Podcasts about Cybereason

  • 112PODCASTS
  • 286EPISODES
  • 39mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Mar 17, 2025LATEST
Cybereason

POPULARITY

20172018201920202021202220232024


Best podcasts about Cybereason

Latest podcast episodes about Cybereason

Resilient Cyber
Resilient Cyber w/ Lior Div & Nate Burke - Agentic AI & the Future of Cyber

Resilient Cyber

Play Episode Listen Later Mar 17, 2025 36:25


In this episode, we sit down with Lior Div and Nate Burke of 7AI to discuss Agentic AI, Service-as-Software, and the future of Cybersecurity. Lior is the CEO/Co-Founder of 7AI and a former CEO/Co-Founder of Cybereason, while Nate brings a background as a CMO with firms such as Axonius, Nagomi, and now 7AI.Lior and Nate bring a wealth of experience and expertise from various startups and industry-leading firms, which made for an excellent conversation.We discussed:The rise of AI and Agentic AI and its implications for cybersecurity.Why the 7AI team chose to focus on SecOps in particular and the importance of tackling toil work to reduce cognitive overload, address workforce challenges, and improve security outcomes.The importance of distinguishing between Human and Non-Human work, and why the idea of eliminating analysts is the wrong approach.Being reactive and leveraging Agentic AI for threat hunting and proactive security activities.The unique culture that comes from having the 7AI team in-person on-site together, allowing them to go from idea to production in a single day while responding quickly to design partners and customer requests.Challenges of building with Agentic AI and how the space is quickly evolving and growing.Key perspectives from Nate as a CMO regarding messaging around AI and getting security to be an early adopter rather than a laggard when it comes to this emerging technology.Insights from Lior on building 7AI compared to his previous role, founding Cybereason, which went on to become an industry giant and leader in the EDR space.

Paul's Security Weekly
Ransomware Attacks a Decade In: What Changed? What Didn't? - benny Vasquez, Mike Mitchell - ESW #397

Paul's Security Weekly

Play Episode Listen Later Mar 10, 2025 118:32


2025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attacks are so common today, it's impossible to report on all of them. There are signs of hope, however - ransomware payments are significantly down. There are also signs defenders are getting more resilient, and are recovering more quickly from these attacks. Today, with Intel471's Mike Mitchell, we'll discuss what defenders need to know to protect against today's ransomware attacks. He'll share some stories and anecdotes from his experiences with customers. He'll also share some tips, and tricks for successful hunts, and how to catch attacks before even your tools trigger alerts. Segment Resources: https://intel471.com/blog/how-ransomware-may-trend-in-2025 And now, for something completely different! I've always urged the importance for practitioners to understand the underlying technology that they're challenged with defending. When we're yelling at the Linux admins and DevOps folks to "just patch it", what does that process entail? How do those patches get applied? When and how are they released in the first place? This is often one of the sticking points when security folks get nervous about "going open source", as if 90% of the code in their environments doesn't already come from some open source project. It's a legitimate concern however - without a legal contract, and some comfort level that a paid support team is actually going to fix critical vulnerabilities, how do we develop trust or a relationship with an open source project? In this interview, benny Vasquez, the Chair of the board of directors for AlmaLinux, will fill in some of the gaps for us, and help us understand how an open source project can not only be trusted, but in many cases may be more responsive to security teams' needs than a commercial vendor. Segment Resources: benny's 'highly scientific' survey on cloud vs on-prem usage across AlmaLinux users In the enterprise security news, Why is a consulting firm raising a $75M Series B? A TON of Cybereason drama just dropped Skybox Security shuts down after 23 years The chilling effect on security leaders is HERE, and what that means IT interest in on-prem, does NOT mean they're quitting the cloud Updates on the crazy Bybit heist the state of MacOS malware Skype is shutting down Mice with CRISPR'ed woolly mammoth fur is NOT the real life Jurassic Park anyone was expecting All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-397

Enterprise Security Weekly (Audio)
Ransomware Attacks a Decade In: What Changed? What Didn't? - benny Vasquez, Mike Mitchell - ESW #397

Enterprise Security Weekly (Audio)

Play Episode Listen Later Mar 10, 2025 118:32


2025 brings us close to an interesting milestone - ransomware attacks, in their current, enterprise-focused form, are almost a decade old. These attacks are so common today, it's impossible to report on all of them. There are signs of hope, however - ransomware payments are significantly down. There are also signs defenders are getting more resilient, and are recovering more quickly from these attacks. Today, with Intel471's Mike Mitchell, we'll discuss what defenders need to know to protect against today's ransomware attacks. He'll share some stories and anecdotes from his experiences with customers. He'll also share some tips, and tricks for successful hunts, and how to catch attacks before even your tools trigger alerts. Segment Resources: https://intel471.com/blog/how-ransomware-may-trend-in-2025 And now, for something completely different! I've always urged the importance for practitioners to understand the underlying technology that they're challenged with defending. When we're yelling at the Linux admins and DevOps folks to "just patch it", what does that process entail? How do those patches get applied? When and how are they released in the first place? This is often one of the sticking points when security folks get nervous about "going open source", as if 90% of the code in their environments doesn't already come from some open source project. It's a legitimate concern however - without a legal contract, and some comfort level that a paid support team is actually going to fix critical vulnerabilities, how do we develop trust or a relationship with an open source project? In this interview, benny Vasquez, the Chair of the board of directors for AlmaLinux, will fill in some of the gaps for us, and help us understand how an open source project can not only be trusted, but in many cases may be more responsive to security teams' needs than a commercial vendor. Segment Resources: benny's 'highly scientific' survey on cloud vs on-prem usage across AlmaLinux users In the enterprise security news, Why is a consulting firm raising a $75M Series B? A TON of Cybereason drama just dropped Skybox Security shuts down after 23 years The chilling effect on security leaders is HERE, and what that means IT interest in on-prem, does NOT mean they're quitting the cloud Updates on the crazy Bybit heist the state of MacOS malware Skype is shutting down Mice with CRISPR'ed woolly mammoth fur is NOT the real life Jurassic Park anyone was expecting All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-397

Paul's Security Weekly TV
Cybereason CEO quits, Skybox shuts down, More Bybit heist details - ESW #397

Paul's Security Weekly TV

Play Episode Listen Later Mar 10, 2025 51:34


In the enterprise security news, Why is a consulting firm raising a $75M Series B? A TON of Cybereason drama just dropped Skybox Security shuts down after 23 years The chilling effect on security leaders is HERE, and what that means IT interest in on-prem, does NOT mean they're quitting the cloud Updates on the crazy Bybit heist the state of MacOS malware Skype is shutting down Mice with CRISPR'ed woolly mammoth fur is NOT the real life Jurassic Park anyone was expecting All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-397

Enterprise Security Weekly (Video)
Cybereason CEO quits, Skybox shuts down, More Bybit heist details - ESW #397

Enterprise Security Weekly (Video)

Play Episode Listen Later Mar 10, 2025 51:34


In the enterprise security news, Why is a consulting firm raising a $75M Series B? A TON of Cybereason drama just dropped Skybox Security shuts down after 23 years The chilling effect on security leaders is HERE, and what that means IT interest in on-prem, does NOT mean they're quitting the cloud Updates on the crazy Bybit heist the state of MacOS malware Skype is shutting down Mice with CRISPR'ed woolly mammoth fur is NOT the real life Jurassic Park anyone was expecting All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-397

Geeks Of The Valley
#107: From Big Platforms to Big Ambitions with Optimist Ventures' Teddy Himler

