Podcasts about axonius

  • 54PODCASTS
  • 276EPISODES
  • 40mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • May 12, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about axonius

Latest podcast episodes about axonius

CISO Stories Podcast
Mapping the Modern Attack Surface: Fintech's Evolving Risk Frontier - Erika Dean - CSP #212

CISO Stories Podcast

Play Episode Listen Later May 12, 2025 30:47


In this episode, Erika Dean dives into the evolution of attack surface management (ASM) in financial tech. From foundational strategies to future-focused threats, she explores how shifts in the fintech landscape demand deeper organizational awareness, ongoing tabletop exercises, and proactive preparation. This segment is sponsored by Axonius. Visit https://cisostoriespodcast.com/axonius to learn more about them! Visit https://cisostoriespodcast.com for all the latest episodes! Show Notes: https://cisostoriespodcast.com/csp-212

Paul's Security Weekly
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Dr. Aleksandr Yampolskiy, Lenny Zeltser - BSW #394

Paul's Security Weekly

Play Episode Listen Later May 7, 2025 64:40


In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (like EDR, MDR, and XDR) effectively handle threats within an organization, but leave a gap regarding third-party risk. SecurityScorecard created the Supply Chain Detection and Response category to empower organizations to shift from being reactive and uncertain to confidently and proactively protecting their entire supply chain. What is Supply Chain Detection and Response (SCDR)?: https://securityscorecard.com/blog/what-is-supply-chain-detection-and-response/ Learn more about continuous supply chain cyber risk detection and response: https://securityscorecard.com/why-securityscorecard/supply-chain-detection-response/ Claim Your Free SCDR Assessment: https://securityscorecard.com/get-started-scdr/#form This segment is sponsored by Security Scorecard. Visit https://securityweekly.com/securityscorecardrsac for more information on how SecurityScorecard MAX and Supply Chain Detection and Response can help your organization identify and resolve supply chain risks. In this interview, Axonius CISO Lenny Zeltser shares the vision behind Axonius Exposures, the company's latest innovation in unified risk management. Launched ahead of RSA Conference 2025, Exposures tackles one of the most persistent challenges in cybersecurity today: making sense of fragmented risk signals to drive confident, actionable decision-making. Lenny will discuss how Exposures unifies security findings, asset intelligence, and business context in a single platform — giving security teams the clarity and automation they need to prioritize what truly matters. He'll also explore what this launch means for Axonius' mission, the evolution of cyber asset management, and how organizations can move from reactive security postures to proactive, risk-based strategies. Want to see how Axonius Exposures gives you the clarity to take action on your most critical risks? Visit https://securityweekly.com/axoniusrsac to learn more and schedule a personalized demo. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-394

Business Security Weekly (Audio)
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Dr. Aleksandr Yampolskiy, Lenny Zeltser - BSW #394

Business Security Weekly (Audio)

Play Episode Listen Later May 7, 2025 64:40


In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (like EDR, MDR, and XDR) effectively handle threats within an organization, but leave a gap regarding third-party risk. SecurityScorecard created the Supply Chain Detection and Response category to empower organizations to shift from being reactive and uncertain to confidently and proactively protecting their entire supply chain. What is Supply Chain Detection and Response (SCDR)?: https://securityscorecard.com/blog/what-is-supply-chain-detection-and-response/ Learn more about continuous supply chain cyber risk detection and response: https://securityscorecard.com/why-securityscorecard/supply-chain-detection-response/ Claim Your Free SCDR Assessment: https://securityscorecard.com/get-started-scdr/#form This segment is sponsored by Security Scorecard. Visit https://securityweekly.com/securityscorecardrsac for more information on how SecurityScorecard MAX and Supply Chain Detection and Response can help your organization identify and resolve supply chain risks. In this interview, Axonius CISO Lenny Zeltser shares the vision behind Axonius Exposures, the company's latest innovation in unified risk management. Launched ahead of RSA Conference 2025, Exposures tackles one of the most persistent challenges in cybersecurity today: making sense of fragmented risk signals to drive confident, actionable decision-making. Lenny will discuss how Exposures unifies security findings, asset intelligence, and business context in a single platform — giving security teams the clarity and automation they need to prioritize what truly matters. He'll also explore what this launch means for Axonius' mission, the evolution of cyber asset management, and how organizations can move from reactive security postures to proactive, risk-based strategies. Want to see how Axonius Exposures gives you the clarity to take action on your most critical risks? Visit https://securityweekly.com/axoniusrsac to learn more and schedule a personalized demo. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-394

Business Security Weekly (Video)
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Lenny Zeltser, Dr. Aleksandr Yampolskiy - BSW #394

Business Security Weekly (Video)

Play Episode Listen Later May 7, 2025 64:40


In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (like EDR, MDR, and XDR) effectively handle threats within an organization, but leave a gap regarding third-party risk. SecurityScorecard created the Supply Chain Detection and Response category to empower organizations to shift from being reactive and uncertain to confidently and proactively protecting their entire supply chain. What is Supply Chain Detection and Response (SCDR)?: https://securityscorecard.com/blog/what-is-supply-chain-detection-and-response/ Learn more about continuous supply chain cyber risk detection and response: https://securityscorecard.com/why-securityscorecard/supply-chain-detection-response/ Claim Your Free SCDR Assessment: https://securityscorecard.com/get-started-scdr/#form This segment is sponsored by Security Scorecard. Visit https://securityweekly.com/securityscorecardrsac for more information on how SecurityScorecard MAX and Supply Chain Detection and Response can help your organization identify and resolve supply chain risks. In this interview, Axonius CISO Lenny Zeltser shares the vision behind Axonius Exposures, the company's latest innovation in unified risk management. Launched ahead of RSA Conference 2025, Exposures tackles one of the most persistent challenges in cybersecurity today: making sense of fragmented risk signals to drive confident, actionable decision-making. Lenny will discuss how Exposures unifies security findings, asset intelligence, and business context in a single platform — giving security teams the clarity and automation they need to prioritize what truly matters. He'll also explore what this launch means for Axonius' mission, the evolution of cyber asset management, and how organizations can move from reactive security postures to proactive, risk-based strategies. Want to see how Axonius Exposures gives you the clarity to take action on your most critical risks? Visit https://securityweekly.com/axoniusrsac to learn more and schedule a personalized demo. Show Notes: https://securityweekly.com/bsw-394

Monday Science
Throwback Thursday: Cybersecurity

Monday Science

Play Episode Listen Later Apr 3, 2025 37:58


In this episode... (first aired on the 20th of September 2021) Dr Bahijja Raimi-Abraham discusses cybersecurity with Ron Eddings (Creative Director at a cybersecurity startup Axonius and Hacker Valley Studio co-host).Thank you for listening! If you liked the episode, please give us a five-star rating and review.

Resilient Cyber
Resilient Cyber w/ Lior Div & Nate Burke - Agentic AI & the Future of Cyber

Resilient Cyber

Play Episode Listen Later Mar 17, 2025 36:25


In this episode, we sit down with Lior Div and Nate Burke of 7AI to discuss Agentic AI, Service-as-Software, and the future of Cybersecurity. Lior is the CEO/Co-Founder of 7AI and a former CEO/Co-Founder of Cybereason, while Nate brings a background as a CMO with firms such as Axonius, Nagomi, and now 7AI.Lior and Nate bring a wealth of experience and expertise from various startups and industry-leading firms, which made for an excellent conversation.We discussed:The rise of AI and Agentic AI and its implications for cybersecurity.Why the 7AI team chose to focus on SecOps in particular and the importance of tackling toil work to reduce cognitive overload, address workforce challenges, and improve security outcomes.The importance of distinguishing between Human and Non-Human work, and why the idea of eliminating analysts is the wrong approach.Being reactive and leveraging Agentic AI for threat hunting and proactive security activities.The unique culture that comes from having the 7AI team in-person on-site together, allowing them to go from idea to production in a single day while responding quickly to design partners and customer requests.Challenges of building with Agentic AI and how the space is quickly evolving and growing.Key perspectives from Nate as a CMO regarding messaging around AI and getting security to be an early adopter rather than a laggard when it comes to this emerging technology.Insights from Lior on building 7AI compared to his previous role, founding Cybereason, which went on to become an industry giant and leader in the EDR space.

