fenton, and Tenable’s Cloud Security Specialist for UK&amp;I and South Africa, Peter Hall,  discuss the importance of securing cloud environments by ensuring management of cloud identities &amp; compliance, and misconfiguration &amp; risk remediation.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/14859087-protect-your-cloud-unpacking-cloud-security-posture-management-ft-tenable.mp3" length="21453595" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14859087</guid>
    <pubDate>Tue, 09 Apr 2024 20:00:00 +0100</pubDate>
    <itunes:duration>1784</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Awareness - Building a Security Conscious Organisation ft. Mimecast</itunes:title>
    <title>Cyber Awareness - Building a Security Conscious Organisation ft. Mimecast</title>
    <itunes:summary><![CDATA[Listen to Jeremy Edwards, Bytes' Head of Networking &amp; Security Solutions alongside Malcolm Murphy, Mimecast's Director of Sales Engineering, as they discuss building a security conscious organisation. Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Listen to Jeremy Edwards, Bytes&apos; Head of Networking &amp; Security Solutions alongside Malcolm Murphy, Mimecast&apos;s Director of Sales Engineering, as they discuss building a security conscious organisation.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Listen to Jeremy Edwards, Bytes&apos; Head of Networking &amp; Security Solutions alongside Malcolm Murphy, Mimecast&apos;s Director of Sales Engineering, as they discuss building a security conscious organisation.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/14857835-cyber-awareness-building-a-security-conscious-organisation-ft-mimecast.mp3" length="17750890" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14857835</guid>
    <pubDate>Tue, 09 Apr 2024 19:00:00 +0100</pubDate>
    <itunes:duration>1476</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Unpacking User Security: Importance of End User Training &amp; Awareness ft. Proofpoint</itunes:title>
    <title>Unpacking User Security: Importance of End User Training &amp; Awareness ft. Proofpoint</title>
    <itunes:summary><![CDATA[Join Courtney Williams, Cyber Security Solutions Specialist at Bytes, and Shariq Hirani, Account Manager at Proofpoint, as they deep dive into user security, the importance of end user training and awareness, and how you can secure your users and create a human firewall in the digital world.  They touch on why security awareness is important, how it has changed and evolved and how Proofpoint do it differently.   Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Join Courtney Williams, Cyber Security Solutions Specialist at Bytes, and Shariq Hirani, Account Manager at Proofpoint, as they deep dive into user security, the importance of end user training and awareness, and how you can secure your users and create a human firewall in the digital world.<br/><br/>They touch on why security awareness is important, how it has changed and evolved and how Proofpoint do it differently.<br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Join Courtney Williams, Cyber Security Solutions Specialist at Bytes, and Shariq Hirani, Account Manager at Proofpoint, as they deep dive into user security, the importance of end user training and awareness, and how you can secure your users and create a human firewall in the digital world.<br/><br/>They touch on why security awareness is important, how it has changed and evolved and how Proofpoint do it differently.<br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/14684516-unpacking-user-security-importance-of-end-user-training-awareness-ft-proofpoint.mp3" length="14515630" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14684516</guid>
    <pubDate>Wed, 13 Mar 2024 17:00:00 +0000</pubDate>
    <itunes:duration>1206</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>MDR: Are you leveraging your existing tools? ft. SecurityHQ</itunes:title>
    <title>MDR: Are you leveraging your existing tools? ft. SecurityHQ</title>
    <itunes:summary><![CDATA[Do you know what MDR is? It seems everyone has a different perspective on what MDR are is and how it can help you.   Listen to this podcast where Jamal Lawrence, Cyber Security Evangelist at Bytes and Assad Bahar, Senior Cyber Security Solutions Architect at SecurityHQ delve into MDR, what a modern MDR platform looks like, how to differentiate between SIEM vs MDR vs MDR and more. Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Do you know what MDR is? It seems everyone has a different perspective on what MDR are is and how it can help you. <br/><br/>Listen to this podcast where Jamal Lawrence, Cyber Security Evangelist at Bytes and Assad Bahar, Senior Cyber Security Solutions Architect at SecurityHQ delve into MDR, what a modern MDR platform looks like, how to differentiate between SIEM vs MDR vs MDR and more.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Do you know what MDR is? It seems everyone has a different perspective on what MDR are is and how it can help you. <br/><br/>Listen to this podcast where Jamal Lawrence, Cyber Security Evangelist at Bytes and Assad Bahar, Senior Cyber Security Solutions Architect at SecurityHQ delve into MDR, what a modern MDR platform looks like, how to differentiate between SIEM vs MDR vs MDR and more.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/14457661-mdr-are-you-leveraging-your-existing-tools-ft-securityhq.mp3" length="13240702" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14457661</guid>
    <pubDate>Wed, 07 Feb 2024 14:00:00 +0000</pubDate>
    <itunes:duration>1099</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Is Network Security still interesting? The C-Level Perspective ft. Check Point</itunes:title>
    <title>Is Network Security still interesting? The C-Level Perspective ft. Check Point</title>
    <itunes:summary><![CDATA[In this podcast we are going to try to convince you that Network Security is still interesting... Everything is cloud interrelated, there is more to life than just cloud conversations and there is other things happening out there.  Join David Rawle, Bytes' Chief Technology Officer and Deryck Mitchelson, Check Point's Global Chief Information Security Officer as they discuss network security, the increasing costs, cloud strategy, Check Point in the cloud &amp; more. Make sure to check us out o...]]></itunes:summary>
    <description><![CDATA[<p>In this podcast we are going to try to convince you that Network Security is still interesting... Everything is cloud interrelated, there is more to life than just cloud conversations and there is other things happening out there.<br/><br/>Join David Rawle, Bytes&apos; Chief Technology Officer and Deryck Mitchelson, Check Point&apos;s Global Chief Information Security Officer as they discuss network security, the increasing costs, cloud strategy, Check Point in the cloud &amp; more.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In this podcast we are going to try to convince you that Network Security is still interesting... Everything is cloud interrelated, there is more to life than just cloud conversations and there is other things happening out there.<br/><br/>Join David Rawle, Bytes&apos; Chief Technology Officer and Deryck Mitchelson, Check Point&apos;s Global Chief Information Security Officer as they discuss network security, the increasing costs, cloud strategy, Check Point in the cloud &amp; more.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/14290676-is-network-security-still-interesting-the-c-level-perspective-ft-check-point.mp3" length="11912884" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14290676</guid>
    <pubDate>Thu, 11 Jan 2024 11:00:00 +0000</pubDate>
    <itunes:duration>989</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>DLP: How do I protect my data in the new environment? Ft. Forcepoint</itunes:title>
    <title>DLP: How do I protect my data in the new environment? Ft. Forcepoint</title>
