Podcasts about authentic8

  • 26PODCASTS
  • 44EPISODES
  • 39mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 20, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about authentic8

Latest podcast episodes about authentic8

Unspoken Security
The Growing Movement of Digital Investigations

Unspoken Security

Play Episode Listen Later Mar 20, 2025 60:27 Transcription Available


In this episode of Unspoken Security, host A.J. Nash sits down with Ramesh Rajagopal, Co-Founder and CEO of Authentic8, to discuss the evolving landscape of digital investigations. They explore how modern intelligence teams navigate the deep and dark web, conduct secure open-source research, and protect themselves from exposure. Ramesh shares how his platform, Silo, empowers analysts by providing anonymity, obfuscation, and productivity tools to streamline investigations without compromising security.The conversation dives into the challenges of direct engagement with cybercriminal environments, the risks analysts face when conducting investigations, and how organizations are shifting towards more proactive intelligence programs. A.J. and Ramesh also discuss the growing adoption of digital investigation tools in the commercial sector, spanning industries from financial services to corporate security and brand protection.AI's role in intelligence work also takes center stage, with insights on how automation can assist analysts without replacing human expertise. The episode closes with practical recommendations for organizations looking to strengthen their intelligence operations while balancing security, efficiency, and long-term strategic growth.Send us a textSupport the show

Remarkable Marketing
The Wager: B2B Marketing Lessons from the Epic True Story of the Shipwrecked HMS Wager with Former Director of Content Marketing at Authentic8, Shannon Ragan

Remarkable Marketing

Play Episode Listen Later Oct 8, 2024 44:34


“Each man carried, along with a sea chest, his own burdensome story.” - Excerpt from The Wager, by David GrannThis is true not only for the men that sailed on the HMS Wager, but your audience and customers (minus the sea chests). Just as David Grann took those burdensome stories from journal entries to write The Wager, so too can you use the burdensome stories of your customers in your marketing.This is one of the things we're talking about in this episode of Remarkable with the help of our special guest, former Director of Content Marketing at Authentic8, Shannon Ragan.Together, we draw marketing lessons from David Grann's book, The Wager, including going to the source, shaping your stories as stranger than fiction, and sourcing those stories from the smallest footnote.About our guest, Shannon RaganShannon Ragan is the former Director of Content Marketing at Authentic8. She joined the company in September 2020 as Content Marketing Senior Manager. She is also a producer and co-host of NeedleStack: the OSINT podcast. She previously served as Senior Marketing Communications Manager at Skybox Security. She has been blogging in the cybersecurity industry for ten years and vows to never write another Patch Tuesday update again.What B2B Companies Can Learn From The Wager:Go to the source. Talk to your customers to understand what matters most to them. And use that in your messaging. Shannon says, “Experience it yourself, as authentically as you can. I think that is a huge thing in content marketing. I feel like there is often a lot of gatekeeping between sales and marketing to customers that it's like, ‘No, I don't want the marketing team to talk to my customers.' It's the practitioners, the people using your tool, your product, that you need to talk to the most. And so any amount of time that you can get with them [is valuable].” In The Wager, David Grann actually sailed the same route that the crew of the HMS Wager did to see what it was really like. That was the only way he could write authentically about the experience.Shape your stories as stranger than fiction. When you do talk to your audience or your customers, get their war stories about the struggles they've had that your product will solve. Shannon says that having a podcast has been a great platform for sharing those stories. She says, “I think the true stories are the most interesting. And so getting  people that live it, walk the walk, do it every day to kind of tell their war stories and their learnings along the way, and be able to share those with our audience under our brand without really having to talk too much about ourselves has just been a great brand builder and gotten people into our orbit. And then once they know us and like us and love us, then it's really easy to be like, ‘By the way, we have this great product I think you'll like.'” It's like how The Wager is a true story that, in David Grann's telling, feels closer to fiction because of the detail and expressive voices he includes. And he was able to do that through the use of primary sources. So use your primary sources - your audience and customers - to write your marketing messages. Stories can start with the smallest footnote. When David Grann was doing research for The Wager, he was looking through lists of people who boarded the ship. And next to many names, he saw “DD,” which he discovered meant “Dispatched Dead.” It was through researching the deeper story behind this two-letter abbreviation that he uncovered stories of scurvy and the overall human toll of the voyage. Look for the small footnotes that could tell you a much deeper story for use in your marketing.Quotes*”Kill your darlings. It is the thing that is most difficult to do to your own work, because it's the thing that you're like, ‘But I grew this babe in my womb. I can't get rid of it.' And it's like, you do it in service of the rest of the thing that you have tended and grown. And it's such a hard lesson to learn and you have to teach it to yourself over and over again. Like David Grann had to teach it to himself again. But it makes a good writer.” - Shannon Ragan*”One of my biggest pieces of advice is that part of your strategy should be co-creating content with your prospects and customers. Like, that should be a pillar of your strategy. And all of the people who can't give you testimonials, who aren't legal approved to give you a quote, who can't do all that stuff, can come on your podcast and talk about everything but the thing.” - Ian Faison*”Think about where you want to end up. Like, do you want people to thank you for your content marketing? And if so, how do you build the path to get there? So yeah, think about where you want to end up, and then build your strategy and your editorial path to get there.” - Shannon RaganTime Stamps[0:55] Meet Shannon Ragan, former Director of Content Marketing at Authentic8[3:50] Content Marketing Insights from The Wager[5:33] David Grann's Research Journey[14:33] Crafting Authentic Content[15:21] Engaging with Customers through Content[16:11] The Power of Co-Creating Content[25:30] Marketing Strategy Overhaul[38:05] Character Development in Writing[42:06] Final Thoughts on Content StrategyLinksConnect with Shannon on LinkedInLearn more about Authentic8About Remarkable!Remarkable! is created by the team at Caspian Studios, the premier B2B Podcast-as-a-Service company. Caspian creates both nonfiction and fiction series for B2B companies. If you want a fiction series check out our new offering - The Business Thriller - Hollywood style storytelling for B2B. Learn more at CaspianStudios.com. In today's episode, you heard from Ian Faison (CEO of Caspian Studios) and Meredith Gooderham (Senior Producer). Remarkable was produced this week by Jess Avellino, mixed by Scott Goodrich, and our theme song is “Solomon” by FALAK. Create something remarkable. Rise above the noise.

