{"id":104880,"date":"2025-04-01T10:47:53","date_gmt":"2025-04-01T09:47:53","guid":{"rendered":"https:\/\/www.cloudcomputing-news.net\/?p=104880"},"modified":"2025-04-02T15:25:21","modified_gmt":"2025-04-02T14:25:21","slug":"brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world","status":"publish","type":"post","link":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/","title":{"rendered":"Brian Wagner, Defence.com: Cybersecurity in a perimeterless world"},"content":{"rendered":"\n<p>Brian Wagner is at the forefront of shaping how businesses defend against modern cyber threats. A renowned cybersecurity speaker and industry leader, he has served as head of compliance for AWS Financial Services and now leads as CTO at cybersecurity firm <a href=\"https:\/\/www.defense.com\/\">Defence.com<\/a>. Throughout his career, including key roles at Cisco, AWS and Bulletproof, Brian has helped organisations of all sizes build resilient, future-ready security strategies. <\/p>\n\n\n\n<p>We spoke to Brian to explore the next generation of cyber attacks, how businesses can protect themselves in a perimeterless world, and why the human factor remains both the greatest risk and the greatest opportunity in cybersecurity today.<\/p>\n\n\n\n<p><strong>As threat actors continue to evolve their tactics, what do you foresee as the next major style or category of cyber attack that businesses should prepare for?<\/strong><\/p>\n\n\n\n<p>The next&#8230;wow. I think it\u2019s going to come from the strides we\u2019re making in areas like quantum computing and other futuristic technologies. As our computing capabilities become more powerful, there will come a time when our current encryption mechanisms are no longer secure.<\/p>\n\n\n\n<p>I\u2019m not sure it will be the very next threat, but if you look at how we protect digital data today, there&#8217;s a not-too-distant future where that protection could be compromised. I wouldn\u2019t say encryption will become obsolete, but it could be broken within a reasonable amount of time by technologies like quantum computing \u2014 or simply by more powerful systems.<\/p>\n\n\n\n<p><strong>In what ways did the COVID-19 pandemic shift the cybersecurity landscape, and how has remote work specifically made businesses more vulnerable to attack?<\/strong><\/p>\n\n\n\n<p>Yes \u2014 when you work outside the office, when you work remotely, the difference from a digital perspective is that in the office, you\u2019re at least on a known network or within a known environment. Is it perfect? That varies from business to business. But it\u2019s at least predictable. You know where the perimeter is, how communications flow, and so on.<\/p>\n\n\n\n<p>When you work from home, the perimeter dissolves. There\u2019s no longer a defined boundary. If you think of it like a castle or fortress \u2014 you protect the walls, and people inside those walls are trusted to some degree, just by being there. In an office, it\u2019s the same. You\u2019re there physically, so you&#8217;ve likely passed some trust threshold \u2014 someone recognises you, you&#8217;re part of the system.<\/p>\n\n\n\n<p>But when that perimeter disappears, the attack surface expands exponentially. The opportunities for attack multiply. Instead of one centralised target, each individual working remotely becomes a potential point of entry. So rather than breaching a single fortress, an attacker now has many smaller targets. It makes everyone more vulnerable.<\/p>\n\n\n\n<p><strong>What\u2019s the single most important, practical step you believe organisations can take today to strengthen their cybersecurity posture?<\/strong><\/p>\n\n\n\n<p>I think the absolute top tip \u2014 easy to implement and realistic \u2014 is to use a password manager. A lot of the breaches we see now come from commonly used passwords or ones that have already been leaked online. So that\u2019s probably the number one easiest way to prevent a breach.<\/p>\n\n\n\n<p>The next thing is email vigilance. Phishing \u2014 if you&#8217;re unfamiliar with the term \u2014 is when someone tricks you into handing over information like login credentials or bank details. In business scenarios, it&#8217;s often aimed at stealing login details, which can then be used to access systems. There\u2019s no single action that can solve this, but the takeaway is to be sceptical of all emails.<\/p>\n\n\n\n<p>Another useful step is enabling multi-factor authentication (MFA). Everyone\u2019s using third-party services now &#8211; everything is a subscription, and every subscription has a login. With MFA, even if your password is stolen or leaked, the attacker won\u2019t be able to access your account without that second layer of verification. That makes the password effectively useless to them.<\/p>\n\n\n\n<p><strong>In your experience, what is the most common root cause behind data breaches within organisations today?<\/strong><\/p>\n\n\n\n<p>Sadly, it\u2019s human beings. Humans are inherently trusting \u2014 it\u2019s part of who we are. Statistically, it\u2019s clear that phishing plays a huge role in breaches. People are the weak point.