    <itunes:summary><![CDATA[Join Giuseppe Damiano, Bytes' Pre-Sales Solution Consultant as he is joined by Forcepoint’s Snr. Manager, Sales Engineering, Stuart Wilson discussing Data Protection and Loss Prevention.   Take a listen to this podcast whilst on a walk with your dog as they delve into different aspects of DLP, including data challenges, changing IT environment, compliance &amp; regulations and emergence of Generative AI. Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Join Giuseppe Damiano, Bytes&apos; Pre-Sales Solution Consultant as he is joined by Forcepoint’s Snr. Manager, Sales Engineering, Stuart Wilson discussing Data Protection and Loss Prevention. <br/><br/>Take a listen to this podcast whilst on a walk with your dog as they delve into different aspects of DLP, including data challenges, changing IT environment, compliance &amp; regulations and emergence of Generative AI.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Join Giuseppe Damiano, Bytes&apos; Pre-Sales Solution Consultant as he is joined by Forcepoint’s Snr. Manager, Sales Engineering, Stuart Wilson discussing Data Protection and Loss Prevention. <br/><br/>Take a listen to this podcast whilst on a walk with your dog as they delve into different aspects of DLP, including data challenges, changing IT environment, compliance &amp; regulations and emergence of Generative AI.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/14166726-dlp-how-do-i-protect-my-data-in-the-new-environment-ft-forcepoint.mp3" length="21639819" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-14166726</guid>
    <pubDate>Mon, 18 Dec 2023 16:00:00 +0000</pubDate>
    <itunes:duration>1799</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CyberBytes: Exploring the Security Landscape in 2023 - Part 2</itunes:title>
    <title>CyberBytes: Exploring the Security Landscape in 2023 - Part 2</title>
    <itunes:summary><![CDATA[Listen in as Nicole Chesworth, our Pre-Sales Solution Consultant, and Ellen Hallam, our Threat Intelligence Analyst, continue their discussion from the last episode of CyberBytes and deep dive into Email, Cyber Resilience and Supply Chain Management. Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Listen in as Nicole Chesworth, our Pre-Sales Solution Consultant, and Ellen Hallam, our Threat Intelligence Analyst, continue their discussion from the last episode of CyberBytes and deep dive into Email, Cyber Resilience and Supply Chain Management.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Listen in as Nicole Chesworth, our Pre-Sales Solution Consultant, and Ellen Hallam, our Threat Intelligence Analyst, continue their discussion from the last episode of CyberBytes and deep dive into Email, Cyber Resilience and Supply Chain Management.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/13882187-cyberbytes-exploring-the-security-landscape-in-2023-part-2.mp3" length="17868678" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13882187</guid>
    <pubDate>Tue, 31 Oct 2023 16:00:00 +0000</pubDate>
    <itunes:duration>1485</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Step Up to M365 E5  - The Journey: M365 E5 Deep Dive</itunes:title>
    <title>Step Up to M365 E5  - The Journey: M365 E5 Deep Dive</title>
    <itunes:summary><![CDATA[Listen to Abbey Long, Microsoft Security Specialist and Ryan Mulliner, Senior Microsoft Commercial Executive at Bytes as they delve into the fourth episode of the E5 Step Up and how they are here to help customers to get the best from their Microsoft Licensing investment.  In this episode, Abbey and Ryan introduce Nicole Chesworth, Pre-sales Cyber Security Consultant at Bytes, to delve deeper into the capabilities of the products included in M365 E5. Make sure to check us out on Spotify and f...]]></itunes:summary>
    <description><![CDATA[<p>Listen to Abbey Long, Microsoft Security Specialist and Ryan Mulliner, Senior Microsoft Commercial Executive at Bytes as they delve into the fourth episode of the E5 Step Up and how they are here to help customers to get the best from their Microsoft Licensing investment.<br/><br/>In this episode, Abbey and Ryan introduce Nicole Chesworth, Pre-sales Cyber Security Consultant at Bytes, to delve deeper into the capabilities of the products included in M365 E5.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Listen to Abbey Long, Microsoft Security Specialist and Ryan Mulliner, Senior Microsoft Commercial Executive at Bytes as they delve into the fourth episode of the E5 Step Up and how they are here to help customers to get the best from their Microsoft Licensing investment.<br/><br/>In this episode, Abbey and Ryan introduce Nicole Chesworth, Pre-sales Cyber Security Consultant at Bytes, to delve deeper into the capabilities of the products included in M365 E5.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/13879820-step-up-to-m365-e5-the-journey-m365-e5-deep-dive.mp3" length="17258739" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13879820</guid>
    <pubDate>Tue, 31 Oct 2023 11:00:00 +0000</pubDate>
    <itunes:duration>1434</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Step Up to M365 E5 - The Journey: Licensing and How To Buy</itunes:title>
    <title>Step Up to M365 E5 - The Journey: Licensing and How To Buy</title>
    <itunes:summary><![CDATA[Listen to Abbey Long, Microsoft Security Specialist and Ryan Mulliner, Senior Microsoft Commercial Executive at Bytes as they delve into the second episode of the E5 Step Up and how they are here to help customers to get the best from their Microsoft Licensing investment.  In this installment of Step up to M365 E5 – The Journey, Ryan and Abbey discuss the ways that E5 can be licensed, the difference between agreements and the main components within the suite. Make sure to check us out on Spot...]]></itunes:summary>
    <description><![CDATA[<p>Listen to Abbey Long, Microsoft Security Specialist and Ryan Mulliner, Senior Microsoft Commercial Executive at Bytes as they delve into the second episode of the E5 Step Up and how they are here to help customers to get the best from their Microsoft Licensing investment.<br/><br/>In this installment of Step up to M365 E5 – The Journey, Ryan and Abbey discuss the ways that E5 can be licensed, the difference between agreements and the main components within the suite.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Listen to Abbey Long, Microsoft Security Specialist and Ryan Mulliner, Senior Microsoft Commercial Executive at Bytes as they delve into the second episode of the E5 Step Up and how they are here to help customers to get the best from their Microsoft Licensing investment.<br/><br/>In this installment of Step up to M365 E5 – The Journey, Ryan and Abbey discuss the ways that E5 can be licensed, the difference between agreements and the main components within the suite.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/13879811-step-up-to-m365-e5-the-journey-licensing-and-how-to-buy.mp3" length="5734989" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13879811</guid>
    <pubDate>Tue, 31 Oct 2023 11:00:00 +0000</pubDate>
    <itunes:duration>474</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Step up to M365 E5 - The Journey: Thrive with M365</itunes:title>
    <title>Step up to M365 E5 - The Journey: Thrive with M365</title>
    <itunes:summary><![CDATA[Listen to Abbey Long, Microsoft Security Specialist and Ryan Mulliner, Senior Microsoft Commercial Executive at Bytes as they delve into the third episode of the E5 Step Up and how they are here to help customers to get the best from their Microsoft Licensing investment.  On this episode  Abbey and Ryan are back with Liam Acton, Microsoft Customer Success Manager at Bytes to discuss how we can help you with the move to E5.  For full video content visit: https://youtu.be/WFHbimkpcps Make ...]]></itunes:summary>
    <description><![CDATA[<p>Listen to Abbey Long, Microsoft Security Specialist and Ryan Mulliner, Senior Microsoft Commercial Executive at Bytes as they delve into the third episode of the E5 Step Up and how they are here to help customers to get the best from their Microsoft Licensing investment.<br/><br/>On this episode  Abbey and Ryan are back with Liam Acton, Microsoft Customer Success Manager at Bytes to discuss how we can help you with the move to E5.<br/><br/>For full video content visit: https://youtu.be/WFHbimkpcps</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Listen to Abbey Long, Microsoft Security Specialist and Ryan Mulliner, Senior Microsoft Commercial Executive at Bytes as they delve into the third episode of the E5 Step Up and how they are here to help customers to get the best from their Microsoft Licensing investment.<br/><br/>On this episode  Abbey and Ryan are back with Liam Acton, Microsoft Customer Success Manager at Bytes to discuss how we can help you with the move to E5.<br/><br/>For full video content visit: https://youtu.be/WFHbimkpcps</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/13879783-step-up-to-m365-e5-the-journey-thrive-with-m365.mp3" length="6972550" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13879783</guid>
    <pubDate>Tue, 31 Oct 2023 11:00:00 +0000</pubDate>
    <itunes:duration>577</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>How is the Threat Landscape Evolving? (ft. Secureworks)</itunes:title>
    <title>How is the Threat Landscape Evolving? (ft. Secureworks)</title>