Content Amplified
Why your content doesn't need a sales pitch

Content Amplified

Play Episode Listen Later Aug 16, 2024 16:12


In this episode, we interview Aubrey Byron, a content marketing manager at Authentic8, a cybersecurity startup. Aubrey shares her insights on how to create content that genuinely adds value without pushing a hard sales pitch. What you'll learn in this episode: • The importance of providing valuable, non-salesy content. • How to build trust and brand awareness in a niche market. • Strategies for measuring the impact of content on lead generation. • The benefits of leveraging subject matter experts in your marketing strategy. • How to successfully run ungated events and webinars for brand awareness. The OSINT podcast

Content Amplified
"Be the TV show, not the advertisement"

Content Amplified

Play Episode Listen Later May 13, 2024 15:48


In this episode, we interview Shannon Ragan, the Director of Content Marketing at Authentic8 and co-producer/co-host of the Needle Stack podcast. Shannon delves into her journey in the marketing world, emphasizing the collaborative and creative nature of content marketing and how it has been a pivotal aspect of her career. What you'll learn in this episode: The transformative shift in marketing strategy from traditional to value-driven approaches. How "Be the TV show, not the advertisement" became a mantra for more authentic customer engagement. The impact of ungating content and focusing on providing real value. Practical strategies for content marketing that enhances brand trust and engagement.

Talking Threat Intelligence
What Security Teams Need to Know About ChatGPT

Talking Threat Intelligence

Play Episode Listen Later Jul 11, 2023 33:41


Imagine a world where talking to computers feels as natural as chatting with a friend. That's the power of ChatGPT, a groundbreaking technology developed by a company called OpenAI.  This technology has already revolutionized the way we work with computers. Instead of giving them commands, we can have real conversations with them. It's like having an incredibly smart virtual assistant at our fingertips. ChatGPT understands what we say and responds in a way that makes sense. It helps us find information quickly, provides useful suggestions, and even assists with tasks like writing. With ChatGPT, the possibilities seem endless, and it has truly changed the way we interact with technology. But corporate security teams are understandably worried. For starters, ChatGPT can be used by bad actors to create and spread false information like never before. This means that people are more likely to come across misleading or manipulated content, making it hard to separate fact from fiction online. Additionally, ChatGPT also represents the technological equivalent to the machine gun for cybercriminals, allowing them to create high quality phishing emails and develop new attack vectors like never before.  So how do security teams address these challenges?  In this episode, our guest Daniel Ben-Chitrit, Director of Product Management at Authentic8, breaks down what ChatGPT will mean for corporate security teams and the OSINT community. We'll also discuss how OSINT analysts can leverage this technology effectively while maintaining security and data privacy. In this episode, expect to learn:  The implications of using ChatGPT in threat intelligence gathering and analysis. Discover the potential risks and vulnerabilities associated with integrating ChatGPT into corporate systems. How to effectively mitigate security threats and protect sensitive information in the era of ChatGPT. Gain insights into the challenges of distinguishing between genuine and manipulated information generated by ChatGPT. Understand the impact of ChatGPT on phishing and social engineering attacks, and how to combat them. Explore potential vulnerabilities in existing security systems when faced with ChatGPT-generated threats. Understand the potential impact of ChatGPT on user privacy and data protection in corporate environments. Discover ways to educate employees about the risks and benefits of interacting with ChatGPT in a secure manner. … and much more.  Relevant Resources: Authentic8: authentic8.com Email Daniel: dbchitrit@authentic8.com Daniel on LinkedIn: https://www.linkedin.com/in/danielbenchitrit/ Try ChatGPT for Free: https://chat.openai.com/ Sentinel-1: https://www.sentinelone.com/ Joe Rogan Interviews Justin Trudeau: https://www.youtube.com/watch?v=K0YRNS0FYTQ Finally, if you enjoyed this episode, make sure to subscribe to Talking Threat Intelligence on Apple Podcasts, Spotify, or wherever you listen to podcasts. And if you're interested in learning more about building a successful threat intelligence program, be sure to check out our website at LiferaftInc.com.

