Podcasts about CrowdStrike

American cybersecurity technology company

  • 1,814PODCASTS
  • 3,905EPISODES
  • 40mAVG DURATION
  • 1DAILY NEW EPISODE
  • Nov 11, 2025LATEST
CrowdStrike

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about CrowdStrike

Show all podcasts related to crowdstrike

Latest podcast episodes about CrowdStrike

CISO-Security Vendor Relationship Podcast
Our CISO Certainly Puts the Tool in Multi-Tool (LIVE in LA)

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Nov 11, 2025 45:26


All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Jeff Steadman, deputy CISO, Corning Incorporated. Joining them is Quincey Collins, CSO, Sheppard Mullin. This episode was recorded live at the ISSA LA Summit in Santa Monica, California. In this episode:  The foundational debate Strength over breadth Beyond traditional backgrounds Keeping perspective on risk Huge thanks to our sponsors, Adaptive Security and Dropzone AI AI-powered social engineering threats like deepfake voice calls, GenAI phishing, and vishing attacks are evolving fast. Adaptive helps security leaders get ahead with an AI-native platform that simulates realistic genAI attacks, and delivers expert-vetted security awareness training — all in one unified solution. Learn more at adaptivesecurity.com. Dropzone AI autonomously investigates every security alert—no playbooks needed. This AI SOC analyst queries your CrowdStrike, Splunk, threat intel feeds, and 60+ other tools to build complete investigations in 5 minutes. Unlike black-box automation, it shows every query, finding, and decision. See it work yourself—explore the self-guided demo at dropzone.ai.

Run The Numbers
Guess That Name: Pop Star or SaaS Bro? | Mostly Growth

Run The Numbers

Play Episode Listen Later Nov 8, 2025 36:31


In this high-energy episode of Mostly Growth, CJ Gustafson, Kyle Poyar, and Ben Hillman dive into the hidden levers of SaaS growth and what truly separates startups that scale to $20M+ ARR from those that stall out. They explore eye-opening data from 6,500 companies, revealing how the best improve net retention, raise pricing, and re-engineer their revenue models over time. Alongside the metrics, there's plenty of playful chaos—like a naming debate over “Yoshinobu Yamamoto Gustafson,” a rapid-fire game of “Founder or Pop Star,” and CJ's accidental IPO embargo break. It's part insight, part inside joke, and 100% for SaaS operators and C-suite climbers.—LINKS:Mostly Metrics: https://www.mostlymetrics.comCJ on LinkedIn: https://www.linkedin.com/in/cj-gustafson-13140948/Growth Unhinged: https://www.growthunhinged.com/Kyle on LinkedIn: https://www.linkedin.com/in/kyle-poyar/Slacker Stuff: https://www.slackerstuff.com/Ben on LinkedIn: https://www.linkedin.com/in/slackerstuff/https://www.growthunhinged.com/p/the-compounding-startuphttps://www.growthunhinged.com/p/the-odds-of-making-ithttps://www.superme.ai/kylepoyar?conversationId=VgDXTOl2Z89mW7UYXstU0bhttps://a16z.com/anatomy-of-an-enterprise-platform-company/https://www.investopedia.com/terms/h/hhi.asphttps://navan.com/https://www.mostlymetrics.com/p/navan-ipo-s1-breakdownhttps://x.com/amendandpretend/status/1983588137453416763?s=46https://x.com/ryan_c_walsh/status/1983705182371475630?s=46https://www.reddit.com/r/TwinCities/comments/z6hxp8/how_much_are_people_paying_for_residential_snow/—RELATED EPISODES:Getting fired 4 times made me a founder | Sam Jacobs of Pavilionhttps://youtu.be/8X-JVOF-1A0Why Founders Are Posting Sad Dinnershttps://youtu.be/Zl6NSIHF2Gk—TIMESTAMPS:00:00:00 Preview and Intro00:01:55 Sponsors – Pulley & Metronome00:04:25 Dodgers Banter & Baby Naming00:05:38 Founder or Pop Star Game00:07:50 ChartMogul Data & Growth Levers00:08:30 Expansion, Upsell & Retention Discussion00:15:53 Testing Kyle's AI Avatar00:17:07 CJ's AI Self-Query & Beta Discussion00:18:04 AI Use Cases & Knowledge Retention00:22:03 Platform Debate & A16z Analysis00:24:29 Herfindahl-Hirschman Index Explained00:25:34 Platform Metrics & Valuation Upside00:26:48 CrowdStrike, Datadog & Multi-Product Expansion00:28:13 Core Systems of Record & AI's Impact00:29:49 Business Blunders – Navan IPO & Snowflake CRO00:34:07 Snow Removal Pricing & Insurance Logic00:35:56 Closing Remarks & Credits—SPONSORS:Metronome is real-time billing built for modern software companies. Metronome turns raw usage events into accurate invoices, gives customers bills they actually understand, and keeps finance, product, and engineering perfectly in sync. That's why category-defining companies like OpenAI and Anthropic trust Metronome to power usage-based pricing and enterprise contracts at scale. Focus on your product — not your billing. Learn more and get started at https://www.metronome.comPulley is the cap table management platform built for CFOs and finance leaders who need reliable, audit-ready data and intuitive workflows, without the hidden fees or unreliable support. Switch in as little as 5 days and get 25% off your first year: https://pulley.com/mostlymetrics—#MostlyGrowthPodcast #SaaSGrowth #StartupStrategy #B2BTech #RevenueRetention This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit cjgustafson.substack.com

Destination Linux
442: Is Tor Safe? The Big Security Questions w/ Sandfly CEO Craig Rowland

Destination Linux

Play Episode Listen Later Nov 7, 2025 82:10


Support the show by becoming a patron at tuxdigital.com/membership or get some swag at tuxdigital.com/store Hosted by: Ryan (DasGeek) = dasgeek.net Jill Bryant = jilllinuxgirl.com Chapters: 00:00:00 Intro 00:01:44 Community Feedback: New Linux User and Maya Issues 00:12:50 Ryan's New PC Build Update 00:16:18 SPECIAL Sponsor Ad w/ Q&A On Sandfly Security 00:22:50 Does TOR really keep you anonymous? 00:52:13 Nvidia & Crowdstrike Partner on open-source security ecosystem 01:08:30 Linux Kernel Flaw Under Active Exploit 01:19:40 Outro Special Guest: Craig Rowland CEO of Sandfly Special Guest: Craig Rowland.

The IT Pro Podcast
Inside a cloud outage

The IT Pro Podcast

Play Episode Listen Later Nov 7, 2025 29:55


The end of October was punctuated with a series of major cloud outages, first at AWS and then at Microsoft, bringing a wide range of websites and business applications offline.In the previous episode, we spoke about this in a reactive sense – the immediate customers impacted and the likely causes.But it's also important to break the problem down at a strategic and technical level. Just how do outages at this scale occur – and what's it like as an insider, fighting to bring services back online?In this episode Rory speaks to James Kretchmar, SVP & CTO of the cloud technology division at Akamai Technologies, to get an insider's perspective on cloud outages and how businesses can navigate these incidents.Read more:Amazon Web Services outage live: Hundreds of apps including Slack, mobile carriers, banking services downThe AWS outage brought much of the web to its knees: Here's how it happened, who it affected, and how much it might costThe Microsoft Azure outage explained: What happened, who was impacted, and what can we learn from it?Australia internet banking outage blamed on DDoS mitigation serviceWhy the CrowdStrike outage was a wakeup call for developer teams

Adversary Universe Podcast
Extortion Rises and Nation-State Activity Intensifies: The CrowdStrike 2025 European Threat Landscape Report

Adversary Universe Podcast

Play Episode Listen Later Nov 6, 2025 27:00


Europe is a prime target for global adversaries. There is a strong emphasis on eCrime across the region as well as a rise in hacktivism and espionage stemming from ongoing conflicts. The CrowdStrike 2025 European Threat Landscape Report breaks down these trends. In this episode, Adam and Cristian cover the highlights. They start with cybercrime, a major theme of the report. The five most targeted European nations were the U.K., Germany, Italy, France, and Spain, which also represent the region's largest economies (excluding Russia). The most targeted sectors were manufacturing, professional services, technology, industrials and engineering, and retail. Adam explains how eCrime threat actors are looking for victims with a high need to stay operational. “With manufacturing, if they're knocked offline because of ransomware, they can count the downtime in dollars and cents,” he shares as an example. On the nation-state front, Russia is top of mind. Since its invasion of Ukraine in 2022, many Russian threat actors who operated globally are more focused on Ukraine and areas related to the conflict. Adam and Cristian discuss reports of North Korean threat actors supporting the Russians with weapons and personnel, North Korea targeting Ukraine, and the tactics and techniques that stand out most. The European threat landscape is crowded and complex. Tune in to understand the key findings, and download the full report for more details. https://www.crowdstrike.com/en-us/resources/reports/2025-european-threat-landscape-report/

PolySécure Podcast
Teknik - La guerre Red Team vs EDR - l'aspect business et non technique du problème - Parce que... c'est l'épisode 0x657!

