Focus on our friends and colleagues that are professionals in the cybersecurity and IT space.
Rick and Chris discuss the evolving landscape of cyber and IT, with a focus on AI and machine learning. Chris expresses his concerns about the increasing use of AI by cybercriminals and its potential for both cyber attack and defense. They both highlighted the importance of a robust cybersecurity strategy, including continuous monitoring, risk management, and employee training. Chris emphasizes the need for a more open approach to sharing information and solutions within the cybersecurity community to prevent attacks. They also discuss common misconceptions about cybersecurity, stressing that it's the responsibility of everyone in an organization to prevent potential threats. Connect with Chris: https://www.linkedin.com/in/christopher-hippensteel-50814729/ Visit New Resources Consulting: https://newresources.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Rick and Chris discuss the evolving landscape of cyber and IT, with a focus on AI and machine learning. Chris expresses his concerns about the increasing use of AI by cybercriminals and its potential for both cyber attack and defense. They both highlighted the importance of a robust cybersecurity strategy, including continuous monitoring, risk management, and employee training. Chris emphasizes the need for a more open approach to sharing information and solutions within the cybersecurity community to prevent attacks. They also discuss common misconceptions about cybersecurity, stressing that it's the responsibility of everyone in an organization to prevent potential threats. Connect with Chris: https://www.linkedin.com/in/christopher-hippensteel-50814729/ Visit New Resources Consulting: https://newresources.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Ryan, a senior security analyst, stresses the importance of strategic planning and risk management in cybersecurity. He pointed out that many teams are bogged down by daily alerts, leaving little time for proactive measures. Ryan advocated for the use of managed detection and response services to focus on long-term strategies and highlighted the need for a balance between strong defense and offense. He also discussed the potential of AI and machine learning in managing and analyzing large amounts of data. In a more lighthearted moment, Ryan shared his fond childhood memories with the TRS-80 and Apple II and confirmed that he still enjoys playing retro games. Connect with Ryan: https://www.linkedin.com/in/ryan-gregory-9bb03236/ Visit Coalition: https://www.coalitioninc.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Ryan, a senior security analyst, stresses the importance of strategic planning and risk management in cybersecurity. He pointed out that many teams are bogged down by daily alerts, leaving little time for proactive measures. Ryan advocated for the use of managed detection and response services to focus on long-term strategies and highlighted the need for a balance between strong defense and offense. He also discussed the potential of AI and machine learning in managing and analyzing large amounts of data. In a more lighthearted moment, Ryan shared his fond childhood memories with the TRS-80 and Apple II and confirmed that he still enjoys playing retro games. Connect with Ryan: https://www.linkedin.com/in/ryan-gregory-9bb03236/ Visit Coalition: https://www.coalitioninc.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Rick and Kevin discuss partnerships in the Managed Service Provider space, with a focus on the cyber insurance sector. Kevin revealed that his team is exploring a new channel within the Managed Service Provider space, due to the similar customer base. He emphasized the importance of affordable and accessible cyber insurance as a crucial component of an organization's risk management strategy for 2024 and beyond. He also highlighted the correlation between security solutions, cyber policy, and insurability, stating that cyber insurance should provide protection against threats that security tools cannot. Kevin stresses the significance of maintaining an active insurance policy and managing it to address new vulnerabilities. Connect with Kevin: https://www.linkedin.com/in/kschmidt10/ Visit Coalition: https://www.coalitioninc.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Rick and Kevin discuss partnerships in the Managed Service Provider space, with a focus on the cyber insurance sector. Kevin revealed that his team is exploring a new channel within the Managed Service Provider space, due to the similar customer base. He emphasized the importance of affordable and accessible cyber insurance as a crucial component of an organization's risk management strategy for 2024 and beyond. He also highlighted the correlation between security solutions, cyber policy, and insurability, stating that cyber insurance should provide protection against threats that security tools cannot. Kevin stresses the significance of maintaining an active insurance policy and managing it to address new vulnerabilities. Connect with Kevin: https://www.linkedin.com/in/kschmidt10/ Visit Coalition: https://www.coalitioninc.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