Geeks Of The Valley

Play Episode Listen Later Feb 24, 2025 28:15


Teddy Himler brings over 15 years of global experience at leading institutions, including Goldman Sachs, SoftBank, Comcast Ventures, and Antler, to his role at Optimist Ventures.Throughout his career, Teddy has cultivated deep expertise in global technology trends, innovative business models, and firm-building, with a focus on sectors such as artificial intelligence, insurance, healthcare, and industrial automation.At Antler, Teddy served as a partner, where he played a key role in the firm's growth, helping it become the world's most active early-stage venture capital firm by deal count.Prior to Antler, Teddy was instrumental in scaling SoftBank's operations in both the U.S. and Southeast Asia. In 2018, he launched SoftBank Group International's first New York City office, where he managed assets outside of SoftBank's Vision Fund, including Arm, Sprint, Boston Dynamics, and Brightstar. Earlier, as SoftBank Capital's first West Coast hire, Teddy served as Vice President, spearheading its Southeast Asia strategy from Jakarta while collaborating with partners like Alibaba.From 2018 to 2021, Teddy was a Principal at Comcast Ventures in New York, where he focused on investments in consumer internet, robotics, fintech (including insurtech and crypto), and other emerging technologies as part of Comcast's corporate venture capital platform.Teddy began his career at Goldman Sachs as an investment banking analyst in the Technology, Media & Telecom group in San Francisco. He holds a B.A. in Government and Economics from Harvard University.Over the years, Teddy has backed five unicorns at the seed or Series A stages and has been a deal team leader or member in numerous landmark investments, including Kabbage, Fitbit, Dialpad, BigCommerce, Grab, Tokopedia, Cheddar, Acorns, Hippo, Blockdaemon, Madison Reed, Blockchange, ABL Space, KeyMe, Arm, Boston Dynamics, SoftBank Robotics, Sprint, Cybereason, Zola, SoFi, Airspan, OneWeb, Kindbody, Berkshire Grey, Lemonade, Brightstar, Airalo, Earlytrade, Folio, Ora Health, Endless Health, and Inshur.Teddy's career reflects a track record of identifying transformative technologies and building global ventures, making him a key figure in the venture capital ecosystem.LinkedIn: https://www.linkedin.com/in/teddy-himler-84674719/

Malicious Life
Cuckoo Spear [B-Side]

Malicious Life

Play Episode Listen Later Nov 20, 2024 30:43


APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT & Instrastructure organizations using a sophisticated backdoor malware known as LODEINFO. Recently, Jin Ito & Loic Castel, researchers from Cybereason's IR Team, uncovered a new tool used by the group: NOOPDOOR, which incorporates highly sophisticated persistence mechanisms, allowing APT-10 to evade detection and remain inside enterprise networks for two or even three years. Our Sponsors:* Check out 1Password and use my code MALICIOUS for a great deal: 1password.comAdvertising Inquiries: https://redcircle.com/brands

Paul's Security Weekly TV
Funding, Trustwave/Cybereason, NVIDIA Morpheus AI SOC, and the job situation is bad - ESW #384

Paul's Security Weekly TV

Play Episode Listen Later Nov 16, 2024 54:28


This week in the enterprise security news, Upwind Security gets a massive $100M Series B Trustwave and Cybereason merge NVIDIA wants to force SOC analyst millennials to socialize with AI agents Has the cybersecurity workforce peaked? Why incident response is essential for resilience an example of good product marketing who is Salvatore Verini, Jr. and why does he have all my data? All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-384

Enterprise Security Weekly (Video)
Funding, Trustwave/Cybereason, NVIDIA Morpheus AI SOC, and the job situation is bad - ESW #384

Enterprise Security Weekly (Video)

Play Episode Listen Later Nov 16, 2024 54:28


This week in the enterprise security news, Upwind Security gets a massive $100M Series B Trustwave and Cybereason merge NVIDIA wants to force SOC analyst millennials to socialize with AI agents Has the cybersecurity workforce peaked? Why incident response is essential for resilience an example of good product marketing who is Salvatore Verini, Jr. and why does he have all my data? All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-384

Paul's Security Weekly
AI and the Autonomous SOC - Separating Hype from Reality - Justin Beals, Itai Tevet - ESW #384

Paul's Security Weekly

Play Episode Listen Later Nov 15, 2024 116:05


There have been a lot of bold claims about how generative AI and machine learning will transform the SOC. Ironically, the SOC was (arguably) invented only because security products failed to make good on bold claims. The cybersecurity market is full of products that exist only to solve the problems created by other security products (Security Analytics, SOC Automation, Risk-Based Vulnerability Management). Other products are natural evolutions and pick up where others leave off. In this interview, we'll explore what AI can and can't do, particularly when it comes to alert triage and other common SOC tasks. Segment Resources: From Forrester: Generative AI Will Not Fulfill Your Autonomous SOC Hopes (Or Even Your Demo Dreams) From Intezer: Mastering SOC Automation in 2024: Tips, Trends and Tools The Future of SOC Automation Platforms SentinelOne wants to make the autonomous SOC a reality Naturally, the next approach to try is a federated one. How do we break down cybersecurity into more bite-sized components? How do we alleviate all this CISO stress we've heard about, and make their job seem less impossible than it does today? This will be a more standards and GRC focused discussion, covering: the reasons why cross-walking doesn't work the reasons why traditional TPRM approaches (e.g. questionnaires) don't work opportunities for AI to help risk management or sales support? This week in the enterprise security news, Upwind Security gets a massive $100M Series B Trustwave and Cybereason merge NVIDIA wants to force SOC analyst millennials to socialize with AI agents Has the cybersecurity workforce peaked? Why incident response is essential for resilience an example of good product marketing who is Salvatore Verini, Jr. and why does he have all my data? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-384

Enterprise Security Weekly (Audio)
AI and the Autonomous SOC - Separating Hype from Reality - Justin Beals, Itai Tevet - ESW #384

Enterprise Security Weekly (Audio)

Play Episode Listen Later Nov 15, 2024 116:05


There have been a lot of bold claims about how generative AI and machine learning will transform the SOC. Ironically, the SOC was (arguably) invented only because security products failed to make good on bold claims. The cybersecurity market is full of products that exist only to solve the problems created by other security products (Security Analytics, SOC Automation, Risk-Based Vulnerability Management). Other products are natural evolutions and pick up where others leave off. In this interview, we'll explore what AI can and can't do, particularly when it comes to alert triage and other common SOC tasks. Segment Resources: From Forrester: Generative AI Will Not Fulfill Your Autonomous SOC Hopes (Or Even Your Demo Dreams) From Intezer: Mastering SOC Automation in 2024: Tips, Trends and Tools The Future of SOC Automation Platforms SentinelOne wants to make the autonomous SOC a reality Naturally, the next approach to try is a federated one. How do we break down cybersecurity into more bite-sized components? How do we alleviate all this CISO stress we've heard about, and make their job seem less impossible than it does today? This will be a more standards and GRC focused discussion, covering: the reasons why cross-walking doesn't work the reasons why traditional TPRM approaches (e.g. questionnaires) don't work opportunities for AI to help risk management or sales support? This week in the enterprise security news, Upwind Security gets a massive $100M Series B Trustwave and Cybereason merge NVIDIA wants to force SOC analyst millennials to socialize with AI agents Has the cybersecurity workforce peaked? Why incident response is essential for resilience an example of good product marketing who is Salvatore Verini, Jr. and why does he have all my data? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-384

The Last American Vagabond
Calls For Kushner Investigated As Agent Of I̶s̶r̶a̶e̶l̶ Saudi Arabia & Cybereason’s Nov 5 Simulation

The Last American Vagabond

Play Episode Listen Later Oct 25, 2024 253:36 Transcription Available


Welcome to The Daily Wrap Up, a concise show dedicated to bringing you the most relevant independent news, as we see it, from the last 24 hours (10/25/24). As always, take the information discussed in the video below and research it for yourself, and come to your own conclusions. Anyone telling you what the truth is, or claiming they have the answer, is likely leading you astray, for one reason or another. Stay Vigilant.  !function(r,u,m,b,l,e){r._Rumble=b,r[b]||(r[b]=function(){(r[b]._=r[b]._||[]).push(arguments);if(r[b]._.length==1){l=u.createElement(m),e=u.getElementsByTagName(m)[0],l.async=1,l.src="https://rumble.com/embedJS/u2q643"+(arguments[1].video?'.'+arguments[1].video:'')+"/?url="+encodeURIComponent(location.href)+"&args="+encodeURIComponent(JSON.stringify([].slice.apply(arguments))),e.parentNode.insertBefore(l,e)}})}(window, document, "script", "Rumble");   Rumble("play", {"video":"v5hvbn9","div":"rumble_v5hvbn9"}); Video Source Links (In Chronological Order): (24) Diana Panchenko

The Cybersecurity Defenders Podcast
#153 - Unpacking the hacker mindset with Ken Westin, Senior Solutions Engineer at LimaCharlie