Darknet Diaries
152: Stacc Attack

Darknet Diaries

Play Episode Listen Later Dec 3, 2024 53:03


Jarett Dunn, AKA StaccOverflow, stole millions of dollars from a website called Pump Fun, and he wanted to do it in the most dramatic and theatrical way he could. His big heist is known as the “Stacc Attack”.https://x.com/STACCoverflowHe has a merch store now freestacc.io.SponsorsSupport for this show comes from Cobalt Strike. Cobalt Strike simulates real-world, advanced cyber attacks to enable red teams to proactively evaluate an organisation's security readiness and defence response. Their Command and Control framework gives red teamers the ability to customise their engagements and incorporate their own tools and techniques, allowing you to stress-test specific parts of your incident response capabilities. Learn more about Cobalt Strike and get a custom demo at https://cobaltstrike.com/darknet.Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Darknet Diaries
151: Chris Rock

Darknet Diaries

Play Episode Listen Later Nov 5, 2024 57:57


Chris Rock is known for being a security researcher. But he's also a black hat incident responder. He tells us about a job he did in the middle east.https://x.com/chrisrockhackerSponsorsSupport for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.Support for this show comes from Flare. Flare automates monitoring across the dark & clear web to detect high-risk exposure, before threat actors have a chance to leverage it. Their unified solution makes it easy to rapidly identify risks across thousands of sources, including developers leaking secrets on public GitHub Repositories, threat actors selling infected devices on dark web markets, and targeted attacks being planned on illicit Telegram Channels. Visit https://flare.io to learn more.

The CyberWire
Guarding the Vote

The CyberWire

Play Episode Listen Later Oct 31, 2024 33:47


CISA spins up an election operations war room. Microsoft neglected to restrict access to gender-detecting AI. Yahoo uncovers vulnerabilities in OpenText's NetIQ iManager. QNAP issues urgent patches for its NAS devices. Sysdig uncovers Emerald Whale. A malvertising campaign exploits Meta's ad platform to spread the SYS01 infostealer. Senator Ron Wyden wants to tighten rules aimed at preventing U.S. technologies from reaching repressive regimes. Researchers use AI to uncover an IoT zero-day. Sophos reveals a five year battle with firewall hackers. Our guest is Frederico Hakamine, Technology Evangelist from Axonius, talking about how threats both overlap and differ across individuals and critical infrastructure. Be afraid of spooky data. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Frederico Hakamine, Technology Evangelist from Axonius, talking about how threats both overlap and differ across individuals and critical infrastructure. Selected Reading CISA Opens Election War Room to Combat Escalating Threats (GovInfo Security) Agencies face ‘inflection point' ahead of looming zero-trust deadline, CISA official says (CyberScoop) Microsoft Provided Gender Detection AI on Accident (404 Media) Yahoo Discloses NetIQ iManager Flaws Allowing Remote Code Execution (SecurityWeek) QNAP patches critical SQLi flaw (Beyond Machines) EMERALDWHALE: 15k Cloud Credentials Stolen in Operation Targeting Exposed Git Config Files (Sysdig) Fake Meta Ads Hijacking Facebook Accounts to Spread SYS01 Infostealer (Hackread) Exclusive: Senator calls on Commerce to tighten proposed rules on exporting surveillance, hacking tech to problematic nations (CyberScoop) GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI (GreyNoise)  Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices (WIRED) Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats (Sophos News) Spooky Data at a Distance (LinkedIn) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Darknet Diaries
150: mobman 2

Darknet Diaries

Play Episode Listen Later Oct 1, 2024 43:11


In Episode 20 of Darknet Diaries, we heard from Greg aka “mobman” who said he created the sub7 malware. Something didn't sit right with a lot of people about that episode. It's time to revisit that episode and get to the bottom of things.SponsorsThis show is sponsored by Shopify. Shopify is the best place to go to start or grow your online retail business. And running a growing business means getting the insights you need wherever you are. With Shopify's single dashboard, you can manage orders, shipping, and payments from anywhere. Sign up for a one-dollar-per-month trial period at https://shopify.com/darknet.Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.Sourceshttps://www.youtube.com/watch?v=GDMc2PZM4V4https://www.illmob.org/notmymobman/https://darknetdiaries.com/episode/20

Darknet Diaries
149: Mini-Stories: Vol 3

Darknet Diaries

Play Episode Listen Later Sep 3, 2024 48:04


In this episode we hear EvilMog (https://x.com/Evil_Mog) tell us a story about when he had to troubleshoot networks in Afghanistan. We also get Joe (http://x.com/gonzosec) to tell us a penetration test story.SponsorsSupport for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Darknet Diaries
148: Dubsnatch

Darknet Diaries

Play Episode Listen Later Aug 6, 2024 89:16


Ever wondered how far a fan would go to get a sneak peek of their favorite artist's unreleased tracks? In this episode, we uncover the audacious story of some teens bent on getting their hands on the newest dubstep music before anyone else.SponsorsSupport for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.

Darknet Diaries
145: Shannen

Darknet Diaries

Play Episode Listen Later May 7, 2024 77:12


Shannen Rossmiller wanted to fight terrorism. So she went online and did. Read more about her from her book “The Unexpected Patriot: How an Ordinary American Mother Is Bringing Terrorists to Justice”. An affiliate link to the book on Amazon is here: https://amzn.to/3yaf5sI. Thanks to Spycast for allowing usage of the audio interview with Shannen. Sponsors Support for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Darknet Diaries
144: Rachel

Darknet Diaries

Play Episode Listen Later Apr 2, 2024 64:30


Rachel Tobac is a social engineer. In this episode we hear how she got started doing this and a few stories of how she hacked people and places using her voice and charm. Learn more about Rachel by following her on Twitter https://twitter.com/RachelTobac or by visiting https://www.socialproofsecurity.com/ Daniel Miessler also chimes in to talk about AI. Find out more about him at https://danielmiessler.com/. Sponsors Support for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Paul's Security Weekly TV
Early stage startup M&A on fire, funding healthy, and attackers are like lawyers? - ESW #352

Paul's Security Weekly TV

Play Episode Listen Later Mar 8, 2024 60:14


In the enterprise security news, Axonius raises $200M and is doing $100M ARR! Claroty raises $100M and is doing $100M ARR! Crowdstrike picks up DSPM with Flow Security CyCode picks up Bearer Are attackers like lawyers? How a bank failed (with no help from a cyber attack) the FTC cracks down on customer data collection Apple's car sadly won't be a thing any time soon or maybe ever. All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-352

Enterprise Security Weekly (Video)
Early stage startup M&A on fire, funding healthy, and attackers are like lawyers? - ESW #352

Enterprise Security Weekly (Video)

Play Episode Listen Later Mar 8, 2024 60:14


In the enterprise security news, Axonius raises $200M and is doing $100M ARR! Claroty raises $100M and is doing $100M ARR! Crowdstrike picks up DSPM with Flow Security CyCode picks up Bearer Are attackers like lawyers? How a bank failed (with no help from a cyber attack) the FTC cracks down on customer data collection Apple's car sadly won't be a thing any time soon or maybe ever. All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-352

Paul's Security Weekly
What can we do today to prevent tomorrow's breach? - Michael Mumcuoglu - ESW #352

Paul's Security Weekly

Play Episode Listen Later Mar 7, 2024 107:13


Defenders spend a lot of time and money procuring and implementing security controls. At the heart of SecOps and the SOC are technologies like XDR, SIEM, and SOAR. How do we know these technologies are going to detect or prevent attacks? Wait for the annual pen test? Probably not a good idea. In this segment, we'll talk with Michael Mumcuoglu about how MITRE's ATT&CK framework can help defenders better prepare for inevitable attack TTPs they'll have knocking on their doors. Segment Resources: CardinalOps Contributes to MITRE ATT&CK for Fourth Consecutive Release ESG Report: Operationalize MITRE ATT&CK with Detection Posture Management Report: Enterprise SIEMs offer inadequate threat detection 2023 State of SIEM Detection Risk Report In the enterprise security news, Axonius raises $200M and is doing $100M ARR! Claroty raises $100M and is doing $100M ARR! Crowdstrike picks up DSPM with Flow Security CyCode picks up Bearer Are attackers like lawyers? How a bank failed (with no help from a cyber attack) the FTC cracks down on customer data collection Apple's car sadly won't be a thing any time soon or maybe ever. All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-352