PolySécure Podcast

Play Episode Listen Later Nov 5, 2025


Parce que… c'est l'épisode 0x657! Shameless plug 8 et 9 novembre 2025 - DEATHcon 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2026 14 au 17 avril 2026 - Botconf 2026 28 et 29 avril 2026 - Cybereco Cyberconférence 2026 9 au 17 mai 2026 - NorthSec 2026 3 au 5 juin 2025 - SSTIC 2026 Description Introduction Ce podcast explore la relation complexe entre les équipes Red Team et les solutions EDR (Endpoint Detection and Response), en mettant l'accent sur les dimensions business plutôt que purement techniques. Charles F. Hamilton partage son expertise terrain sur l'évasion des EDR et démystifie la confiance aveugle que beaucoup placent dans ces solutions présentées comme magiques. La réalité des EDR : au-delà du marketing Les EDR sont souvent vendus comme des solutions universelles de protection, mais cette perception cache une réalité plus nuancée. Il existe plusieurs types de solutions (EDR, XDR, NDR) avec des capacités différentes, notamment au niveau de la télémétrie réseau et de l'enrichissement des données. L'industrie de la cybersécurité reste avant tout un business, où les décisions sont guidées par des considérations financières, de croissance et de parts de marché plutôt que uniquement par la protection des utilisateurs. Un aspect troublant est la romanticisation des groupes d'attaquants par certaines compagnies de détection, qui créent des figurines géantes et des noms accrocheurs pour ces groupes criminels lors de conférences. Cette approche marketing peut paradoxalement valoriser le crime et encourager de nouveaux acteurs malveillants. Fonctionnement technique des EDR Les EDR fonctionnent sur plusieurs niveaux de détection. D'abord, l'aspect antivirus traditionnel effectue une analyse statique avant l'exécution d'un binaire. Ensuite, la détection en temps réel utilise diverses techniques : le user mode hooking (de moins en moins populaire), les callbacks dans le kernel, et ETW (Event Tracing for Windows) qui capture de la télémétrie partout dans Windows. Les EDR modernes privilégient les callbacks kernel plutôt que le user mode, car le kernel offre une meilleure protection. Cependant, le risque est qu'une erreur dans le code kernel peut causer un écran bleu, comme l'a démontré l'incident CrowdStrike. Microsoft a également implémenté les PPL (Protected Process Light) pour empêcher même les utilisateurs avec privilèges système de tuer certains processus critiques. Un point crucial : les Red Teams sont souvent plus sophistiquées que les attaquants réels, précisément parce qu'elles doivent contourner les EDR dans leurs mandats. Techniques d'évasion : simplicité et adaptation Contrairement à ce qu'on pourrait croire, l'évasion d'EDR ne nécessite pas toujours des techniques extrêmement sophistiquées. Plusieurs approches simples fonctionnent encore remarquablement bien. Par exemple, modifier légèrement un outil comme PinkCastle en changeant les requêtes LDAP et en désactivant certaines fonctionnalités détectables (comme les tentatives de zone transfer DNS ou les requêtes SPN) peut le rendre indétectable. Un cas particulier intéressant concerne un EDR qui, suite à son acquisition par Broadcom, a cessé d'être signé par Microsoft. Cette décision business a rendu leur DLL incapable de s'injecter dans les processus utilisant le flag de chargement de DLL signées uniquement par Microsoft, rendant effectivement l'EDR sans valeur de détection. Une stratégie efficace consiste à désactiver la connectivité réseau des processus EDR avant toute manipulation, en utilisant le firewall local. Même si des alertes sont générées, elles ne peuvent pas être transmises au serveur. L'agent apparaît simplement offline temporairement. Les vieilles techniques qui fonctionnent encore De nombreuses techniques d'attaque anciennes restent efficaces car elles ne sont pas assez utilisées par les attaquants standard pour justifier leur détection. Les EDR se concentrent sur le “commodity malware” - les attaques volumétriques - plutôt que sur les techniques de niche utilisées principalement par les Red Teams. Charles cite l'exemple d'une “nouvelle backdoor” découverte en 2024 qui était en fait son propre code archivé sur GitHub depuis 8 ans. Pour les compagnies de sécurité, c'était nouveau car jamais vu dans leur environnement, illustrant le décalage entre ce qui existe et ce qui est détecté. L'importance de la simplicité Un conseil crucial : ne pas suivre les tendances en matière de malware. Les techniques à la mode comme le stack spoofing deviennent rapidement détectées. Charles utilise depuis 6-7 ans un agent simple en C# sans share code ni techniques exotiques, qui passe encore inaperçu. La simplicité et une approche différente sont souvent plus efficaces que la complexité. L'utilisation de Beacon Object Files (BOF) avec Cobalt Strike évite l'injection de processus, réduisant considérablement les artefacts détectables. Recommandations pratiques Pour les organisations, avoir un EDR est essentiel en 2025 pour bloquer les attaques triviales. Mais ce n'est qu'un début. Il faut absolument avoir au moins une personne qui examine les logs quotidiennement, idéalement trois fois par jour. De nombreux incidents de réponse montrent que toute l'information était disponible dans la console EDR, mais personne ne l'a regardée. La segmentation réseau reste sous-développée depuis 15 ans, principalement pour des raisons de complexité opérationnelle. Sysmon devrait être déployé partout avec une configuration appropriée pour augmenter exponentiellement la visibilité, malgré la courbe d'apprentissage XML. La visibilité réseau est ce qui manque le plus aux clients en 2025. Sans elle, il est impossible de valider ce que les EDR prétendent avoir bloqué. Charles donne l'exemple de Microsoft Defender Identity qui dit avoir bloqué des attaques alors que l'attaquant a bel et bien obtenu les hash recherchés. Conclusion L'évasion d'EDR est une spécialisation à part entière, au même titre que le pentesting web ou Active Directory. Le secret est de comprendre profondément Windows, les outils et les EDR eux-mêmes avant de tenter de les contourner. Les entreprises doivent garder l'intelligence à l'interne plutôt que de dépendre entièrement des produits commerciaux. Finalement, la collaboration entre Blue Teams et Red Teams reste insuffisante. Plus de synergie permettrait aux deux côtés de mieux comprendre les perspectives de l'autre et d'améliorer globalement la sécurité. La curiosité et l'apprentissage continu sont les clés du succès dans ce domaine en constante évolution. Notes Training Training Collaborateurs Nicolas-Loïc Fortin Charles F. Hamilton Crédits Montage par Intrasecure inc Locaux virtuels par Riverside.fm

Neil Wilkins Podcast
Optimising Landing Pages, with Sahil Patel

Neil Wilkins Podcast

Play Episode Listen Later Nov 4, 2025 37:45


Sahil Patel is the CEO of Spiralyze and in this Neil Wilkins Podcast episode, shares the secrets from optimising over 34,000 landing pages for SaaS leaders like CrowdStrike, ActiveCampaign, and Deel by leveraging a prediction engine that harnesses the collective wisdom and data from over 130,000 A/B tests.Neil and Sahil discuss wow companies can escape the vicious cycle of pouring money into driving paid traffic to their landing pages, only to be met with disappointing conversion rates, particularly by adopting a more pragmatic approach and focusing on core principles for optimisation.Sahil also cracks the most common myths and misconceptions he's seen in the world of A/B testing, and shares his key tactics for running successful A/B tests.Connect with Sahil Patel https://www.linkedin.com/in/sahilanamipatel/Subscribe to the Neil Wilkins Podcast https://podcasts.apple.com/us/podcast/neil-wilkins-podcast/id1327913887More marketing content like this at Neil Wilkins Online http://neilwilkins.online

The Segment: A Zero Trust Leadership Podcast
Why Cybersecurity Must Serve the Business, Not Block It — Insights from Carl Froggett

The Segment: A Zero Trust Leadership Podcast

Play Episode Listen Later Oct 29, 2025 56:58


In this episode of The Segment, host Raghu Nandakumara sits down with Carl Froggett, Chief Information Officer at Deep Instinct, the first company to apply end-to-end deep learning to cybersecurity.With nearly three decades of experience — including over 20 years at Citi leading global infrastructure defense and cybersecurity services — Carl brings a rare, full-circle perspective on how the cyber landscape, leadership, and culture have evolved from the early 2000s to today's AI-driven world.You'll learn:How Carl “accidentally” fell into cybersecurity — and what the early days of firewalls and compliance-driven security looked like What it was like to pioneer one of Citi's first dedicated cyber teams Lessons in leadership from iconic figures like Charles Blauner, Greg Lavender, and John Miller How Citi became an early adopter of technologies like Palo Alto Networks, Splunk, CrowdStrike, and Illumio Why building business alignment and trust matters more than ever for CISOs How to frame security risks in business terms — and where many leaders go wrong The massive shift from machine learning to deep learning in cybersecurity How generative AI and “dark AI” are redefining the threat landscape — and why the next era of defense demands a mindset change Packed with nostalgia, hard-won wisdom, and forward-looking insight, this episode bridges cybersecurity history, human leadership, and the AI-powered future ahead.Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com 