The Cybersecurity Defenders Podcast

Play Episode Listen Later Sep 10, 2024 35:07


On this episode of The Cybersecurity Defenders Podcast, we unpack the hacker mindset with Ken Westin, Senior Solutions Engineer at LimaCharlie.Ken is a seasoned thought leader in cybersecurity who has spent years analyzing and understanding the intricacies of cyber threats and the methods behind them. Ken has a unique ability to identify emerging trends in the industry and for figuring out how businesses can protect themselves before they fall victim to attacks. Previous to his current role, Ken was the Field CISO at Panther, where he developed workshops and delivered them around the world. His career also includes significant contributions at Cybereason, Elastic, and Splunk, where he drove security growth, developed innovative tools, and shaped industry conversations on cybersecurity. Ken has been a key spokesperson in the industry, frequently quoted in the media and featured at major conferences like Black Hat and DEF CON.Ken recently joined the team at LimaCharlie as a Senior Solutions Engineer, with the intent to use his deep expertise to help organizations build robust security strategies.Ken's reading list:“Daemon” - Daniel Suarez“Cryptonomicon” - Neal Stephenson“The Myth of Normal” - Gabor Maté“Threats: What Every Engineer Should Learn From Star Wars” - Adam Shostack“The Mitrokhin Archive” Christopher Andrew & Vasili Mitrokhin“The Road” - Cormac McCarthyThe song at the end of the podcast:Decrypted Savant - Mercator Misconceptions

Cyber Heroes
Social Engineering, Deep Fakes und die menschliche Psyche

Cyber Heroes

Play Episode Listen Later Jul 8, 2024 32:57


In dieser Folge spricht Milena mit Patrick Buchholz, Distribution & Channel Manager bei Cybereason und Podcasthost bei Zerteilte Zukünfte über Social Engineering, Deep Fakes und die menschliche Psyche.Du willst beim Roundtable von Cybereason dabei sein? Melde dich an: ch-info@cybereason.com.Hast du Themenwünsche, Anmerkungen oder Feedback? Du erreichst uns unter cyberheroes@infinigate.ch.Dies ist ein Podcast der Infinigate (Schweiz) AG.

The CyberWire
Encore: What malicious campaign is lurking under the surface? [Research Saturday]

The CyberWire

Play Episode Listen Later Dec 30, 2023 23:33


Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign. The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used. The research can be found here: Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

Research Saturday
Encore: What malicious campaign is lurking under the surface?

Research Saturday

Play Episode Listen Later Dec 30, 2023 23:33


Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign. The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used. The research can be found here: Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation Learn more about your ad choices. Visit megaphone.fm/adchoices

Talking Cloud with an emphasis on Cloud Security
50-The Talking Cloud Podcast-audio only - Guest - Zohar Alon - President, Product and R&D at Cybereason

Talking Cloud with an emphasis on Cloud Security

Play Episode Listen Later Aug 9, 2023 68:31


This episode features our great friend, Zohar Alon. Geek at heart. Cyber and Cloud pioneer. Will always be Ex-Check Point. Loves building companies (Dome9), now leading Cybereason Product and R&D. Investing in great companies like Firefly, Adaptive Shield, Tamnoon, Laminar, Argon, Safe Base and Descope. Giving back to young entrepreneurs as much as possible.

Paul's Security Weekly
ESW #316 - Theresa Lanowitz, Vinay Anand, Christopher Kruegel, Geoff Bibby, Randy Watkins, Nick Biasini

Paul's Security Weekly

Play Episode Listen Later May 5, 2023 148:18


This week, we start with the news: 2 weeks of news to catch up on! 16 funding stories, 4 M&A stories, Cybereason prunes its valuation… a lot, First Republic Bank seized by FDIC, Ransomware is irrelevant Sun Tzu hates infosec, AI Trends, Kevin Mandia's 7 tips for defense, & How much time should we spend automating tasks?   Christopher will delve into what lateral security/lateral movement are and identify key lateral security tools (network segmentation, micro-segmentation, advanced threat prevention systems, network sandboxes, and network traffic analysis/network detection and response). He will also touch on why automation is important when it comes to consistent security and the current threat landscape.  This segment is sponsored by VMware. Visit https://securityweekly.com/vmwarenetsecrsac to learn more about them!   AT&T Cybersecurity released its 12th annual Cybersecurity Insights Report, “Edge Ecosystem,” which highlights the dramatic shift in computing underpinned by 5G, the edge, and the convergence of networking and security. The report found that business and technology leaders are finally coming together not just to understand the new edge computing ecosystem, but to make more predictable, data-informed business decisions. Collaboration among these leaders, as well as external partners in the ecosystem, will be critical for the edge journey ahead – but more progress must be made to better leverage the edge and transform the business. This segment is sponsored by AT&T Cybersecurity. Visit https://securityweekly.com/attrsac to learn more about them!   EASM is a critical component of continuous threat exposure management and a necessary step in improving validation and vulnerability management processes. Gartner recently published a report describing the evolution of EASM and where it's headed in the market. We're excited to see the market move in this direction because, at NetSPI, we're already committed to investing in our team and technology to stay ahead of these trends. We already have a head start. This segment is sponsored by NetSpi. Visit https://securityweekly.com/netspirsac to learn more about them!   “Man plans, the Universe laughs” - unfortunately, that's been the saying for far too long when it comes to cybersecurity. Security leaders know it's only a matter of time before their organization gets breached, but instead of being ready for it, they rely on fixing the problem after it happens. In Cisco's newest report, the first ever Cybersecurity Readiness Index, it was found that a small minority of businesses globally (15%) consider themselves to be ready and able to defend against the expanding array of cybersecurity risks and threats of today. Organizations need to get ready and stay ready with solutions they can trust. This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them!   OpenText Cybersecurity is on a mission to simplify security by delivering smarter, innovative solutions. Geoff Bibby, the SVP of OpenText Cybersecurity Marketing & Strategy, will offer insight into the company's purpose-built approach to create a powerhouse cybersecurity portfolio that scales to meet the security needs of large enterprises down to individual consumers.  This segment is sponsored by OpenText. Visit https://securityweekly.com/opentextrsac to learn more about them!   The continued headcount shortage facing cybersecurity teams is driving many organizations to embrace Managed Detection and Response (MDR) as a way to combat cyber threats. With this demand, dozens of MDR companies have emerged over the past two years. Critical Start's CTO, Randy Watkins, will discuss the origin of MDR, share evaluation tips, and reveal some of the potential pitfalls. This segment is sponsored by Critical Start. Visit https://securityweekly.com/criticalstartrsac to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw316 

Enterprise Security Weekly (Audio)
ESW #316 - Theresa Lanowitz, Vinay Anand, Christopher Kruegel, Geoff Bibby, Randy Watkins, Nick Biasini

Enterprise Security Weekly (Audio)

Play Episode Listen Later May 5, 2023 148:18


This week, we start with the news: 2 weeks of news to catch up on! 16 funding stories, 4 M&A stories, Cybereason prunes its valuation… a lot, First Republic Bank seized by FDIC, Ransomware is irrelevant Sun Tzu hates infosec, AI Trends, Kevin Mandia's 7 tips for defense, & How much time should we spend automating tasks?   Christopher will delve into what lateral security/lateral movement are and identify key lateral security tools (network segmentation, micro-segmentation, advanced threat prevention systems, network sandboxes, and network traffic analysis/network detection and response). He will also touch on why automation is important when it comes to consistent security and the current threat landscape.  This segment is sponsored by VMware. Visit https://securityweekly.com/vmwarenetsecrsac to learn more about them!   AT&T Cybersecurity released its 12th annual Cybersecurity Insights Report, “Edge Ecosystem,” which highlights the dramatic shift in computing underpinned by 5G, the edge, and the convergence of networking and security. The report found that business and technology leaders are finally coming together not just to understand the new edge computing ecosystem, but to make more predictable, data-informed business decisions. Collaboration among these leaders, as well as external partners in the ecosystem, will be critical for the edge journey ahead – but more progress must be made to better leverage the edge and transform the business. This segment is sponsored by AT&T Cybersecurity. Visit https://securityweekly.com/attrsac to learn more about them!   EASM is a critical component of continuous threat exposure management and a necessary step in improving validation and vulnerability management processes. Gartner recently published a report describing the evolution of EASM and where it's headed in the market. We're excited to see the market move in this direction because, at NetSPI, we're already committed to investing in our team and technology to stay ahead of these trends. We already have a head start. This segment is sponsored by NetSpi. Visit https://securityweekly.com/netspirsac to learn more about them!   “Man plans, the Universe laughs” - unfortunately, that's been the saying for far too long when it comes to cybersecurity. Security leaders know it's only a matter of time before their organization gets breached, but instead of being ready for it, they rely on fixing the problem after it happens. In Cisco's newest report, the first ever Cybersecurity Readiness Index, it was found that a small minority of businesses globally (15%) consider themselves to be ready and able to defend against the expanding array of cybersecurity risks and threats of today. Organizations need to get ready and stay ready with solutions they can trust. This segment is sponsored by Cisco. Visit https://securityweekly.com/ciscorsac to learn more about them!   OpenText Cybersecurity is on a mission to simplify security by delivering smarter, innovative solutions. Geoff Bibby, the SVP of OpenText Cybersecurity Marketing & Strategy, will offer insight into the company's purpose-built approach to create a powerhouse cybersecurity portfolio that scales to meet the security needs of large enterprises down to individual consumers.  This segment is sponsored by OpenText. Visit https://securityweekly.com/opentextrsac to learn more about them!   The continued headcount shortage facing cybersecurity teams is driving many organizations to embrace Managed Detection and Response (MDR) as a way to combat cyber threats. With this demand, dozens of MDR companies have emerged over the past two years. Critical Start's CTO, Randy Watkins, will discuss the origin of MDR, share evaluation tips, and reveal some of the potential pitfalls. This segment is sponsored by Critical Start. Visit https://securityweekly.com/criticalstartrsac to learn more about them!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw316 