    <itunes:summary><![CDATA[We are currently seeing a lot of people ask how different technology developments in the mainstream like AI are effecting people's security architecture and how their approach to monitoring technologies and controls should be changing.   Join Adam McCaig, Bytes' Head of Cyber Security, and Ritesh Singhai, Secureworks' Vice President Global Presales discuss the threat landscape, the definitions of XDR and MDR, whether EDR is enough to mitigate threats and reduce risk and more. Make sure t...]]></itunes:summary>
    <description><![CDATA[<p>We are currently seeing a lot of people ask how different technology developments in the mainstream like AI are effecting people&apos;s security architecture and how their approach to monitoring technologies and controls should be changing. <br/><br/>Join Adam McCaig, Bytes&apos; Head of Cyber Security, and Ritesh Singhai, Secureworks&apos; Vice President Global Presales discuss the threat landscape, the definitions of XDR and MDR, whether EDR is enough to mitigate threats and reduce risk and more.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>We are currently seeing a lot of people ask how different technology developments in the mainstream like AI are effecting people&apos;s security architecture and how their approach to monitoring technologies and controls should be changing. <br/><br/>Join Adam McCaig, Bytes&apos; Head of Cyber Security, and Ritesh Singhai, Secureworks&apos; Vice President Global Presales discuss the threat landscape, the definitions of XDR and MDR, whether EDR is enough to mitigate threats and reduce risk and more.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/13625505-how-is-the-threat-landscape-evolving-ft-secureworks.mp3" length="20900319" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13625505</guid>
    <pubDate>Wed, 20 Sep 2023 10:00:00 +0100</pubDate>
    <itunes:duration>1738</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>NCE for Public Sector - Powered by Bytes</itunes:title>
    <title>NCE for Public Sector - Powered by Bytes</title>
    <itunes:summary><![CDATA[During this episode, our Microsoft Program manager, Nathan Miller and Anthony Taylor, our Microsoft Channel Sales Specialist come together to discuss the recent news on legacy CSP retirement and the inclusion of NCE in public sector.  Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>During this episode, our Microsoft Program manager, Nathan Miller and Anthony Taylor, our Microsoft Channel Sales Specialist come together to discuss the recent news on legacy CSP retirement and the inclusion of NCE in public sector. </p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this episode, our Microsoft Program manager, Nathan Miller and Anthony Taylor, our Microsoft Channel Sales Specialist come together to discuss the recent news on legacy CSP retirement and the inclusion of NCE in public sector. </p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/13497181-nce-for-public-sector-powered-by-bytes.mp3" length="12930016" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13497181</guid>
    <pubDate>Wed, 30 Aug 2023 12:00:00 +0100</pubDate>
    <itunes:duration>1073</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>CyberBytes: Exploring the Cyber Landscape - Part 1</itunes:title>
    <title>CyberBytes: Exploring the Cyber Landscape - Part 1</title>
    <itunes:summary><![CDATA[Listen in as Nicole Chesworth, our Pre-Sales Solution Consultant, and Ellen Hallam, our Threat Intelligence Analyst, deep dive into discussing Identity, Cloud Defense, Threat Intelligence and recent exploits.  Don't miss out, next time they will be discussing Email, Cyber Resilience and Supply Chain Management. Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Listen in as Nicole Chesworth, our Pre-Sales Solution Consultant, and Ellen Hallam, our Threat Intelligence Analyst, deep dive into discussing Identity, Cloud Defense, Threat Intelligence and recent exploits.<br/><br/>Don&apos;t miss out, next time they will be discussing Email, Cyber Resilience and Supply Chain Management.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Listen in as Nicole Chesworth, our Pre-Sales Solution Consultant, and Ellen Hallam, our Threat Intelligence Analyst, deep dive into discussing Identity, Cloud Defense, Threat Intelligence and recent exploits.<br/><br/>Don&apos;t miss out, next time they will be discussing Email, Cyber Resilience and Supply Chain Management.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/13375366-cyberbytes-exploring-the-cyber-landscape-part-1.mp3" length="19163061" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13375366</guid>
    <pubDate>Wed, 09 Aug 2023 10:00:00 +0100</pubDate>
    <itunes:duration>1593</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Step Up to M365 E5 - The Journey: M365 E5 Suite</itunes:title>
    <title>Step Up to M365 E5 - The Journey: M365 E5 Suite</title>
    <itunes:summary><![CDATA[Listen to Abbey Long, Microsoft Security Specialist and Ryan Mulliner, Senior Microsoft Commercial Executive at Bytes as they delve into the first episode of the E5 Step Up and how they are here to help customers to get the best from their Microsoft Licensing investment.  In this episode they are discussing the value of M365 E5 across the various solution areas  and what is included in the M365 E5 suite.   Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Listen to Abbey Long, Microsoft Security Specialist and Ryan Mulliner, Senior Microsoft Commercial Executive at Bytes as they delve into the first episode of the E5 Step Up and how they are here to help customers to get the best from their Microsoft Licensing investment.<br/><br/>In this episode they are discussing the value of M365 E5 across the various solution areas  and what is included in the M365 E5 suite.<br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Listen to Abbey Long, Microsoft Security Specialist and Ryan Mulliner, Senior Microsoft Commercial Executive at Bytes as they delve into the first episode of the E5 Step Up and how they are here to help customers to get the best from their Microsoft Licensing investment.<br/><br/>In this episode they are discussing the value of M365 E5 across the various solution areas  and what is included in the M365 E5 suite.<br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/13237447-step-up-to-m365-e5-the-journey-m365-e5-suite.mp3" length="2481155" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13237447</guid>
    <pubDate>Mon, 17 Jul 2023 16:00:00 +0100</pubDate>
    <itunes:duration>203</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>They want me to stick my servers where?!</itunes:title>
    <title>They want me to stick my servers where?!</title>
    <itunes:summary><![CDATA[Join Kenny Lowe from Dell, and Andrew Cheung and Chris Colledge, from Bytes as we take on the hype around “the cloud exodus”, Hybrid Cloud, Multi Cloud, and how we see the future of infrastructure platforms panning out. Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Join Kenny Lowe from Dell, and Andrew Cheung and Chris Colledge, from Bytes as we take on the hype around “the cloud exodus”, Hybrid Cloud, Multi Cloud, and how we see the future of infrastructure platforms panning out.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Join Kenny Lowe from Dell, and Andrew Cheung and Chris Colledge, from Bytes as we take on the hype around “the cloud exodus”, Hybrid Cloud, Multi Cloud, and how we see the future of infrastructure platforms panning out.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/13081407-they-want-me-to-stick-my-servers-where.mp3" length="22257231" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-13081407</guid>
    <pubDate>Wed, 21 Jun 2023 14:00:00 +0100</pubDate>
    <itunes:duration>1851</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>SASE vs Zero Trust or SASE &amp; Zero Trust? (ft. Forcepoint)</itunes:title>
    <title>SASE vs Zero Trust or SASE &amp; Zero Trust? (ft. Forcepoint)</title>