In todays episode Danny and Rick dive into the evolution of cybersecurity, focusing on the shift towards a Zero Trust model and the critical need for sensible controls like blocking unnecessary applications and limiting privileges. They emphasize how ThreatLockers innovative security solution effectively prevents ransomware, zero-day exploits, and other attacks by adopting a "deny-by-default" approach. Danny explains the importance of moving from a model of allowing everything to blocking everything unless explicitly permitted, making cybersecurity more accessible for everyone. They highlight the benefits of Zero Trust and robust hygiene practices in endpoint protection. Together, they stress the role of innovation and a proactive mindset in building stronger cybersecurity defenses. Connect with Danny: https://www.linkedin.com/in/dannyjenkinscyber/ Visit ThreatLocker: https://www.threatlocker.com/ Learn more about ThreatLocker: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=danny_10.23.24&utm_content=danny&utm_term=podcast Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
In todays episode Danny and Rick dive into the evolution of cybersecurity, focusing on the shift towards a Zero Trust model and the critical need for sensible controls like blocking unnecessary applications and limiting privileges. They emphasize how ThreatLockers innovative security solution effectively prevents ransomware, zero-day exploits, and other attacks by adopting a "deny-by-default" approach. Danny explains the importance of moving from a model of allowing everything to blocking everything unless explicitly permitted, making cybersecurity more accessible for everyone. They highlight the benefits of Zero Trust and robust hygiene practices in endpoint protection. Together, they stress the role of innovation and a proactive mindset in building stronger cybersecurity defenses. Connect with Danny: https://www.linkedin.com/in/dannyjenkinscyber/ Visit ThreatLocker: https://www.threatlocker.com/ Learn more about ThreatLocker: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=danny_10.23.24&utm_content=danny&utm_term=podcast Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Rob discusses ThreatLockers's approach to cybersecurity, emphasizing a preventative rather than reactive strategy. He explains their tools are designed to block everything that isn't explicitly allowed to run, not just bad things. This approach, he argued, is particularly important in situations where legitimate tools can be misused. Rob clarifies the concept of "Zero Trust", which involves assuming a breach is inevitable and limiting access to only what's needed and its importance. Connect with Rob: https://www.linkedin.com/in/threatlockerrob/ Visit ThreatLocker: https://www.threatlocker.com/ Learn more about ThreatLocker: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=rob_10.16.24&utm_content=rob&utm_term=podcast Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Rob discusses ThreatLockers's approach to cybersecurity, emphasizing a preventative rather than reactive strategy. He explains their tools are designed to block everything that isn't explicitly allowed to run, not just bad things. This approach, he argued, is particularly important in situations where legitimate tools can be misused. Rob clarifies the concept of "Zero Trust", which involves assuming a breach is inevitable and limiting access to only what's needed and its importance. Connect with Rob: https://www.linkedin.com/in/threatlockerrob/ Visit ThreatLocker: https://www.threatlocker.com/ Learn more about ThreatLocker: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=rob_10.16.24&utm_content=rob&utm_term=podcast Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Rick and Ryan discuss ThreatLocker's cybersecurity solutions, emphasizing proactive threat prevention and the importance of a strong security foundation. They explored the concept of 'zero trust' in cybersecurity and the challenges of managing threats, particularly those involving social engineering. The conversation also touched on Ryan's career journey and the evolution of cybersecurity practices in organizations. Connect with Ryan: https://www.linkedin.com/in/ryan-bowman-3358a71b/ Visit ThreatLocker: https://www.threatlocker.com/ Check out ThreatLockers platform: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=ryan_10.9.24&utm_content=ryan&utm_term=podcast Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Rick and Ryan discuss ThreatLocker's cybersecurity solutions, emphasizing proactive threat prevention and the importance of a strong security foundation. They explored the concept of 'zero trust' in cybersecurity and the challenges of managing threats, particularly those involving social engineering. The conversation also touched on Ryan's career journey and the evolution of cybersecurity practices in organizations. Connect with Ryan: https://www.linkedin.com/in/ryan-bowman-3358a71b/ Visit ThreatLocker: https://www.threatlocker.com/ Check out ThreatLockers platform: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=ryan_10.9.24&utm_content=ryan&utm_term=podcast Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Gary and Rick discuss the increasing importance of cybersecurity compliance and the role of managed service providers (MSPs) in addressing this need. Gary highlighted the advantages of MSPs as a staff augmentation solution for small and medium-sized businesses (SMBs), which often lack the resources and expertise to handle cybersecurity in-house. Rick noted the trend of security talent moving to MSPs for access to the latest tools and technologies. They also discussed the continuous threat and exposure management challenges faced by SMBs, emphasizing the need for integrated tools to identify and mitigate vulnerabilities. Connect with Gary: https://www.linkedin.com/in/gary-drexler-2942b643/ Visit Cytellix: https://www.cytellix.