POPULARITY
“I had a team of me…and that was it!” Join us this week on The Tech Leaders Podcast, where Gareth Davies sits down with Darren Desmond, CISO at the AA, to discuss how AI will change the Cyber Security arms race, why it's a strange time for CISOs, and how he was the most un-military recruit his training Sergeant had ever seen… Time stamps:What makes effective leadership in tech? (2:32) Starting from scratch: "I had a team of me... and that was it!" (4:20) Lessons from the Army and Atomic Weapons Establishment (6:20) The Betfair culture shock: "Decisions made on the hoof" (15:20) The key cybersecurity threat: Why ransomware remains a top concern (16:50) How asset management strengthens cybersecurity (18:10) CISO advice: Why asset management is critical for security (22:17) The CyberSec arms race: How AI will change the game (24:58) Why security is a team effort, not a standalone activity (26:00) Ransomware evolution: "The risk of AI-driven attacks" (36:45) AI in cybersecurity: The future, risks, and opportunities (40:20) Career advice: "Pick a goal and work towards it" (45:06)https://www.bedigitaluk.com/
The Polish word for friendship is "przyjaźń" (pronounced pshih-yah-zh-n). When I think of the Polish people, my time living there, and the memories made, this is the word that comes to mind, everytime. Friendship. From the first days of my arriving in Poland in 1990 to my recent return and reunion nearly 35 years later, the spirit of friendship has always guided me, as it does the people of Poland. On today's episode we hear from one of those friends - Grzegorz Leseniewski. Grzegorz is an attorney at law and a managing partner at Leśniewski Borkiewicz Kostka & Partners, where he helps clients navigate the complex and dynamic legal landscape of new technologies, CyberSec, FinTech, e-commerce, and M&A. Enjoy this conversation and reunion. Dziękuje za słuchanie. - Thanks for listening.
'What the Tech?' is a podcast powered by the Computer Science Department of UCalgary. Here to deconstruct complex computer science concepts, and explain what the tech is going on. In this episode, we had the pleasure of chatting with Jason Ngu, aka Duck Guy, a third-year undergraduate student in the Computer Science department at UCalgary. We discuss Jason's internship experience, journey to becoming a mental health advocate, his work with UCalgary's CYBERSEC club, and more! If you enjoyed today's episode, make sure to subscribe on whatever platform you're listening on. We encourage you to reach out to us, ask us questions about the show, or even suggest topics of interest to you! You can do so by following us on Instagram @uofc_cpsc. Music: Intro / Outro Nowhere Land by Kevin MacLeod || Link: https://incompetech.filmmusic.io/song/4148-nowhere-land || License: CC BY http://creativecommons.org/licenses/by/4.0/ Background Loopster by Kevin MacLeod || Link: https://incompetech.filmmusic.io/song/4991-loopster || License: CC BY http://creativecommons.org/licenses/by/4.0/ Funkorama by Kevin MacLeod || Link: https://incompetech.filmmusic.io/song/3788-funkorama || License: CC BY http://creativecommons.org/licenses/by/4.0/ I Knew a Guy by Kevin MacLeod || Link: https://incompetech.filmmusic.io/song/3895-i-knew-a-guy || License: CC BY (http://creativecommons.org/licenses/by/4.0/) Cool Vibes by Kevin MacLeod || Link: https://incompetech.filmmusic.io/song/3553-cool-vibes || License: CC BY (http://creativecommons.org/licenses/by/4.0/) Thinking Music by Kevin MacLeod || Link: https://incompetech.filmmusic.io/song/4522-thinking-music || License: CC BY (http://creativecommons.org/licenses/by/4.0/) Funk Game Loop by Kevin MacLeod || Link: https://incompetech.filmmusic.io/song/3787-funk-game-loop || License: CC BY http://creativecommons.org/licenses/by/4.0/ Umbrella Pants by Kevin MacLeod || Link: https://incompetech.filmmusic.io/song/4559-umbrella-pants || License: CC BY (http://creativecommons.org/licenses/by/4.0/)
Cybersec- Gli indicato di compromissioneTra Hashr e Snort due tool che controllano gli indicatori di compromissione.Vediamo perche' questi tool, e i relativi dati, sono poco usati
Formidabili.Mai visto in questi anni un testo piu' utile.su caffe20.it/membri la checklist operativaScarica il pdf qui https://www.civile.it/privacy/visual.php?num=99069