    <itunes:summary><![CDATA[In this podcast, Jacob Ross, Network Security Lead at Bytes and Stuart Wilson, Senior Manager Sales Engineering at Forcepoint  delve into the ever changing cyber landscape and the challenges businesses are seeing around hybrid working and cloud adoption. Is it SASE vs Zero Trust or SASE and Zero Trust? Listen to find out what they think. Look out for an invite for Forcepoint's webinar in May! Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>In this podcast, Jacob Ross, Network Security Lead at Bytes and Stuart Wilson, Senior Manager Sales Engineering at Forcepoint  delve into the ever changing cyber landscape and the challenges businesses are seeing around hybrid working and cloud adoption. Is it SASE vs Zero Trust or SASE and Zero Trust? Listen to find out what they think.</p><p>Look out for an invite for Forcepoint&apos;s webinar in May!</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In this podcast, Jacob Ross, Network Security Lead at Bytes and Stuart Wilson, Senior Manager Sales Engineering at Forcepoint  delve into the ever changing cyber landscape and the challenges businesses are seeing around hybrid working and cloud adoption. Is it SASE vs Zero Trust or SASE and Zero Trust? Listen to find out what they think.</p><p>Look out for an invite for Forcepoint&apos;s webinar in May!</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/12696452-sase-vs-zero-trust-or-sase-zero-trust-ft-forcepoint.mp3" length="15348780" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12696452</guid>
    <pubDate>Fri, 21 Apr 2023 16:00:00 +0100</pubDate>
    <itunes:duration>1275</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Modernise your workplace with FastTrack</itunes:title>
    <title>Modernise your workplace with FastTrack</title>
    <itunes:summary><![CDATA[Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/12391753-modernise-your-workplace-with-fasttrack.mp3" length="16921106" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12391753</guid>
    <pubDate>Tue, 07 Mar 2023 13:00:00 +0000</pubDate>
    <itunes:duration>1406</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Zero Trust Security: Common Myths &amp; Surprising Truths (feat. Mimecast)</itunes:title>
    <title>Zero Trust Security: Common Myths &amp; Surprising Truths (feat. Mimecast)</title>
    <itunes:summary><![CDATA[In this podcast, Bytes Head of Technology Solution Development, Gennaro Migliaccio, and Mimecast's Regional CISO, Neil Clauson, discuss all things Zero Trust security - from common misconceptions, to key benefits of the model &amp; why all organisations should consider the methodology as part of their Cyber strategy for 2023 &amp; beyond.    This podcast discusses: How is Started vs How it's Going Common ChallengesMyth Busting Zero Trust - A Marketing Buzzword? A Product?  A Fa...]]></itunes:summary>
    <description><![CDATA[<p>In this podcast, Bytes Head of Technology Solution Development, Gennaro Migliaccio, and Mimecast&apos;s Regional CISO, Neil Clauson, discuss all things Zero Trust security - from common misconceptions, to key benefits of the model &amp; why all organisations should consider the methodology as part of their Cyber strategy for 2023 &amp; beyond.  <br/><br/>This podcast discusses:</p><ul><li>How is Started vs How it&apos;s Going </li><li>Common Challenges</li><li>Myth Busting Zero Trust - <em>A Marketing Buzzword? A Product?  A Fad?</em></li><li>Managing your Zero Trust expectations - Understanding the Process &amp; Achieving the ZT Aspiration </li><li>The Value &amp; Benefit to all organisations across the world</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In this podcast, Bytes Head of Technology Solution Development, Gennaro Migliaccio, and Mimecast&apos;s Regional CISO, Neil Clauson, discuss all things Zero Trust security - from common misconceptions, to key benefits of the model &amp; why all organisations should consider the methodology as part of their Cyber strategy for 2023 &amp; beyond.  <br/><br/>This podcast discusses:</p><ul><li>How is Started vs How it&apos;s Going </li><li>Common Challenges</li><li>Myth Busting Zero Trust - <em>A Marketing Buzzword? A Product?  A Fad?</em></li><li>Managing your Zero Trust expectations - Understanding the Process &amp; Achieving the ZT Aspiration </li><li>The Value &amp; Benefit to all organisations across the world</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/12161676-zero-trust-security-common-myths-surprising-truths-feat-mimecast.mp3" length="15805844" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-12161676</guid>
    <pubDate>Wed, 01 Feb 2023 11:00:00 +0000</pubDate>
    <itunes:duration>1313</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cyber Security Report 2023: Key Takeaways Unpacked</itunes:title>
    <title>Cyber Security Report 2023: Key Takeaways Unpacked</title>
    <itunes:summary><![CDATA[In this podcast, Bytes Head of Technology Solutions Development, Gennaro Migliaccio, and Bytes’ Cyber Security Evangelist, Adam McCaig, unpack &amp; discuss the key takeaways from the Bytes Cyber Security report.    This podcast discusses:   Key Challenges &amp; Priorities for 2023The Cyber Skills GapUser Awareness Training  Zero Trust Security Cloud Security Approaches in 2023   Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>In this podcast, Bytes Head of Technology Solutions Development, Gennaro Migliaccio, and Bytes’ Cyber Security Evangelist, Adam McCaig, unpack &amp; discuss the key takeaways from the Bytes Cyber Security report.  <br/><br/>This podcast discusses:<br/><br/></p><ul><li>Key Challenges &amp; Priorities for 2023</li><li>The Cyber Skills Gap</li><li>User Awareness Training </li><li> Zero Trust Security </li><li>Cloud Security Approaches in 2023 </li></ul><p><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In this podcast, Bytes Head of Technology Solutions Development, Gennaro Migliaccio, and Bytes’ Cyber Security Evangelist, Adam McCaig, unpack &amp; discuss the key takeaways from the Bytes Cyber Security report.  <br/><br/>This podcast discusses:<br/><br/></p><ul><li>Key Challenges &amp; Priorities for 2023</li><li>The Cyber Skills Gap</li><li>User Awareness Training </li><li> Zero Trust Security </li><li>Cloud Security Approaches in 2023 </li></ul><p><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/11984451-cyber-security-report-2023-key-takeaways-unpacked.mp3" length="27913559" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11984451</guid>
    <pubDate>Thu, 05 Jan 2023 11:00:00 +0000</pubDate>
    <itunes:duration>2322</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Demystifying XDR Security</itunes:title>
    <title>Demystifying XDR Security</title>
    <itunes:summary><![CDATA[In this podcast Bytes Head of Technology &amp; Solutions Sales, Jeremy Edwards, and Netskope Chief Technologist, Rich Davis, discuss the true meaning &amp; value behind XDR Security. Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>In this podcast Bytes Head of Technology &amp; Solutions Sales, Jeremy Edwards, and Netskope Chief Technologist, Rich Davis, discuss the true meaning &amp; value behind XDR Security.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>In this podcast Bytes Head of Technology &amp; Solutions Sales, Jeremy Edwards, and Netskope Chief Technologist, Rich Davis, discuss the true meaning &amp; value behind XDR Security.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/11697568-demystifying-xdr-security.mp3" length="15229574" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-11697568</guid>
    <pubDate>Tue, 15 Nov 2022 12:00:00 +0000</pubDate>
    <itunes:duration>1265</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Kubernetes: Build your own or invest in tooling?</itunes:title>
    <title>Kubernetes: Build your own or invest in tooling?</title>
    <itunes:summary><![CDATA[Bytes, Red Hat, and Pure Storage explore the the drawbacks of securing your own K8S clusters, and how investing in tooling can save time, money, and headaches. Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Bytes, Red Hat, and Pure Storage explore the the drawbacks of securing your own K8S clusters, and how investing in tooling can save time, money, and headaches.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Bytes, Red Hat, and Pure Storage explore the the drawbacks of securing your own K8S clusters, and how investing in tooling can save time, money, and headaches.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/11661486-kubernetes-build-your-own-or-invest-in-tooling.mp3" length="26727007" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11661486</guid>
    <pubDate>Wed, 09 Nov 2022 11:00:00 +0000</pubDate>
    <itunes:duration>2223</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Consolidated Security: Definition, Value &amp; Impact</itunes:title>
    <title>Consolidated Security: Definition, Value &amp; Impact</title>
    <itunes:summary><![CDATA[During this episode Bytes' CTO, David Rawle,  Check Point's CTO EMEA, Deryck Mitchelson, unpack and discuss the true meaning, value &amp; significance of a consolidated approach to Security.  Included in this session: Consolidated Security: The True Definition Enabling a 'Single Pane of Glass' approach by consolidating security dashboard across Cloud &amp; On-PremAn Honest Expert Exploration of Past &amp; Present Trends The True Value of Consolidation: Simplified Managemen...]]></itunes:summary>