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Gary and Rick discuss the increasing importance of cybersecurity compliance and the role of managed service providers (MSPs) in addressing this need. Gary highlighted the advantages of MSPs as a staff augmentation solution for small and medium-sized businesses (SMBs), which often lack the resources and expertise to handle cybersecurity in-house. Rick noted the trend of security talent moving to MSPs for access to the latest tools and technologies. They also discussed the continuous threat and exposure management challenges faced by SMBs, emphasizing the need for integrated tools to identify and mitigate vulnerabilities. Connect with Gary: https://www.linkedin.com/in/gary-drexler-2942b643/ Visit Cytellix: https://www.cytellix.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Trenelle shares her insights on the importance of a robust cyber security strategy. Trenelle emphasizes the significance of understanding where important data is stored, conducting regular assessments, and maintaining ongoing monitoring and awareness of potential threats. She also expresses enthusiasm for the emerging trend of extended detection and response (XDR), which combines assessment with ongoing monitoring to provide a comprehensive view of cyber security risks. As the workforce evolves, cybersecurity strategies should adapt to meet new challenges. Connect with Trenelle: https://www.linkedin.com/in/trenellelyiscott-piercemba/ Visit Cytellix: https://www.cytellix.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Trenelle shares her insights on the importance of a robust cyber security strategy. Trenelle emphasizes the significance of understanding where important data is stored, conducting regular assessments, and maintaining ongoing monitoring and awareness of potential threats. She also expresses enthusiasm for the emerging trend of extended detection and response (XDR), which combines assessment with ongoing monitoring to provide a comprehensive view of cyber security risks. As the workforce evolves, cybersecurity strategies should adapt to meet new challenges. Connect with Trenelle: https://www.linkedin.com/in/trenellelyiscott-piercemba/ Visit Cytellix: https://www.cytellix.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Garret shares his insights on the importance of identity management and authentication in cybersecurity. Garret emphasizes that while authentication is necessary, it is not sufficient to ensure the identity of a user. He pointed out that identities can be stolen or bypassed through various methods, and the real challenge lies in managing user privileges and keeping track of their activities in real-time. Identity governance should be a robust component of any cybersecurity stack. Garret defines governance in the context of identity management. Connect with Garret: https://www.linkedin.com/in/theauthguy/ Visit YouAttest: https://youattest.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Garret shares his insights on the importance of identity management and authentication in cybersecurity. Garret emphasizes that while authentication is necessary, it is not sufficient to ensure the identity of a user. He pointed out that identities can be stolen or bypassed through various methods, and the real challenge lies in managing user privileges and keeping track of their activities in real-time. Identity governance should be a robust component of any cybersecurity stack. Garret defines governance in the context of identity management. Connect with Garret: https://www.linkedin.com/in/theauthguy/ Visit YouAttest: https://youattest.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Jeff emphasizes the importance of a holistic approach to cybersecurity, focusing on the roles and operations of human beings rather than just the deployment of tools. He argued that cybersecurity is a human problem, and human nature must be considered when seeking solutions. Jeff also highlighted the need for a robust cybersecurity strategy that integrates processes, tools, and skills to manage risks effectively. He recommended the use of AI-powered platforms like the Security Bulldog to improve efficiency and productivity in cybersecurity tasks. Connect with Jeff: https://www.linkedin.com/in/jeffmajka/ Visit The Security Bulldog: https://securitybulldog.