Enterprise Security Weekly (Audio)
What can we do today to prevent tomorrow's breach? - Michael Mumcuoglu - ESW #352

Enterprise Security Weekly (Audio)

Play Episode Listen Later Mar 7, 2024 107:13


Defenders spend a lot of time and money procuring and implementing security controls. At the heart of SecOps and the SOC are technologies like XDR, SIEM, and SOAR. How do we know these technologies are going to detect or prevent attacks? Wait for the annual pen test? Probably not a good idea. In this segment, we'll talk with Michael Mumcuoglu about how MITRE's ATT&CK framework can help defenders better prepare for inevitable attack TTPs they'll have knocking on their doors. Segment Resources: CardinalOps Contributes to MITRE ATT&CK for Fourth Consecutive Release ESG Report: Operationalize MITRE ATT&CK with Detection Posture Management Report: Enterprise SIEMs offer inadequate threat detection 2023 State of SIEM Detection Risk Report In the enterprise security news, Axonius raises $200M and is doing $100M ARR! Claroty raises $100M and is doing $100M ARR! Crowdstrike picks up DSPM with Flow Security CyCode picks up Bearer Are attackers like lawyers? How a bank failed (with no help from a cyber attack) the FTC cracks down on customer data collection Apple's car sadly won't be a thing any time soon or maybe ever. All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-352

Content Amplified
How to humanize your content?

Content Amplified

Play Episode Listen Later Mar 4, 2024 14:17


Welcome back to another episode of Content Amplified. In this episode, we interview Kaite Rosa, who leads the brand at Axonius, a cybersecurity company. What you'll learn in this episode: Insights into launching and leading a major campaign with Simone Biles and its impact on brand humanization. The strategic approach to differentiating brand messaging in the cybersecurity industry, moving away from conventional militaristic themes. The importance of storytelling in brand campaigns, including the unique method of not mentioning the product directly to foster stronger emotional connections. Metrics and measurements essential for evaluating the success of brand messaging campaigns. Future directions in storytelling and humanizing the cybersecurity sector, focusing on practitioners' stories and flipping the narrative away from stereotypes.

HR Leaders
The Crucial Role of 'Why' in Effective Workplace Communication

HR Leaders

Play Episode Listen Later Nov 21, 2023 24:48


It's 5:05! Daily cybersecurity and open source briefing
Episode #269: Edwin Kwan: WhatsApp Mods for Android May Contain Spyware; Ian Garrett: Cyber Attackers and Defenders Enter an AI Arms Race; Katy Craig: Russia, Iran, and China: US 2024 Election Meddling Likely; Mark Miller: This Day in Tech History

It's 5:05! Daily cybersecurity and open source briefing

Play Episode Listen Later Nov 9, 2023 11:24


Darknet Diaries
139: D3f4ult

Darknet Diaries

Play Episode Listen Later Nov 7, 2023 80:43 Very Popular


This is the story of D3f4ult (twitter.com/_d3f4ult) from CWA. He was a hacktivist, upset with the state of the way things were, and wanted to make some changes. Changes were made. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn't be. Check them out at https://canary.tools. Support for this show comes from Quorum Cyber. Their mantra is: “We help good people win.” If you're looking for a partner to help you reduce risk and defend against the threats that are targeting your business — and especially if you are interested in Microsoft Security — reach out to Quorum Cyber at www.quorumcyber.com/darknet-diaries. Sources https://www.vice.com/en/article/z3ekk5/kane-gamble-cracka-back-online-after-a-two-year-internet-ban https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/ https://www.hackread.com/fbi-server-hacked-miami-police-data-leaked/ https://archive.ph/Si79V#selection-66795.5-66795.6 https://wikileaks.org/cia-emails/John-Brennan-Draft-SF86/page-7.html Learn more about your ad choices. Visit podcastchoices.com/adchoices

Darknet Diaries
138: The Mimics of Punjab

Darknet Diaries

Play Episode Listen Later Oct 3, 2023 46:30


This episode is about scammers in the Punjab region. Tarun (twitter.com/taruns21) comes on the show to tell us a story of what happened to him. Naomi Brockwell (twitter.com/naomibrockwell) makes an appearance to speak about digital privacy. To learn more about protecting your digital privacy, watch Naomi's YouTube channel https://www.youtube.com/@NaomiBrockwellTV. And check out the books Extreme Privacy (https://amzn.to/3L3ffp9) and Beginner's Introduction to Privacy (https://amzn.to/3EjuSoY). Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from SpyCloud. It's good practice to see what data is getting passed around out there regarding you, your employees, your customers, and your business. The dark web is a place where this data is traded and shared. SpyCloud will help you find what out there about you and give you a report so you can be aware. Then they'll continuously monitor the dark web for any new exposures you should be aware of. To learn more visit spycloud.com/darknetdiaries. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthens you're infrastructure from the ground up with a zero trust posture. ThreatLocker's allow-listing give you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provices zero trust control at the kernel level. Learn more at www.threatlocker.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Secrets of Rockstar CFOs
Taming the Pre-IPO Beast with Chris Kramer, Axonius CFO

Secrets of Rockstar CFOs

Play Episode Listen Later Sep 24, 2023 40:15


Being the CFO of a pre-IPO unicorn is one heck of a job title to have, especially in your first 90 days. But as the new CFO at the rapidly growing startup, Axonius, Chris Kramer is more than up to the challenge. With a successful track record as a unicorn-status company, Axonius is poised for a significant financial event, but what does this mean for the CFO and the company's culture? Chris sheds light on the financial and cultural shifts that come with the transition to a public company. Join in as we explore the intricacies of CFO life in a pre-IPO company, the importance of financial transparency, the impact of an IPO on company culture, and a whole lot more!To book a demo with Payhawk, click here.

Darknet Diaries
137: Predator

Darknet Diaries

Play Episode Listen Later Sep 5, 2023 69:28 Very Popular


A new type of mercenary spyware came on the radar called Predator. It'll infect a mobile phone, and then suck up all the data from it. Contacts, text messages, location, and more. This malware is being sold to intelligence agencies around the world. In this episode we hear from Crofton Black at Lighthouse Reports who spent 6 months with a team of journalists researching this story which was published here: https://www.lighthousereports.com/investigation/flight-of-the-predator/. We also hear from Bill Marczak and John Scott-Railton from Citizen Lab. If you want to hear about other mercenary spyware, check out episodes 99 and 100, about NSO group and Pegasus. To hear another episode about Greece check out episode 64 called Athens Shadow Games. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Akamai Connected Cloud (formerly Linode). Akamai Connected Cloud supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Learn more about your ad choices. Visit podcastchoices.com/adchoices

The Conference Room with Simon Lader
Ep. 120 - "How Effective Sales Engineering Can Scale Your Business!" with Sean Blenkhorn