    <description><![CDATA[<p>During this episode Bytes&apos; CTO, David Rawle,  Check Point&apos;s CTO EMEA, Deryck Mitchelson, unpack and discuss the true meaning, value &amp; significance of a consolidated approach to Security. </p><p>Included in this session:</p><ul><li>Consolidated Security: The True Definition </li><li>Enabling a &apos;Single Pane of Glass&apos; approach by consolidating security dashboard across Cloud &amp; On-Prem</li><li>An Honest Expert Exploration of Past &amp; Present Trends </li><li>The True Value of Consolidation: Simplified Management, Optimised Protection</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this episode Bytes&apos; CTO, David Rawle,  Check Point&apos;s CTO EMEA, Deryck Mitchelson, unpack and discuss the true meaning, value &amp; significance of a consolidated approach to Security. </p><p>Included in this session:</p><ul><li>Consolidated Security: The True Definition </li><li>Enabling a &apos;Single Pane of Glass&apos; approach by consolidating security dashboard across Cloud &amp; On-Prem</li><li>An Honest Expert Exploration of Past &amp; Present Trends </li><li>The True Value of Consolidation: Simplified Management, Optimised Protection</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/11623445-consolidated-security-definition-value-impact.mp3" length="15571640" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11623445</guid>
    <pubDate>Thu, 03 Nov 2022 12:00:00 +0000</pubDate>
    <itunes:duration>1294</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Keeping the rush to hybrid working secure</itunes:title>
    <title>Keeping the rush to hybrid working secure</title>
    <itunes:summary><![CDATA[During this episode Bytes CTO, David Rawle, Cyberark EMEA Technical Director, David Higgins and Tenable UK&amp;I Territory Manager, Taj Jassar discuss their thoughts on baking security into your business to ensure change is done securely. Included in this session: Enabling Secure Hybrid workingWhy not to run admin rights on staff endpointsEnsuring consistency of controlsMake sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>During this episode Bytes CTO, David Rawle, Cyberark EMEA Technical Director, David Higgins and Tenable UK&amp;I Territory Manager, Taj Jassar discuss their thoughts on baking security into your business to ensure change is done securely.</p><p>Included in this session:</p><ul><li>Enabling Secure Hybrid working</li><li>Why not to run admin rights on staff endpoints</li><li>Ensuring consistency of controls</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this episode Bytes CTO, David Rawle, Cyberark EMEA Technical Director, David Higgins and Tenable UK&amp;I Territory Manager, Taj Jassar discuss their thoughts on baking security into your business to ensure change is done securely.</p><p>Included in this session:</p><ul><li>Enabling Secure Hybrid working</li><li>Why not to run admin rights on staff endpoints</li><li>Ensuring consistency of controls</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/11022543-keeping-the-rush-to-hybrid-working-secure.mp3" length="16758988" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11022543</guid>
    <pubDate>Mon, 25 Jul 2022 12:00:00 +0100</pubDate>
    <itunes:duration>1392</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Practical Application of Zero Trust </itunes:title>
    <title>The Practical Application of Zero Trust </title>
    <itunes:summary><![CDATA[During this episode Bytes CTO, David Rawle,  Mimecast Field CTO, Johan Dreyer, and Netskope Head of Solutions Marketing, Rich Davis discuss their thoughts and divulge their knowledge on Zero Trust. Included in this session: Achieving Zero Trust in your businessWhy Zero Trust is not a productHow email forms part of a Zero Trust strategyMake sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>During this episode Bytes CTO, David Rawle,  Mimecast Field CTO, Johan Dreyer, and Netskope Head of Solutions Marketing, Rich Davis discuss their thoughts and divulge their knowledge on Zero Trust.</p><p>Included in this session:</p><ul><li>Achieving Zero Trust in your business</li><li>Why Zero Trust is not a product</li><li>How email forms part of a Zero Trust strategy</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this episode Bytes CTO, David Rawle,  Mimecast Field CTO, Johan Dreyer, and Netskope Head of Solutions Marketing, Rich Davis discuss their thoughts and divulge their knowledge on Zero Trust.</p><p>Included in this session:</p><ul><li>Achieving Zero Trust in your business</li><li>Why Zero Trust is not a product</li><li>How email forms part of a Zero Trust strategy</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/11004258-the-practical-application-of-zero-trust.mp3" length="19136682" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-11004258</guid>
    <pubDate>Thu, 21 Jul 2022 10:00:00 +0100</pubDate>
    <itunes:duration>1590</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Cloud Security: A Meaningful Discussion</itunes:title>
    <title>Cloud Security: A Meaningful Discussion</title>
    <itunes:summary><![CDATA[During this episode Bytes CTO, David Rawle, and Crowdstrike  Solutions Architect, Justin Harris, discuss their thoughts and divulge their knowledge on Cloud Security. Multicloud encompasses more than you expectUsing security specific tools to enhance your multicloud securityWhy building everything in code is so stringMake sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>During this episode Bytes CTO, David Rawle, and Crowdstrike  Solutions Architect, Justin Harris, discuss their thoughts and divulge their knowledge on Cloud Security.</p><ul><li>Multicloud encompasses more than you expect</li><li>Using security specific tools to enhance your multicloud security</li><li>Why building everything in code is so string</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this episode Bytes CTO, David Rawle, and Crowdstrike  Solutions Architect, Justin Harris, discuss their thoughts and divulge their knowledge on Cloud Security.</p><ul><li>Multicloud encompasses more than you expect</li><li>Using security specific tools to enhance your multicloud security</li><li>Why building everything in code is so string</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/10606302-cloud-security-a-meaningful-discussion.mp3" length="16309884" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10606302</guid>
    <pubDate>Thu, 12 May 2022 15:00:00 +0100</pubDate>
    <itunes:duration>1355</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Enhance your Data Strategies</itunes:title>
    <title>Enhance your Data Strategies</title>
    <itunes:summary><![CDATA[On this episode, we welcome back Simpsons Associates for the second instalment of our Data Analytics Series.  The focus of this episode surrounds data strategy as discussion turns towards three big head to head questions that all data strategists face:   Low Code vs No Code?Buying Solutions vs Building Solutions?RPA vs Integration?  Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>On this episode, we welcome back Simpsons Associates for the second instalment of our Data Analytics Series.  The focus of this episode surrounds data strategy as discussion turns towards three big head to head questions that all data strategists face:<br/><br/></p><ul><li>Low Code vs No Code?</li><li>Buying Solutions vs Building Solutions?</li><li>RPA vs Integration?</li></ul><p><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>On this episode, we welcome back Simpsons Associates for the second instalment of our Data Analytics Series.  The focus of this episode surrounds data strategy as discussion turns towards three big head to head questions that all data strategists face:<br/><br/></p><ul><li>Low Code vs No Code?</li><li>Buying Solutions vs Building Solutions?</li><li>RPA vs Integration?</li></ul><p><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/10374891-enhance-your-data-strategies.mp3" length="22604708" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10374891</guid>
    <pubDate>Mon, 04 Apr 2022 15:00:00 +0100</pubDate>
    <itunes:duration>1880</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Optimize Employee Experience with Microsoft Viva</itunes:title>
    <title>Optimize Employee Experience with Microsoft Viva</title>