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Jeff emphasizes the importance of a holistic approach to cybersecurity, focusing on the roles and operations of human beings rather than just the deployment of tools. He argued that cybersecurity is a human problem, and human nature must be considered when seeking solutions. Jeff also highlighted the need for a robust cybersecurity strategy that integrates processes, tools, and skills to manage risks effectively. He recommended the use of AI-powered platforms like the Security Bulldog to improve efficiency and productivity in cybersecurity tasks. Connect with Jeff: https://www.linkedin.com/in/jeffmajka/ Visit The Security Bulldog: https://securitybulldog.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Digital Identity and Verifiable Credentials Discussion Paul Ashley, CTO of Anonyme Labs, discussed the importance of digital identity in cybersecurity and its evolution towards a decentralized model. He elaborated on the concept of verifiable credentials, which are cryptographically protected and offer a secure and controlled way to manage personal data. Paul also mentioned his attendance at the Ident conference in Las Vegas, which focuses on digital identity. We also discussed potential benefits for both consumers and businesses. Connect with Paul: https://www.linkedin.com/in/drpaulashley/ Visit Anonyme Labs: https://anonyome.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Digital Identity and Verifiable Credentials Discussion Paul Ashley, CTO of Anonyme Labs, discussed the importance of digital identity in cybersecurity and its evolution towards a decentralized model. He elaborated on the concept of verifiable credentials, which are cryptographically protected and offer a secure and controlled way to manage personal data. Paul also mentioned his attendance at the Ident conference in Las Vegas, which focuses on digital identity. We also discussed potential benefits for both consumers and businesses. Connect with Paul: https://www.linkedin.com/in/drpaulashley/ Visit Anonyme Labs: https://anonyome.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Jeremy shares his insights on the evolving cybersecurity landscape, noting that cyber experts are now gaining attention from C-suites, a significant shift since 2019. He highlighted the increasing compliance requirements for companies and expressed enthusiasm about emerging technologies, stressing the need for more engineers to address vulnerabilities. Drawing on his military background, Jeremy emphasizes the importance of a robust cyber strategy, workforce development, and the Cybersecurity Maturity Model Certification (CMMC) in enhancing cyber resilience. Rick and Jeremy, both with special forces backgrounds, also bonded over their shared experiences and current roles, discussing their involvement in veteran support organizations. Connect with Jeremy: https://www.linkedin.com/in/jeremy-miller-lionfish/ Visit Lionfish Cybersecurity: https://www.lionfishcybersecurity.com/ Visit Special Forces Association: https://www.specialforcesac500.org/ Subscribe: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw?sub_confirmation=1 Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Jeremy shares his insights on the evolving cybersecurity landscape, noting that cyber experts are now gaining attention from C-suites, a significant shift since 2019. He highlighted the increasing compliance requirements for companies and expressed enthusiasm about emerging technologies, stressing the need for more engineers to address vulnerabilities. Drawing on his military background, Jeremy emphasizes the importance of a robust cyber strategy, workforce development, and the Cybersecurity Maturity Model Certification (CMMC) in enhancing cyber resilience. Rick and Jeremy, both with special forces backgrounds, also bonded over their shared experiences and current roles, discussing their involvement in veteran support organizations. Connect with Jeremy: https://www.linkedin.com/in/jeremy-miller-lionfish/ Visit Lionfish Cybersecurity: https://www.lionfishcybersecurity.com/ Visit Special Forces Association: https://www.specialforcesac500.org/ Subscribe: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw?sub_confirmation=1 Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Mark Nicholls, a management consultant and CEO of the Information Professionals Group, emphasizes the growing importance of cybersecurity as a critical business risk and the need for collaboration between cyber professionals and business leaders to mitigate these risks. He highlights the challenges cyber professionals face due to isolation and the lack of support from the wider business, stressing the importance of shared responsibility in managing cybersecurity. Mark also discusses the independence and expertise of his company in providing unbiased support and advice for digital transformation, innovation, and governance. Additionally, he shared his personal interest in triathlon technology, mentioning his new triathlon bike and smart swim goggles. Connect with Mark: https://www.linkedin.com/in/markdnicholls/ Visit Information Professionals Group: https://www.informpros.com.au/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Mark Nicholls, a management consultant and CEO of the Information Professionals Group, emphasizes the growing importance of cybersecurity as a critical business risk and the need for collaboration between cyber professionals and business leaders to mitigate