The Conference Room with Simon Lader

Play Episode Listen Later Sep 4, 2023 36:14


In this week's episode of The Conference Room we welcome Sean Blenkhorn, the Vice President of Worldwide Sales Engineering at Axonius, a leading cybersecurity vendor. With over two decades of experience in diverse organizations like Symantec, Canadian Bank CIBC, and eSentire, Sean is one of the authorities of Sales Engineering in the cybersecurity sector. Join us as we dive into the intriguing world of "pre-sales", and explore its critical role in bridging the gap between technology and sales. KEY TAKEAWAYS FROM THIS EPISODE Defining Sales Engineering: Sean starts our conversation by providing insights into the role of a sales engineer, emphasizing their responsibility in helping customers understand the technical aspects of solutions and products. Tune in at [00:01:12] to get a clear understanding. Technical Expertise vs. Sales Skills: At [00:03:25], the discussion delves into the distinct qualities required in a sales engineer, balancing technical expertise with effective communication and relationship-building skills. Supporting Account Executives: Learn how sales engineers work closely with account executives to tailor solutions to customer needs. Sean highlights this collaborative nature at [00:05:42]. Trust and Relationships: Discover how a deeper level of trust often develops between customers and sales engineers, leading to more meaningful interactions and understanding. Join us at [00:07:58] for this insightful discussion. Traits of a Good Sales Engineer: Sean outlines the qualities that make a successful sales engineer, including passion for the industry, agility in working with diverse teams, effective communication, and a hunger for learning. Hear more at [00:10:20]. Transitioning to Leadership: The challenges and rewards of moving from a sales engineer to a leadership position are explored at [00:12:45], underlining the shift from individual contributions to team development and culture building. THIS WEEK'S GUEST - SEAN BLENKHORN Sean Blenkhorn, Vice President of Worldwide Sales Engineering at Axonius, boasts over 20 years of industry experience across diverse sectors. With roles in renowned organizations such as Symantec, Canadian Bank CIBC, and eSentire, Sean has acquired a deep understanding of both cybersecurity and effective sales strategies. His proficiency as an advisor to early-stage vendors underscores his credibility in guiding technological solutions to success. Since 2021, Sean has steered Axonius' global sales engineering team, showcasing his exceptional leadership and commitment to bridging the gap between technology and sales for optimal customer solutions. Join us as we delve into the remarkable journey of this industry veteran. You can learn more about Sean by visiting his LinkedIn profile You can learn about Axonius by visiting their website YOUR HOST - SIMON LADER Simon Lader is the host of The Conference Room, Co-Founder of global executive search firm Salisi Human Capital, and lead generation coaching company Flow and Scale. Since 1997, Simon has helped cybersecurity vendors to build highly effective teams, and since 2022 he has helped people make money from podcasting. Get to know more about Simon at: Website: https://simonlader.com/ Twitter: https://twitter.com/simonlader LinkedIn: https://www.linkedin.com/in/headhuntersimonlader The Conference Room is available on Spotify Apple Podcasts Amazon Music iHeartRadio And everywhere else you listen to podcasts!

Darknet Diaries
136: Team Xecuter

Darknet Diaries

Play Episode Listen Later Aug 1, 2023 87:05


Team Xecuter was a group involved with making and selling modchips for video game systems. They often made mods that allowed the video game system to rip games or play pirated games. It was a crowd favorite in the modding scene. Until it all fell apart. The story of what happened to Team Xecuter must be heard to believe. This episode features Gary Bowser. You can find more about Gary here: https://twitter.com/Bowser_GaryOPA https://garyopa.com/ https://www.gofundme.com/f/garyopa-restarting-his-life?utm_location=darknetdiaries Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn't be. Check them out at https://canary.tools. Support for this show comes from ThreatLocker. ThreatLocker has built-in endpoint security solutions that strengthens you're infrastructure from the ground up with a zero trust posture. ThreatLocker's allow-listing give you a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker provices zero trust control at the kernel level. Learn more at www.threatlocker.com. Sources https://www.washingtonpost.com/archive/politics/1994/10/27/ringleader-pleads-guilty-in-phone-fraud/56e551bb-a727-43e8-a3ca-1c1f4cf6ef82/ https://www.justice.gov/sites/default/files/usao/legacy/2010/10/12/usab4304.pdf https://www.eurogamer.net/nintendo-to-appeal-not-guilty-judgement-of-flash-cart-sellers-7 https://www.gamesindustry.biz/nintendo-pounces-on-global-piracy-outfit https://www.justice.gov/opa/pr/two-members-notorious-videogame-piracy-group-team-xecuter-custody https://medium.com/swlh/watch-paint-dry-how-i-got-a-game-on-the-steam-store-without-anyone-from-valve-ever-looking-at-it-2e476858c753#.z05q2nykc https://www.lemonde.fr/police-justice/article/2022/05/27/voler-des-societes-qui-font-des-milliards-qu-est-ce-que-j-en-ai-a-faire-max-louarn-c-ur-de-hackeur_6127821_1653578.html https://www.theverge.com/2020/11/20/21579392/nintendo-big-house-super-smash-bros-melee-tournament-slippi-cease-desist https://www.youtube.com/watch?v=U7VwtOrwceo https://www.youtube.com/watch?v=5sNIE5anpik Learn more about your ad choices. Visit podcastchoices.com/adchoices

CFO Thought Leader
919: Adopting a Broader View | Chris Kramer, CFO, Axonius

CFO Thought Leader

Play Episode Listen Later Jul 26, 2023 37:19


Among the different career highlights that Chris Kramer shares with us, perhaps none is as memorable as what might be called his “Indiana Jones moment.” Having distinguished himself as a “technical accountant” during the first half of his career, Kramer was often dispatched to observe and scrutinize the accounting practices of prospective acquisition targets in foreign lands—a succession of deployments that led him to frequently encounter unexpected circumstances. Such was the case one time in the mid-2000s, when he entered the UK corporate offices of an acquisition prospect and found himself casting his eyes upon something that he “had never seen before.” Somehow, in doing his due diligence, Kramer had found a big bound book: a company ledger.  Given that few details populate this ledger tale, we'll assume that he may have been engaged in some polite conversation with the UK office's accounting team when it occurred to him that he needed a network login code. This request led to one UK accountant subsequently winking at another, who from what seemed like out of nowhere produced a large brown volume—or perhaps it was black, or maybe blue, and perhaps the company was mostly using QuickBooks but had relied on bound ledgers prior to 2004. Kramer doesn't tell us. However, the words that he uses to illustrate his “find” arguably echo the tone and sentiments of an archaeologist making a heroic discovery.  “It was incredible—a physical ledger, which I then had to ‘translate' before taking it back to corporate!,” exclaims Kramer, whose depth of technical accounting knowledge and range of M&A experiences had made him an invaluable asset for deal-minded CFOs. However, Kramer tells us, he would have appreciated having a broader view of finance earlier in his career, which would have allowed him to see beyond accounting and position himself to acquire more acumen across different finance disciplines such as IR and FP&A. “I was very far down the accounting track in the realm of chief accounting officers before I began speaking to CFOs and CFO recruiters and spending time inside these other disciplines,” reports Kramer, who tells us that his deliberate push to acquire a wider view of finance didn't always feel like an upward climb. He continues: “I went from having this massive team as a chief accounting officer to being an SVP of FP&A with only a fraction of the number of people who previously reported to me.” –Jack Sweeney

Remarkable Marketing
Nike: B2B Marketing Lessons from Lauren Fleshman's Visionary “Objectify Me” Campaign with Kaite Rosa, Senior Director of Brand at Axonius