Business Security Weekly (Audio)
The Reality - BSW #193

Business Security Weekly (Audio)

Play Episode Listen Later Oct 28, 2020 52:58


This week, we welcome Matt Ashburn, Federal Engagement Lead at Authentic8, to talk about Scale Your SOC: Protecting Against Browser-Based Threats! In the Leadership and Communications section, Cybersecurity, a risk to all board of directors, Is The Cybersecurity Industry Selling Lemons? Apparently Lots Of Important CISOs Think it Is, 4 critical strategies for tech leaders in Gartner's CIO agenda, and more!   Show Notes: https://securityweekly.com/bsw193 Visit https://securityweekly.com/authentic8 to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly
The Reality - BSW #193

Paul's Security Weekly

Play Episode Listen Later Oct 28, 2020 52:58


This week, we welcome Matt Ashburn, Federal Engagement Lead at Authentic8, to talk about Scale Your SOC: Protecting Against Browser-Based Threats! In the Leadership and Communications section, Cybersecurity, a risk to all board of directors, Is The Cybersecurity Industry Selling Lemons? Apparently Lots Of Important CISOs Think it Is, 4 critical strategies for tech leaders in Gartner's CIO agenda, and more!   Show Notes: https://securityweekly.com/bsw193 Visit https://securityweekly.com/authentic8 to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Paul's Security Weekly TV
Scale Your SOC: Protecting Against Browser-Based Threats - Matt Ashburn - BSW #193

Paul's Security Weekly TV

Play Episode Listen Later Oct 27, 2020 30:18


Silo is a cloud-based web isolation platform that separates the things you care about from the things you cannot trust. In this segment, former CIA cyber security officer Matt Ashburn will demonstrate how Silo protects organizations from malicious web-based content, from ransomware to advanced persistent threats. We’ll also see how Silo enables incident response and SOC analysts through security, managed attribution and unified insight into user behavior.   This segment is sponsored by Authentic8. Visit https://securityweekly.com/authentic8 to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw193

Business Security Weekly (Video)
Scale Your SOC: Protecting Against Browser-Based Threats - Matt Ashburn - BSW #193

Business Security Weekly (Video)

Play Episode Listen Later Oct 26, 2020 30:18


Silo is a cloud-based web isolation platform that separates the things you care about from the things you cannot trust. In this segment, former CIA cyber security officer Matt Ashburn will demonstrate how Silo protects organizations from malicious web-based content, from ransomware to advanced persistent threats. We’ll also see how Silo enables incident response and SOC analysts through security, managed attribution and unified insight into user behavior.   This segment is sponsored by Authentic8. Visit https://securityweekly.com/authentic8 to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw193

PI Perspectives
OSMOSIS Quick Hits with Nick Finnberg

PI Perspectives

Play Episode Listen Later Aug 27, 2020 22:53


Quick Hits OSMOSIS Segment 4:    Welcome to the OSMOSIS 2020 Quick Hits segment. For the next 9 weeks we will be giving you some behind the scenes content with conference speakers. This week we have Nick Finnberg. Nick Currently works for Authentic8 as an opensource specialist. Prior to that he was an Army intelligence officer and has extensive task force experience in fraud and money laundering. Nick’s Topic at Osmosis is Combining Dark Web Data and Open Source Intelligence         Links:     Matt’s email: MatthewS@Satellitepi.com     Linkedin: Matthew Spaier  Nick’s email:nfinnberg@authentic8.com Linkedin: Nicholas Finnberg     Sponsors:      https://www.osmosiscon.com/ www.investigators-toolbox.com

army osmosis authentic8
Business Security Weekly (Audio)
Expert Instinct - BSW #183

Business Security Weekly (Audio)

Play Episode Listen Later Aug 6, 2020 70:10


This week, it's Security Weekly Virtual Hacker Summer Camp, and we have two interviews! First, we welcome Matt Ashburn, Federal Engagement Lead at Authentic8, to discuss "How Security Spending Overlooks the Biggest Risk of All"! Then, we welcome Doug Hubbard, Founder at Hubbard Decision Research, to discuss "The Failure of Risk Management"!   Show Notes: https://wiki.securityweekly.com/bsw183 Learn more on how to quantify risk in terms of dollars and cents in order to build better "business impact" decision makers, visit: https://hubbardresearch.com/ Visit https://www.authentic8.com/bsw to learn more about them!   Join the Security Weekly Discord Server: https://discord.gg/pqSwWm4 Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly  