these risks. He highlights the challenges cyber professionals face due to isolation and the lack of support from the wider business, stressing the importance of shared responsibility in managing cybersecurity. Mark also discusses the independence and expertise of his company in providing unbiased support and advice for digital transformation, innovation, and governance. Additionally, he shared his personal interest in triathlon technology, mentioning his new triathlon bike and smart swim goggles. Connect with Mark: https://www.linkedin.com/in/markdnicholls/ Visit Information Professionals Group: https://www.informpros.com.au/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Aaron discusses the challenges of implementing Multi-Factor Authentication (MFA) in companies, leading to increased support tickets and associated risks. He proposes a mobile phone-based solution for identity verification using advanced features like 3D depth mapping and cryptography to enhance security and user experience, with integration for automatic self-service MFA resets. Aaron also explains the risks of deepfakes and synthetic content, and highlighted how NameTag focuses on secure, self-service MFA resets and account recovery to prevent cyber incidents. Connect with Aaron: https://www.linkedin.com/in/aaronpainter/ Visit Nametag: https://getnametag.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Aaron discusses the challenges of implementing Multi-Factor Authentication (MFA) in companies, leading to increased support tickets and associated risks. He proposes a mobile phone-based solution for identity verification using advanced features like 3D depth mapping and cryptography to enhance security and user experience, with integration for automatic self-service MFA resets. Aaron also explains the risks of deepfakes and synthetic content, and highlighted how NameTag focuses on secure, self-service MFA resets and account recovery to prevent cyber incidents. Connect with Aaron: https://www.linkedin.com/in/aaronpainter/ Visit Nametag: https://getnametag.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Philip shared his experiences as a serial entrepreneur, discusses his upcoming book, and introduced his new podcast, "Success is Podcast," which aims to highlight diverse successful individuals. He emphasizes the importance of cybersecurity for small and medium-sized businesses and expressed optimism about AI and machine learning enhancing cybersecurity measures. Philip also discusses the benefits of Textdrip, a business texting platform, noting its higher delivery and response rates and its AI capabilities for automation. Additionally, he shared his journey of writing a book about his entrepreneurial experiences, stressing the importance of expert editing and expressing his admiration for the problem-solving abilities of entrepreneurs. Connect with Phil: https://www.linkedin.com/in/philportman/ Visit TextDrip: https://textdrip.com/ Listen to 'Success Is': https://philportman.com/index.php/phil-podcast/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Philip shared his experiences as a serial entrepreneur, discusses his upcoming book, and introduced his new podcast, "Success is Podcast," which aims to highlight diverse successful individuals. He emphasizes the importance of cybersecurity for small and medium-sized businesses and expressed optimism about AI and machine learning enhancing cybersecurity measures. Philip also discusses the benefits of Textdrip, a business texting platform, noting its higher delivery and response rates and its AI capabilities for automation. Additionally, he shared his journey of writing a book about his entrepreneurial experiences, stressing the importance of expert editing and expressing his admiration for the problem-solving abilities of entrepreneurs. Connect with Phil: https://www.linkedin.com/in/philportman/ Visit TextDrip: https://textdrip.com/ Listen to 'Success Is': https://philportman.com/index.php/phil-podcast/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Connect with Cary: https://www.linkedin.com/in/caryw/ Visit Endace: https://www.endace.com/ Read the article: https://blog.endace.com/2024/04/14/why-you-should-care-about-fips-niap-apl/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Connect with Cary: https://www.linkedin.com/in/caryw/ Visit Endace: https://www.endace.com/ Read the article: https://blog.endace.com/2024/04/14/why-you-should-care-about-fips-niap-apl/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Christian and Rick discuss cybersecurity risks related to automated medical and IoT devices, emphasizing the importance of prioritizing cybersecurity based on business maturity and risk assessment. They highlighted the critical role of emotional intelligence and effective communication in the cybersecurity industry, drawing insights from Christian's book "The Smartest Person in the Room" and his Secure Methodology training program. Christian's company focuses on securing medical devices through rigorous testing and risk analysis to prevent potential harm to patients, aiming to advance healthcare securely without impeding progress. Connect with Christian: https://www.linkedin.com/in/christianespinosa/ Visit Blue Goat Cyber: https://bluegoatcyber.com/ Check out the book: https://a.co/d/bliEf1Z Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Christian and Rick discuss cybersecurity risks related to automated medical and IoT devices, emphasizing the importance of prioritizing cybersecurity based on business maturity and risk assessment. They highlighted the critical role of emotional intelligence and effective communication in the cybersecurity industry, drawing insights from Christian's book "The Smartest Person in the Room" and his Secure Methodology training program. Christian's company focuses on securing medical devices through rigorous testing and risk analysis to prevent potential harm to patients, aiming to advance healthcare securely without impeding progress. Connect with Christian: https://www.linkedin.com/in/christianespinosa/ Visit Blue Goat Cyber: https://bluegoatcyber.com/ Check out the book: https://a.co/d/bliEf1Z Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Chris is passionate about the field because it's always changing and there's something new to learn every day. He started in help desk and eventually moved into security. Chris has noticed a recent trend where attackers are targeting third-party vendors such as MSPs to gain access to multiple clients. He's excited about threat intelligence that can provide a better overall view of the security landscape. Chris believes that the most critical aspect of cybersecurity is user awareness. He suggests rewarding users for passing security training to encourage participation. Connect with Chris: https://www.linkedin.com/in/chrismaulding/ Visit AlchemyCore: https://www.alchemycyber.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Chris is passionate about the field because it's always changing and there's something new to learn every day. He started in help desk and eventually moved into security. Chris has noticed a recent trend where attackers are targeting third-party vendors such as MSPs to gain access to multiple clients. He's excited about threat intelligence that can provide a better overall view of the security landscape. Chris believes that the most critical aspect of cybersecurity is user awareness. He suggests rewarding users for passing security training to encourage participation. Connect with Chris: https://www.linkedin.com/in/chrismaulding/ Visit AlchemyCore: https://www.alchemycyber.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Today we welcome Jon Santee back to the podcast. He was our second ever episode! We discuss various IT and cybersecurity topics including AI, machine learning, and big data. Jon reflects on career changes and technological advancements since his last appearance in January 2021, emphasizing the transformative impact of AI on society. We stress the importance of cybersecurity training and user behavior in organizational security strategies, highlighting the need to mitigate biases in AI models. The episode concludes with John's enthusiasm for integrating AI tools to streamline tasks and enhance productivity. Connect with Jon: https://www.linkedin.com/in/jon-santee/ Visit Four Letter Leadership: https://www.fourletterleadership.com/ Visit ShipMonk: https://www.shipmonk.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Today we welcome Jon Santee back to the podcast. He was our second ever episode! We discuss various IT and cybersecurity topics including AI, machine learning, and big data. Jon reflects on career changes and technological advancements since his last appearance in January 2021, emphasizing the transformative impact of AI on society. We stress the importance of cybersecurity training and user behavior in organizational security strategies, highlighting the need to mitigate biases in AI models. The episode concludes with John's enthusiasm for integrating AI tools to streamline tasks and enhance productivity. Connect with Jon: https://www.linkedin.com/in/jon-santee/ Visit Four Letter Leadership: https://www.fourletterleadership.com/ Visit ShipMonk: https://www.shipmonk.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
This week we are lucky to have Jason Morris back on the podcast. He discusses recent developments in AI and machine learning. We discuss Jason's role in AI strategy for OEM device partners, his involvement with Batchery accelerator, and advancements in AI hardware acceleration. They also touch on the impact of quantum computing and AI in cloud environments, emphasizing data security in AI applications. Jason dispels common misconceptions about AI, such as data quality and job displacement fears. The conversation ends on a lighter note with Jason sharing his enthusiasm for retro technology like the Analog Pocket. Connect with Jason: https://www.linkedin.com/in/jasmor/ Visit Microsoft: https://news.microsoft.com/source/ Visit Jason's personal website: https://jasonmorris.co/ Visit Batchery: https://batchery.