Remarkable Marketing

Play Episode Listen Later Jul 20, 2023 37:48


We're willing to bet that you're working on a new B2B campaign and require some new inspiration.Because all B2B tech ads look and sound the same. They just melt into one shapeless, forgettable jumble of fingers typing and screens scrolling. But we see you plodding along in the B2B marketing marathon of sameness, and we're throwing you some jet-boosted sneakers.On this episode of Remarkable, we're daring you to do the exact opposite of your competitors, to outsource the authenticity of your brand voice to your customers, and much, much more. And we're doing that with the help of our special guest, Senior Director of Brand at Axonius, Kaite Rosa. Together, we're exploring the iconic and visionary 2007 Nike ad campaign featuring pro runner Lauren Fleshman. We look at how the ad deviated from the “tasteful nude” status quo of female athletes in ads, dismantled the objectification of women in sports, and promoted inclusivity by leveraging Lauren's voice. And how you too can subvert expectations, make a statement, and do it authentically. So lace up your new sneaks and get ready to redefine B2B ads on the latest episode of Remarkable.About Nike's “Objectify Me” CampaignNike's “Objectify Me” campaign was a 2007 ad featuring pro runner Lauren Fleshman. It's a 30-second black and white slow mo video of Lauren running toward the camera. And we hear Lauren's voice. She says, “Look at me, study me, understand me. I'm not a small, pink version of a man. Don't give me small, pink versions of a man's running shoe. I'm Lauren Fleshman. I'm a runner, and I'm a woman.” Then it shows her running out of frame, and the Nike logo pops up on screen. It's a really understated Nike ad that deviated FAR from its predecessors.Lauren is a decorated distance runner. She won five NCAA championships at Stanford and two national championships as a professional athlete. She's also a writer, having been featured in The New York Times and Runner's World. Lauren is now Brand Strategy Advisor for fitness apparel company Oiselle, and Co-Founder of natural food company Picky Bars. Her book Good For a Girl: A Woman Running in a Man's World came out in January 2023.About our guest, Kaite RosaKaite Rosa is Senior Director of Brand at Axonius, where she leads the team responsible for creating a $2.6 billion brand in less than five years. Cited as one of the fastest-growing cybersecurity brands in history, Axonius has been named one of the most valuable private cloud companies in the world by the Forbes Cloud 100, along with numerous industry accolades.A life-long writer, she is passionate about using storytelling and creative concepts to define and build exceptional brand experiences. She has spent the bulk of her career at tech startups, and thrives on rapidly growing, fast-paced teams. Previously, she led brand and content at Payfactors, Virgin Pulse, and VentureFizz.What B2B Companies Can Learn From Nike's “Objectify Me” Campaign: Do the opposite of what's expected. Look at what other companies in your space are doing in their campaigns and make a campaign based on the antithesis of that. Be the rebel in your industry. Subvert the expected. Kaite says so many brands feel like they have to join in on what's popular or trending. She says, “There's a lot of, like, ‘Me too,' right? Like, they're gonna copy it and try to make it their own, and look very similar. But what inspires me the most is looking at what your competitors are doing and doing the exact opposite.” It's like how Lauren Fleshman was presented with a briefing inspired by Brandi Chastain's “tasteful nude” ad, and advocated instead to be in her athletic gear and to write the ad copy herself. She turned the copy on its head, saying that if she was going to be objectified, it would be to design running gear specific to her physiology. And the campaign became iconic.Outsource authenticity to your customers. Make your customer's voice your brand voice. Ian says marketers always want to control the narrative, but sometimes you need to let your customers take the wheel. Because he says that when you ask customers to talk about your brand in their own words, “They come up with something absolutely brilliant that you could never have written.” And how could that not be authentic? Nike was able to outsource the authenticity piece of Lauren's ad because Lauren wrote the copy herself. For sure, there was a layer of brand approval, but the words are Lauren's. So outsource the authenticity piece of your ad copy to customers, and it will resonate.Quotes*”Whether you're working in a bootstrapped company or publicly funded company. any budget can accommodate your customer voice.” - Kaite Rosa*”If you're doing a high-level brand campaign, the approach shouldn't be, ‘Let's sell you all the features and benefits.' It should be, ‘Let's get you in the store. Let's get you remembering who we are so that the next time you need those new sneakers or you need a B2B SaaS solution,  you remember the ad.'” - Kaite Rosa*”What is memorable and where storytelling really comes alive is when you look at what's out there and say, ‘We're gonna do something that is disruptive, that is different. And I think that you can do that on any budget.” - Kaite Rosa*“People latch on to the authenticity of brands. That's what drives you emotionally to a brand, is that it feels authentic. It resonates with you. And I think living and breathing your values in everything you do, if you're at a company with a culture that encourages that, that ties your values into everything you do, it comes naturally. Good marketing and good brands tap into those values.” - Kaite RosaTime Stamps[1:37] Get to know Kaite Rosa, Senior Director of Brand at Axonius[2:14] Tell me more about Nike's “Objectify Me” campaign[8:04] About athletic advertising before Lauren Fleshman's campaign[12:23] About the timelessness of the “Objectify Me” ad[14:23] Why challenging the status quo is important[23:27] How to ground your message in values[24:53] What does Axonius do?[25:42] What's Axonius' brand strategy?[26:41] How does Kaite think about the ROI of content marketing?[27:14] Learn more about Axonius' “Controlling Complexity” campaign with gymnast Simone BilesLinksSee Nike's Objectify Me ad with Lauren FleshmanConnect with Kaite Rosa on LinkedInLearn more about AxoniusCheck out the Axonius campaign with Simone BilesAbout Remarkable!Remarkable! is created by the team at Caspian Studios, the premier B2B Podcast-as-a-Service company. Caspian creates both non-fiction and fiction series for B2B companies. If you want a fiction series check out our new offering - The Business Thriller - Hollywood style storytelling for B2B. Learn more at CaspianStudios.com. In today's episode, you heard from Ian Faison (CEO of Caspian Studios), Dane Eckerle (Head of Development), Colin Stamps (Podcast Launch Manager), Anagha Das (B2B Content Marketing Manager), and Meredith O'Neil (Senior Producer). Remarkable was produced this week by Meredith O'Neil, mixed by Scott Goodrich, and our theme song is “Solomon” by FALAK. Create something remarkable. Rise above the noise.

Darknet Diaries
135: The D.R. Incident

Darknet Diaries

Play Episode Listen Later Jul 4, 2023 44:38


Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks us through what happened and the incident response procedures that he went through. Breakmaster Cylinder's new album: https://breakmastercylinder.bandcamp.com/album/the-moon-all-that. Sponsors Support for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Flare. Flare automates monitoring across the dark & clear web to detect high-risk exposure, before threat actors have a chance to leverage it. Their unified solution makes it easy to rapidly identify risks across thousands of sources, including developers leaking secrets on public GitHub Repositories, threat actors selling infected devices on dark web markets, and targeted attacks being planned on illicit Telegram Channels. Visit https://flare.io to learn more. Sources https://www.wired.com/story/costa-rica-ransomware-conti/ https://malpedia.caad.fkie.fraunhofer.de/details/win.bandook https://www.youtube.com/watch?v=QHYH0U66K5Q https://www.youtube.com/live/prCr7Z94078 https://www.eff.org/deeplinks/2023/02/uncle-sow-dark-caracal-latin-america https://www.bleepingcomputer.com/news/security/quantum-ransomware-attack-disrupts-govt-agency-in-dominican-republic/ https://www.welivesecurity.com/2021/07/07/bandidos-at-large-spying-campaign-latin-america/ Attribution Darknet Diaries is created by Jack Rhysider. Assembled by Tristan Ledger. Episode artwork by odibagas. Mixing by Proximity Sound. Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify. Learn more about your ad choices. Visit podcastchoices.com/adchoices

The Conference Room with Simon Lader
Ep 111 - "From Startup to Sensation: Axonius's Marketing Secrets to Hypergrowth Success" - with Nathan Burke

The Conference Room with Simon Lader

Play Episode Listen Later Jul 3, 2023 37:05


In this week's episode we explore the exceptional journey of marketing visionary Nathan Burke, Chief Marketing Officer of Axonius and discover how his unrivaled expertise is transforming the cybersecurity landscape. Join us as we delve into his remarkable contributions, shaping the future of digital security. Key Takeaways From This Episode The importance of differentiation in marketing and emphasizes the need to focus on non-commodity markets. The significance of storytelling and emotional ties in marketing campaigns, using examples of human-centric approaches in cybersecurity. The challenges of marketing products in ill-defined markets and strategies such as defining the problem, quantifying the value, and creating a compelling case. The importance of having a great product before developing the marketing story and engaging in demand generation activities. Start with early conversations to validate the approach, building thought leadership content, and adapting the narrative based on audience feedback to ensure effective marketing communication. THIS WEEK'S GUEST - NATHAN BURKE Nathan Burke is the Chief Marketing Officer behind Axonius' remarkable ascent in the cybersecurity industry. With his strategic prowess, Nathan has propelled this high-growth security vendor to new heights, leading their global marketing efforts. Drawing from his extensive experience in scaling technology companies like Hexadite (acquired by Microsoft), Intralinks, and Cloudlock, Nathan has become a sought-after leader in international marketing. His expertise has been instrumental in driving growth and maximizing visibility for these renowned organizations. A distinguished graduate of Northeastern University, Nathan recently made headlines for securing Axonius's sponsorship of Olympic gold medalist Simone Biles. This remarkable achievement further exemplifies his ability to forge strategic partnerships and capture the attention of the world. YOUR HOST - SIMON LADER Simon Lader is the host of The Conference Room, Co-Founder of global executive search firm Salisi Human Capital, and podcast growth consultancy Viva Podcasts. Since 1997, Simon has helped cybersecurity vendors to build highly effective teams, and since 2022 he has helped people make money from podcasting. Get to know more about Simon at: Website: https://simonlader.com/ Make Money from Podcasting: https://www.vivapodcasts.com/podcastpowerups Twitter: https://twitter.com/simonlader LinkedIn: https://www.linkedin.com/in/headhuntersimonlader The Conference Room is available on Spotify Apple Podcasts: Amazon Music: iHeartRadio And everywhere else you listen to podcasts!

