Share

cover art for Control access with the perimeter security layer

Grey Matter Talks Tech

Control access with the perimeter security layer

Season 3, Ep. 2

Welcome to part two of our seven layers of security miniseries. In this episode, our Cyber Security Specialist Scott Harrison shares tips and insights on how to make your organisation's digital perimeter safe from threats. Ensure only the right people get access to your data and systems.

More episodes

View all episodes

  • 10. Secure by design: The DevSecOps mindset

    36:42||Season 3, Ep. 10
    In this episode of Grey Matter Talks Tech, host Sam Barnes (Azure Solutions Specialist, Grey Matter) is joined by security expert Scott Harrison (Grey Matter) and DevOps specialist Richard Fennell (Black Marble) for a discussion on DevSecOps. The conversation explores the “shift left” approach to security, essential tools and technologies, and the importance of culture and collaboration in building secure software. 
  • 9. Trust no one: Microsoft 365 and the Zero Trust Model

    30:29||Season 3, Ep. 9
    Zero Trust – it's not just a buzzword. In this episode, we explore how Microsoft 365 is putting Zero Trust principles into action. Traditional perimeter-based security is fast becoming a model of the past. Enter Zero Trust. This is a model where verification is continuous, access is conditional, and trust is never assumed. Learn how identity, device health, and real-time risk signals work together to enforce security policies that adapt to today’s threat landscape. Whether you're an IT leader, security professional, or just curious about cloud security, this conversation is for you. It gives you actionable insights into building a resilient, Zero Trust-aligned environment.
  • 8. The state of ransomware in 2025 and beyond

    45:53||Season 3, Ep. 8
    Get ready to dive into the evolving world of ransomware in 2025 with Grey Matter’s latest podcast episode. Hosted by cyber security expert Scott Harrison, you’ll hear from Jon Hope, Senior Technology Evangelist at Sophos, as he unpacks the latest threats, tactics, and trends shaping the ransomware landscape. Whether you're in IT, security, or just keen to stay informed, this episode gives you the insights you need to stay one step ahead. 
  • 7. Why mission critical security means business critical

    16:59||Season 3, Ep. 7
    When your infrastructure is the backbone of your business, security isn’t just important - it’s mission critical. In this episode, we explore how you can protect their most essential systems from evolving cyber threats. But also, if you do become victim to an attack, how you can make sure you’re back up-and-running instantly with very little fallout. Understand the different types of backups you can implement, why disaster recovery and planning are important, and hear real-world examples of the consequences of not having backup (and the benefits of having it in place).  Tune in to understand how to build security that’s not just reactive - but resilient, reliable, and ready for what’s next. 
  • 6. Data security: Lock it down, level up

    16:11||Season 3, Ep. 6
    In a world where data is one of your most valuable assets, protecting it isn’t optional - it’s essential. In this episode, our security expert - Scott Harrison - explores how you can take a proactive approach to data security. You’ll hear practical insights on how to reduce risk, build resilience, and stay ahead of evolving threats. This episode is packed with advice on how tools like Data Loss Prevention (DLP) help you secure your data with confidence. 
  • 5. Why application security is an fundamental requirement

    24:13||Season 3, Ep. 5
    The application layer is where users meet software - and where attackers often strike first.  In this episode, we explore how securing the top layer of the OSI model means more than just patching vulnerabilities. It’s about protecting the interfaces, APIs, and user experiences that drive your business forward. We’ll unpack the risks, the tools, and the strategies that help you stay one step ahead. Whether you’re building SaaS platforms, managing mobile apps, or scaling enterprise solutions, this episode offers practical insight to help you operate more securely and confidently. 
  • 4. Endpoint security essentials: What every business should know

    17:17||Season 3, Ep. 4
    In this episode, we unpack the critical role endpoint security plays in modern layered defence strategies. From laptops to mobile devices, endpoints are where threats often strike first - and where protection matters most. We explore how you can strengthen your security posture, reduce risk, and stay ahead of evolving threats with smarter endpoint solutions. Whether you're scaling your infrastructure or simply want to operate more securely, this episode offers practical insight and expert advice to help you take action.
  • 3. Network security: The silent defender

    20:57||Season 3, Ep. 3
    In this episode, we dive deep into the network security layer - the silent defender that underpins your entire digital infrastructure. Our cyber security expert Scott Harrison brings clarity and insight to a complex topic that’s often overlooked. Scott unpacks how this foundational layer works, why it’s critical to modern cyber resilience, and what businesses can do to strengthen it. Whether you’re scaling your solution or simply want to operate more securely in the cloud, this episode offers practical advice and fresh perspectives to help you stay ahead of threats.