    <itunes:summary><![CDATA[On this episode of the Bytesize Podcast, Peter Ely (Head of Modern Workplace at Bytes) is joined by Microsoft's Karl Kocar, where they discuss how Microsoft Viva brings together communications, knowledge, learning, resources, and insights in the flow of work.  What can you expect?   What is Microsoft Viva?How Viva supports your hybrid working approachNext Steps- how Viva can help your employees thriveMake sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>On this episode of the Bytesize Podcast, Peter Ely (Head of Modern Workplace at Bytes) is joined by Microsoft&apos;s Karl Kocar, where they discuss how Microsoft Viva brings together communications, knowledge, learning, resources, and insights in the flow of work.<br/><br/>What can you expect?<br/><br/></p><ul><li>What is Microsoft Viva?</li><li>How Viva supports your hybrid working approach</li><li>Next Steps- how Viva can help your employees thrive</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>On this episode of the Bytesize Podcast, Peter Ely (Head of Modern Workplace at Bytes) is joined by Microsoft&apos;s Karl Kocar, where they discuss how Microsoft Viva brings together communications, knowledge, learning, resources, and insights in the flow of work.<br/><br/>What can you expect?<br/><br/></p><ul><li>What is Microsoft Viva?</li><li>How Viva supports your hybrid working approach</li><li>Next Steps- how Viva can help your employees thrive</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/10302212-optimize-employee-experience-with-microsoft-viva.mp3" length="16933460" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10302212</guid>
    <pubDate>Wed, 23 Mar 2022 10:00:00 +0000</pubDate>
    <itunes:duration>1407</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Importance of Data Security</itunes:title>
    <title>The Importance of Data Security</title>
    <itunes:summary><![CDATA[During this session Bytes Head of Corporate Security, Jeremy Edwards, and Varonis Technical Director, Matt Lock share their thoughts and knowledge on putting Data Security at the front of business transformation.   Included in this podcast: Delivering successful cloud projectsThings to look out for when migrating data to the cloudHow a data centric approach can be a business enablerMake sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>During this session Bytes Head of Corporate Security, Jeremy Edwards, and Varonis Technical Director, Matt Lock share their thoughts and knowledge on putting Data Security at the front of business transformation. <br/><br/>Included in this podcast:</p><ul><li>Delivering successful cloud projects</li><li>Things to look out for when migrating data to the cloud</li><li>How a data centric approach can be a business enabler</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this session Bytes Head of Corporate Security, Jeremy Edwards, and Varonis Technical Director, Matt Lock share their thoughts and knowledge on putting Data Security at the front of business transformation. <br/><br/>Included in this podcast:</p><ul><li>Delivering successful cloud projects</li><li>Things to look out for when migrating data to the cloud</li><li>How a data centric approach can be a business enabler</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/10128186-the-importance-of-data-security.mp3" length="16577253" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-10128186</guid>
    <pubDate>Wed, 23 Feb 2022 11:00:00 +0000</pubDate>
    <itunes:duration>1377</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Azure Sentinel: The Complete SIEM Tool</itunes:title>
    <title>Azure Sentinel: The Complete SIEM Tool</title>
    <itunes:summary><![CDATA[Hear from Bytes' own David Rawle, Chief Technology Officer and Gennaro Migliaccio , Head of Technology Solutions Development as they discuss Azure Sentinel: Where did SIEM start?How to get the best out of Azure SentinelCould a managed service be beneficial?  Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Hear from Bytes&apos; own <b>David Rawle</b>, Chief Technology Officer and <b>Gennaro Migliaccio</b> , Head of Technology Solutions Development as they discuss Azure Sentinel:</p><ul><li>Where did SIEM start?</li><li>How to get the best out of Azure Sentinel</li><li>Could a managed service be beneficial?</li></ul><p><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Hear from Bytes&apos; own <b>David Rawle</b>, Chief Technology Officer and <b>Gennaro Migliaccio</b> , Head of Technology Solutions Development as they discuss Azure Sentinel:</p><ul><li>Where did SIEM start?</li><li>How to get the best out of Azure Sentinel</li><li>Could a managed service be beneficial?</li></ul><p><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/9427017-azure-sentinel-the-complete-siem-tool.mp3" length="18479157" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9427017</guid>
    <pubDate>Mon, 25 Oct 2021 10:00:00 +0100</pubDate>
    <itunes:duration>1536</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Data Analytics - Hear from the Experts</itunes:title>
    <title>Data Analytics - Hear from the Experts</title>
    <itunes:summary><![CDATA[During this session Chris Colledge, Cloud Solutions Specialist at Bytes is joined by Andrew Edge and Tom Hughes from Simpson Associates to discuss everything data.   Data StrategiesWhat are the challenges that need to be overcome?How organisations can transform to a data driven business In partnership with Simpson Associates Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>During this session <b>Chris Colledge,</b> Cloud Solutions Specialist at Bytes is joined by<b> Andrew Edge</b> and <b>Tom Hughes</b> from Simpson Associates to discuss everything data.<br/><br/></p><ul><li>Data Strategies</li><li>What are the challenges that need to be overcome?</li><li>How organisations can transform to a data driven business</li></ul><p><br/>In partnership with Simpson Associates</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this session <b>Chris Colledge,</b> Cloud Solutions Specialist at Bytes is joined by<b> Andrew Edge</b> and <b>Tom Hughes</b> from Simpson Associates to discuss everything data.<br/><br/></p><ul><li>Data Strategies</li><li>What are the challenges that need to be overcome?</li><li>How organisations can transform to a data driven business</li></ul><p><br/>In partnership with Simpson Associates</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/9314040-data-analytics-hear-from-the-experts.mp3" length="16230014" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9314040</guid>
    <pubDate>Tue, 05 Oct 2021 12:00:00 +0100</pubDate>
    <itunes:duration>1348</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Diversity in Technology</itunes:title>
    <title>Diversity in Technology</title>
    <itunes:summary><![CDATA[Join Jeremy Edwards, Sam Humphries &amp; Neil Thacker as they discuss one of the most pressing and important topics for any organisation or sector today. During this session our host and guests explore: What does diversity mean to you and your organisations?How can we embrace diversity more openly in the workplace?What resources are available for organisations who what to learn more about diversity? Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Join Jeremy Edwards, Sam Humphries &amp; Neil Thacker as they discuss one of the most pressing and important topics for any organisation or sector today. During this session our host and guests explore:</p><ul><li>What does <em>diversity</em> mean to you and your organisations?</li><li>How can we embrace diversity more openly in the workplace?</li><li>What resources are available for organisations who what to learn more about diversity? </li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Join Jeremy Edwards, Sam Humphries &amp; Neil Thacker as they discuss one of the most pressing and important topics for any organisation or sector today. During this session our host and guests explore:</p><ul><li>What does <em>diversity</em> mean to you and your organisations?</li><li>How can we embrace diversity more openly in the workplace?</li><li>What resources are available for organisations who what to learn more about diversity? </li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/8774686-diversity-in-technology.mp3" length="34384834" type="audio/mpeg" />
    <itunes:author></itunes:author>
    <guid isPermaLink="false">Buzzsprout-8774686</guid>
    <pubDate>Wed, 29 Sep 2021 15:00:00 +0100</pubDate>
    <itunes:duration>2861</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Ransomware Attacks - What&#39;s Changed Post-Pandemic? </itunes:title>
    <title>Ransomware Attacks - What&#39;s Changed Post-Pandemic? </title>