Marketing Today with Alan Hart
364: Building Authentic Connections with a Skeptical Audience with Nate Burke, Chief Marketing Officer at Axonius

Marketing Today with Alan Hart

Play Episode Listen Later May 17, 2023 40:58


Nate Burke is the Chief Marketing Officer at cybersecurity solution provider Axonius. Axonius is Nate's fifth startup and his third in cybersecurity. He was Axonius' first US employee, starting before they had a product, which allowed him to develop relationships and lean into the "solve, don't sell" mindset that really sets Axonius apart. Nate wanted to join a company that was simply solving a big problem that was getting worse and where he loved the founders. He found his perfect fit at Axonius and is now working to deliver on their promise of "controlling complexity."In this episode, Alan and Nate discuss Nate's approach to marketing to one of the most skeptical audiences ever, cybersecurity professionals, and how Axonius is doing it differently. Axonius tackles one of the most fundamental problems in cybersecurity: understanding what businesses have. They aim to be the system of record for all the digital infrastructure in a company and refuse to use FUD (fear, uncertainty, and doubt) to market to their clients. Although that is the typical cybersecurity marketing play, Nate and Axonius understand that no one likes buying based on fear, so they choose to lean into the novelty of honesty and delivering on their promises to stand out and build trust with their skeptical audience. In addition, they focus on building relationships with collaborators like Olympian Simone Biles and cross-fit athlete Amy Bream to differentiate themselves in the market.In this episode, you'll learn:How to build trust with a skeptical audienceWhat makes a great salesperson?How Axonius is subverting the marketing norms in their industry Key Highlights [01:40] RSA Tattoo Story[04:40] How Nate became CMO at Axonius[06:20] Why Nate left the marketing program in college[09:00] What does Axonius do?[11:40] Why the fundamentals are so complicated[13:00] How to approach marketing to the most skeptical audience[16:00] Where cybersecurity marketers fall short[16:55] The benefits of joining Axonius early[18:00] Solve, don't sell.[21:20] The opposite marketing approach Axonius is taking[23:50] How Simone Biles and Amy Bream embody "controlling complexity"[27:15] The importance of emotional appeal in B2B marketing[29:45] Trust based on integrity[31:15] It's amazing what you can accomplish when you ask for help.[34:05] What AI really means for marketing right now[37:20] Brands to watch[39:05] The opportunity to be unique and honest Resources Mentioned: Nathan “Nate” Burke Axonius Controlling Complexity: Adaptation Campaign Axonius Content Simone Biles Amy Bream Friends of the Children (cause supported by campaign) Brands mentioned: Peloton RSA Conference Hosted on Acast. See acast.com/privacy for more information.

Paul's Security Weekly TV
Prioritizing Business Needs over Tools for Cost-Effective Protection - Lenny Zeltser, Mayeuresh Ektare - BSW #306

Paul's Security Weekly TV

Play Episode Listen Later May 16, 2023 32:35


Cybersecurity teams today are inundated with tools that provide an abundance of alerts and data about threats, gaps, vulnerabilities and everything in between. While security tools are critical to operating a cybersecurity program and produce helpful data, they should never dictate an organization's cybersecurity strategy. Instead, Amad Fida, CEO & Founder of Brinqa, explains why business priorities should be the foundation for any company's cybersecurity strategy. This segment is sponsored by Axonius. Visit https://securityweekly.com/axoniusrsac to learn more about them!   Economic uncertainty has forced IT and security leaders to be more cautious than ever when increasing spending and team size. Suh dynamics give CISOs and CIOs an opportunity to demonstrate value by going beyond “merely” defending the organization from threats. We can contribute toward the organization's efforts to constrain costs by looking inward at existing tools and assets to understand deployment, usage, and value. We can do this by ensuring the company is making the most of what it already has – and eliminating the spend that's not being utilized in the most effective way. This segment is sponsored by Brinqa. Visit https://securityweekly.com/brinqarsac to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw306 

Paul's Security Weekly
BSW #306 - Mayeuresh Ektare, Molly McLain Sterling, Lenny Zeltser

Paul's Security Weekly

Play Episode Listen Later May 15, 2023 63:10


Medtronic's Security Ambassador program has seen tremendous growth and engagement in recent years. Learn how they gave their program a shot of adrenaline and haven't looked back since.   Cybersecurity teams today are inundated with tools that provide an abundance of alerts and data about threats, gaps, vulnerabilities and everything in between. While security tools are critical to operating a cybersecurity program and produce helpful data, they should never dictate an organization's cybersecurity strategy. Instead, Amad Fida, CEO & Founder of Brinqa, explains why business priorities should be the foundation for any company's cybersecurity strategy. This segment is sponsored by Axonius. Visit https://securityweekly.com/axoniusrsac to learn more about them!   Economic uncertainty has forced IT and security leaders to be more cautious than ever when increasing spending and team size. Suh dynamics give CISOs and CIOs an opportunity to demonstrate value by going beyond “merely” defending the organization from threats. We can contribute toward the organization's efforts to constrain costs by looking inward at existing tools and assets to understand deployment, usage, and value. We can do this by ensuring the company is making the most of what it already has – and eliminating the spend that's not being utilized in the most effective way. This segment is sponsored by Brinqa. Visit https://securityweekly.com/brinqarsac to learn more about them!   Visit https://www.securityweekly.com/bsw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/bsw306 

Bite Size Sales
215: Building a Successful Sales Team with Nick Degnan, SVP Global Sales at Axonius

Bite Size Sales

Play Episode Listen Later May 11, 2023 50:10 Transcription Available


215: Attention all sales leaders who want to build a cohesive team! Have you been misled by these popular myths about building a cohesive sales team through communication and collaboration? Myth #1: A team that agrees on everything is the most cohesive. Myth #2: Communication alone is enough to build a cohesive team. Myth #3: Collaboration should be done solely within the sales team. But don't worry, Nick Degnan is here to set the record straight and reveal the truth about building a truly cohesive sales team.In this episode, you will be able to:Unearth the significant impact of a thriving company culture on sales triumph.Delve into the art of assembling a unified sales team with clear communication and teamwork.Understand the significance of adopting a long-term outlook in crafting a winning sales career.Realize why ethics and respectful treatment of customers are essential in the sales world.Conquer the obstacles of accelerated company expansion and develop organizational resilience.My special guest is Nick Degnan, a seasoned sales leader with a wealth of experience in building and managing successful sales teams. Throughout his 17-year career, Nick has worked with tech giants like EMC, Pure Storage, and Tanium, honing his sales strategy and team management expertise. As the current SVP of Global Sales at Axonius, Nick is deeply committed to fostering a collaborative and communicative environment to support a high-performing sales team. His insights on building cohesiveness and driving results have made him a go-to resource for sales managersThe resources mentioned in this episode are:Visit salesbluebird.com/research to learn more about the IT Harvest cybersecurity platform.Check out Axonius for world-class technology that solves real-world problems.Join the team at Axonius, surrounded by good people who work hard and value excellence.Connect with Nick Degnan on LinkedIn to stay up-to-date on his latest insights and experiences.Subscribe to the Sales Bluebird podcast for more tips and strategies on growing sales in the cybersecurity industry.Nick Degnan on LinkedInAxonius websiteSupport the show

Business of Cyber
BoC #65: Early Stage Investing | Michael Cortez at YL Ventures

Business of Cyber

Play Episode Listen Later Apr 28, 2023 47:35


Michael Cortez is a Partner at YL Ventures. YL manages over $800m and focuses exclusively on cybersecurity investments. YL's invested in leading cyber companies like Orca, Hunters, Grip, Valence, Axonius, and Twistlock.