<\/p>\n\n\n\n<p>Before email became dominant, the exploits were more physical. For example, someone might walk into a front office, say they\u2019re late for a job interview, and hand over a USB stick with their \u201cCV\u201d, which, once plugged in, delivers the breach.<\/p>\n\n\n\n<p>These days, especially with remote work, phishing is absolutely on the rise. I don\u2019t want to lean on phishing for every answer, but broadly speaking, people remain the weakest link in any organisation when it comes to cybersecurity.<\/p>\n\n\n\n<p><strong>With ransomware attacks growing in both frequency and sophistication, what should a business do if it finds itself being financially extorted by cybercriminals?<\/strong><\/p>\n\n\n\n<p>Brian: \u201cFirst of all \u2014 do not pay them. That\u2019s the absolute number one rule. The reason we have cybercrime and ransomware is because it\u2019s profitable. If it didn\u2019t make money, no one would bother doing it.<\/p>\n\n\n\n<p>Next, assess the impact. Ideally, if you&#8217;ve been backing up and archiving your data properly, a ransomware event should be an inconvenience at worst.<\/p>\n\n\n\n<p>There are a couple of scenarios here. If you have backup data, you won\u2019t theoretically lose anything\u2014even if the encrypted data is never recovered. The inconvenience then is the time it takes to restore everything, which may result in a temporary outage.<\/p>\n\n\n\n<p>But it also depends on what data is being held for ransom. Is it personal information? Customer data? Internal business data? If it\u2019s customer-related and includes things like login credentials or personal details, then you have an obligation \u2014 not just under GDPR, but morally \u2014 to notify those affected.<\/p>\n\n\n\n<p>As a responsible business, you should reach out and say: \u201cHere\u2019s what happened, and here\u2019s what we believe was taken.\u201d Those individuals need to know so they can protect themselves.<\/p>\n\n\n\n<p>\u201cBut again \u2014 rule number one \u2014 don\u2019t pay.<\/p>\n\n\n\n<p><strong>If you could go back and give your younger self one piece of advice at the start of your cybersecurity journey, what would it be, and why?<\/strong><\/p>\n\n\n\n<p>Don\u2019t be afraid to fail. Just try things. That\u2019s especially true in the early stages of your career \u2014 any career, not just cybersecurity. There\u2019s often a tendency to chase perfection, to feel like you have to get everything right the first time.<\/p>\n\n\n\n<p>And along the same lines, I\u2019d also say: stick with your strengths. Early in their careers, people often try to be people-pleasers. They want to be seen as helpful or indispensable.<\/p>\n\n\n\n<p>Let me give you an example. Say you\u2019re brought in to solve a software issue for a major company, but someone says: \u201cHey, you\u2019re good with computers &#8211; can you fix the printer?\u201d You might feel inclined to say yes, but really, you should feel confident saying, \u201cActually, I\u2019m here to do this specific job.<\/p>\n\n\n\n<p>When you stay in your lane, you build authority in your area of expertise \u2014 and that\u2019s valuable. It shows confidence, and it helps you grow the right way.<\/p>\n\n\n\n<p>This interview with <a href=\"https:\/\/cyber-security-speakers.com\/speaker\/brian-wagner\">Brian Wagner<\/a> was conducted by <a href=\"https:\/\/motivationalspeakersagency.co.uk\/author\/mark-matthews\">Mark Matthews<\/a>.\u202f\u202f\u202f<\/p>\n\n\n\n<p>Photo by <a href=\"https:\/\/unsplash.com\/@flyd2069?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash\">FlyD<\/a> on <a href=\"https:\/\/unsplash.com\/photos\/red-and-black-love-lock-zAhAUSdRLJ8?utm_content=creditCopyText&amp;utm_medium=referral&amp;utm_source=unsplash\">Unsplash<\/a><\/p>\n\n\n\n<p><strong><em>Want to learn more about cybersecurity and the cloud from industry leaders? Check out&nbsp;<a href=\"https:\/\/www.cybersecuritycloudexpo.com\/\">Cyber Security &amp; Cloud Expo<\/a>&nbsp;taking place in Amsterdam, California, and London.<\/em><\/strong><\/p>\n\n\n\n<p><strong><em>Explore other upcoming enterprise technology events and webinars powered by TechForge&nbsp;<a href=\"https:\/\/techforge.pub\/events\/\">here<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Brian Wagner is at the forefront of shaping how businesses defend against modern cyber threats. A renowned cybersecurity speaker and industry leader, he has served as head of compliance for AWS Financial Services and now leads as CTO at cybersecurity firm Defence.com. Throughout his career, including key roles at Cisco, AWS and Bulletproof, Brian has [&hellip;]<\/p>\n","protected":false},"author":57372,"featured_media":104886,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[497,1969,3],"tags":[169,185],"ppma_author":[882],"class_list":["post-104880","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-computing-companies","category-interviews","category-cloud-computing-security","tag-aws","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.9 (Yoast SEO v24.