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Join Rick as he interviews Patrick Carr, CEO of Slash Next, on the latest trends in cybersecurity. Patrick shares his extensive background, from border manager to Blue Coat, and delves into the impact of generative AI on cybersecurity. Learn about sophisticated phishing attempts and the importance of a layered cybersecurity approach with human augmentation. Plus, discover Patrick's favorite retro tech from his Novell days! Tune in for valuable insights and stories. Connect with Patrick: https://www.linkedin.com/in/patrickharr/ Visit SlashNext: https://slashnext.com/ Read about State of Phishing research done by SlashNext: https://slashnext.com/press-release/slashnext-mid-year-state-of-phishing-report-shows-341-increase-in-bec-and-advanced-phishing-attacks/ Learn more about GenAI for Spam and Graymail Detection: https://slashnext.com/press-release/genai-spam-and-graymail-detection/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Join Rick as he interviews Patrick Carr, CEO of Slash Next, on the latest trends in cybersecurity. Patrick shares his extensive background, from border manager to Blue Coat, and delves into the impact of generative AI on cybersecurity. Learn about sophisticated phishing attempts and the importance of a layered cybersecurity approach with human augmentation. Plus, discover Patrick's favorite retro tech from his Novell days! Tune in for valuable insights and stories. Connect with Patrick: https://www.linkedin.com/in/patrickharr/ Visit SlashNext: https://slashnext.com/ Read about State of Phishing research done by SlashNext: https://slashnext.com/press-release/slashnext-mid-year-state-of-phishing-report-shows-341-increase-in-bec-and-advanced-phishing-attacks/ Learn more about GenAI for Spam and Graymail Detection: https://slashnext.com/press-release/genai-spam-and-graymail-detection/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Today we are sharing some international flavor with Damjan Cvetanovic . He shares insights about cybersecurity and his journey in the field. Damjan discusses his background in ethical hacking and penetration testing, highlighting the importance of adaptability and continuous learning in cybersecurity roles. He emphasizes the need for a holistic approach to cybersecurity, addressing both technical and non-technical aspects such as security management and compliance. Additionally, Damjan talks about his role as CEO and co-founder of Intel Informed, a cybersecurity company focused on identifying vulnerabilities and providing solutions tailored to clients' needs. Finally, he touches on the global landscape of cybersecurity, noting differences in approaches between regions like the EU and the US, with a focus on innovation in the US and emphasis on privacy in Europe, particularly with GDPR regulations. Connect with Damjan: https://www.linkedin.com/in/damjan-cvetanovic-298538195/ Visit Intell Informed: https://intellinformed.com/ Visit UN1QUELY: https://un1quely.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Today we are sharing some international flavor with Damjan Cvetanovic . He shares insights about cybersecurity and his journey in the field. Damjan discusses his background in ethical hacking and penetration testing, highlighting the importance of adaptability and continuous learning in cybersecurity roles. He emphasizes the need for a holistic approach to cybersecurity, addressing both technical and non-technical aspects such as security management and compliance. Additionally, Damjan talks about his role as CEO and co-founder of Intel Informed, a cybersecurity company focused on identifying vulnerabilities and providing solutions tailored to clients' needs. Finally, he touches on the global landscape of cybersecurity, noting differences in approaches between regions like the EU and the US, with a focus on innovation in the US and emphasis on privacy in Europe, particularly with GDPR regulations. Connect with Damjan: https://www.linkedin.com/in/damjan-cvetanovic-298538195/ Visit Intell Informed: https://intellinformed.com/ Visit UN1QUELY: https://un1quely.com/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Today, we have cybersecurity expert Ean Myer back on the show to share his latest experiences and innovative approaches. Ean discusses the importance of comprehensive tabletop exercises that prepare companies for real-world cyber threats by involving technical and non-technical teams. He also highlights the impact of evolving regulations and the fresh perspectives brought by Gen Z in the cybersecurity landscape. Don't miss this exciting episode filled with valuable tips and forward-thinking strategies! Connect with Ean: https://www.linkedin.com/in/eanmeyer/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Today, we have cybersecurity expert Ean Myer back on the show to share his latest experiences and innovative approaches. Ean discusses the importance of comprehensive tabletop exercises that prepare companies for real-world cyber threats by involving technical and non-technical teams. He also highlights the impact of evolving regulations and the fresh perspectives brought by Gen Z in the cybersecurity landscape. Don't miss this exciting episode filled with valuable tips and forward-thinking strategies! Connect with Ean: https://www.linkedin.com/in/eanmeyer/ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