Paul's Security Weekly
Expert Instinct - BSW #183

Paul's Security Weekly

Play Episode Listen Later Aug 6, 2020 70:10


This week, it's Security Weekly Virtual Hacker Summer Camp, and we have two interviews! First, we welcome Matt Ashburn, Federal Engagement Lead at Authentic8, to discuss "How Security Spending Overlooks the Biggest Risk of All"! Then, we welcome Doug Hubbard, Founder at Hubbard Decision Research, to discuss "The Failure of Risk Management"!   Show Notes: https://wiki.securityweekly.com/bsw183 Learn more on how to quantify risk in terms of dollars and cents in order to build better "business impact" decision makers, visit: https://hubbardresearch.com/ Visit https://www.authentic8.com/bsw to learn more about them!   Join the Security Weekly Discord Server: https://discord.gg/pqSwWm4 Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly  

Modern CTO with Joel Beasley
#206 Kevin Lund - CTO at Authentic8

Modern CTO with Joel Beasley

Play Episode Listen Later Aug 5, 2020 61:03


Topics: Cyber Security, Products, CTO Responsibilities Today we are talking to Kevin Lund, the CTO at Authentic8. And we discuss using previous experience to set yourself up for success, the differences between inward and outward facing CTOs and how being passionate about the business first will help the product deliver more value. All of this, right now, on the Modern CTO Podcast! Check them out at https://www.authentic8.com/

products cto ctos authentic8 kevin lund
Paul's Security Weekly TV
SWVHSC: How Security Spending Overlooks the Biggest Risk of All - Matt Ashburn - BSW #183

Paul's Security Weekly TV

Play Episode Listen Later Aug 5, 2020 28:58


Global spending on cyber security totals over $100 billion per year, with no upper limit in sight as adversaries remain successful at compromising even well-resourced organizations. Why do adversaries remain successful despite advances in security technologies and risk frameworks? As it turns out, an often-overlooked architecture from 30 years ago is a common thread among many successful attacks. By re-thinking the ubiquitous web browser and its connection to the internet, CIOs and CISOs can nearly eliminate their internet risk surface, provide users the tools and access they need, and free up incident responders to focus on more advanced threats.   This segment is sponsored by Authentic8. Visit https://www.authentic8.com/bsw to learn more about them! To download your copy of "The Billion Dollar Security Blanket" by Matt Ashburn, visit: https://www.authentic8.com/bsw Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/bsw183

Business Security Weekly (Video)
SWVHSC: How Security Spending Overlooks the Biggest Risk of All - Matt Ashburn - BSW #183

Business Security Weekly (Video)

Play Episode Listen Later Aug 5, 2020 28:58


Global spending on cyber security totals over $100 billion per year, with no upper limit in sight as adversaries remain successful at compromising even well-resourced organizations. Why do adversaries remain successful despite advances in security technologies and risk frameworks? As it turns out, an often-overlooked architecture from 30 years ago is a common thread among many successful attacks. By re-thinking the ubiquitous web browser and its connection to the internet, CIOs and CISOs can nearly eliminate their internet risk surface, provide users the tools and access they need, and free up incident responders to focus on more advanced threats.   This segment is sponsored by Authentic8. Visit https://www.authentic8.com/bsw to learn more about them! To download your copy of "The Billion Dollar Security Blanket" by Matt Ashburn, visit: https://www.authentic8.com/bsw Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/bsw183

Smashing Security
187: Huawei ban, MGM hack, and a contact-tracing cock-up

Smashing Security

Play Episode Listen Later Jul 15, 2020 63:17


Login chaos for England's contact tracing service, our drill-down on the Britain's Huawei 5G ban, MGM's blockbuster breach, and how to pronounce "Gigabyte." All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Maria Varmazis. Plus we have a bonus featured interview with Scott Petry, the co-founder of Authentic8, all about how you can browse the internet safely, securely, and anonymously when conducting research, collecting sensitive evidence, and analyzing data. Visit https://www.smashingsecurity.com/187 to check out this episode’s show notes and episode links. Follow the show on Twitter at @SmashinSecurity, or on the Smashing Security subreddit, or visit our website for more episodes. Remember: Subscribe on Apple Podcasts, or your favourite podcast app, to catch all of the episodes as they go live. Thanks for listening! Warning: This podcast may contain nuts, adult themes, and rude language. Theme tune: "Vinyl Memories" by Mikael Manvelyan. Assorted sound effects: AudioBlocks. Special Guests: Maria Varmazis and Scott Petry.