Paul's Security Weekly TV
Sun Tzu Vs Infosec, 2 Weeks of News, AI Trends, & De-Horned Unicorns - ESW #316

Paul's Security Weekly TV

Play Episode Listen Later May 5, 2023 71:13


This week, we start with the news: 2 weeks of news to catch up on! 16 funding stories, 4 M&A stories, Cybereason prunes its valuation… a lot, First Republic Bank seized by FDIC, Ransomware is irrelevant Sun Tzu hates infosec, AI Trends, Kevin Mandia's 7 tips for defense, & How much time should we spend automating tasks?   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw316 

Enterprise Security Weekly (Video)
Sun Tzu Vs Infosec, 2 Weeks of News, AI Trends, & De-Horned Unicorns - ESW #316

Enterprise Security Weekly (Video)

Play Episode Listen Later May 5, 2023 71:13


This week, we start with the news: 2 weeks of news to catch up on! 16 funding stories, 4 M&A stories, Cybereason prunes its valuation… a lot, First Republic Bank seized by FDIC, Ransomware is irrelevant Sun Tzu hates infosec, AI Trends, Kevin Mandia's 7 tips for defense, & How much time should we spend automating tasks?   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw316 

It's 5:05! Daily cybersecurity and open source briefing
Episode #132 - Top 5 Cyberattacks in 2023, Malvertising, Cybereason, ChatGPT Banned

It's 5:05! Daily cybersecurity and open source briefing

Play Episode Listen Later May 2, 2023 12:11


Hey, it's 5:05 on Tuesday, May 2nd. 2023. From The Sourced Podcast network in New York city, this is your host Pokie Huang. Stories in today's episode come from Edwin Kwan in Sydney, Australia, Katy Craig in San Diego, California, Ian Garrett in Arlington, Virginia, Olimpiu Pop in Transylvania, Romania and Marcel brown in St. Louis, Missouri. Let's get to it. Top 5 Most Dangerous New Cyberattacks for 2023

Paul's Security Weekly
ESW #313 - Pablo Zurro, Travis Howerton

Paul's Security Weekly

Play Episode Listen Later Apr 14, 2023 147:37


Fortra's Core Security has conducted it's fourth annual survey of cybersecurity professionals on the usage and perception of pen testing. The data collected provides visibility into the full spectrum of pen testing's role, helping to determine how these services, tools, and skills must evolve.   Segment Resources:  https://www.fortra.com/resources/guides/2023-pen-testing-report   This segment is sponsored by Fortra's Core Security. Visit https://securityweekly.com/fortracoresecurity to learn more about them!   Compliance with cyber security frameworks such as NIST, PCI, HIPAA, etc. have largely been driven by paper-based processes in Word and Excel. With the rise of cloud computing, containers, and ephemeral systems, paper-based processes can no longer keep up with the speed of business and compliance has become the new bottleneck to progress for highly regulated industries such as government, finance, and energy sector. This session will cover how RegScale is leading a RegOps movement to bring the principles of DevOps to compliance with the world's first real-time GRC system that enables compliance as code via NIST OSCAL. RegOps seeks to shift compliance left to make it real-time, continuous, and complete so that paperwork is always up to date, self-updating, and takes less manual resources to manage.  Segment Resources: Website – https://www.regscale.com Documentation/Learn More – https://regscale.readme.io   In this news segment, we discuss the art of branding/naming security companies, some new cars just out of stealth, 5 startups just out of Y Combinator, and Cybereason's $100M round from Softbank. We also talk new features (Semgrep's new GPT-4 use case), new newsletters, and new reports. We break down Nexx's broken vulnerability disclosure program and its broken products. We also discuss the FDA's new ability to block device certification for security reasons. Android announces rules to make it easier for consumers to delete accounts and remove data when they uninstall apps. IT and Security professionals everywhere are asked not to report breaches, but in some countries more than others. CISOs are more prone to drinking problems, and finally, for our squirrel stories, we discuss a crazy app called Newnew and new ideas in prosthetics.   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw313 

Enterprise Security Weekly (Audio)
ESW #313 - Pablo Zurro, Travis Howerton

Enterprise Security Weekly (Audio)

Play Episode Listen Later Apr 14, 2023 147:37


Fortra's Core Security has conducted it's fourth annual survey of cybersecurity professionals on the usage and perception of pen testing. The data collected provides visibility into the full spectrum of pen testing's role, helping to determine how these services, tools, and skills must evolve.   Segment Resources:  https://www.fortra.com/resources/guides/2023-pen-testing-report   This segment is sponsored by Fortra's Core Security. Visit https://securityweekly.com/fortracoresecurity to learn more about them!   Compliance with cyber security frameworks such as NIST, PCI, HIPAA, etc. have largely been driven by paper-based processes in Word and Excel. With the rise of cloud computing, containers, and ephemeral systems, paper-based processes can no longer keep up with the speed of business and compliance has become the new bottleneck to progress for highly regulated industries such as government, finance, and energy sector. This session will cover how RegScale is leading a RegOps movement to bring the principles of DevOps to compliance with the world's first real-time GRC system that enables compliance as code via NIST OSCAL. RegOps seeks to shift compliance left to make it real-time, continuous, and complete so that paperwork is always up to date, self-updating, and takes less manual resources to manage.  Segment Resources: Website – https://www.regscale.com Documentation/Learn More – https://regscale.readme.io   In this news segment, we discuss the art of branding/naming security companies, some new cars just out of stealth, 5 startups just out of Y Combinator, and Cybereason's $100M round from Softbank. We also talk new features (Semgrep's new GPT-4 use case), new newsletters, and new reports. We break down Nexx's broken vulnerability disclosure program and its broken products. We also discuss the FDA's new ability to block device certification for security reasons. Android announces rules to make it easier for consumers to delete accounts and remove data when they uninstall apps. IT and Security professionals everywhere are asked not to report breaches, but in some countries more than others. CISOs are more prone to drinking problems, and finally, for our squirrel stories, we discuss a crazy app called Newnew and new ideas in prosthetics.   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw313 

Paul's Security Weekly TV
Flood of new startups coming out of stealth, new newsletters, hiding breaches - ESW #313

Paul's Security Weekly TV

Play Episode Listen Later Apr 14, 2023 66:47


In this news segment, we discuss the art of branding/naming security companies, some new cars just out of stealth, 5 startups just out of Y Combinator, and Cybereason's $100M round from Softbank. We also talk new features (Semgrep's new GPT-4 use case), new newsletters, and new reports. We break down Nexx's broken vulnerability disclosure program and its broken products. We also discuss the FDA's new ability to block device certification for security reasons. Android announces rules to make it easier for consumers to delete accounts and remove data when they uninstall apps. IT and Security professionals everywhere are asked not to report breaches, but in some countries more than others. CISOs are more prone to drinking problems, and finally, for our squirrel stories, we discuss a crazy app called Newnew and new ideas in prosthetics.   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw313 

Enterprise Security Weekly (Video)
Flood of new startups coming out of stealth, new newsletters, hiding breaches - ESW #313

Enterprise Security Weekly (Video)