Hacker Valley Studio
Mastering Focus with Simone Biles and Amy Bream at RSA

Hacker Valley Studio

Play Episode Listen Later Apr 11, 2023 35:39


RSA is right around the corner and we're so excited because it's one of our big opportunities to meet with you, our dedicated listener. If you want to catch up with the Hacker Valley Team be sure to jump into our discord. You can join by going to hackervalley.com/discord   Impactful Moments: 00:00 - Intro 01:24 - Introducing Amy Bream & Simone Biles 02:50 - What's it like being at a cybersecurity conference? 04:20 - Persevering through adversity 05:28 - Consistency — according to Amy & Simone 07:20 - How to overcome imposter syndrome 10:15 - Advice on handling burnout 11:53 - Focus and goal planning 15:09 - Authenticity and staying true to yourself 17:07 - The Axonius partnership — the bridge between athletes and technologists 19:42 - Staying focused in high-intensity environments 22:45 - Simone Biles, as a “person” 24:23 - The mind/body connection 26:55 - Mastering the basics 31:11 - What does legacy mean to you?   Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

Founder Storiez
Value based leadership | Nurit Shiber Chief people officer Axonius | How to live by your values

Founder Storiez

Play Episode Listen Later Mar 30, 2023 43:29


Conversation with Nurit Shiber, Chief People Officer at Axonius.  

Remarkable Marketing
Ryan Reynolds: How to Make Your CEO Your Spokesperson

Remarkable Marketing

Play Episode Listen Later Mar 16, 2023 46:06


Humanizing your brand is one of the most difficult challenges in marketing.But there's a proven solution to getting people to associate your business with more than just its logo: a spokesperson.A spokesperson is the voice and face of your company. It can't just be anybody. You need someone with a trusted voice. Someone who can speak about your product with authenticity. Someone who can talk to your customers in the language they use. And it doesn't have if that someone is a little charming, too.This week, we're taking lessons from comedic actor and entrepreneur Ryan Reynolds, who has become the face of his own brands like Aviation Gin and Mint Mobile. Here to help us is SaaS SEO thought leader Liam Barnes, Head of Demand Generation and Programs at Bionic, an application security posture management platform. With Ryan and Liam by our side, we're showing you how to choose an effective spokesperson, why hiring a celebrity isn't so far out of reach, and why you shouldn't gatekeep your content.About Ryan ReynoldsRyan Reynolds is a Canadian-American actor, producer, and entrepreneur whose career took off after he starred in National Lampoon's Van Wilder. He's also starred in Waiting, Adventureland, Free Guy, and the Deadpool franchise.Ryan's track record as an entrepreneur may be even more impressive than his work in film. Three businesses he has either invested in or owns have sold for incredibly impressive figures: Aviation Gin ($610 million), Mint Mobile ($1.35 billion), and film production and digital advertising agency Maximum Effort (undisclosed). He also has financial interests in the Wrexham Association Football Club, 1password, and Wealthsimple.What B2B Companies Can Learn From Ryan Reynolds:Choose an in-house evangelist for your brand. There's no one who knows your product better than someone who lives and breathes it on a daily basis. Your ideal evangelist is someone who can vouch for your product and speak the language of your customers – and has a stake in the business's success. Ryan Reynolds is not only the owner of Mint Mobile, but also the company's in-house evangelist. He has the authority, investment, and understanding of the product to share the benefits of becoming a customer. And because one of Mint Mobile's values is that they're cheap, he highlights it by, for example, featuring his family in the ads as “barely paid spokespeople.” Chances are that you already have some great brand evangelists in your B2B company. This could be a CXO with a strong social media presence who's established as a thought leader in your industry, someone on your product team who is consistently engaging with your community in popular forums, or even the new hire who's documenting their journey at your company.Hire a celebrity to be your company spokesperson. We love internal brand evangelists. But we also love influencer marketing, and what's hot right now? Getting a celebrity to be the face of your brand. They're more accessible than you think. Partnerships come at a range of price points, and you don't need a mega A-lister to make a big impact. According to an article in the Journal of Advertising Research, celebrity endorsements can increase a company's sales by an average of 4%. Ping Identity hired actor and athlete Terry Crews to be their “chief identity champion” for a brand awareness campaign that launched in October 2020. According to Ping Identity CMO Kevin Sellers, the company's website traffic increased 1000 percent after the launch of the campaign. So dig deep into your brand's voice and mission and find a celebrity or influencer who can embody your brand. The results speak for themselves! Bonus points if they bring a little humor into it!Make your content accessible. Distribution is key! There is a lot of great B2B content out there – but too often, companies limit their audience by gatekeeping their content. With his businesses, Reynolds takes a different approach. His businesses don't spend heavily on advertising, but the ads they do create are funny, engaging, and accessible to everyone. The ads often go viral, further expanding their reach. (If you want to see a textbook example of what we're talking about, check out this Mint Mobile ad!) And while we understand that not all B2B content can be a quirky one-minute advertisement, the key here is simple: unlock the gate. Don't keep your best ideas in an email newsletter or in a hotel conference room. You're limiting your audience when you do.Key Quotes*“He has this sense of ownership and everything is tongue in cheek. When we're buying his stuff, we're buying a little bit of Ryan. He vouched for it. And it's just really novel, how he productizes himself. A gin is just a gin. But when Ryan Reynolds is behind it, now it means something more.” - Ian Faison*”It's important to surround yourself with good people who are very good at their job. And with Ryan Reynolds, he has George Dewey as his business partner, who is that creative genius, that ad genius. He understands marketing, he understands culture, he understands people.” - Ian Faison*”It's important to have someone who is likable, charismatic and engaging as the spokesperson. Someone who's very close and tied and invested into the company driving the story and driving the thought leadership of the company. Especially in security, we have a really hard time getting founders, getting evangelists, getting technical people to want to push the story forward. And it's because they just don't have that advertising expertise, the marketing expertise. They're engineers, they're not writers. And if they were writers, they were like research-based writers, so the creativity side of it was lost. And so it's important to do both things. Partner the front running technical people in your company with solid marketers, and help them push the narrative forward. - Liam Barnes *”Something that Ryan Reynolds understands is the distribution of the content that he's creating. He could definitely go and headline user conferences or go and do features where he goes and shows up at certain places where people ask him questions and pay attention to him for an hour. But then there's nothing after that. And something that companies get really wrong is they put all this time and energy into a user conference and then they gate it. They put it behind this paywall, or they make you give your information to them and then nobody sees it after the conference…Honestly, what most people would react more positively to is, go ahead and have the user conference, then go spend time distributing the content correctly. It's just something that's a completely missed opportunity. It's an interesting kind of dynamic that you see a lot in b2b, where everything's gated and nobody has access, and they're wondering why they're not getting the returns from it. It's because nobody ends up actually seeing it.” - Liam Barnes“To make your ads better, make the creative more memorable and funnier. And then just put a little bit of that marketing engine behind it, retargeting and AB testing, and all the stuff that we have at our disposal to supercharge that really good creative. Because at the end of the day, if you're just promoting bad creative and boring creative, it's never going to get legs.” - Ian Faison“It's less about trying to make your chosen spokesperson charismatic. It's more about trying to make that person relatable to who we're selling to. So our CEO and CTO are engineers and security folks. And we're selling to engineering and security folks. So I don't have to make them the most charismatic people. I just have to make them relatable. They have shared experiences with those people. They've been in security before, they've been through writing code and building systems and doing DevOps and running security teams, and doing the security research. And so just talking about those personal experiences and relating it to what those teams are going through. That's all you really need.” - Liam BarnesTime Stamps[1:31] Introducing Liam Barnes, Head of Demand Generation and Programs at Bionic[2:13] What's Bionic?[4:05] Who's Ryan Reynolds?[5:55] What makes Ryan Reynolds an effective spokesperson?[12:14] How did Ryan Reynolds become a marketing powerhouse?[18:50] What can we learn about B2B marketing from Ryan Reynolds?[23:54] How can B2B companies use celebrity spokespeople?[36:22] How can companies make their CEO an effective spokesperson?LinksListen to Demand Gen Visionaries with Liam BarnesTune in to Everyday Demand Gen with Liam BarnesSee the Axonius x Simone Biles adCheck out IBM Watson's collaboration with fashion designer Gaurav GuptaTake a look at Microsoft's collab with National Geographic in their “Make What's Next” initiative Create your own business thriller starring an A-list celebritySee Coinbase's $7M Superbowl ad that got people talkingAbout Remarkable!Remarkable! is created by the team at Caspian Studios, the premier B2B Podcast-as-a-Service company. Caspian creates both non-fiction and fiction series for B2B companies. If you want a fiction series check out our new offering - The Business Thriller - Hollywood style storytelling for B2B. Learn more at CaspianStudios.com. In today's episode, you heard from Ian Faison (CEO of Caspian Studios), Dane Eckerle (Head of Development), Colin Stamps (Podcast Launch Manager), Anagha Das (B2B Content Marketing Manager), and Meredith O'Neil (Senior Producer). Remarkable was produced this week by Meredith O'Neil, mixed by Scott Goodrich, and our theme song is “Solomon” by FALAK. Create something remarkable. Rise above the noise.