The CU2.0 Podcast
CU 2.0 Podcast Episode 80 Scott Petry Authentic8 on the Tower of Babel in Many FIs

The CU2.0 Podcast

Play Episode Listen Later Feb 26, 2020 35:47


They just don't talk well together.That's the surprising conclusion in a report entitled "Surprising Disconnect Over Compliance and Secure Web Use at Financial Firms," research sponsored by IT security company Authentic8. (Download the report here.)Inside many banks and credit unions IT, compliance, and legal just don't talk the same language and often do not see the same problems, according to this report.Read the related CUInsight article about the report here. Today's guest, Scott Petry, CEO of Authentic8 who will tell is about this internal Tower of Babel.Here's why it matters: "this disconnect creates the potential for sizable gaps in compliance and data protection approaches in these organizations."Credit unions may have even tougher going because in many cases some of these tasks are outsourced and often the vendors simply do not talk together. Ever.Often, said the report, compliance focuses on reducing risks, legal relies on security policies, and IT is more attuned to attack vectors and keeping users content.And those three orientations may collide.The report explores how to get the three competing tribes on the same page, thus improving the institution's digital security.The report also looks at how to maximize web use while maintaining optimal security.  Increasingly a tool of choice is remote browser isolation and Petry tells why this solution is gaining favor inside many financial institutions.The conversation starts off with an attention grabber: why the ordinary URL is IT's nightmare. And know that Authentic8's Silo web browser has built in protections that anticipate - and solve for - user errors, pages they should not have clicked on, and still worse. It's protection for the Age of the Web and it consumes the first half of the podcast.From there, we turn back to the question of the three tribes - and how to get them cooperating for the security of the organization.Be prepared to hear realities you haven't thought about - and the result may be heightened internal security.Read the report. It's short, it's free, but it's provocative: Get it here.Like what you are hearing? Find out how you can help sponsor this podcast here. Very affordable sponsorship packages are available. Email rjmcgarvey@gmail.comFind out more about CU2.0 and the digital transformation of credit unions here. It's a journey every credit union needs to take. Pronto

Triangulation (Video HD)
Triangulation 423: Scott Petry

Triangulation (Video HD)

Play Episode Listen Later Nov 22, 2019 64:50


Scott Petry is the CEO of Authentic8. He talks to Leo Laporte about his work on the Newton, how he saved the world from spam, and his plan to make your browser safe. Host: Leo Laporte Guest: Scott Petry Download or subscribe to this show at https://twit.tv/shows/triangulation.

Triangulation (MP3)
Triangulation 423: Scott Petry

Triangulation (MP3)

Play Episode Listen Later Nov 22, 2019 64:50


Scott Petry is the CEO of Authentic8. He talks to Leo Laporte about his work on the Newton, how he saved the world from spam, and his plan to make your browser safe. Host: Leo Laporte Guest: Scott Petry Download or subscribe to this show at https://twit.tv/shows/triangulation.

Triangulation (Video HI)
Triangulation 423: Scott Petry

Triangulation (Video HI)

Play Episode Listen Later Nov 22, 2019 64:50


Scott Petry is the CEO of Authentic8. He talks to Leo Laporte about his work on the Newton, how he saved the world from spam, and his plan to make your browser safe. Host: Leo Laporte Guest: Scott Petry Download or subscribe to this show at https://twit.tv/shows/triangulation.

Triangulation (Video LO)
Triangulation 423: Scott Petry

Triangulation (Video LO)

Play Episode Listen Later Nov 22, 2019 64:50


Scott Petry is the CEO of Authentic8. He talks to Leo Laporte about his work on the Newton, how he saved the world from spam, and his plan to make your browser safe. Host: Leo Laporte Guest: Scott Petry Download or subscribe to this show at https://twit.tv/shows/triangulation.

Paul's Security Weekly TV
Challenges in the Browser & Securing Web Sessions - Scott Petry - BSW #152

Paul's Security Weekly TV

Play Episode Listen Later Nov 21, 2019 40:02


Scott Petry is the CEO of Authentic8. Scott Petry has been using the cloud to disrupt the information security market for nearly 20 years. He founded Postini in 1999, which pioneered the cloud-delivered service model for email security and content compliance. After Postini was acquired by Google, Scott remained as Director of Product Management for Google Enterprise. In 2010, he co-founded Authentic8, a secure virtual browser solution designed to address the inherent lack of security in the protocols the world uses to access the web. He graduated with a B.S. from San Diego State University. To learn more about Authentic8, visit: https://securityweekly.com/authentic8 Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode152

Business Security Weekly (Video)
Challenges in the Browser & Securing Web Sessions - Scott Petry - BSW #152

Business Security Weekly (Video)

Play Episode Listen Later Nov 20, 2019 40:02


Scott Petry is the CEO of Authentic8. Scott Petry has been using the cloud to disrupt the information security market for nearly 20 years. He founded Postini in 1999, which pioneered the cloud-delivered service model for email security and content compliance. After Postini was acquired by Google, Scott remained as Director of Product Management for Google Enterprise. In 2010, he co-founded Authentic8, a secure virtual browser solution designed to address the inherent lack of security in the protocols the world uses to access the web. He graduated with a B.S. from San Diego State University. To learn more about Authentic8, visit: https://securityweekly.com/authentic8 Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/BSWEpisode152

