{"id":202420,"date":"2025-02-07T21:41:29","date_gmt":"2025-02-07T21:46:12","guid":{"rendered":"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/"},"modified":"2026-04-05T16:50:18","modified_gmt":"2026-04-05T20:50:18","slug":"welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer","status":"publish","type":"podcast","link":"https:\/\/www.cyberark.com\/zh-hans\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/","title":{"rendered":"Welcome to Security Matters: The Next Evolution of CyberArk&#8217;s Podcast (Show Trailer)"},"content":{"rendered":"<p>Welcome to <strong>Security Matters<\/strong>, the next evolution of CyberArk\u2019s podcast. Previously known as <strong>Trust Issues<\/strong>, this show has always brought expert insights into the world of identity security.<\/p>\n<p>Hosted by David Puner, Senior Editorial Manager at CyberArk, <strong>Security Matters<\/strong> refines its focus to emphasize a proactive approach to cybersecurity. The podcast will delve into the principle of &#8220;Think like an attacker,&#8221; highlighting the importance of staying ahead of threats rather than merely reacting to them.<\/p>\n<p>Each episode will feature deep insights, expert perspectives, and actionable strategies to help empower listeners to defend and protect their organizations and the digital world. Topics will include securing the entire spectrum of identities\u2014both human and machine\u2014protecting hybrid and multi-cloud environments and analyzing the latest attack methods.<\/p>\n<p>Join <strong>Security Matters<\/strong> to explore why how you approach security truly matters.<\/p>\n<p>Coming mid-Feb. 2025 to this stream and most major podcast platforms.\u00a0<\/p>\n<\/p>\n<div class=\"transcript\" style=\"white-space:pre-line\">Welcome to Security Matters, the next evolution of CyberArk&#8217;s podcast. If you&#8217;ve been with us from the beginning or joined somewhere along the way, you know us as Trust Issues, a show that brought expert insights into the world of identity security.<\/p>\n<p>You&#8217;re still in the right place, and I&#8217;m still your host, David Puner, a Senior Editorial Manager at CyberArk, the global leader in identity security.<\/p>\n<p>But just like the security landscape evolves, so has our podcast. With Security Matters, we&#8217;re refining our focus even further, homing in on a principle we live by here\u2014think like an attacker. Security isn&#8217;t just about reacting to threats, it&#8217;s about staying ahead of them. A proactive approach is essential because security is a business imperative.<\/p>\n<p>Our Security Matters topics and conversations will double down on this, providing deep insights, expert perspectives, and actionable strategies to help you defend and protect your organization and the digital world. Whether we&#8217;re digging into securing the entire spectrum of identities\u2014human and machine\u2014protecting hybrid and multi-cloud environments, or analyzing the latest attack methods, the stakes couldn&#8217;t be higher.<\/p>\n<p>Because how you approach security matters.<\/p><\/div>\n","protected":false},"featured_media":213846,"template":"","class_list":["post-202420","podcast","type-podcast","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Welcome to Security Matters: The Next Evolution of CyberArk&#039;s Podcast (Show Trailer) | CyberArk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Welcome to Security Matters: The Next Evolution of CyberArk&#039;s Podcast (Show Trailer)\" \/>\n<meta property=\"og:description\" content=\"Welcome to Security Matters, the next evolution of CyberArk\u2019s podcast. Previously known as Trust Issues, this show has always brought expert insights into the world of identity security. Hosted by David Puner, Senior Editorial Manager at CyberArk, Security Mat...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-05T20:50:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MGZmNC5wbmc-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"1400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/\",\"url\":\"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/\",\"name\":\"Welcome to Security Matters: The Next Evolution of CyberArk's Podcast (Show Trailer) | CyberArk\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MGZmNC5wbmc-1.jpg\",\"datePublished\":\"2025-02-07T21:46:12+00:00\",\"dateModified\":\"2026-04-05T20:50:18+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/#breadcrumb\"},\"inLanguage\":\"zh-CN\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MGZmNC5wbmc-1.jpg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MGZmNC5wbmc-1.jpg\",\"width\":1400,\"height\":1400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Welcome to Security Matters: The Next Evolution of CyberArk&#8217;s Podcast (Show Trailer)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-CN\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-CN\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Welcome to Security Matters: The Next Evolution of CyberArk's Podcast (Show Trailer) | CyberArk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/","og_locale":"zh_CN","og_type":"article","og_title":"Welcome to Security Matters: The Next Evolution of CyberArk's Podcast (Show Trailer)","og_description":"Welcome to Security Matters, the next evolution of CyberArk\u2019s podcast. Previously known as Trust Issues, this show has always brought expert insights into the world of identity security. Hosted by David Puner, Senior Editorial Manager at CyberArk, Security Mat...","og_url":"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2026-04-05T20:50:18+00:00","og_image":[{"width":1400,"height":1400,"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MGZmNC5wbmc-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"2 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/","url":"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/","name":"Welcome to Security Matters: The Next Evolution of CyberArk's Podcast (Show Trailer) | CyberArk","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MGZmNC5wbmc-1.jpg","datePublished":"2025-02-07T21:46:12+00:00","dateModified":"2026-04-05T20:50:18+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/#breadcrumb"},"inLanguage":"zh-CN","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/"]}]},{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MGZmNC5wbmc-1.jpg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2025\/02\/MGZmNC5wbmc-1.jpg","width":1400,"height":1400},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/podcasts\/welcome-to-security-matters-the-next-evolution-of-cyberarks-podcast-show-trailer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Welcome to Security Matters: The Next Evolution of CyberArk&#8217;s Podcast (Show Trailer)"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-CN"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"zh-CN","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/podcast\/202420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/podcast"}],"about":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/types\/podcast"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/media\/213846"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/zh-hans\/wp-json\/wp\/v2\/media?parent=202420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}