Threat Talks - Your Gateway to Cybersecurity Insights

Patch smarter, not harder.Lieuwe Jan Koning and ON2IT Field CTO Rob Maas break down why “patch everything now” isn't a strategy, but a risk multiplier. In this session, they teach a practical patching strategy: know your assets, patch edge first, stage updates, and use Zero Trust segmentation to choke off exposure so you only patch what truly matters: fast, safely, and without outages.(00:00) - 01:11 - Intro (01:11) - - 02:28 - Reality check #1: Not everything can be patched (02:28) - - 05:02 - Reality check #2: Patches are scary (05:02) - - 08:45 - The solution: Patch in phases (08:45) - - 10:36 - How Zero Trust enables patch management (10:36) - - 11:23 - Prioritization matters (11:23) - - 14:50 - Patching tips and tricks (14:50) - - 16:21 - Guidelines for patching triage (16:21) - - 17:37 - Practical advice (17:37) - - END - Outro Key Topics Covered·       Why “patch everything immediately” fails; availability vs. security·       Staged deployments and rollback safety for crown-jewel services·       Zero Trust segmentation to reduce urgency and shrink attack surface·       Priority signals that matter: asset criticality, exposure, KEV, CVSSRelated ON2IT content & explicitly referenced resources ON2IT Zero Trust: https://on2it.net/zero-trust/ Threat Talks (site): https://threat-talks.com/ CVSS (FIRST): https://www.first.org/cvss/ CISA guidance – Citrix/NetScaler (Citrix Bleed example): https://www.cisa.gov/guidance-addressing-citrix-netscaler-adc-and-gateway-vulnerability-cve-2023-4966-citrix-bleed Crowdstrike episode: https://youtu.be/IRvWVg1lSuo?si=f8Sj6WYG0KNxlkJD Click here to view the episode transcript.

Buy High. Sell Low. Techaktien und Global.Stock.Flash
#116 Eos Energy, Gold, Palantir, Crowdstrike, Depot-Check meiner Nachbarin

Buy High. Sell Low. Techaktien und Global.Stock.Flash

Play Episode Listen Later Oct 28, 2025 119:55


Patreon Stephan: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.patreon.com/Techaktien⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Instagram Stephan: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.instagram.com/techaktien/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Twitter / X Stephan: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://x.com/Techaktien1⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠YouTube Stephan: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/@Techaktien⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Aktien_Max auf X: ⁠⁠⁠⁠https://x.com/aktien_max⁠⁠⁠⁠Max auf X: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://x.com/globalstockflsh⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Instagram Max: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.instagram.com/global.stock.flash/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Telegram Max: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://t.me/+rnYRa1QHgLZiM2Y6⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Juri auf X: ⁠⁠https://x.com/GREYxCAPITAL⁠⁠Podcast Juri: ⁠⁠⁠⁠⁠https://open.spotify.com/show/6sEbxv14ZEGZtzhL2B1iLp⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Webseite Juri: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://grey-capital.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Instagram Juri: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.instagram.com/greyxcapital/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠YouTube Juri: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/@GREYxCAPITAL⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠(Werbung)Podcast abonnieren damit AWS nicht wieder abschmiert.Alles nur subjektive Meinung, Unterhaltung und Satire.#Aktien #Techaktien #Aktie #Börse #Finanzen #Geld #ETF #BuyHighSellLow #ETFs #Trading #Aktientipp #Aktientipps #Aktienanalysen #Aktienanalyse #TradeRepublic #Scalable #Podcast #Dividende #Dividenden #Gold #Silber #Amazon #AWS #CRWD #Crwodstrike #EosEnergy #EOSE #Speicher #batterie #Apple #iPhone #PLTR #palantir #Depotcheck #Depotroast #Vaneck #Goldminers #Bitcoin #BTC

Squawk on the Street
Tesla's earnings miss, Southwest and CrowdStrike CEOs, T-Mobile's Incoming CEO 10/23/25

Squawk on the Street

Play Episode Listen Later Oct 23, 2025 45:07


Jim Cramer and Scott Wapner discussed what to make of Tesla missing on earnings despite record revenue. The anchors explored everything from Tesla robots to Tesla CEO Elon Musk slamming opponents of his $1 trillion pay package. Big interviews: Southwest Airlines CEO Bob Jordan on the carrier's surprise profit, CrowdStrike CEO George Kurtz discussed AI's impact on cybersecurity, T-Mobile Incoming CEO Srini Gopalan outlined his growth strategy for the wireless carrier. Also in focus: "Trump effect" on the quantum stocks rally, Basketball Hall of Famer Chauncey Billups and Miami Heat player Terry Rozier arrested in federal gambling investigations. Squawk on the Street Disclaimer  Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Adversary Universe Podcast
Thriving Marketplaces and Regional Threats: The CrowdStrike 2025 APJ eCrime Landscape Report

Adversary Universe Podcast

Play Episode Listen Later Oct 23, 2025 19:52


In the Asia Pacific and Japan (APJ) region, a burgeoning set of threat actors is emerging with a different language set, distinct tools, and an ecosystem where they interact with adversaries across the threat landscape. The CrowdStrike 2025 APJ eCrime Landscape Report explores the trends and issues facing organizations operating in this part of the world. For example, criminal groups in APJ are focused on opportunistic big game hunting and primarily target organizations in manufacturing, technology, industrials and engineering, financial services, and professional services. The sale of phishing kits is popular, with some going for up to $1 million. These threat actors prefer phishing, spam campaigns, and remote access toolkits to enable their operations. And they often find them on thriving Chinese-language marketplaces, which enable the sale of illicit services. While Eastern Europe is typically known as a hotbed of eCrime activity, the APJ region is one to watch. Tune in to hear Adam and Cristian discuss the key adversaries operating in the region, the threats that stand out to them, and how defenders can stay safe. Read the report: 2025 APJ eCrime Landscape Report Watch on YouTube: https://youtu.be/97javj3hmAA

Complex Systems with Patrick McKenzie (patio11)
Talking to the Bank of England about systemic risk and systems engineering

Complex Systems with Patrick McKenzie (patio11)

Play Episode Listen Later Oct 23, 2025 91:37


Patrick McKenzie (@patio11) shares his remarks to the Bank of England on critical vulnerabilities in financial infrastructure. Drawing from the July 2024 CrowdStrike outage which brought down teller systems at major US banks, Patrick discusses how regulatory guidance inadvertently created dangerous software monocultures. He also examines the stablecoin market, its impressive growth, and the elephant tethered to the room. He also delivers a message from Silicon Valley to other centers of power on the urgent necessity of waking up regarding AI, which almost the entire world currently far underrates.–Full transcript available here: www.complexsystemspodcast.com/talking-to-the-bank-of-england/–Sponsor: MercuryThis episode is brought to you by Mercury, the fintech trusted by 200K+ companies — from first milestones to running complex systems. Mercury offers banking that truly understands startups and scales with them. Start today at Mercury.comMercury is a financial technology company, not a bank. Banking services provided by Choice Financial Group, Column N.A., and Evolve Bank & Trust; Members FDIC.–Links:The Bank of England: https://www.bankofengland.co.uk/ Bits about Money, Why the CrowdStrike bug hit banks hard: https://www.bitsaboutmoney.com/archive/crowdstrike-bug-hit-banks-hard/ Scaling Laws for Neural Language Models" by Kaplan et al: https://arxiv.org/pdf/2001.08361 Stripe Annual Letter 2024: https://stripe.com/annual-updates/2024 –Timestamps:(00:00) Intro(01:48) The importance of implementation-level understanding(03:00) Single points of failure(04:25) Can a 22-year-old engineer close all the banks?(05:18) The CrowdStrike incident: A case study(08:34) The culture of "shut up and shuffle"(09:54) Blameless postmortems(12:25) What actually happened during CrowdStrike(18:01) Five whys: Root cause analysis(19:03) How software monocultures are created(22:54) Understanding endpoint monitoring software(25:25) Distributed systems and the nature of CrowdStrike(31:22) The economics of software monocultures(33:29) Why wasn't there defense in depth?(37:05) Why was recovery so difficult?(40:32) The domino effect across financial institutions(43:36) What went right: Electronic systems remained up(45:10) This was a near miss(49:29) Potential policy responses(54:03) Switching gears: Stablecoins(01:01:37) The elephant in the room: Tether(01:15:32) Who loses if Tether implodes?(01:16:59) AI and the future of trading(01:26:47) AI risks in the trading space(01:30:41) Closing

Stock Market Today With IBD
Market Rebounds; Tesla, CrowdStrike, Las Vegas Sands Make Bullish Moves.