Paul's Security Weekly
Shady Things - BSW #152

Paul's Security Weekly

Play Episode Listen Later Nov 20, 2019 64:34


This week, we welcome Scott Petry, CEO at Authentic8, to discuss challenges with the browser and securing web sessions! In the Leadership and Communications segment, CISOs left in compromising position as organizations tout cyber robustness, How To Get More Out Of Your Team, 8 Steps To Convert Your Commute Time To Me Time, and more!   Show Notes: https://wiki.securityweekly.com/BSWEpisode152 Visit https://www.securityweekly.com/bsw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

Business Security Weekly (Audio)
Shady Things - BSW #152

Business Security Weekly (Audio)

Play Episode Listen Later Nov 20, 2019 64:34


This week, we welcome Scott Petry, CEO at Authentic8, to discuss challenges with the browser and securing web sessions! In the Leadership and Communications segment, CISOs left in compromising position as organizations tout cyber robustness, How To Get More Out Of Your Team, 8 Steps To Convert Your Commute Time To Me Time, and more!   Show Notes: https://wiki.securityweekly.com/BSWEpisode152 Visit https://www.securityweekly.com/bsw for all the latest episodes!   Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly

The Tech Blog Writer Podcast
945: Meet Silo, The Browser For A Zero Trust Web By Authentic8

The Tech Blog Writer Podcast

Play Episode Listen Later Aug 23, 2019 39:39


Cybersecurity is a $100 billion industry. If feels like our newsfeeds are bombarded with stories about breaches on an almost hourly basis. We are becoming increasingly aware of the costs around phishing schemes, and data breaches. Most recently, Baltimore racked up a nearly $18 million tab recovering from a ransomware attack that shut down numerous city departments. While the market is crowded with hundreds of solutions to prevent an attack, there is one risk that many people overlook. There is increasing evidence that the traditional web browser should be at the top of the risk list. When it comes to browsers, few—if any—companies take the time to thoroughly scrutinize or vet their options and many default to whatever is pre-installed on their device. The browser is critical for many aspects of a business. Most companies today rely on a “free” version vulnerable to threat actors, making it the most expensive software they have. Authentic8 founder Scott Petry, a 20+ year Silicon Valley veteran and joins me on my tech podcast to highlight the dangers the humble web browser. I learn why the web browser is an aberration in the IT software stack and explore the real cost of this seemingly “free” tool? We also talk about the lessons he learned from founding Postini, which was an e-mail, Web security, and archiving service, which has been owned by Google since 2007. In addition to sharing his recipe for success for launching security startups, Scott also sheds light on why 30 years after the birth of the World Wide Web, organizations are still relying on this outdated tool. 

7 Minute Security
7MS #368: Tales of Pentest Fail

7 Minute Security

Play Episode Listen Later Jun 24, 2019 36:22


This episode of the 7 Minute Security Podcast is brought to you by Authentic8, creators of Silo. Silo allows its users to conduct online investigations to collect information off the web securely and anonymously. For more information, check out Authentic8. In today's episode, I toss myself under the proverbial security bus and share a tale of pentest fail. Looking back, I think the most important lessons learned were: Scope projects well - I've been part of many over- and under-scoped projects due to PMs and/or sales folks doing an oversimplified calculations, like "URLs times X amount of dollars equals the SOW price." I recommend sending clients a more in-depth questionnaire and even jump on a Web meeting to get a nickel tour of their apps before sending a quote. Train your juniors - IMHO, they should shoulder-surf with more senior engineers a few times and not do much hands-to-keyboard work at first (except maybe helping write the report) until they demonstrate proficiency. Use automated pentest tools with caution - they need proper tuning/care/feeding or they can bring down Web sites and "over test" parameters.

7 Minute Security
7MS #365: Interview with Ryan Manship and Dave Dobrotka - Part 3

7 Minute Security

Play Episode Listen Later May 30, 2019 68:19


This episode of the 7 Minute Security Podcast is brought to you by Authentic8, creators of Silo. Silo allows its users to conduct online investigations to collect information off the web securely and anonymously. For more information, check out Authentic8. First, a bit of miscellany: If you replace "red rain" with "red team" in this song, we might just have a red team anthem on our hands! If you're in the Twin Cities area and looking for an infosec analyst job, check out this posting with UBB. If interested, I can help make an electronic introduction - and/or let 'em know 7 Minute Security sent ya! Ok, in today's program we're talking about red teaming again with our third awesome installment with Ryan and Dave who are professional red teamers! Today we cover: Recon - it's super important! It's like putting together puzzle pieces...and the more of that puzzle you can figure out, less likely you'll be surprised and the more likely you'll succeed at your objective! Reporting - how do you deliver reports in a way that blue team doesn't feel picked on, management understands the risk, and ultimately everybody leaves feeling charged to secure all the things? I also asked the questions folks submitted to me via LinkedIn/Slack: Any tips for the most dreaded part of an assessment (reports)? How do you get around PowerShell v5 with restrict language mode without having the ability to downgrade to v2? What's an alternative to PowerShell tooling for internal pentesting? (hint: C# is the hotness) What certs/skills should I pursue to get better at red teaming (outside of "Hey, go build a lab!"). Are customers happy to get assessed by a red team exercise, or do they do it begrudgingly because of requirements/regulations?