    <itunes:summary><![CDATA[During this session, Joe Hepburn Head of Data Management at Bytes and Pierre Francois, CTO, Rubrik,  discuss the ever changing trends we are seeing with backup and disaster recovery. They talk about how Ransomware has become more sophisticated since the COVID-19 pandemic. Trends and additional threats What's new with ransomware attacksSecure backup optionsIn partnership with Rubrik.  Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>During this session, Joe Hepburn Head of Data Management at Bytes and Pierre Francois, CTO, Rubrik,  discuss the ever changing trends we are seeing with backup and disaster recovery. They talk about how Ransomware has become more sophisticated since the COVID-19 pandemic.</p><ul><li>Trends and additional threats </li><li>What&apos;s new with ransomware attacks</li><li>Secure backup options</li></ul><p>In partnership with Rubrik. </p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this session, Joe Hepburn Head of Data Management at Bytes and Pierre Francois, CTO, Rubrik,  discuss the ever changing trends we are seeing with backup and disaster recovery. They talk about how Ransomware has become more sophisticated since the COVID-19 pandemic.</p><ul><li>Trends and additional threats </li><li>What&apos;s new with ransomware attacks</li><li>Secure backup options</li></ul><p>In partnership with Rubrik. </p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/9158472-ransomware-attacks-what-s-changed-post-pandemic.mp3" length="26636471" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9158472</guid>
    <pubDate>Wed, 08 Sep 2021 10:00:00 +0100</pubDate>
    <itunes:duration>2212</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Challenges of Modern IT Procurement</itunes:title>
    <title>Challenges of Modern IT Procurement</title>
    <itunes:summary><![CDATA[Join our commercial consultants, Glen Rogers and Dominic McHugh, as they discuss some of the current challenges within IT procurement. Discover how hybrid work, security and the cloud are all affecting licensing, how businesses can protect themselves - and what the future might bring.  Got a question for Glen or Dom? Contact us at tellmemore@bytes.co.uk    Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Join our commercial consultants, Glen Rogers and Dominic McHugh, as they discuss some of the current challenges within IT procurement. Discover how hybrid work, security and the cloud are all affecting licensing, how businesses can protect themselves - and what the future might bring.<br/><br/>Got a question for Glen or Dom? Contact us at tellmemore@bytes.co.uk<br/><br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Join our commercial consultants, Glen Rogers and Dominic McHugh, as they discuss some of the current challenges within IT procurement. Discover how hybrid work, security and the cloud are all affecting licensing, how businesses can protect themselves - and what the future might bring.<br/><br/>Got a question for Glen or Dom? Contact us at tellmemore@bytes.co.uk<br/><br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/9124497-challenges-of-modern-it-procurement.mp3" length="19054012" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-9124497</guid>
    <pubDate>Wed, 01 Sep 2021 21:00:00 +0100</pubDate>
    <itunes:duration>1583</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security Matters: The Importance of Data Security &amp; Compliance </itunes:title>
    <title>Security Matters: The Importance of Data Security &amp; Compliance </title>
    <itunes:summary><![CDATA[Listen to Bytes' Head of Solutions Development, Gennaro Migliaccio, and Microsoft's Security &amp; Compliance Technical Specialist, Maha AbuRumman as they discuss all things data and information compliance &amp; security, including key market trends, frameworks, common challenges &amp; drivers, plus best practise recommendations.     Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>Listen to Bytes&apos; Head of Solutions Development, Gennaro Migliaccio, and Microsoft&apos;s Security &amp; Compliance Technical Specialist, Maha AbuRumman as they discuss all things data and information compliance &amp; security, including key market trends, frameworks, common challenges &amp; drivers, plus best practise recommendations. <br/><br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>Listen to Bytes&apos; Head of Solutions Development, Gennaro Migliaccio, and Microsoft&apos;s Security &amp; Compliance Technical Specialist, Maha AbuRumman as they discuss all things data and information compliance &amp; security, including key market trends, frameworks, common challenges &amp; drivers, plus best practise recommendations. <br/><br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/8931017-security-matters-the-importance-of-data-security-compliance.mp3" length="21228708" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8931017</guid>
    <pubDate>Tue, 27 Jul 2021 17:00:00 +0100</pubDate>
    <itunes:duration>1764</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>The Art of the Possible: Azure Virtual Desktop + Windows 365</itunes:title>
    <title>The Art of the Possible: Azure Virtual Desktop + Windows 365</title>
    <itunes:summary><![CDATA[During this episode host Chris Colledge, Cloud Solution Specialist at Bytes, discusses recent announcements from Microsoft Inspire, and what the future holds for Azure Virtual Desktop (AVD) and Windows 365 (W365) with  Tom Hickling , Azure Program Manager at Microsoft.    From WVD to AVD - Technical changes vs a re-brand? How are Microsoft planning to incorporate cloud-based approaches into their virtual desktop platform?Looking at the similarities and differences between AVD +...]]></itunes:summary>
    <description><![CDATA[<p>During this episode host Chris Colledge, Cloud Solution Specialist at Bytes, discusses recent announcements from Microsoft Inspire, and what the future holds for Azure Virtual Desktop (AVD) and Windows 365 (W365) with  Tom Hickling , Azure Program Manager at Microsoft. <br/><br/></p><ul><li>From WVD to AVD - Technical changes vs a re-brand? </li><li>How are Microsoft planning to incorporate cloud-based approaches into their virtual desktop platform?</li><li>Looking at the similarities and differences between AVD + W365 - Which one is right for you? </li><li>A glimpse into the future - Support for Windows 11</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this episode host Chris Colledge, Cloud Solution Specialist at Bytes, discusses recent announcements from Microsoft Inspire, and what the future holds for Azure Virtual Desktop (AVD) and Windows 365 (W365) with  Tom Hickling , Azure Program Manager at Microsoft. <br/><br/></p><ul><li>From WVD to AVD - Technical changes vs a re-brand? </li><li>How are Microsoft planning to incorporate cloud-based approaches into their virtual desktop platform?</li><li>Looking at the similarities and differences between AVD + W365 - Which one is right for you? </li><li>A glimpse into the future - Support for Windows 11</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/8918376-the-art-of-the-possible-azure-virtual-desktop-windows-365.mp3" length="18271148" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8918376</guid>
    <pubDate>Mon, 26 Jul 2021 08:00:00 +0100</pubDate>
    <itunes:duration>1518</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Remote Working Achieved…What now? </itunes:title>
    <title>Remote Working Achieved…What now? </title>
    <itunes:summary><![CDATA[During this session Peter Ely, Modern Workplace Lead, Bytes and Spencer Pitts, Chief Technologist, VMWare discuss the initial rush to home working, it’s challenges and what to do next. The importance of Digital Employee ExperienceBytes commissioned Forrester market report findingsWhat the next 12 months looks like for the return to work planMake sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>During this session Peter Ely, Modern Workplace Lead, Bytes and Spencer Pitts, Chief Technologist, VMWare discuss the initial rush to home working, it’s challenges and what to do next.</p><ul><li>The importance of Digital Employee Experience</li><li>Bytes commissioned Forrester market report findings</li><li>What the next 12 months looks like for the return to work plan</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this session Peter Ely, Modern Workplace Lead, Bytes and Spencer Pitts, Chief Technologist, VMWare discuss the initial rush to home working, it’s challenges and what to do next.</p><ul><li>The importance of Digital Employee Experience</li><li>Bytes commissioned Forrester market report findings</li><li>What the next 12 months looks like for the return to work plan</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/8592374-remote-working-achieved-what-now.mp3" length="19250205" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8592374</guid>
    <pubDate>Wed, 26 May 2021 15:00:00 +0100</pubDate>