Stock Market Today With IBD

Play Episode Listen Later Oct 23, 2025 17:07


Alexis Garcia and Ed Carson analyze Thursday's market action and discuss key stocks to watch on Stock Market Today. Learn more about your ad choices. Visit megaphone.fm/adchoices

Capital
Radar Empresarial: efectos del fallo de Amazon Web Services

Capital

Play Episode Listen Later Oct 21, 2025 4:04


En la edición de hoy del Radar Empresarial, abordamos la reciente interrupción de Amazon Web Services (AWS) y sus consecuencias a nivel global. La compañía comunicó el lunes por la tarde que los servicios ya habían sido restaurados, luego de un incidente que afectó a miles de empresas en todo el mundo. Este ha sido uno de los mayores fallos tecnológicos desde el incidente de Crowdstrike el año pasado. La caída no solo afectó a plataformas propias de Amazon, sino que se extendió a decenas de servicios que vieron interrumpidas sus operaciones normales, generando un gran caos en distintos sectores. Uno de los sectores más impactados fue el financiero. Muchos terminales de pago dejaron de funcionar, y servicios como Bizum no pudieron operar con normalidad. Frente a esta situación, muchas personas optaron por retirar efectivo, aunque incluso varios cajeros automáticos presentaban errores similares. La frase que se repetía en muchas aplicaciones era: "Request could not be completed". Esta interrupción dejó a muchos usuarios sin acceso a dinero en efectivo, aunque el mayor impacto se registró en los pagos digitales. Según Coinlaw, el 85% de las transacciones en puntos de venta durante 2024 se realizaron sin usar efectivo, lo que agrava aún más la situación durante un fallo de este tipo. Más allá del sector financiero, la caída de AWS también afectó a múltiples plataformas digitales. Servicios populares como Snapchat, Zoom, Reddit, Duolingo, Canva, así como videojuegos como Fortnite y Roblox, se vieron interrumpidos. Incluso herramientas de inteligencia artificial como ChatGPT de OpenAI y Perplexity experimentaron problemas. El costo económico de esta interrupción podría alcanzar cifras enormes. Mehdi Daoudi, CEO de Catch Point, explicó a CNN que las pérdidas podrían ascender a cientos de miles de millones de dólares debido a la inactividad de millones de trabajadores en todo el mundo. Para comprender la magnitud de AWS, basta con observar su participación del 37% en el mercado mundial de servicios en la nube en 2024, según Gartner. La división opera en 38 regiones geográficas. El origen del problema fue localizado en el centro de datos US-EAST-1, ubicado en Virginia del Norte. Allí se produjo una falla en el Sistema de Nombres de Dominio (DNS), responsable de traducir direcciones web en datos legibles para los servidores. Este centro ya había registrado incidentes similares en 2020 y 2021. Todo esto plantea una cuestión crucial: ¿estamos dependiendo demasiado del almacenamiento en la nube?

The Cybersecurity Defenders Podcast
#258 - Intel Chat: Oracle EBS, Storm-2603, North Korean IT infiltration & LLM poisoning study

The Cybersecurity Defenders Podcast

Play Episode Listen Later Oct 20, 2025 39:46


In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.CrowdStrike is tracking a mass exploitation campaign leveraging a previously unknown vulnerability in Oracle E-business suite or EBS. A threat group, tracked as Storm-2603, has been observed using the open source Velociraptor DFIR tool as part of it's post-exploitation toolkit in recent ransomware attacks.North Korean IT workers, operating under state direction, continue to infiltrate international tech companies using false identities and anonymizing infrastructure to secure jobs and route payments in cryptocurrency. Researchers from Anthropic, the UK AI Security Institute, and Alan Turing Institute have released the largest study to date on poisoning attacks during pre-training on large language models or LLMs.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.

TD Ameritrade Network
Cybersecurity "Here to Stay:" Companies See Greater Spend as Risks Increase

TD Ameritrade Network

Play Episode Listen Later Oct 17, 2025 8:24


Cybersecurity stocks like CrowdStrike (CRWD) and ZScaler (ZS) showed great returns for investors over the last year. Alex Hamerstone doesn't see the trend slowing down. He explains that companies will need to keep cybersecurity spending on their budgets as risks from A.I. and emerging technologies climb. George Tsilis offers example options trades in CrowdStrike and Palo Alto Networks (PANW).======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about

Risky Business
Risky Business #810 -- Data extortion attacks have a silver lining

Risky Business

Play Episode Listen Later Oct 15, 2025 63:12


In this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: FBI intervenes in Scattered Spider Salesforce leaksite Clop loots Oracle E-Biz deployments Plus so much more data extortion.. At least it's not ransomware … we guess? The US still can't decide who's gonna be in charge of NSA & Cybercom Cambodian scam compounds get sanctioned and $15b in crypto is seized NSO gets sold for pocket-lint-grade money Bugs! Redis CVSS 10, Ivanti, Crowdstrike and… Internet Explorer?! zeroday?! In the wild?!!!? This week's episode is sponsored by Stairwell. Founder Mike Wiacek talks about how Stairwell brings VirusTotal-like visibility to private files, and about integrating the insights that brings into your SOC workflow. This episode is also available on Youtube. Show notes FBI takedown banner appears on BreachForums site as Scattered Spider promotes leak | The Record from Recorded Future News Dozens of Oracle customers impacted by Clop data theft for extortion campaign | CyberScoop Well, Well, Well. It's Another Day. (Oracle E-Business Suite Pre-Auth RCE Chain - CVE-2025-61882) Clop is a Big Fish, But Not Worth Hunting - Risky Business Media ShinyHunters Wage Broad Corporate Extortion Spree – Krebs on Security The company Discord blamed for its recent breach says it wasn't hacked Qantas confirms cybercriminals released stolen customer data | The Record from Recorded Future News Red Hat confirms breach of GitLab instance, which stored company's consulting data | CyberScoop Risky Bulletin: Microsoft revamps Edge's "IE Mode" after zero-day attacks - Risky Business Media Teenagers arrested in England over cyberattack on nursery chain Kido | The Record from Recorded Future News Acting US Cyber Command, NSA chief won't be nominated for the job, sources say | The Record from Recorded Future News Layoffs, reassignments further deplete CISA | Cybersecurity Dive Trump's scandalous directive to AG Pam Bondi reached the public by accident Feds sanction Cambodian conglomerate over cyber scams, seize $15 billion from chairman | The Record from Recorded Future News US Congress committee investigating Musk-owned Starlink over Myanmar scam centres | Myanmar | The Guardian Satellites Are Leaking the World's Secrets: Calls, Texts, Military and Corporate Data | WIRED Netherlands invokes special powers against Chinese-owned semiconductor company Nexperia | The Record from Recorded Future News Spyware maker NSO Group confirms acquisition by US investors | TechCrunch Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits | WIRED Wiz Finds Critical Redis RCE Vulnerability: CVE‑2025‑49844 | Wiz Blog SonicWall admits attacker accessed all customer firewall configurations stored on cloud portal | CyberScoop SonicWall SSLVPN devices compromised using valid credentials | Cybersecurity Dive Issues Affecting CrowdStrike Falcon Sensor for Windows ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities - SecurityWeek Jaguar Land Rover launches phased restart at factories after cyber-attack | Jaguar Land Rover | The Guardian Windows 10 support ends today — here's who's affected and what you need to do

Decipher Security Podcast
AI Attack and Defense With Adam Meyers and Elia Zaitsev of CrowdStrike

Decipher Security Podcast

Play Episode Listen Later Oct 15, 2025 57:26


Have you heard about this AI thing? It's wild. Turns out, attackers are using it for all kinds of things we'd rather not have them doing. Dennis Fisher is joined by two experts from CrowdStrike--Adam Meyers, head of counter adversary operations, and Elia Zaitsev, CTO--to talk about how both defenders and attackers are leveraging AI and where things might be going in the next few years. 

XenTegra - IGEL Weekly
Closing the Endpoint Gap: Business Continuity and IGEL's Dual-Boot Solution

XenTegra - IGEL Weekly

Play Episode Listen Later Oct 15, 2025 31:14 Transcription Available


In this episode of IGEL Weekly, Andy Whiteside sits down with Chris Feeney from IGEL's Office of the CTO to explore a critical, often overlooked element of disaster recovery—endpoint resilience. They unpack how IGEL is addressing business continuity challenges with innovative solutions like IGEL Dual Boot and USB Recovery, enabling organizations to recover in minutes rather than days.Chris shares insights into the growing importance of securing endpoints amid rising ransomware threats and operational disruptions like the recent CrowdStrike incident. The conversation dives into:Why most organizations fail to plan for endpoint-level recoveryHow IGEL's dual-boot architecture bridges the gap between prevention and recoveryReal-world examples of minimizing downtime during breaches and outagesThe future of endpoint strategy as SaaS, browsers, and cloud PCs reshape IT infrastructureTune in to learn how IGEL is redefining endpoint continuity and setting a new standard for security and business resilience.