7 Minute Security
7MS #364: Tales of External Pentest Pwnage

7 Minute Security

Play Episode Listen Later May 22, 2019 36:00


This episode of the 7 Minute Security Podcast is brought to you by Authentic8, creators of Silo. Silo allows its users to conduct online investigations to collect information off the web securely and anonymously. For more information, check out Authentic8. This episode features cool things I'm learning about external pentesting. But first, some updates: My talk at Secure360 went really well. Only slightly #awkward thing is I felt an overwhelming need to change my title slide to talk about the fact that I don't drink. The 7MS User Group went well. We'll resume in the late summer or early fall and do a session on lockpicking! Wednesday night my band had the honor of singing at a Minnesota LEMA service and wow, what an honor. To see the sea of officers and their supportive families and loved ones was incredibly powerful. On the external pentest front, here are some items we cover in today's show: MailSniper's Invoke-DomainHarvestOWA helps you discover the FQDN of your mail server target. Invoke-UsernameHarvestOWA helps you figure out what username scheme your target is using. Invoke-PasswordSprayOWA helps you do a low and slow password spray to hopefully find some creds! Once inside the network, CrackMapExec is your friend. You can figure out where your compromised creds are valid across the network with this syntax: crackmapexec smb 192.168.0.0/24 -u USER -p ‘PASSWORD’ -d YOURDOMAIN You can also find what shares you have access to with: crackmapexec smb 192.168.0.0/24 -u USER -p ‘PASSWORD’ -d YOURDOMAIN --shares Sift through those shares! They often have VERY delicious bits of information in them :-)

Designing Enterprise Platforms
Early Adopter Research Podcast with Authentic8's Scott Petry

Designing Enterprise Platforms

Play Episode Listen Later Mar 21, 2019 27:55


In this edition of the Early Adopter Research(EAR)Podcast, EAR's Dan Woods speaks with Scott Petry, the CEO of Authentic8. Their conversation focused on the current cybersecurity landscape and Authentic8's approach of securing the browser. Their discussion also covered: * 2:30 - Zero Trust * 7:20 - Why is cybersecurity always additive? * 13:30 - How will cybersecurity change as it moves to the cloud? * 20:00 - How to be a rational buyer in cybersecurity * 24:30 - Is cyber insurance necessary?

The Privacy, Security, & OSINT Show
107-Listener Questions

The Privacy, Security, & OSINT Show

Play Episode Listen Later Jan 11, 2019 61:34


This week I attempt to answer the most common questions sent from listeners over the past month. Sponsored this week by @silentpocket & @Authentic8. All episodes available at IntelTechniques.com.

The Privacy, Security, & OSINT Show
098-Sextortion, Data Breaches, and Anonymous Browsing

The Privacy, Security, & OSINT Show

Play Episode Listen Later Nov 9, 2018 71:54


This week I discuss creepy new sextortion attacks, interview SpyCloud about data breaches, and review Authentic8's investigation browser.

Down the Security Rabbithole Podcast
DtSR Episode 311 - Further the Browser

Down the Security Rabbithole Podcast

Play Episode Listen Later Aug 29, 2018 39:47


This week we dive into the world of the web browser. A brief history, some discussion about what's wrong and how it's broken - and a few suggestions for what to do next. This is a complicated discussion - so you can bet we'll come back to it with your feedback!   Highlights from this week's show include... A brief walk-through of the history of browsing Solutions that tried, but ultimately failed, to solve the challenges An approach we've seen before - the "remote browser" Discussion on challenges and opportunities of the remote browser concept Discussion on Authentic8's approach and innovations

browsers authentic8
The CyberWire
MysteryBot developed from LokiBot. Satan rebranded as DBGer. Snooping on iOS got harder, but maybe not impossible. IG report on the FBI is out, not damning but not good, either.

The CyberWire

Play Episode Listen Later Jun 15, 2018 22:40


In today's podcast we hear that MysteryBot is under development and presumably being prepared for sale on the black market. Satan ransomware gets a makeover and a new name. Apple has taken measures to make iOS traffic less accessible to snooping, but lawful snoops may already have a way around that security. Kasperky will no longer work with Europol. The US Justice Department IG reports on the FBI. And a former Jeopardy champion cops a hacking plea. Robert M. Lee from Dragos, on his efforts to educate through the use of comic strips. Guest is Scott Petry from Authentic8 discussing their FAKE booth at the RSA conference.  