Darknet Diaries
131: Welcome to Video

Darknet Diaries

Play Episode Listen Later Dec 27, 2022 70:26 Very Popular


Andy Greenberg (https://twitter.com/a_greenberg) brings us a gut wrenching story of how criminal investigators used bitcoin tracing techniques to try to find out who was at the center of a child sexual abuse darkweb website. This story is part of Andy's new book “Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency”. An affiliate link to the book on Amazon is here: https://amzn.to/3VkjSh7. Sponsors Support for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Learn more about your ad choices. Visit podcastchoices.com/adchoices

The Cyber Ranch Podcast
Can We Even Measure Risk? with Andy Ellis and Chris Roberts - EXPLICIT

The Cyber Ranch Podcast

Play Episode Listen Later Dec 14, 2022 36:20


This is another "'E' for explicit" show as this one is another LIVE! show from the CISO XC conference in Dallas-Fort Worth. Why the 'E'?  Because halfway through Allan Alford's conversation with Andy Ellis (CISO at Orca, Operating Partner at YL Ventures, former CISO at Akamai), Chris Roberts (CISO at Boom Supersonic) joins the stage with some fine whisky and his own clever takes on measuring risk. Join Allan, Andy, and Chris as they deconstruct risk, extolling its virtues, and hopefully change the way you think about risk altogether. Is likelihood times impact valid? Is the 5x5 grid valid? What is plausibility vs. probability? Find out on this great LIVE! episode! Sponsor Links: Thank you to our sponsor Axonius for bringing this episode to life! The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley  

Darknet Diaries
128: Gollumfun (Part 1)

Darknet Diaries

Play Episode Listen Later Nov 15, 2022 63:07


Brett Johnson, AKA Gollumfun (twitter.com/GOllumfun) was involved with the websites Counterfeit Library and Shadow Crew. He tells his story of what happened there and some of the crimes he committed. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer.

Darknet Diaries
125: Jeremiah

Darknet Diaries

Play Episode Listen Later Oct 4, 2022 51:21 Very Popular


Jeremiah Roe is a seasoned penetration tester. In this episode he tells us about a time when he had to break into a building to prove it wasn't as secure as the company thought. You can catch more of Jeremiah on the We're In podcast. Sponsors Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Snyk. Snyk is a developer security platform that helps you secure your applications from the start. It automatically scans your code, dependencies, containers, and cloud infrastructure configs — finding and fixing vulnerabilities in real time. Create your free account at snyk.co/darknet.

Darknet Diaries
124: Synthetic Remittance

Darknet Diaries

Play Episode Listen Later Sep 20, 2022 20:03 Very Popular


What do you get when you combine social engineering, email, crime, finance, and the money stream flowing through big tech? Evaldas Rimašauskas comes to mind. He combined all these to make his big move. A whale of a move. Sponsors Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer. Support for this show comes from Axonius. The Axonius solution correlates asset data from your existing IT and security solutions to provide an always up-to-date inventory of all devices, users, cloud instances, and SaaS apps, so you can easily identify coverage gaps and automate response actions. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free.

Darknet Diaries
122: Lisa

Darknet Diaries

Play Episode Listen Later Aug 23, 2022 52:26 Very Popular


In this episode we hear some insider threat stories from Lisa Forte. Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Snyk. Snyk is a developer security platform that helps you secure your applications from the start. It automatically scans your code, dependencies, containers, and cloud infrastructure configs — finding and fixing vulnerabilities in real time. Create your free account at snyk.co/darknet. Attribution Darknet Diaries is created by Jack Rhysider. Editing by Damienne. Assembled by Tristan Ledger. Sound designed by Andrew Meriwether. Episode artwork by odibagas. Mixing by Proximity Sound. Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify.

Darknet Diaries
121: Ed

Darknet Diaries

Play Episode Listen Later Jul 26, 2022 44:56 Very Popular


In this episode we hear some penetration test stories from Ed Skoudis (twitter.com/edskoudis). We also catch up with Beau Woods (twitter.com/beauwoods) from I am The Cavalry (iamthecavalry.org). Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Zscalar. Zscalar zero trust exchange will scrutinize the traffic and permit or deny traffic based on a set of rules. This is so much more secure than letting data flow freely internally. And it really does mitigate ransomware outbreaks. The Zscaler Zero Trust Exchange gives YOU confidence in your security to feel empowered to focus on other parts of your business, like digital transformation, growth, and innovation. Check out the product at zscaler.com/darknet. Support for this podcast comes from Cybereason. Cybereason reverses the attacker's advantage and puts the power back in the defender's hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet. View all active sponsors. Attribution Darknet Diaries is created by Jack Rhysider. Editing by Damienne. Assembled by Tristan Ledger. Sound designed by Andrew Meriwether. Episode artwork by odibagas. Audio cleanup by Proximity Sound. Theme music created by Breakmaster Cylinder. 

Darknet Diaries
119: Hot Wallets

Darknet Diaries

Play Episode Listen Later Jun 14, 2022 59:32 Very Popular


In this episode we interview journalist Geoff White to discuss some of the recent crypto currency heists that have been happening recently. Geoff has been tracking a certain group of thieves for some time and shares his knowledge of what he's found. Much of what we talk about in this episode has been published in Geoff's new book The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War (https://amzn.to/3mKf1qB). Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. axonius.com/darknet Support for this show comes from Thinkst Canary. Their canaries attract malicious actors in your network and then send you an alert if someone tries to access them. Great early warning system for knowing when someone is snooping around where they shouldn't be. Check them out at https://canary.tools.

Darknet Diaries
118: Hot Swaps

Darknet Diaries

Play Episode Listen Later May 31, 2022 88:28 Very Popular


This is the story of Joseph Harris (https://twitter.com/akad0c). When he was a young teen he got involved with stealing video game accounts and selling them for money. This set him on a course where he flew higher and higher until he got burned. Joseph sometimes demonstrates vulnerabilities he finds on his YouTube channel https://www.youtube.com/channel/UCdcuF5Zx6BiYmwnS-CiRAng. Listen to episode 112 “Dirty Coms” to hear more about what goes on in the communities Joseph was involed with. Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Support for this show comes from Synack. Synack is a penetration testing firm. But they also have a community of, people like you, who earn regular money by legally hacking. If you're interested in getting paid to hack, visit them now at synack.com/red-team, and click ‘apply now.'

Darknet Diaries
115: Player Cheater Developer Spy

Darknet Diaries

Play Episode Listen Later Apr 19, 2022 40:51 Very Popular


Some video game players buy cheats to win. Let's take a look at this game cheating industry to see who the players are. Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this podcast comes from Cybereason. Cybereason reverses the attacker's advantage and puts the power back in the defender's hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.

Darknet Diaries
113: Adam

Darknet Diaries

Play Episode Listen Later Mar 22, 2022 54:11 Very Popular


Adam got a job doing IT work at a learning academy. He liked it and was happy there and feeling part of the team. But a strange series of events took him in another direction, that definitely didn't make him happy. Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this podcast comes from Cybereason. Cybereason reverses the attacker's advantage and puts the power back in the defender's hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet. Support for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.