In this episode Nick discusses cyber warranty for MSPs and emphasizes the significance of safeguarding environments and minimizing risk for clients. Cork offers financial protection to MSPs' customers through a cyber warranty linked to the MSP's tech stack, ensuring instant coverage without extra paperwork. MSPs are now integrating this warranty as a value-added service in their pricing structure. Additionally, Nick discusses the growing trend of incorporating AI and automation tools in managed security services, emphasizing the importance of a multi-layered cybersecurity approach involving email security, training, and authentication. Connect with Nick: https://www.linkedin.com/in/wolfnick/ Visit Cork: https://corkinc.com/ Check out Cork on YouTube: https://www.youtube.com/channel/UCCGhG7bcfrULCsrUsdLcAzQ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
In this episode Nick discusses cyber warranty for MSPs and emphasizes the significance of safeguarding environments and minimizing risk for clients. Cork offers financial protection to MSPs' customers through a cyber warranty linked to the MSP's tech stack, ensuring instant coverage without extra paperwork. MSPs are now integrating this warranty as a value-added service in their pricing structure. Additionally, Nick discusses the growing trend of incorporating AI and automation tools in managed security services, emphasizing the importance of a multi-layered cybersecurity approach involving email security, training, and authentication. Connect with Nick: https://www.linkedin.com/in/wolfnick/ Visit Cork: https://corkinc.com/ Check out Cork on YouTube: https://www.youtube.com/channel/UCCGhG7bcfrULCsrUsdLcAzQ Visit ShortArms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Dr. Alexander Stein, founder of Dolus Advisors, is not only a cybersecurity professional but also a licensed psychoanalyst. He emphasizes the importance of human decision-making in cybersecurity, stating that it's a human issue involving technology, not just a technical problem. Stein advocates for leadership understanding the human element's significance in cybersecurity strategy. He recounts a successful engagement where his expertise in human factors was pivotal in redesigning a cybersecurity awareness and training program for a large organization. Stein highlights the need to cultivate cyber champions within organizations and values introspection and self-awareness as essential "technologies" in cybersecurity. Connect with Dr. Stein: https://www.linkedin.com/in/alexandersteinphd/ Visit Dolus Advisors: https://www.dolusadvisors.com/ Visit Shortarms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
Dr. Alexander Stein, founder of Dolus Advisors, is not only a cybersecurity professional but also a licensed psychoanalyst. He emphasizes the importance of human decision-making in cybersecurity, stating that it's a human issue involving technology, not just a technical problem. Stein advocates for leadership understanding the human element's significance in cybersecurity strategy. He recounts a successful engagement where his expertise in human factors was pivotal in redesigning a cybersecurity awareness and training program for a large organization. Stein highlights the need to cultivate cyber champions within organizations and values introspection and self-awareness as essential "technologies" in cybersecurity. Connect with Dr. Stein: https://www.linkedin.com/in/alexandersteinphd/ Visit Dolus Advisors: https://www.dolusadvisors.com/ Visit Shortarms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
This week Brad Hawkins, CEO and founder of Safer Net, returns as a guest on the CyberPro Podcast to share his cybersecurity insights. The company has experienced significant growth, with employees now spanning the globe, reflecting the worldwide nature of cybersecurity challenges. Hawkins highlights the evolving landscape of cybersecurity, particularly emphasizing the rapid advancements in AI and the ongoing work on IoT security. He stresses the importance of adhering to fundamental cybersecurity practices, such as using VPNs and virus protection consistently, to mitigate risks effectively. Brad concludes with a lighthearted discussion on the indispensable role of technology in daily life. Connect with Brad: https://www.linkedin.com/in/brad-hawkins-516b721/ Visit SaferNet: https://safernetvpn.com/ Visit Shortarms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS
This week Brad Hawkins, CEO and founder of Safer Net, returns as a guest on the CyberPro Podcast to share his cybersecurity insights. The company has experienced significant growth, with employees now spanning the globe, reflecting the worldwide nature of cybersecurity challenges. Hawkins highlights the evolving landscape of cybersecurity, particularly emphasizing the rapid advancements in AI and the ongoing work on IoT security. He stresses the importance of adhering to fundamental cybersecurity practices, such as using VPNs and virus protection consistently, to mitigate risks effectively. Brad concludes with a lighthearted discussion on the indispensable role of technology in daily life. Connect with Brad: https://www.linkedin.com/in/brad-hawkins-516b721/ Visit SaferNet: https://safernetvpn.com/ Visit Shortarms website: https://www.shortarmsolutions.com/ You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions YouTube: https://www.youtube.com/@shortarmsolutions Twitter/X: https://twitter.com/ShortArmSAS