Play Episode Listen Later Apr 14, 2023 66:47


In this news segment, we discuss the art of branding/naming security companies, some new cars just out of stealth, 5 startups just out of Y Combinator, and Cybereason's $100M round from Softbank. We also talk new features (Semgrep's new GPT-4 use case), new newsletters, and new reports. We break down Nexx's broken vulnerability disclosure program and its broken products. We also discuss the FDA's new ability to block device certification for security reasons. Android announces rules to make it easier for consumers to delete accounts and remove data when they uninstall apps. IT and Security professionals everywhere are asked not to report breaches, but in some countries more than others. CISOs are more prone to drinking problems, and finally, for our squirrel stories, we discuss a crazy app called Newnew and new ideas in prosthetics.   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw313 

Paul's Security Weekly
ESW #295 - John Grancarich, Alan Radford

Paul's Security Weekly

Play Episode Listen Later Nov 4, 2022 144:31


Positive change is coming to cybersecurity. In this segment, John Grancarich, EVP of Strategy at Fortra, explains what it means when we say we're tenacious in our pursuit of a stronger, simpler future for cybersecurity, and that our advanced threat research and intelligence informs everything we do. This segment is sponsored by Fortra. Visit https://securityweekly.com/fortra to learn more about them!   Gartner recently reported that the RPA software market will reach $2.9 billion by the end of 2022, up 19.5% from 2021. But, despite Airlines adopting it to help with cancellations and retail for inventory management, we're not talking about the security risk this tech will cause. Alan Radford, Global IAM Strategist at One Identity discusses the truly devastating impact that can occur when an organization leaves its RPA program vulnerable and without any identity and access protection, why realizing that machines have identities too could save us from dangerous RPA breaches in the future, and steps companies can take to secure their RPA technology as more companies continue to implement it.   Finally, in the enterprise security news, 12 funding announcements, 1Password acquires Passage, Layoffs continue with another round at Cybereason, FTC takes action against Drizly's CEO, everything you need to know about new US data privacy legislation, Cisco Meraki devices in Russia go POP! Young silicon valley workers are in for a shock, Ransomware trends, MFA trends, US officials say tech companies need to build secure products, All that and lots more, on this episode of Enterprise Security Weekly!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw295

Enterprise Security Weekly (Audio)
ESW #295 - John Grancarich, Alan Radford

Enterprise Security Weekly (Audio)

Play Episode Listen Later Nov 4, 2022 144:31


Positive change is coming to cybersecurity. In this segment, John Grancarich, EVP of Strategy at Fortra, explains what it means when we say we're tenacious in our pursuit of a stronger, simpler future for cybersecurity, and that our advanced threat research and intelligence informs everything we do. This segment is sponsored by Fortra. Visit https://securityweekly.com/fortra to learn more about them!   Gartner recently reported that the RPA software market will reach $2.9 billion by the end of 2022, up 19.5% from 2021. But, despite Airlines adopting it to help with cancellations and retail for inventory management, we're not talking about the security risk this tech will cause. Alan Radford, Global IAM Strategist at One Identity discusses the truly devastating impact that can occur when an organization leaves its RPA program vulnerable and without any identity and access protection, why realizing that machines have identities too could save us from dangerous RPA breaches in the future, and steps companies can take to secure their RPA technology as more companies continue to implement it.   Finally, in the enterprise security news, 12 funding announcements, 1Password acquires Passage, Layoffs continue with another round at Cybereason, FTC takes action against Drizly's CEO, everything you need to know about new US data privacy legislation, Cisco Meraki devices in Russia go POP! Young silicon valley workers are in for a shock, Ransomware trends, MFA trends, US officials say tech companies need to build secure products, All that and lots more, on this episode of Enterprise Security Weekly!   Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly   Show Notes: https://securityweekly.com/esw295

Paul's Security Weekly TV
FTC Against Drizly's CEO, 12 Funding Announcements, Cisco Meraki, & MFA Trends - ESW #295

Paul's Security Weekly TV

Play Episode Listen Later Nov 4, 2022 52:13


Finally, in the enterprise security news, 12 funding announcements, 1Password acquires Passage, Layoffs continue with another round at Cybereason, FTC takes action against Drizly's CEO, everything you need to know about new US data privacy legislation, Cisco Meraki devices in Russia go POP! Young silicon valley workers are in for a shock, Ransomware trends, MFA trends, US officials say tech companies need to build secure products, All that and lots more, on this episode of Enterprise Security Weekly!   Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw295

The Perfect Storm
Episode 32: with Matt Hagovsky

The Perfect Storm

Play Episode Listen Later Oct 6, 2022 40:38


Matthew meets with Matt Hagovsky, the North American Sales Engineering VP for Cybereason. They discuss how Cybereason approaches endpoint attacks by distilling all alerts into one to help users map out their cyber vulnerabilities in a quicker and more useful way. They also talk about how detection endpoint response has advanced over the years and how cyber companies with different resources have adapted to these technologies. They mention the differences between MDR (Managed Detection & Response) and EDR (Endpoint Detection & Response) and how they could affect your choice of MSP (Market Service Provider).

The CTO Advisor
Iztik Moshaof VMware Explore 2022

The CTO Advisor

Play Episode Listen Later Sep 21, 2022


Iztik Moshaof, Sr. Director of Global IT at Cybereason, shares Cybereason's Multi-Cloud journey, including AWS, Oracle Cloud Infrastructure, and Microsoft Azure. Keith and Iztik met at VMware 2022 and discuss Oracle Cloud VMware Solution on the set of the CTO Advisor Studio.

@BEERISAC: CPS/ICS Security Podcast Playlist
Software Bill of Materials (SBOM) [ML B-side]

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 31, 2022 25:20


Podcast: Malicious Life (LS 58 · TOP 0.5% what is this?)Episode: Software Bill of Materials (SBOM) [ML B-side]Pub date: 2022-08-31 In May 2021, Following the Solarwinds and the Colonial Pipeline attacks, the Biden administration published a presidential Executive Order mandating the use of SBOMs – Software Bill of Materials – in all government agencies. What are SBOMs and how useful are they in cybersecurity? Nate Nelson talks to two experts: Allan Friedman (CISA) and Chris Blask (Cybeats). The podcast and artwork embedded on this page are from Cybereason, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

@BEERISAC: CPS/ICS Security Podcast Playlist
“A CISO's Nightmare”: Israel Baron on Railway Secuirty

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 17, 2022 26:26


Podcast: Malicious Life (LS 58 · TOP 0.5% what is this?)Episode: “A CISO's Nightmare”: Israel Baron on Railway SecuirtyPub date: 2022-08-15 Railway systems are a mess of old systems built on top of older systems, running ancient operating systems and exposing their most sensitive inner workings to commuters via Wifi. Why are railway systems so difficult to defend, and what are the most probable attack vectors against them? Nate Nelson, our Sr. producer, speaks with Israel Baron, Israel Railway’s first ever CISO. The podcast and artwork embedded on this page are from Cybereason, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The CyberWire
What malicious campaign is lurking under the surface? [Research Saturday]

The CyberWire

Play Episode Listen Later Jul 30, 2022 22:48 Very Popular


Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign. The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used. The research can be found here: Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

Research Saturday
What malicious campaign is lurking under the surface?

Research Saturday

Play Episode Listen Later Jul 30, 2022 22:48


Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign. The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used. The research can be found here: Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

Darknet Diaries
121: Ed

Darknet Diaries

Play Episode Listen Later Jul 26, 2022 44:56 Very Popular


In this episode we hear some penetration test stories from Ed Skoudis (twitter.com/edskoudis). We also catch up with Beau Woods (twitter.com/beauwoods) from I am The Cavalry (iamthecavalry.org). Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Zscalar. Zscalar zero trust exchange will scrutinize the traffic and permit or deny traffic based on a set of rules. This is so much more secure than letting data flow freely internally. And it really does mitigate ransomware outbreaks. The Zscaler Zero Trust Exchange gives YOU confidence in your security to feel empowered to focus on other parts of your business, like digital transformation, growth, and innovation. Check out the product at zscaler.com/darknet. Support for this podcast comes from Cybereason. Cybereason reverses the attacker's advantage and puts the power back in the defender's hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet. View all active sponsors. Attribution Darknet Diaries is created by Jack Rhysider. Editing by Damienne. Assembled by Tristan Ledger. Sound designed by Andrew Meriwether. Episode artwork by odibagas. Audio cleanup by Proximity Sound. Theme music created by Breakmaster Cylinder. 