    <itunes:duration>1600</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security Reporting (EP1) – What Information is needed?</itunes:title>
    <title>Security Reporting (EP1) – What Information is needed?</title>
    <itunes:summary><![CDATA[During this session Steve Marshall, Bytes' CISO, challenges his guests Patrick Bayle, Palo Alto Networks System Engineer,  and Sam Humphries, Exabeam's Head of Security Strategy, on: Would management reporting of security breaches be helpful?Should there be some way for Vendors to report breaches to customers and users?Do we think it would help to hold Executives responsible for the code their company puts out?Got a question for Steve? Email us at tellmemore@bytes.co.uk. Make sure to che...]]></itunes:summary>
    <description><![CDATA[<p>During this session Steve Marshall, Bytes&apos; CISO, challenges his guests Patrick Bayle, Palo Alto Networks System Engineer,  and Sam Humphries, Exabeam&apos;s Head of Security Strategy, on:</p><ul><li>Would management reporting of security breaches be helpful?</li><li>Should there be some way for Vendors to report breaches to customers and users?</li><li>Do we think it would help to hold Executives responsible for the code their company puts out?</li></ul><p>Got a question for Steve? Email us at tellmemore@bytes.co.uk.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this session Steve Marshall, Bytes&apos; CISO, challenges his guests Patrick Bayle, Palo Alto Networks System Engineer,  and Sam Humphries, Exabeam&apos;s Head of Security Strategy, on:</p><ul><li>Would management reporting of security breaches be helpful?</li><li>Should there be some way for Vendors to report breaches to customers and users?</li><li>Do we think it would help to hold Executives responsible for the code their company puts out?</li></ul><p>Got a question for Steve? Email us at tellmemore@bytes.co.uk.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/8514181-security-reporting-ep1-what-information-is-needed.mp3" length="18169495" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8514181</guid>
    <pubDate>Wed, 26 May 2021 09:00:00 +0100</pubDate>
    <itunes:duration>1509</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security 2020 in Review (EP1) - What&#39;s trending into 2021?</itunes:title>
    <title>Security 2020 in Review (EP1) - What&#39;s trending into 2021?</title>
    <itunes:summary><![CDATA[During this session, host Jeremy Edwards, Head of Corporate Security at Bytes, discusses top trends for 2021, and the challenges faced by multi-cloud adoption with Ian Porteous, Check Point Regional Director, Security Engineering and Francis Gaffney, Mimecast Director of Threat Intelligence. Comments on Gartner's top trends for 2021What challenges we are seeing with Multi-Cloud adoptionThe challenges Multi-Cloud adoption will bring the future   Make sure to check us out on Spotify and follow ...]]></itunes:summary>
    <description><![CDATA[<p>During this session, host Jeremy Edwards, Head of Corporate Security at Bytes, discusses top trends for 2021, and the challenges faced by multi-cloud adoption with Ian Porteous, Check Point Regional Director, Security Engineering and Francis Gaffney, Mimecast Director of Threat Intelligence.</p><ul><li>Comments on Gartner&apos;s top trends for 2021</li><li>What challenges we are seeing with Multi-Cloud adoption</li><li>The challenges Multi-Cloud adoption will bring the future</li></ul><p><br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this session, host Jeremy Edwards, Head of Corporate Security at Bytes, discusses top trends for 2021, and the challenges faced by multi-cloud adoption with Ian Porteous, Check Point Regional Director, Security Engineering and Francis Gaffney, Mimecast Director of Threat Intelligence.</p><ul><li>Comments on Gartner&apos;s top trends for 2021</li><li>What challenges we are seeing with Multi-Cloud adoption</li><li>The challenges Multi-Cloud adoption will bring the future</li></ul><p><br/><br/></p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/8557091-security-2020-in-review-ep1-what-s-trending-into-2021.mp3" length="18534485" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8557091</guid>
    <pubDate>Thu, 20 May 2021 17:00:00 +0100</pubDate>
    <itunes:duration>1540</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security Reporting (EP2) – Covid passport &amp; security implications</itunes:title>
    <title>Security Reporting (EP2) – Covid passport &amp; security implications</title>
    <itunes:summary><![CDATA[During this session Steve Marshall, Bytes' CISO, challenges his guests Patrick Bayle, Palo Alto Networks System Engineer, and Sam Humphries, Exabeam's Head of Security Strategy, on the Covid Passport: Is this going to end up being like track and trace?What are the Data security implications?And more…Got a question for Steve? Email us at tellmemore@bytes.co.uk. Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>During this session Steve Marshall, Bytes&apos; CISO, challenges his guests Patrick Bayle, Palo Alto Networks System Engineer, and Sam Humphries, Exabeam&apos;s Head of Security Strategy, on the Covid Passport:</p><ul><li>Is this going to end up being like track and trace?</li><li>What are the Data security implications?</li><li>And more…</li></ul><p>Got a question for Steve? Email us at <a href='https://www.bytes.co.uk/info/podcasts/tellmemore@bytes.co.uk'>tellmemore@bytes.co.uk</a>.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this session Steve Marshall, Bytes&apos; CISO, challenges his guests Patrick Bayle, Palo Alto Networks System Engineer, and Sam Humphries, Exabeam&apos;s Head of Security Strategy, on the Covid Passport:</p><ul><li>Is this going to end up being like track and trace?</li><li>What are the Data security implications?</li><li>And more…</li></ul><p>Got a question for Steve? Email us at <a href='https://www.bytes.co.uk/info/podcasts/tellmemore@bytes.co.uk'>tellmemore@bytes.co.uk</a>.</p><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/8557071-security-reporting-ep2-covid-passport-security-implications.mp3" length="13086234" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8557071</guid>
    <pubDate>Thu, 20 May 2021 17:00:00 +0100</pubDate>
    <itunes:duration>1086</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
  <item>
    <itunes:title>Security 2020 in Review (EP2) – What’s trending into 2021?</itunes:title>
    <title>Security 2020 in Review (EP2) – What’s trending into 2021?</title>
    <itunes:summary><![CDATA[During this session, host Jeremy Edwards, Head of Corporate Security at Bytes, discusses top trends for 2021, and the challenges faced by multi-cloud adoption with Sam Humphries, Exabeam's Head of EMEA Security Strategy, and Feras Tappuni, CEO &amp; Co-Founder of SecurityHQ. What does the future of Cyber Security hold?How important it is to know what you have in your network.How phishing has changed in the last year.Make sure to check us out on Spotify and follow us for more! ]]></itunes:summary>
    <description><![CDATA[<p>During this session, host Jeremy Edwards, Head of Corporate Security at Bytes, discusses top trends for 2021, and the challenges faced by multi-cloud adoption with Sam Humphries, Exabeam&apos;s Head of EMEA Security Strategy, and Feras Tappuni, CEO &amp; Co-Founder of SecurityHQ.</p><ul><li>What does the future of Cyber Security hold?</li><li>How important it is to know what you have in your network.</li><li>How phishing has changed in the last year.</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></description>
    <content:encoded><![CDATA[<p>During this session, host Jeremy Edwards, Head of Corporate Security at Bytes, discusses top trends for 2021, and the challenges faced by multi-cloud adoption with Sam Humphries, Exabeam&apos;s Head of EMEA Security Strategy, and Feras Tappuni, CEO &amp; Co-Founder of SecurityHQ.</p><ul><li>What does the future of Cyber Security hold?</li><li>How important it is to know what you have in your network.</li><li>How phishing has changed in the last year.</li></ul><p>Make sure to check us out on <a href='https://open.spotify.com/show/7wdIfSXnBVn3sNtYBXPEkH?si=36cbd23aa8a74830'>Spotify </a>and follow us for more!</p>]]></content:encoded>
    <enclosure url="https://www.buzzsprout.com/1779404/episodes/8557065-security-2020-in-review-ep2-what-s-trending-into-2021.mp3" length="22458566" type="audio/mpeg" />
    <itunes:author>Bytes</itunes:author>
    <guid isPermaLink="false">Buzzsprout-8557065</guid>
    <pubDate>Thu, 20 May 2021 17:00:00 +0100</pubDate>
    <itunes:duration>1867</itunes:duration>
    <itunes:keywords></itunes:keywords>
    <itunes:episodeType>full</itunes:episodeType>
    <itunes:explicit>false</itunes:explicit>
  </item>
</channel>
</rss>
