Preview Mode Links will not work in preview mode

To ancients of the north, the steam rising from the hot stones of a sauna was akin to the very life force of man. To this day, deals are struck and decisions made in saunas, where movers and shakers gather to exchange ideas.

We invite you to Cyber Security Sauna (#CyberSauna), the podcast for sweating out the hot topics in security. We bring you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's self-proclaimed "cyber translator" Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game.

Dec 26, 2018

If you're looking for love nowadays, you'll likely turn to an online dating app. But what do these apps mean for your security? What privacy concessions are you making when you swipe? How does your online behavior impact your real life? Sean Sullivan joins Janne this episode to discuss the balancing act of maintaining...


Dec 10, 2018

2018 is winding to a close and the new year is just around the corner. What's in store for 2019 in cyber security? In this episode, five experts talk about exactly that, and discuss notable trends of 2018. From mobile phishing to AI trends, supply chain attacks, IoT, data privacy and more, our roundtable keeps...


Nov 19, 2018

Endpoint protection has been the trusted backbone of many companies' security. But with stories about data breaches and successful cyber attacks constantly in the news, people are beginning to think endpoint security is dead. Whether or not you agree, you might be wondering if there's any truth to this statement. F-


Oct 29, 2018

Democracy in the digital age is a wonderful yet wild beast. When it comes to electing our leaders nowadays, we're faced with questions about how to escape the influence of malicious actors. With the US midterm elections just around the corner, F-Secure security adviser Sean Sullivan joins us this episode to explain the...


Oct 8, 2018

Should your laptop ever get stolen and fall into the wrong hands, you would probably be comfortable in the knowledge that the data on it is protected by full disk encryption. But what if a malicious adversary could get around that encryption and access the data anyway? F-Secure's Olle Segerdahl and Pasi...