Darknet Diaries
Presenting: Click Here "Lapsus$"

Darknet Diaries

Play Episode Listen Later Jul 12, 2022 35:26 Very Popular


We're going to play two stories for you today. First is a story that comes from the podcast Click Here, hosted by Dina Temple Raston. It's about Lapsus$. Then after that Jack Rhysider tells a story about a sewage plant in Australia that had a big problem. You can find more episode of Click Here on your favorite podcast player or by visiting https://ClickHereShow.com. Sponsors Support for this show comes Snyk. Snyk is a developer security platform that helps you secure your applications from the start. It automatically scans your code, dependencies, containers, and cloud infrastructure configs — finding and fixing vulnerabilities in real time. Create your free account at https://snyk.co/darknet. Support for this show comes from Linode. Linode supplies you with virtual servers. Visit [linode.com/darknet](https://linode.com/darknet) and get a special offer. Support for this podcast comes from Cybereason. Cybereason reverses the attacker's advantage and puts the power back in the defender's hands. End cyber attacks. From endpoints to everywhere.

Darknet Diaries
120: Voulnet

Darknet Diaries

Play Episode Listen Later Jun 28, 2022 34:50 Very Popular


This is the story about when Mohammed Aldoub, AKA Voulnet, (twitter.com/Voulnet) found a vulnerability on Virus Total and Tweeted about it. Sponsors Support for this podcast comes from Cybereason. Cybereason reverses the attacker's advantage and puts the power back in the defender's hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet. Support for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Sources https://www.cyberscoop.com/story/trial-error-kuwait-mohammed-aldoub-case/

SWFL Business Podcast
10: John Schlager, Lee Noriega, and Sam Curry from Inceptus and Cybereason

SWFL Business Podcast

Play Episode Listen Later May 19, 2022 44:50


"The temptation is to think the cost of ransomware as 'What's the ransom? How much do I have to pay?' That's just a fraction of it." Welcome to the SWFL Business Podcast, where we interview business owners in the Southwest Florida area to learn about their business and where they're heading. Today's guests are John Schlager (CEO) and Lee Noriega (COO) of Inceptus, and Sam Curry (CSO) of Cybereason. Do you know what ransomware is? You may have heard it in the news, especially when a major company like Target is attacked. Maybe a company in your industry had their data held for ransom. Maybe your company. Either way, the cost of a ransomware attack goes deeper than you think. We're joined by John, Lee, and Sam to discuss the unconsidered impacts of ransomware attacks on your business, the methods attackers use to breach systems, and a "zero trust" or "least trust" approach to defending yourself and mitigating the risks of cyber attacks on your business. Implementing these practices comes from the C-suite. Listen to how they reframe the conversation around cybersecurity in a way that executives can understand: risk mitigation. Listen on Apple Podcasts: https://apple.co/3NYks1F (https://apple.co/3NYks1F) Listen on Spotify: https://spoti.fi/3x1rufI (https://spoti.fi/3x1rufI) Watch on YouTube: https://bit.ly/3j69E3g (https://bit.ly/3j69E3g) Connect with Sam on LinkedIn at https://www.linkedin.com/in/currysam/ (https://www.linkedin.com/in/currysam/) Learn more about the work Cybereason is doing by visiting https://www.cybereason.com/ (https://www.cybereason.com/) Connect with John on LinkedIn at https://www.linkedin.com/in/schlagej/ (https://www.linkedin.com/in/schlagej/) Connect with Lee on LinkedIn at https://www.linkedin.com/in/lnoriega/ (https://www.linkedin.com/in/lnoriega/) Learn more about Inceptus and reach out them by visiting https://inceptussecure.com/home (https://inceptussecure.com/home) Like what you hear? Want to have your own podcast produced in the Bonita Springs, FL area? Visit www.swflpodcasts.com to learn more.

Darknet Diaries
117: Daniel the Paladin

Darknet Diaries

Play Episode Listen Later May 17, 2022 71:38 Very Popular


Daniel Kelley (https://twitter.com/danielmakelley) was equal parts mischievousness and clever when it came to computers. Until the day his mischief overtook his cleverness. Sponsors Support for this show comes from Keeper Security. Keeper Security's is an enterprise password management system. Keeper locks down logins, payment cards, confidential documents, API keys, and database passwords in a patented Zero-Knowledge encrypted vault. And, it takes less than an hour to deploy across your organization. Get started by visiting keepersecurity.com/darknet. Support for this podcast comes from Cybereason. Cybereason reverses the attacker's advantage and puts the power back in the defender's hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.

Malicious Life
Operation CuckooBees [ML B-Side]

Malicious Life

Play Episode Listen Later May 17, 2022 26:06 Very Popular


Assaf Dahan, Threat Research Lead at Cybereason's Nocturnus team, describes a recently discovered cyber-espionage campaign targeting the Defense, Energy, Aerospace, Biotech and Pharma industries conducted by APT 41, AKA Winnti Group - a Chinese state-sponsored APT group known for its stealth and sophistication.

From Vendorship to Partnership
Building Data-Driven Sales Playbooks with Christian Borrelli, VP of Global Sales at CaptivateIQ

From Vendorship to Partnership

Play Episode Listen Later May 4, 2022 18:26


Welcome back to the From Vendorship → Partnership podcast, Season 2: Seller's Journey! Our guest this week is Christian Borrelli, VP of Global Sales at CaptivateIQ! Christian joined CaptivateIQ as one of the first employees, and has scaled the sales team to 100+ since then. In this episode, Christian & Ross chat about the future of B2B startup sales, what most people get wrong about sales at startups, and using data to iterate on your sales process. About Christian: Christian Borrelli leads the sales organization at CaptivateIQ, the leader in commission management software. Prior to joining CaptivateIQ as one of its first employees and scaling the sales team to 100, Christian held finance and operations roles at Siemens, Cybereason, and EMC. He currently resides in Austin, TX.

Darknet Diaries
115: Player Cheater Developer Spy

Darknet Diaries

Play Episode Listen Later Apr 19, 2022 40:51 Very Popular


Some video game players buy cheats to win. Let's take a look at this game cheating industry to see who the players are. Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this podcast comes from Cybereason. Cybereason reverses the attacker's advantage and puts the power back in the defender's hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet.

Channel Journeys Podcast
Stephan Tallent: The Pay as You Grow MSSP Program

Channel Journeys Podcast

Play Episode Listen Later Apr 13, 2022 47:47


Managed Security Services Providers (MSSPs) are a vital component of a cybersecurity vendor's partner ecosystem. When I wanted to learn how to build a best in class MSSP program, I turned to Stephan Tallent, VP of North America MSSPs at Cybereason. Stephan shares the details behind Cybereason's new ‘Pay As You Grow' program designed to … Stephan Tallent: The Pay as You Grow MSSP Program Read More » The post Stephan Tallent: The Pay as You Grow MSSP Program first appeared on Channel Journeys.

Darknet Diaries
113: Adam

Darknet Diaries

Play Episode Listen Later Mar 22, 2022 54:11 Very Popular


Adam got a job doing IT work at a learning academy. He liked it and was happy there and feeling part of the team. But a strange series of events took him in another direction, that definitely didn't make him happy. Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this podcast comes from Cybereason. Cybereason reverses the attacker's advantage and puts the power back in the defender's hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet. Support for this show comes from Varonis. Do you wonder what your company's ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet.