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Brian Wagner, Defence.com: Cybersecurity in a perimeterless world<\/title>\n<meta name=\"description\" content=\"Brian Wagner, cybersecurity expert and CTO at Defence.com, discusses the future of cyber threats, the impact of remote work and why human error remains the biggest security challenge for businesses today.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Brian Wagner, Defence.com: Cybersecurity in a perimeterless world\" \/>\n<meta property=\"og:description\" content=\"Brian Wagner, cybersecurity expert and CTO at Defence.com, discusses the future of cyber threats, the impact of remote work and why human error remains the biggest security challenge for businesses today.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloud Computing News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-01T09:47:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-02T14:25:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/flyd-zAhAUSdRLJ8-unsplash.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Duncan MacRae\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:site\" content=\"@cloud_comp_news\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Duncan MacRae\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/\"},\"author\":{\"name\":\"Duncan MacRae\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870\"},\"headline\":\"Brian Wagner, Defence.com: Cybersecurity in a perimeterless world\",\"datePublished\":\"2025-04-01T09:47:53+00:00\",\"dateModified\":\"2025-04-02T14:25:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/\"},\"wordCount\":1247,\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/flyd-zAhAUSdRLJ8-unsplash.jpg\",\"keywords\":[\"AWS\",\"cybersecurity\"],\"articleSection\":[\"Companies\",\"Interviews\",\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/\",\"name\":\"Brian Wagner, Defence.com: Cybersecurity in a perimeterless world\",\"isPartOf\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/flyd-zAhAUSdRLJ8-unsplash.jpg\",\"datePublished\":\"2025-04-01T09:47:53+00:00\",\"dateModified\":\"2025-04-02T14:25:21+00:00\",\"description\":\"Brian Wagner, cybersecurity expert and CTO at Defence.com, discusses the future of cyber threats, the impact of remote work and why human error remains the biggest security challenge for businesses today.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#primaryimage\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/flyd-zAhAUSdRLJ8-unsplash.jpg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/flyd-zAhAUSdRLJ8-unsplash.jpg\",\"width\":1920,\"height\":1281},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cloudcomputing-news.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Brian Wagner, Defence.com: Cybersecurity in a perimeterless world\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#website\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"name\":\"Cloud Computing News\",\"description\":\"IaaS, SaaS, PaaS, Data Security, CIO, Analysis\",\"publisher\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#organization\",\"name\":\"Cloud Computing News\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg\",\"width\":1920,\"height\":1080,\"caption\":\"Cloud Computing News\"},\"image\":{\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/CT\/210614738995040\",\"https:\/\/x.com\/cloud_comp_news\",\"https:\/\/www.linkedin.com\/groups\/45151\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870\",\"name\":\"Duncan MacRae\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/895f18375558aad26b5923eae11cf44f\",\"url\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg\",\"contentUrl\":\"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg\",\"caption\":\"Duncan MacRae\"},\"description\":\"Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing.\",\"sameAs\":[\"duncan@techforge.pub\"],\"url\":\"https:\/\/www.cloudcomputing-news.net\/news\/author\/duncan1\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Brian Wagner, Defence.com: Cybersecurity in a perimeterless world","description":"Brian Wagner, cybersecurity expert and CTO at Defence.com, discusses the future of cyber threats, the impact of remote work and why human error remains the biggest security challenge for businesses today.