The CyberWire
Qatar—provocation, and disinformation online. Influence operations move from doxing to disinformation. 2FA still a good idea. Former FBI Director Comey testifies. And assume the boss is watching.

The CyberWire

Play Episode Listen Later Jun 8, 2017 14:58


In today's podcast, we hear that Qatar remains in bad odor with its neighbors over a recent online provocation. (Russia denies any involvement.) Anomali talks about influence operations, especially with respect to elections, where they may be moving from doxing to disinformation. Leaks about election hacking shouldn't turn you off to multifactor authentication—it's not the technology; it's us. Former FBI Director Comey testifies before the Senate Intelligence Committee. Level 3 Communications' Dale Drew review health care security stats. Drew Paik from Authentic8 shares vacation traveling tips. And a lesson from the NSA leak arrest: assume the boss is watching.

ConnectSafely Live
Scott Petry of Authentic8 on secure cloud browser

ConnectSafely Live

Play Episode Listen Later Feb 14, 2017 6:37


Larry speaks with Scott Petry about Authentic8's secure cloud-based browser

cloud secure browsers authentic8 scott petry
ConnectSafely
Scott Petry of Authentic8 on secure cloud browser

ConnectSafely

Play Episode Listen Later Feb 14, 2017 6:37


Larry speaks with Scott Petry about Authentic8's secure cloud-based browser

cloud secure browsers authentic8 scott petry
Reinventing Professionals
Sharpening Security Strategy With a Virtual Browser

Reinventing Professionals

Play Episode Listen Later Nov 15, 2016 11:39


I spoke with Scott Petry, the co-founder and CEO of Authentic8, the creator of Silo, a secure virtual browser. Prior to Authentic8, Scott founded Postini, an email server security company, acquired by Google in 2007. We discussed the genesis of Authentic8, the security issues associated with the typical browser, and the benefits of a virtual browser like Silo for the legal industry, among other issues.

Reinventing Professionals
Sharpening Security Strategy With a Virtual Browser

Reinventing Professionals

Play Episode Listen Later Nov 15, 2016 11:39


I spoke with Scott Petry, the co-founder and CEO of Authentic8, the creator of Silo, a secure virtual browser. Prior to Authentic8, Scott founded Postini, an email server security company, acquired by Google in 2007. We discussed the genesis of Authentic8, the security issues associated with the typical browser, and the benefits of a virtual browser like Silo for the legal industry, among other issues.

Reinventing Professionals
Sharpening Security Strategy With a Virtual Browser

Reinventing Professionals

Play Episode Listen Later Nov 15, 2016 11:39


I spoke with Scott Petry, the co-founder and CEO of Authentic8, the creator of Silo, a secure virtual browser. Prior to Authentic8, Scott founded Postini, an email server security company, acquired by Google in 2007. We discussed the genesis of Authentic8, the security issues associated with the typical browser, and the benefits of a virtual browser like Silo for the legal industry, among other issues.

Reinventing Professionals
Sharpening Security Strategy With a Virtual Browser

Reinventing Professionals

Play Episode Listen Later Nov 15, 2016 11:39


I spoke with Scott Petry, the co-founder and CEO of Authentic8, the creator of Silo, a secure virtual browser. Prior to Authentic8, Scott founded Postini, an email server security company, acquired by Google in 2007. We discussed the genesis of Authentic8, the security issues associated with the typical browser, and the benefits of a virtual browser like Silo for the legal industry, among other issues.

Reinventing Professionals
Sharpening Security Strategy With a Virtual Browser

Reinventing Professionals

Play Episode Listen Later Nov 15, 2016 11:39


I spoke with Scott Petry, the co-founder and CEO of Authentic8, the creator of Silo, a secure virtual browser. Prior to Authentic8, Scott founded Postini, an email server security company, acquired by Google in 2007. We discussed the genesis of Authentic8, the security issues associated with the typical browser, and the benefits of a virtual browser like Silo for the legal industry, among other issues.

The CyberWire
Daily: Ransomware spreads (backup or pay up?). Safe travels. FTC, NFL embarrassed.

The CyberWire

Play Episode Listen Later Jun 9, 2016 11:59


In today's podcast we follow the latest news and trends with respect to ransomware, now the hottest commodity on the black market, and still able to fetch between $15,000 and $20,000 an extortion. Twitter credentials join VK's in the criminal souk; both sets may have been harvested via earlier breaches in other social media sites. NATO looks into cyber collaboration, workforce development, innovation (Estonia hints low budgets can drive creativity), and the risk of strategic surprise in hybrid warfare. Cylance becomes the industry's latest unicorn with a big Series D funding round. The Johns Hopkins University's Joe Carrigan help us plan our backup strategy, and Scott Petry from Authentic8 offers suggestions for safe browsing while traveling.

Faith Fellowship Podcast
8 - Authentic8 (April 12, 2009)

Faith Fellowship Podcast

Play Episode Listen Later Apr 12, 2009 38:33