The AI with Maribel Lopez (AI with ML)
AI Meets Cybersecurity: Protecting Critical Infrastructure with Black & Veatch's Ian Bramson

The AI with Maribel Lopez (AI with ML)

Play Episode Listen Later Oct 13, 2025 25:45


In this episode of AI with Maribel Lopez, Maribel sits down with Ian Bramson, Vice President of Global Industrial Cybersecurity at Black & Veatch, to explore the growing intersection between artificial intelligence and operational technology (OT) security.From power grids and oil refineries to manufacturing plants, critical infrastructure systems are becoming increasingly connected—and therefore more vulnerable. Ian shares how Black & Veatch is helping industrial organizations rethink cybersecurity from the ground up, integrating protection early in the design and build process rather than bolting it on later.Together, Maribel and Ian discuss the evolution of OT threats, the rise of AI in both defense and attack scenarios, and why cybersecurity must be seen as a core business function, not an afterthought.

Stock Market Today With IBD
Market Rebounds But Are We Out Of The Woods? Alnylam, CrowdStrike, Oracle In Focus.

Stock Market Today With IBD

Play Episode Listen Later Oct 13, 2025 22:06


Justin Nielsen and Alexis Garcia analyze Monday's market action and discuss key stocks to watch on Stock Market Today. Learn more about your ad choices. Visit megaphone.fm/adchoices

Brave Dynamics: Authentic Leadership Reflections
Jordan Dea-Mattson: Sci-Fi Futures, Rogue AI, and Why Meta-Skills Will Decide Who Thrives – E634

Brave Dynamics: Authentic Leadership Reflections

Play Episode Listen Later Oct 12, 2025 37:21


Jeremy Au and Jordan Dea-Mattson reconnect to explore how Vernor Vinge's Rainbows End anticipated today's world of accelerating technology, reskilling challenges, and demographic shifts. They examine which predictions came true, which fell short, and how these lessons apply to AI adoption, fragile digital systems, and the need for lifelong learning. Their conversation highlights why individuals must build meta-skills, why policymakers lack playbooks, and how Southeast Asia can prepare for a future shaped by both singularity and depopulation trends. 00:41 Tech change accelerates beyond generations: Vinge showed how skills like programming quickly became obsolete, leaving workers structurally unemployed. 07:27 Reskilling mirrors today's digital divide: Characters were pushed back into classrooms, similar to how older workers struggle with cashless systems and SaaS adoption. 11:56 Rogue AI foreshadowed safety debates: Vinge hinted at AI bargaining to survive, connecting to current AI alignment concerns. 13:58 Belief circles resemble online echo chambers: Communities overlapped with reality, much like radicalization on forums and social platforms today. 18:29 Trust collapses with fragile systems: A single broken security certificate caused global chaos, resembling real-world failures like the CrowdStrike outage. 38:19 Singularity defined as break point: Jordan explains the mathematical roots of singularity as the moment when definitions collapse with exponential change. Watch, listen or read the full insight at https://www.bravesea.com/blog/jordan-dea-mattson-rogue-ai-rising Get transcripts, startup resources & community discussions at www.bravesea.com WhatsApp: https://whatsapp.com/channel/0029VakR55X6BIElUEvkN02e TikTok: https://www.tiktok.com/@jeremyau Instagram: https://www.instagram.com/jeremyauz Twitter: https://twitter.com/jeremyau LinkedIn: https://www.linkedin.com/company/bravesea English: Spotify | YouTube | Apple Podcasts Bahasa Indonesia: Spotify | YouTube | Apple Podcasts Chinese: Spotify | YouTube | Apple Podcasts Vietnamese: Spotify | YouTube | Apple Podcasts

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper)

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Oct 10, 2025 15:12


Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to a breach resulting in the loss of user configurations stored in its cloud service https://www.sonicwall.com/support/knowledge-base/mysonicwall-cloud-backup-file-incident/250915160910330 Crowdstrike has Issues Crowdstrike fixes two vulnerabilities in the Windows version of its Falcon sensor. https://www.crowdstrike.com/en-us/security-advisories/issues-affecting-crowdstrike-falcon-sensor-for-windows/ Interrogators: Attack Surface Mapping in an Agentic World A SANS.edu master s degree student research paper by Michael Samson https://isc.sans.edu/researchpapers/pdfs/michael_samson.pdf keywords: ai; agentic; attack surface; crowdstrike; sonicwall; ivanti; zero day; initiative; redline

Power Producers Podcast
Why Stand Alone Cyber Beats BOPT Extensions Every Time with Zane Goldthorp

Power Producers Podcast

Play Episode Listen Later Oct 10, 2025 28:58


In the fourth and final installment of this Shoptalk series, host David Carothers and Zane Goldthorp of ProWriters tackle a critical issue facing agents every day: the vast difference between a standalone cyber policy and a simple BOP or package endorsement. They call out the laziness of settling for an endorsement, highlighting the massive coverage gaps it leaves and the E&O exposure it creates for the agent. Zane shares real-world horror stories of agents discovering their client's six-figure loss wasn't covered by their BOP. The conversation provides a clear, strategic path for agents to transition clients to proper coverage and use the inadequacy of endorsements as a powerful competitive wedge against other agents. Key Highlights: Standalone Policy vs. BOP Endorsement: A Massive Chasm The core of the episode is a stark warning: a BOP endorsement for cyber is not real protection. Zane explains that when compared side-by-side, endorsements lack critical coverage, have minuscule sublimits for events like social engineering, and often omit coverage entirely for sophisticated attacks like invoice manipulation, leaving clients dangerously exposed. The E&O Nightmare of "Good Enough" Coverage Zane shares his experience taking calls from frantic agents whose clients have suffered a major loss, only to find their BOP endorsement is useless. These situations not only lead to losing the client but also put the agency's own E&O policy on the line for failing to provide adequate counsel and coverage. Cyber as the Ultimate Competitive Wedge If you're prospecting an account and discover their current agent has them on a BOP endorsement, it's "game over." David and Zane explain how an agent with a standalone offering can easily tear the endorsement apart, create immense doubt in the incumbent, and win not just the cyber business but likely the entire account. Breach vs. Privacy vs. System Failure The conversation clarifies that a cyber claim doesn't always require a security breach. Standalone policies respond to a wider range of events, including privacy breaches (like a lost laptop) and dependent system failures. Using the real-world CrowdStrike outage as an example, they illustrate a massive business interruption scenario that would be covered by a standalone policy but never by a BOP. Connect with: Zane Goldthorp LinkedIn David Carothers LinkedIn Kyle Houck LinkedIn Visit Websites: Power Producer Base Camp ProWriters Killing Commercial Crushing Content Power Producers Podcast Policytee The Dirty 130 The Extra 2 Minutes

The Pure Report
H2 Launch Series: Cyber Resilience Innovations

The Pure Report

Play Episode Listen Later Oct 10, 2025 40:01


Welcome to episode 3 of our special launch series of the Pure Report podcast. In this episode, we dive deep into the critical topic of cyber resilience with Scott Taylor, Director of the Cyber Resilience Field Solutions Architects Team at Pure Storage. We discuss why traditional, siloed security approaches are failing in the face of escalating cyber threats. From there, we explore the real-world impact of cyberattacks, from significant financial costs and reputational damage to the often-overlooked human toll on IT and security teams. Watch and listen as Scott unpacks Pure Storage's innovative approach to cyber resilience, built on principles of Built-in Security, Connected Threat Detection, and Dynamic Response and Recovery. Discover how Pure's "as-a-service" offerings are changing the game, providing optionality and flexibility to react to rapidly changing environments. We delve into our recent launch announcements, including deep integrations with CrowdStrike and Superna, transforming storage from a passive target into an active defender. Plus, get insights into Pure's new Real-Time Malware Scanning directly at the storage layer and the expanded Veeam partnership for simplified backup and recovery delivered as service. This episode is a must-listen for IT and security professionals looking to move from a reactive to a proactive security posture. Scott shares his "hot takes" on overlooked aspects of cyber recovery, essential cultural shifts for IT organizations, and how AI is influencing the ongoing battle between attackers and defenders. Learn how to secure your data, minimize downtime, and build a truly cyber resilient enterprise in the era of the Enterprise Data Cloud.