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/","og_locale":"en_GB","og_type":"article","og_title":"Brian Wagner, Defence.com: Cybersecurity in a perimeterless world","og_description":"Brian Wagner, cybersecurity expert and CTO at Defence.com, discusses the future of cyber threats, the impact of remote work and why human error remains the biggest security challenge for businesses today.","og_url":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/","og_site_name":"Cloud Computing News","article_publisher":"https:\/\/www.facebook.com\/pages\/CT\/210614738995040","article_published_time":"2025-04-01T09:47:53+00:00","article_modified_time":"2025-04-02T14:25:21+00:00","og_image":[{"width":1920,"height":1281,"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/flyd-zAhAUSdRLJ8-unsplash.jpg","type":"image\/jpeg"}],"author":"Duncan MacRae","twitter_card":"summary_large_image","twitter_creator":"@cloud_comp_news","twitter_site":"@cloud_comp_news","twitter_misc":{"Written by":"Duncan MacRae","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#article","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/"},"author":{"name":"Duncan MacRae","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870"},"headline":"Brian Wagner, Defence.com: Cybersecurity in a perimeterless world","datePublished":"2025-04-01T09:47:53+00:00","dateModified":"2025-04-02T14:25:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/"},"wordCount":1247,"publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/flyd-zAhAUSdRLJ8-unsplash.jpg","keywords":["AWS","cybersecurity"],"articleSection":["Companies","Interviews","Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/","url":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/","name":"Brian Wagner, Defence.com: Cybersecurity in a perimeterless world","isPartOf":{"@id":"https:\/\/www.cloudcomputing-news.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#primaryimage"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/flyd-zAhAUSdRLJ8-unsplash.jpg","datePublished":"2025-04-01T09:47:53+00:00","dateModified":"2025-04-02T14:25:21+00:00","description":"Brian Wagner, cybersecurity expert and CTO at Defence.com, discusses the future of cyber threats, the impact of remote work and why human error remains the biggest security challenge for businesses today.","breadcrumb":{"@id":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#primaryimage","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/flyd-zAhAUSdRLJ8-unsplash.jpg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2025\/04\/flyd-zAhAUSdRLJ8-unsplash.jpg","width":1920,"height":1281},{"@type":"BreadcrumbList","@id":"https:\/\/www.cloudcomputing-news.net\/news\/brian-wagner-defence-com-cybersecurity-in-a-perimeterless-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cloudcomputing-news.net\/"},{"@type":"ListItem","position":2,"name":"Brian Wagner, Defence.com: Cybersecurity in a perimeterless world"}]},{"@type":"WebSite","@id":"https:\/\/www.cloudcomputing-news.net\/#website","url":"https:\/\/www.cloudcomputing-news.net\/","name":"Cloud Computing News","description":"IaaS, SaaS, PaaS, Data Security, CIO, Analysis","publisher":{"@id":"https:\/\/www.cloudcomputing-news.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cloudcomputing-news.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.cloudcomputing-news.net\/#organization","name":"Cloud Computing News","url":"https:\/\/www.cloudcomputing-news.net\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/07\/Cloudtech.svg","width":1920,"height":1080,"caption":"Cloud Computing News"},"image":{"@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pages\/CT\/210614738995040","https:\/\/x.com\/cloud_comp_news","https:\/\/www.linkedin.com\/groups\/45151\/"]},{"@type":"Person","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/1579de5d21ad7a9b5d437a2b642cf870","name":"Duncan MacRae","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cloudcomputing-news.net\/#\/schema\/person\/image\/895f18375558aad26b5923eae11cf44f","url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg","contentUrl":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg","caption":"Duncan MacRae"},"description":"Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing.","sameAs":["duncan@techforge.pub"],"url":"https:\/\/www.cloudcomputing-news.net\/news\/author\/duncan1\/"}]}},"authors":[{"term_id":882,"user_id":0,"is_guest":1,"slug":"duncan1","display_name":"Duncan MacRae","avatar_url":{"url":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg","url2x":"https:\/\/www.cloudcomputing-news.net\/wp-content\/uploads\/2024\/11\/photo-of-duncan-scaled-1.jpg"},"author_category":"","user_url":"","last_name":"MacRae","first_name":"Duncan","job_title":"Editor-in-Chief","description":"Duncan is an award-winning technology industry analyst, specialising in cloud computing, blockchain, martech and edge computing."}],"_links":{"self":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/104880","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/users\/57372"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/comments?post=104880"}],"version-history":[{"count":0,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/posts\/104880\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media\/104886"}],"wp:attachment":[{"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/media?parent=104880"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/categories?post=104880"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/tags?post=104880"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.cloudcomputing-news.net\/wp-json\/wp\/v2\/ppma_author?post=104880"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}