The Gary Null Show
The Gary Null Show - 03.16.22

The Gary Null Show

Play Episode Listen Later Mar 16, 2022 50:32


Eating nuts and peanuts associated with reduced overall, cardiovascular death   Vanderbilt University School of Medicine, March 2, 2022   Eating nuts and peanuts was associated with a reduced risk of overall death and death from cardiovascular disease across different ethnic groups and among individuals with low socioeconomic status, which suggests that peanuts, because of their affordability, may be a cost-effective measure to improve cardiovascular health, according to an article published by JAMA Internal Medicine. The authors analyzed three large study groups involving 71,764 low-income black and white men and women living in the southeastern United States and 134,265 Chinese men and women living in Shanghai, China. Men in both the U.S. and Chinese study participant groups consumed more peanuts than women. In the U.S. group, about 50 percent of the nut/peanut consumption was peanuts and in the participant groups from China only peanut consumption was assessed.   (NEXT)   People with diabetes who eat less processed food at night may live longer   Study finds eating carbs earlier in the day is linked to better heart health   Harbin Medical University (China), March 15, 2022   The time of day that people with diabetes eat certain foods may be just as important to their well-being as portion size and calories, according to a new study published in the Endocrine Society's Journal of Clinical Endocrinology and Metabolism. Mealtimes should be in line with the biological clock—a natural, internal process that regulates the sleep–wake cycle and repeats every 24 hours. Health outcomes for people with diabetes may be improved if certain foods are eaten at different times of the day.   (NEXT)   Researchers find out why yogurt lowers the risk of developing diabetes   Université of Laval (Quebec), March 15, 2022    Scientists have known for some years that eating yogurt is associated with a reduced risk of diabetes, but the reasons behind this protective effect were unclear. A study published today in Nature Communications reveals that this protection could come partly from the gut microbiota as well as from specific metabolites produced by the lactic bacteria in yogurt. “These metabolites, called branched chain hydroxy acids (BCHA), result from the action of yogurt lactic bacteria on naturally occurring amino acids in milk. “ The researchers made this discovery when observing the effects of yogurt on mice fed a diet rich in sugars and fats. One of the groups was given the equivalent of two daily servings of yogurt. After the 12-week experiment, the researchers found better control of blood sugar, insulin resistance, and liver function in the yogurt fed group. They then analyzed all the metabolites present in their livers and observed changes in BCHA.   (NEXT)   Low blood folate may be linked to heightened dementia and death risks in older people   Icahn School of Medicine at Mount Sinai, March 15, 2022   Low levels of folate (vitamin B9) in the blood may be linked to a heightened risk of dementia and death from any cause in older people, suggests research published online in the journal Evidence Based Mental Health. Levels should be routinely monitored and deficiencies corrected in older age, especially given that blood levels of folate tend to tail off with age, with up to 1 in 5 older adults estimated to be folate deficient, say the researchers. The evidence to date suggests that folate deficiency affects cognition and nerve signaling in the brain, making it a possible risk factor for subsequent dementia.   (OTHER NEWS)   Darktrace and Cybereason: The Intelligence Front Companies Seeking to Subjugate the World with the A.I. Singularity   Meet two power cybersecurity companies riddled with American, British, and Israeli intelligence agents who plan on using AI technology to target foreign populations as well as their own. BY JOHNNY VEDMORE UNLIMITED HANGOUT NOVEMBER 3, 2020   We have all been dreaming, a dream where you can float or glide across your dreamscape effortlessly. This leads to the feeling of trepidation, as though you have the ability to let go, and if you do let go, you'll either soar or fall. We're now at a point in history where either the coming events will be studied for thousands of years, or it will be remembered as the point where we lost our humanity completely. Artificial Intelligence (A.I.) technology has entered a new phase over the past several years, where instead of the A.I. algorithms learning from humans, they are now teaching themselves, changing their own algorithms as they learn. We are on the cusp of letting go of control entirely, so early on, because of a few small companies who have quietly been given free reign under the guise of “protecting” our digital lives, all within a tech sector that is moving so fast that we can no longer see what's just around the bend. The entire free thinking population of Earth would love a little more time to discuss such epochal change. However, the technocrats and scientists, supported by venture capitalists, are already putting into action the future before the masses have a chance to even consider discussing its consequences. With very little legislation governing A.I. technologies on the books, our governments are eager to get every tech pioneer inventing whilst there is no accountability for any resulting harm. We're not talking major societal disruption, we're talking about a potential extinction level event of our own creation. Where we should be taking cautious baby steps, instead we're expecting to fly just by letting go. We are about to experience a monumental change in technology, starting with “next-generation” cybersecurity that will then move quickly into the unknown. Unsupervised A.I., now running on critical networks throughout the world as a “cybersecurity” product, is evolving its own algorithm without the need for humans to be involved. Meanwhile, the wealthy patrons funding this cutting edge future tech are out in force, working to propel our societies into this new, unexplored and dystopian technological frontier. But who are the companies that these eager wealthy venture capitalists are funding to create an autonomous, A.I.-powered cyber defence system like never before? Are they even companies at all when we consider their deep and direct ties to intelligence agencies? Should these firms instead be reclassified as simply extensions of state intelligence apparatus acting without the restrictions of public accountability? Each of these companies have been built by teams of former intelligence operatives, some of who have sat in the highest echelons of the intelligence apparati of their respective countries. MI5 and C.I.A. both carry considerable weight in these sinister sounding enterprises, but it is Israel's Unit 8200 that are the main group capitalising on this advance into the world-altering realm of unsupervised Artificial Intelligence algorithms. Yet, these very companies appear to be selling a defence against a potential apocalypse that they themselves may be responsible for. They have the solutions to everyone's cyber-woes, or at least that's the image they wish to portray. Let me introduce you to the most dangerous intelligence operations masquerading as cybersecurity companies on planet Earth. Darktrace – The Unsupervised Machine Learning A.I. Cybersecurity Solution The members of Darktrace are open about their aims. They talk about publicly held dataas though they already have the rights to sell it to anyone around the world. Data is the fuel of the Fourth Industrial Revolution and Darktrace has made almost $2 billion in the data business during its relatively short history, reaching Unicorn status with great ease. When Darktrace first launched its website in 2013, its description of the company's vision was entitled, “The New Normal: Learn Human and Machine Behavior to Reduce Cyber Security Risks.” Back then we were less familiar with the term “the new normal,” but now it surrounds us. Darktrace is already active within the NHS, the U.K. power grid, and many other major parts of Britain's critical infrastructure and they are rapidly expanding around the globe. Dave Palmer was an MI5 anti-terror agent working on the 2012 London Olympics when he and some of his colleagues first bashed out the initial idea for what would become Darktrace. They wanted to create an A.I. cybersecurity system that was based on the human immune system, a system that differed from the traditional, reactive antivirus software approach. This system would look for abnormalities in a computer network's processes to target a wider range of more sophisticated cyber issues. In a TechCrunch talk in 2016, the freshly installed co-CEO of Darktrace, Poppy Gustafsson, is caught misleading the audience about the company's origins. She uses the TechCrunch stage to claim that the “spark” for the creation of Darktrace originally came from the mathematicians at Cambridge and downplayed the involvement of intelligence agencies like MI5, GCHQ, and the C.I.A. The TechCrunch moderator, Natasha Lomas, displayed some fine journalistic integrity on this occasion and asked for clarification. “So did the maths research come first and then you got together with the spies. Which way round was it?” asked the intrepid Lomas. Gustafsson squirms a little before saying, “it was exactly that. First the machine learning that was talking about how to critique a computer to help it understand itself. And then it was the, um, experts from the government intelligence agencies who thought ‘ooh, this could be applied to the problem of cybersecurity.'” But that statement was an outright lie and Gustafsson isn't the most skilled deceiver. Gustafsson, who was initially CFO and COO for the fledgling Darktrace, runs the company alongside the other co-CEO Nicole Eagen, an alumnus of Oracle, a major tech company that also has its origins in intelligence. Both parts of Darktrace's female power duo were brought over from Invoke Capital by Darktrace's initial angel investor and advisory boardmember, UK billionaire Dr. Mike Lynch OBE. Describing himself as the “UKs answer to Bill Gates“, Dr. Mike Lynch is lauded as one of the most influential investors in the tech sector. His previous successful endeavours had been with Autonomy, a tech firm that has Lynch caught up in a legal wrangle with HP over the fraudulent inflation of its valuation, and Blinkx, a video search company where Lynch was later forced to step down from the board. Yet, Darktrace is not just one man working alone. The company boasts that over 4000 organisations worldwide now rely on Darktrace's A.I. technologies. With headquarters in San Francisco, US, and Cambridge, UK, Darktrace has over 1300 employees spread across 44 countries and their numbers are rising. And although the connections to the state intelligence agencies are clear and obvious, Darktrace is officially a completely private enterprise with big investors including KKR, Summit Partners, Vitruvian Partners, Samsung Ventures, TenEleven Ventures, Hoxton Ventures, Talis Capital, Invoke Capital and Insight Venture Partners. Sitting alongside the controversial Dr. Mike Lynch OBE on the advisory board for Darktrace are some seriously influential people deeply connected to US and UK intelligence agencies. If you were to walk into the advisory boardroom at Darktrace, you could be forgiven for thinking that you were actually attending a U.K. Home Office meeting from the past. The former Home Secretary under Prime Minister Theresa May, Amber Rudd, became part of Darktrace after her time in government ended in 2019. She is also on the advisory team of Teneo, a consulting firm co-founded and led by Doug Band, the former advisor to Bill Clinton and close friend of the infamous Jeffrey Epstein. As always, when investigating the murky world of intelligence, many connections to Epstein and his partner Ghislaine Maxwell are revealed. With that being said, yet another member of Darktrace's advisory board also has Epstein/Maxwell links. The C.I.A. stalwart, Alan Wade, is one of the most interesting members of the Darktrace advisory team. He was announced as joining their growing advisory board on 10 May 2016 and had been the former Chief Information Officer of the Central Intelligence Agency. His thirty- five year career at the top echelons of the C.I.A. ended in 2006 and afterwards he would dedicate his time to assisting companies with C.I.A. links from the private sector. While he had been at one of the top posts in the entire U.S. intelligence community, Wade co-founded Chiliad alongside Ghislaine Maxwell's sister, Christine Maxwell. As Unlimited Hangout reported earlier this year, Christine Maxwell was personally involved in leading the opeartions of the front company used by Robert Maxwell to market the PROMIS software, which had a backdoor for Israeli intelligence, to both the U.S.' public and private sectors. Given this history, it is certainly telling that Wade would choose to co-found a major software company with Christine Maxwell of all people. Cybereason – From Offensive, State-Sponsored Hackers to A.I. Cybersecurity As we have experienced at other memorable moments in history, coincidental simulations prior or during any intelligence agency led manipulated event are commonplace. On this occasion, a company named Cybereason is here to provide us with a short glimpse of our pending fearful futures. In multiple simulations Cybereason has run over the last few years, they have been gaming out how potential cyberattacks could cause unthinkable disaster for the U.S. 2020 election. Cybereason's CEO and co-founder is an enigmatic former Israeli Intelligence agent Lior Div-Cohen, often simply referred to as Lior Div. Div, an IDF Medal of Honor recipient and former Israeli Unit 8200 member, co-founded Cybereason in 2012 alongside Yossi Naar and Yonatan Striem-Amit, who are also fellow veterans of Israel's military cybersecurity corps. A scholar from the Academic College of Tel-Aviv, Lior Div afterwards worked as a software engineer for Xacct a network service provider followed by the notorious firm Amdocs, which was accused of eavesdropping on American government officials on behalf of Israel. In between Amdocs and Cybereason, Lior Div was the CEO and co-founder of Israeli cybersecurity firm AlfaTech which is described in its national media as“a cybersecurity services company for Israeli government agencies.” Some of the simulations that Cybereason have hosted over the past two years lead us to election day. In a video entitled: 2018 -10 Hacking the Vote from a scenario and simulation which was actually entitled Blackout; Protect the Vote, the simulation examines which parts of an election day processes were vulnerable to hackers. They make clear from the start it won't be all about voting machines themselves. Operation Blackout Nolandia, the fictional city which was ground zero during Operation Blackout, was based on an average American city nestled within a crucial swing state on election day. Here in Nolandia, three teams of cyber-fighters would battle with each other over control of the city. These would be the three teams each with succinct roles in the polling day pretence, as told to us by Cybereason's Ross Rustici and Sam Curry: Red Team AKA Broken Eagle Task Force: The basic aim of the Broken Eagle's Task Force was to disrupt the election processes in real time. The Red's approach evolved throughout the simulation from causing as much harm as they could into making the result of the election as in doubt and politically biased as possible. They attempted to control the narrative that the system was broken and that the elections could not be trusted. Blue Team AKA Nolandia Event Task Force: The Blue's were fundamentally reactive during the simulation and were constantly on the backfoot. The Blue's, responding to a reported gas leak at a Nolandia polling station early in the scenario, contacted the Secretary of State's office to ask whether they needed to close the polling station. Luckily, the real State Department had two advisors sitting in on the simulation who were able to offer alternative contingency plans that existed in real world America. By the end of the simulation, the Blue's were all aware that they had largely failed the exercise. White Team AKA White Control Team: This team acted as support to give advice or permission to either team, in a role very much like the Dungeon Master in a D&D game. The White's main task was to balance the realism of the scenario and create problems for either team that they'd experience in the real world. In November 2019, Cybereason re-ran their election day attack simulation at an event in Washington D.C. and have run multiple simulations over the last year. The last imagined American city was called Adversaria. As the election day creeps ever closer, Cybereason have been releasing it's more well produced promo videos online. If you're paying very close attention then you will have noticed that Cybereason have spent all of October 2020 marketing heavily as their big day approaches. Representatives of Cybereason are being quoted in every mainstream scare story out there. Vice News released an article on 7 October entitled: “Hospitals Have Become ‘Prime Targets' for Crippling Ransomware Attacks,” where they quote Israel Barak, Cybereason's Chief Information Security Officer, the article states that Barak is “a cyber warfare expert at Cybereason, spent nine years in the Israel Defence Forces specialising in cyber defence systems.” And when Computer Weekly's Adam Scroxton, on 20 October, was reporting on the conviction of the six supposed Russian hackers in the famous NotPetya attack, Cybereason rolled out their CSO, Sam Curry, to give a statement. In a Wired article on 22 October titled: 12 Cyber Threats That Could Wreak Havoc on the Election, Wired explains: “The security firm Cybereason last year ran a series of tabletop exercises specifically looking at how real-world attacks might impact Election Day. One exercise focused on a hacktivist group—known in the exercise as “Kill Organized Systems (K-OS),” pun intended—that disrupted traffic lights and brought the election to a standstill by paralyzing the city's transportation system.” The media appearances for Cybereason have never come so thick and fast as they have this past October. One could even assume that these appearances are a media campaign leading up towards a big event.