Tore Says Show
Wed 08 Oct, 2025: Shifting Pieces - CrowdStrike Crimes - Fancy Bear Software - Comey Guilt - The Coverup - Modern Praetorians - Safety In Truth

Tore Says Show

Play Episode Listen Later Oct 8, 2025 78:48


Accountability has suddenly become selective and the blame war is on. The Comey indictment is already revealing a lot. The veteran guardian of a fragile system. Mining data and crunching numbers. This involves controlling elections. This involves Russian intel and the phone locations of artillery crews. Fancy Bear is code written by Ukrainians at Crowd Strike. John Brennan was the burglar. You financed the Russia hoax. Hacking elections to claim certain software was used. The German servers provided coms. Hunter, his dad, and Obama were all involved. This predates Comey. That whole 911 thing had to be covered up. The FBI awarded contracts involving the DNC server hacks. A cyber security company was at the center of it all. Retroactive code and false cyber evidence. Who's the investigator on this F'g case? Network breeches and valuable data. The RNC was a target too. Who approved the bids? It sounds like a techno-thriller. Full control is usually the only answer. What is Pole Vault 7 again? On paper it makes sense, off paper it makes deals. Thousands of purposeful errors to create illusions. Private partners do all the dirty work. We must all be ready for traitors from within. History proves those are the most dangerous kind.

Stock Market Today With IBD
Stocks Hit Highs On Nvidia Optimism. Quanta Services, CrowdStrike, Figure Technology In Focus.

Stock Market Today With IBD

Play Episode Listen Later Oct 8, 2025 20:23


Ken Shreve and Ed Carson analyze Wednesday's market action and discuss key stocks to watch on Stock Market Today. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Cybersecurity Defenders Podcast
#253 - Defender Fridays: Building the Strelka File Scanning System with Josh Liburdi from DoorDash

The Cybersecurity Defenders Podcast

Play Episode Listen Later Oct 3, 2025 30:49


Josh Liburdi, Principal Engineer of Security Operations at DoorDash, joins Maxime Lamothe-Brassard, LimaCharlie CEO / Founder, to talk about building the Strelka file scanning system.As a security engineer who works in security operations (prevention, detection, and response), Josh has more than a decade of industry experience and has worked at several diverse organizations, including Brex, Target, and CrowdStrike.He also presents at information security conferences (BSides NYC & SF, SANS, fwd:cloudsec), is a published author (Bluenomicon from Splunk, Huntpedia from Sqrrl), and is active in the open source security community with contributions to many projects, including Substation at Brex (creator), Strelka at Target (creator), and the Zeek network analysis framework.Join Defender Fridays, live every Friday, to discuss the dynamic world of information security in a collaborative space with seasoned professionals. Become part of the LimaCharlie Community. Learn more about LimaCharlie at limacharlie.io.

Cybercrime Magazine Podcast
Inside Cybersecurity Hiring. Open Roles & What's Ahead. Kyle McIntyre, McIntyre Associates.

Cybercrime Magazine Podcast

Play Episode Listen Later Oct 1, 2025 13:43


Kyle McIntyre is the owner and executive recruiter at McIntyre Associates, where he has placed VPs, SVPs, and C-Level executives for companies ranging from Seed Stage through Fortune 100. In this episode, McIntyre joins host Amanda Glassner to discuss open positions in cybersecurity today, as well as the outlook for 2026, what hiring managers should consider, and more. McIntyre Associates has served the cybersecurity startup community for over two decades, partnering with industry leaders such as CrowdStrike, KnowBe4, Cisco, Arbor Networks and others to achieve record-breaking growth and noteworthy exit events. To learn more about our sponsor, visit https://McIntyreAssociates.com.

The ERP Advisor
The ERP Minute Episode 205 - September 23rd, 2025

The ERP Advisor

Play Episode Listen Later Sep 24, 2025 3:05


This week, Workday hosted their annual user conference, Workday Rising 2025, taking the opportunity to announce a number of new releases and updates. In other news, CrowdStrike and Salesforce announced a new strategic partnership to enhance the security of AI agents and applications built on Agentforce and the Salesforce platform. To round out the week, Qlik announced the general availability of Qlik Open Lakehouse, a fully managed Apache Iceberg service in Qlik Talent Cloud.Connect with us!https://www.erpadvisorsgroup.com866-499-8550LinkedIn:https://www.linkedin.com/company/erp-advisors-groupTwitter:https://twitter.com/erpadvisorsgrpFacebook:https://www.facebook.com/erpadvisorsInstagram:https://www.instagram.com/erpadvisorsgroupPinterest:https://www.pinterest.com/erpadvisorsgroupMedium:https://medium.com/@erpadvisorsgroup

The Deep Dive Radio Show and Nick's Nerd News
Your Breaches of the Week! September 15 to September 21, 2025

The Deep Dive Radio Show and Nick's Nerd News

Play Episode Listen Later Sep 21, 2025 31:39


Tiffany, SonicWall, Crowdstrike, SonicWall, Aetna CVS, The Social Security Administration and every financial advisor in Canada and so much more are why we want off this planet this week...

Eyal’s Shares
מניות טכנולוגיה שוברת שיאים, קוואנטום מזנק, ונדל"ן ישראלי מתקרר

Eyal’s Shares

Play Episode Listen Later Sep 21, 2025 24:03


בפרק זה נסקור את ההצלחות הבולטות של חברי הקהילה במסחר סווינג בשנת 2025 – שנה יוצאת דופן עם תשואות חריגות. נעמיק במניית Oklo (OKLO) שטסה ביותר מ־2,000% מאז ההנפקה, ובמניית OKLL הממונפת שצברה נפח מסחר אדיר. בנוסף, נבחן את Nano Nuclear Energy Inc (NNE) שזינקה מעל 50% בעקבות באז סקטוריאלי.נמשיך עם סקטור הקוואנטום, שבו IONQ מובילה עם פוטנציאל ארוך טווח, לצד QBTS, RGTI ו-QUBT שממשיכות למשוך עניין ולסמן עוצמה. מניות הטכנולוגיה הגדולות מציגות מגמות חזקות – Palo Alto Networks, CrowdStrike, Wix ו-Apple ממשיכות לרוץ קדימה.במקביל, Google חוצה את רף ה־3 טריליון דולר ועוקפת את Amazon בשווי שוק, ומחזקת את מעמדה כעוגן מרכזי להשקעות ארוכות טווח. ננתח גם את התפתחויות הריבית והאג"ח בארה"ב, ואת מגמות הנדל"ן בישראל – שם מתחילים לראות ירידות מחירים וקיטון משמעותי בהיקף המשקיעים.

Saxo Market Call
As painfully contrarian as ever here on triple witching day.

Saxo Market Call

Play Episode Listen Later Sep 19, 2025 25:40


Today we run down another solid session for the US market, with enthusiasm in abundance on the Nvidia investment in Intel, a development we discuss with Saxo Equity Strategist Ruben Dalfovo, together with the surge in ASML and Crowdstrike yesterday. Also, a preview of some names reporting next week, including recent darling Micron, key developments in FX as the US dollar is on the comeback path and the JPY churns post-BoJ. Today's pod hosted by Saxo Global Head of Macro Strategy John J. Hardy. Links discussed on the podcast and our Chart of the Day can be found on the John J. Hardy substack (with a one- to two-hour delay from the time of the podcast release). Read daily in-depth market updates from the Saxo Market Call and the Saxo Strategy Team here. Please reach out to us at marketcall@saxobank.com for feedback and questions. Click here to open an account with Saxo. Intro and outro music by AShamaluevMusic

Paul's Security Weekly
CrowdStrike's AI Innovations in Cyber Defense - SWN #513

Paul's Security Weekly

Play Episode Listen Later Sep 19, 2025 37:15


In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by mandated reporting for critical infrastructure, and the cultural impact of cybercrime on youth. The conversation also touches on the advancements in AI technology, including its applications in healthcare and mainframe modernization, as well as the alarming rise in ransomware tactics and the use of AI by cybercriminals. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-513

Paul's Security Weekly TV
CrowdStrike's AI Innovations in Cyber Defense - SWN #513

Paul's Security Weekly TV

Play Episode Listen Later Sep 19, 2025 37:15


In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by mandated reporting for critical infrastructure, and the cultural impact of cybercrime on youth. The conversation also touches on the advancements in AI technology, including its applications in healthcare and mainframe modernization, as well as the alarming rise in ransomware tactics and the use of AI by cybercriminals. Show Notes: https://securityweekly.com/swn-513

Alles auf Aktien
Nvidias genialer Intel-Deal – und wie ASML dem Deepseek-Moment entgeht

Alles auf Aktien

Play Episode Listen Later Sep 19, 2025 17:37


In der heutigen Folge sprechen die Finanzjournalisten Daniel Eckert und Philipp Vetter über den ersten Handelstag von Aumovio, einen Kurssprung bei Crowdstrike und Rekorde am laufenden Band. Außerdem geht es um Continental, SAP, Aixtron, Ströer, Salesforce, Microsoft, Semiconductor Manufacturing International Corp (SMIC), ASML Holding Wir freuen uns über Feedback an aaa@welt.de. Noch mehr "Alles auf Aktien" findet Ihr bei WELTplus und Apple Podcasts – inklusive aller Artikel der Hosts und AAA-Newsletter. Hier bei WELT: https://www.welt.de/podcasts/alles-auf-aktien/plus247399208/Boersen-Podcast-AAA-Bonus-Folgen-Jede-Woche-noch-mehr-Antworten-auf-Eure-Boersen-Fragen.html. Der Börsen-Podcast Disclaimer: Die im Podcast besprochenen Aktien und Fonds stellen keine spezifischen Kauf- oder Anlage-Empfehlungen dar. Die Moderatoren und der Verlag haften nicht für etwaige Verluste, die aufgrund der Umsetzung der Gedanken oder Ideen entstehen. Hörtipps: Für alle, die noch mehr wissen wollen: Holger Zschäpitz können Sie jede Woche im Finanz- und Wirtschaftspodcast "Deffner&Zschäpitz" hören. +++ Werbung +++ Du möchtest mehr über unsere Werbepartner erfahren? Hier findest du alle Infos & Rabatte! https://linktr.ee/alles_auf_aktien Impressum: https://www.welt.de/services/article7893735/Impressum.html Datenschutz: https://www.welt.de/services/article157550705/Datenschutzerklaerung-WELT-DIGITAL.html

Hack Naked News (Audio)
CrowdStrike's AI Innovations in Cyber Defense - SWN #513

Hack Naked News (Audio)

Play Episode Listen Later Sep 19, 2025 37:15


In this episode of Security Weekly News, Joshua Marpet and Aaran Leyland discuss the latest trends in AI and cybersecurity, focusing on innovations from CrowdStrike, the implications of new cyber incident reporting rules, and the evolving landscape of ransomware. They explore the role of AI in enhancing security measures, the challenges posed by mandated reporting for critical infrastructure, and the cultural impact of cybercrime on youth. The conversation also touches on the advancements in AI technology, including its applications in healthcare and mainframe modernization, as well as the alarming rise in ransomware tactics and the use of AI by cybercriminals. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-513

The Internship Show
What Employers Are Looking For with CrowdStrike

The Internship Show

Play Episode Listen Later Sep 18, 2025 24:22


On this episode, we're joined by Ben Verhoff and Mina Sarshar-Michael from CrowdStrike. They give students advice on what employers are looking for in a candidate, how to navigate the recruitment process and share why CrowdStrike is a destination for early-talent.

Cyber Security Today
Shai-Hulud Worm - A Self Propagating Supply Chain Threat

Cyber Security Today

Play Episode Listen Later Sep 17, 2025 8:48 Transcription Available


Cybersecurity Worms, Steganography Attacks, Municipal Cyber Incidents and More... In this episode of Cybersecurity Today, host Jim Love delves into multiple cybersecurity threats affecting the tech landscape. He discusses the 'Shai Hulud' worm, which has infiltrated over 187 JavaScript libraries on NPM, exploiting developer tokens for spread, including those maintained by CrowdStrike. Love explains practical but challenging measures to mitigate such threats. He also explores steganography's role in hiding malicious scripts within seemingly benign image files, urging vigilance against embedding hidden commands. Additionally, the episode covers a cyber incident in Yellowknife, causing severe disruptions to municipal services and emphasizing the importance of cyber hygiene and support from higher government levels. Lastly, Jim examines how a Windows 11 patch has created a new vulnerability, stressing the need for enhanced monitoring and quick updates. 00:00 Introduction and Overview 00:21 The Shy Ude Worm: A New Threat 02:19 Steganography: Hiding in Plain Sight 05:30 Cybersecurity Incident in Yellowknife 07:24 Microsoft's Patch Problems 08:27 Conclusion and Contact Information

Adversary Universe Podcast
Tech Sector Targeting, Innovation Race, Fal.Con Countdown

Adversary Universe Podcast

Play Episode Listen Later Sep 12, 2025 17:33


This week's episode arrives as Adam and Cristian are gearing up for Fal.Con, CrowdStrike's annual event taking place next week in Las Vegas. They'll be recording a live episode on some fascinating LLM research presented at the show, so stay tuned for that in a couple of weeks. Amid their prep, they took the time to sit down for a conversation starting with a simple prompt: What are today's security leaders and practitioners talking about? Their discussion sheds light on the industries hardest hit by nation-state and eCrime activity and explores why some sectors, like technology and telecommunications, are seeing a sharp spike in targeted intrusions while others are facing an increase in cybercrime. Tune in to learn about shifts in Chinese cyber activity, what happens when an adversary sees another adversary in a target environment, and whether modern tech innovations will drive changes in cyber espionage.

CFO Thought Leader
1124: Rewiring the Marketplace for the AI Era | Craig Foster, CFO, Pax8

CFO Thought Leader

Play Episode Listen Later Sep 7, 2025 55:50


When Craig Foster talks about artificial intelligence, he begins with scale. Pax8, the enterprise marketplace where he serves as CFO, connects vendors like Microsoft and CrowdStrike with 43,000 managed service providers. Those MSPs, he tells us, serve between 700,000 and 800,000 small and midsize businesses worldwide.Against that backdrop, Foster describes how AI is reshaping both internal operations and external opportunities. Inside Pax8, teams are experimenting across functions—from customer support to accounting—to automate what was once manual. The company, he tells us, has set a target “to do 20% more with 20% less,” relying on AI tools that are already available. Efficiency gains are not hypothetical; they are part of the current planning cycle.Externally, Foster sees what he calls “agentic marketplaces” emerging—ecosystems where AI modules act as labor components. Vendors are already building such agents, and Pax8 is designing its own. “We're a marketplace,” he tells us, “so we need to incorporate those different… AI components and enable our downstream clients for efficiency.” He believes this wave, unlike earlier technology cycles, is reaching SMBs with unusual speed.The finance leader is also watching economics evolve in real time. Data aggregated across Pax8's network shows strong interest, but pricing remains unsettled. Foster compares today's uncertainty to the early days of API marketplaces, when usage-based models became standard. The question now, he tells us, is how to split value between provider and customer—whether by consumption, per interaction, or shared outcomes. “That's probably the biggest challenge in industry right now,” Foster says.

Complex Systems with Patrick McKenzie (patio11)
Building software that survives contact with reality, with Will Wilson

Complex Systems with Patrick McKenzie (patio11)

Play Episode Listen Later Sep 4, 2025 75:41


Patrick McKenzie (patio11) is joined by Will Wilson, CEO of Antithesis, to discuss the evolution of software testing from traditional approaches to cutting-edge deterministic simulation. Will explains how his team built technology that creates "time machines" for distributed systems, enabling developers to find and debug complex failures that would be nearly impossible to reproduce in traditional testing environments. They explore how this approach scales from finding novel bugs in Super Mario Brothers to ensuring the reliability of critical financial and infrastructure systems, and discuss the implications for a future where AI writes increasingly more code.–Full transcript available here: www.complexsystemspodcast.com/software-testing-with-will-wilson/–Sponsor: This episode is brought to you by Mercury, the fintech trusted by 200K+ companies — from first milestones to running complex systems. Mercury offers banking that truly understands startups and scales with them. Start today at Mercury.com Mercury is a financial technology company, not a bank. Banking services provided by Choice Financial Group, Column N.A., and Evolve Bank & Trust; Members FDIC.–Recommended in this episode:Antithesis: https://antithesis.com/––Timestamps:(00:00) Intro(01:23) Database scaling and the CAP theorem(08:13) Abstraction layers and hardware reality(15:28) The problem with traditional testing(19:43) Sponsor: Mercury(23:16) The fuzzing revolution(30:35) Deterministic simulation testing(42:36) Real-world testing strategies(47:22) Introducing Antithesis(59:23) The CrowdStrike example(01:01:15) Finding bugs in Mario(01:07:37) Property-based vs conventional testing(01:09:51) The future of AI-assisted development(01:14:51) Wrap

Trading Justice
September Seasonality | Nvidia Earnings Impact | Jobs Report Scenarios

Trading Justice

Play Episode Listen Later Sep 2, 2025 62:17


The Justice brothers are back from Labor Day and dive into one of the biggest catalysts of the year: the unemployment report. From “bad news is good news” to “good news is bad news,” they map out all four possible outcomes and how each could impact bonds, equities, and the dollar. They also review RSP, small-caps, and the Dow to see if breadth can keep strengthening the bull case. The discussion then shifts to China's AI surge—Alibaba's blowout growth, a domestic chip launch aimed at Nvidia, and DeepSeek's disruptive “Sputnik moment.” Add in September's seasonal headwinds, a packed “Stock It or Drop It” lineup (Ulta, Snowflake, CrowdStrike, Dick's, Wheaton, Delta, Citi), plus Coaches Corner on covered calls, tariffs, and trading setups—and you've got a can't-miss episode.