Techmeme Ride Home
Tue. 07/06 – New Nintendo Switch (Finally/Kinda)

Techmeme Ride Home

Play Episode Listen Later Jul 6, 2021 17:57


Nintendo finally announces the new Switch, but how new is it really? What the heck is happening with Didi and China? REvil strikes again, and what that might mean for the hacking situation going forward. And on a day of big geopolitical news, might big tech platforms be chased out of India and Hong Kong because their employees are in danger of being sent to jail?Sponsors:Tovala.com/ride Cybereason.com Links:Nintendo Switch OLED model will go on sale October 8th for $350 (The Verge)Chinese Regulators Suggested Didi Delay Its U.S. IPO (Wall Street Journal)Didi Shows China's Tech Giants Must First Answer to Beijing (Bloomberg)China's Big Tech Crackdown Puts Dozens of U.S. IPOs at Risk (Bloomberg)Hundreds of Businesses, From Sweden to U.S., Affected by Cyberattack (New York Times)REvil gang asks for $70 million to decrypt systems locked in Kaseya attack (The Record)Twitter has lost liability protection in India, government says (Tech Crunch)American Internet Giants Hit Back at Hong Kong Doxxing Law (New York Times)See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Techmeme Ride Home
Mon. 06/21 – Can Facebook Win Audio?

Techmeme Ride Home

Play Episode Listen Later Jun 21, 2021 16:03


Facebook's Clubhouse clone rolls out. Here's how it works. China really does seem to be cracking down on Bitcoin mining. Here's why that could be important. Some power companies in Texas are remotely adjusting the smart thermostats of users. Here's why that's likely the future of things. And had you heard of cyclic propulsion aircraft before? I hadn't. Let me tell you about it.Sponsors:Skiff.org/ride Cybereason.comLinks:Facebook officially launches Live Audio Rooms and podcasts in the US (Tech Crunch)China to shut down over 90% of its Bitcoin mining capacity after local bans (Global Times)Digital euro will protect consumer privacy, ECB executive pledges (Financial Times)'Woke up sweating': Some Texans shocked to find their smart thermostats were raised remotely (KHOU)Apple Watch accessory maker Wristcam raises $25M (Tech Crunch)Russia has flown prototypes of its six-seat hybrid VTOL Cyclocar (New Atlas)See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Techmeme Ride Home
(Bonus) How Ransomware Works With Cybereason's CISO Isreal Barak

Techmeme Ride Home

Play Episode Listen Later May 22, 2021 27:28


Cybereason's CISO, Isreal Barak uses the recent Colonial Pipeline incident to give us a deep explainer on how Ransomware and Ransomware as a service works.Sponsors:Cybereason.comNordVPN.com/ride coupon code rideSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.