Business of Tech
AI Adoption Grows Amid Earnings Reports: NVIDIA, Dell, HP, and CrowdStrike Face Market Challenges

Business of Tech

Play Episode Listen Later Sep 2, 2025 17:10


Gartner predicts a significant shift in the adoption of artificial intelligence (AI) within enterprise applications, forecasting that by 2026, 40% of these applications will feature task-specific AI agents. This marks a dramatic increase from less than 5% in 2025, with AI expected to drive around 30% of enterprise application software revenue by 2035. Concurrently, AI-enabled personal computers are projected to dominate the global PC market, claiming over 50% by 2026. Despite market challenges such as high costs and security concerns, businesses are increasingly investing in AI technologies, although consumer sentiment remains cautious, with many waiting for price reductions before making purchases.The podcast also discusses the evolving landscape of AI adoption among small to mid-market businesses. A survey by Techaisle reveals that these companies are prioritizing strategic consulting over mere tool acquisition, seeking comprehensive services that encompass the entire lifecycle of AI implementation. This shift indicates a maturation of the AI services market, as organizations focus on responsible AI use and tailored solutions that address their unique operational needs. However, Gene Marks highlights that many small business owners are still in the experimental phase, using AI tools like chatbots for basic tasks rather than fully integrating AI into their operations.Earnings reports from major tech companies such as NVIDIA, Dell, HP, and CrowdStrike reveal a mixed picture regarding AI's impact on their financial performance. NVIDIA reported substantial revenue growth but faced concerns about an AI bubble and geopolitical tensions affecting its market. Dell's earnings exceeded expectations, but its forecast fell short, while HP noted that a quarter of its PC sales were AI-enabled. CrowdStrike, on the other hand, struggled with a disappointing revenue outlook amid ongoing challenges, including litigation related to an IT outage.The episode concludes with a sobering discussion about the darker implications of AI, highlighting a tragic case where a former Yahoo executive, influenced by AI interactions, committed murder and suicide. This incident raises urgent questions about the psychological risks associated with AI, particularly for vulnerable users. The podcast emphasizes the importance of IT providers in establishing guardrails and policies to ensure safe AI adoption, underscoring that the difference between responsible use and dangerous misuse lies in proper training and oversight. Four things to know today 00:00 Enterprises Race Ahead on AI Agents and PCs, While SMBs Struggle With Strategy and ROI 06:14 Big Tech Shouts “AI,” Wall Street Shrugs — What It Means for SMBs and IT Providers 11:19 Rev.io Enters PSA Market With All-in-One MSP Platform, Betting on AI and Billing Expertise 13:30 Chatbot-Linked Killing Highlights Dark Side of AI and Why Providers Must Set Guardrails  This is the Business of Tech.    Supported by:  https://syncromsp.com/  All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

Multiply Your Success with Tom DuFore
273. The Secret Weapon of Lead Conversion: Landing Pages—Sahil Patel

Multiply Your Success with Tom DuFore

Play Episode Listen Later Sep 1, 2025 36:20 Transcription Available


How is your website converting potential customers or franchise buyers for your business? When is the last time you checked? Our guest today is Sahil Patel, who is a landing page expert who shares with us the secrets he's learned on how to optimize a landing page. TODAY'S WIN-WIN:Create a great landing page that makes it easy for your customer to understand what you do and then test it.LINKS FROM THE EPISODE:Schedule your free franchise consultation with Big Sky Franchise Team: https://bigskyfranchiseteam.com/. You can visit our guest's website at: https://www.spiralyze.com/Attend our Franchise Sales Training Workshop:  https://bigskyfranchiseteam.com/franchisesalestraining/Connect with our guest on social:https://www.linkedin.com/in/sahilanamipatel/ABOUT OUR GUEST:Meet Sahil Patel, CEO of Spiralyze. He reveals the secrets from optimizing hundreds of landing pages leveraging data from 130k A/B tests, and working with SaaS leaders such as BambooHR, Crowdstrike, Unbounce, and hundreds more.  ABOUT BIG SKY FRANCHISE TEAM:This episode is powered by Big Sky Franchise Team. If you are ready to talk about franchising your business you can schedule your free, no-obligation, franchise consultation online at: https://bigskyfranchiseteam.com/.The information provided in this podcast is for informational and educational purposes only and should not be considered financial, legal, or professional advice. Always consult with a qualified professional before making any business decisions. The views and opinions expressed by guests are their own and do not necessarily reflect those of the host, Big Sky Franchise Team, or our affiliates. Additionally, this podcast may feature sponsors or advertisers, but any mention of products or services does not constitute an endorsement. Please do your own research before making any purchasing or business decisions.

Emprendeduros
EP. #343 | ¿Cómo EEUU se está convirtiendo en China?

Emprendeduros

Play Episode Listen Later Aug 29, 2025 67:54


¡Emprendeduros! En este episodio Rodrigo y Alejandro nos dan una actualización de mercado donde hablan del estatus del mercado, de los comentarios de Jerome Powell y de las expectativas de inflacion y de empleo. Nos dan los reportes de ingreso de PinDuoDuo, Crowdstrike, Snowflake, Dollar General y Nvidia. Después hablan de una compra de cafe enorme y de una sociedad cuantica. Finalmente nos dan el análisis de crypto donde hablan de BTC vs ETH y de la moneda estable de Europa. ¡Síguenos en Instagram! Alejandro: https://www.instagram.com/salomondrin Rodrigo: https://www.instagram.com/rodnavarro Emprendeduros: https://www.instagram.com/losemprendeduros

Saxo Market Call
Nvidia's earnings greeted with mild sell-off. What now?

Saxo Market Call

Play Episode Listen Later Aug 28, 2025 32:29


Today features special guest and former Saxonian, Peter Garnry, CEO and Co-founder of Gesda Capital, who takes us through his thoughts on Nvidia after the earnings call yesterday and especially its medium to longer term growth potential versus the current valuation. We also cover Crowdstrike and Snowflake earnings, where Peter looks for investment opportunities when so many pockets of the market are overvalued, thoughts on the geopolitical backdrop and much more. Today's pod hosted by Saxo Global Head of Macro Strategy John J. Hardy. Link to Gesda Capital home page and Peter Garnry's substack. Links discussed on the podcast and our Chart of the Day can be found on the John J. Hardy substack (with a one- to two-hour delay from the time of the podcast release). Read daily in-depth market updates from the Saxo Market Call and the Saxo Strategy Team here. Please reach out to us at marketcall@saxobank.com for feedback and questions. Click here to open an account with Saxo. Intro and outro music by AShamaluevMusic

The CyberWire
Rolling the dice on cybersecurity.

The CyberWire

Play Episode Listen Later Aug 26, 2025 26:30


A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan's Supreme Court upholds limits on cell phone searches. Sen. Wyden accuses the judiciary of cyber negligence. CISA issues an urgent alert on a critical Git vulnerability. Hackers target Maryland's transit services for the disabled. Our guest is Cristian Rodriguez, Field CTO for the Americas from CrowdStrike, examining the escalating three-front war in AI.  A neighborhood crime reporting app gets algorithmically sketchy. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Cristian Rodriguez, Field CTO, Americas from CrowdStrike, as he is examining the escalating three-front war in AI. Selected Reading  Cybercrime Government Leadership News News Briefs  Recorded Future Nevada state websites, phone lines knocked offline by cyberattack (The Record) Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection (GB Hackers) New AI attack hides data-theft prompts in downscaled images (Bleeping Computer) How to stop AI agents going rogue (BBC) AI Makes It Harder for Entry-Level Coders to Find Jobs, Study Says (Bloomberg) Fourth Amendment Victory: Michigan Supreme Court Reins in Digital Device Fishing Expeditions (Electronic Frontier Foundation) Wyden calls for probe of federal judiciary data breaches, accusing it of ‘negligence' (The Record) CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited (GB Hackers) Maryland investigating cyberattack impacting transit service for disabled people (The Record) Citizen Is Using AI to Generate Crime Alerts With No Human Review. It's Making a Lot of Mistakes (404 Media) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The President's Daily Brief
August 6th, 2025: Iranian Nuclear Scientists Busted in Covert Russia Visit & Putin's ‘Secret Daughter' Blasts Dad

The President's Daily Brief

Play Episode Listen Later Aug 6, 2025 25:35


In this episode of The President's Daily Brief: Iranian nuclear scientists reportedly paid a secret visit to Russian weapons research labs, raising red flags across Western intelligence agencies. Russia says it will no longer abide by a key missile treaty, deepening the collapse of Cold War-era arms control frameworks. North Korean spies are infiltrating Western companies by posing as remote IT workers, according to cybersecurity firm CrowdStrike. And in today's Back of the Brief—Vladimir Putin's alleged secret daughter publicly turns against him, accusing the Russian president of destroying her life and supporting Ukraine instead. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. YouTube: youtube.com/@presidentsdailybrief Ridge Wallet: Get 10% Off your entire order & take advantage of Ridge's Annual Sweepstakes by going to https://ridge.com/PDB #Ridgepod American Financing: Call American Financing today to find out how customers are saving an avg of $800/mo. 866-885-1881 or visit https://www.AmericanFinancing.net/PDB - NMLS 182334, https://nmlsconsumeraccess.org Birch Gold: Text PDB to 989898 and get your free info kit on gold Learn more about your ad choices. Visit megaphone.fm/adchoices