Welcome to another enlightening episode of CISO Tradecraft! In this episode, host G. Mark Hardy dives deep into the critical topic of CISO burnout with special guest Raghav Singh, a PhD candidate from the University of Buffalo. This is an eye-opening session for anyone in the cybersecurity field, especially those in or aspiring to the CISO role. Raghav shares valuable insights from his extensive research on the unique stresses faced by CISOs, the organizational factors contributing to burnout, and practical coping mechanisms. We also explore the evolutionary phases of CISOs, from technical experts to strategic business enablers. Whether you're dealing with resource limitations, seeking executive support, or managing ever-evolving cybersecurity threats, this episode offers actionable advice to navigate the demanding role of a CISO successfully. Don't forget to like, comment, and share to help other CISOs and cybersecurity leaders! Big Thanks to our Sponsor CruiseCon - https://cruisecon.com/ CruiseCon Discount Code: CISOTRADECRAFT10 Transcripts: https://docs.google.com/document/d/1fhLkaj_JetlYFQ50Q69uMGmsw3fS3Wqa CISO Burnout - https://aisel.aisnet.org/amcis2023/sig_lead/sig_lead/4/ CISO-CIO Power Dynamics https://aisel.aisnet.org/amcis2024/is_leader/is_leader/6/ Cybersec professionals and AI integration https://aisel.aisnet.org/amcis2024/security/security/29/ Raghav can be reached on rsingh45@buffalo.edu Chapters 00:00 Introduction and Guest Welcome 02:34 Understanding CISO Burnout 03:24 PhD Journey and Challenges 10:12 Key Findings on CISO Burnout 18:39 Six Sources of CISO Burnout 32:47 CISO Maturity Levels 42:57 Conclusion and Call to Action
Entrevistamos Carolina Taborda, Gerente General de Cybersec Cluster en Costa Rica, con ella hablaremos cuales son los planes de ciberseguridad en Costa Rica. Junto a Monica Valle y Pablo San Emeterio, Eduardo Castillo aborda cuales son los retos que debe abordar un pais hermano como es Costa Rica. Twitter: @ciberafterwork Instagram: @ciberafterwork +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/
Przewodnikiem na ścieżkach legislacji regulujących system cyberbezpieczeństwa jest Mikołaj Otmianowski, wiceprezes Red into Green, polskiej firmy wspierajacej przystosowanie m.in. sektora finansowego do takich aktów, jak rozporządzenie DORA czy - dla pozostałych sektorów gospodarki - dyrektywa NIS2. Cyberprawnik i radca, przedsiębiorca branży legal tech.W rozmowie:- logika i mechanizmy nowych regulacji z zakresu CyberSec- gotowość i dojrzałość cyber firm i instytucji- meandry implementacji prawa i adaptacji przepisów przez rynek- narzędzia i metody zapewnienia zgodności z nowymi przepisami. Zapraszamy do odsłuchu!
Sponsor by SEC Playground --- Support this podcast: https://podcasters.spotify.com/pod/show/chillchillsecurity/support
Antivirus - Avast e la sicurezza della navigazione online senza rivendita di datiAntivirus che rivendono dati ?Due sanzioni contro Avast, ma vediamo come funziona la sicurezza della navigazione online.Per iscrizioni: www.caffe20.it/membri o privacykit.it/membri
Auto e informatica: troppo facile dire: "te l'avevo detto".Il report che vi segnalo, da upstream.auto e' di quelli da non perdere.130 e piu' pagine che entrano nel dettaglio con un grafica godibilissima e una strutturazione dei contenuti rapida.Insomma: diventa interessante scoprire come dalle colonnine EV si possono correre rischi (pochi) e come un media center possa cercare di entrare nelle auto.Insieme alle soluzioni.Buon ascolto, www.privacykit.it/membri
In this episode of the Grownlearn podcast, we sit down with Terry Ziemniak, former VP of CyberSec for the largest health system in the Charlotte region, and a seasoned cybersecurity mentor for tech startups. Terry shares his expert insights on the recent technology shutdown caused by Crowdstrike, the critical aspects of business resiliency, and the evolving landscape of IT security. We delve into the emerging regulations around AI and discuss strategies to ensure future compliance in the US. Tune in to learn how to navigate cyber incidents, the importance of robust security measures, and how to turn cybersecurity into a business asset. Terry Zemniak: https://www.techcxo.com/partners/terry-ziemniak/ -------------------------------------------------------------------------------------------------------------------
Software - sviluppo collaborativo e responsabilità da frameworks, librerie e containerCrowdstrike docet ?La metodologia devops e' straordinariamente utile, ma non adatta ne' a tutti ne' sempre.Comunque e' il momento di ribadire criteri di scelta di framework esterni.Ne propongo alcuni in un ottica di introduzione alla problematica.
Crowdstrike la vendetta - pochi giorni dopo ecco cosa andava detto subitoErrata corrige, e nuovo episodio per mettere i puntini sulle u :)I temi trattati nella puntata SOLO PRO di Caffè 2.0, in ordine di trattazione, sono:L'errore del software di sicurezza CrowdStrike che ha causato il blocco di computer Microsoft WindowsLa responsabilità di Microsoft e CrowdStrike nell'incidenteLa risposta dei hacker all'incidenteLe implicazioni della cyber security per la privacy e le aziendeL'importanza di investire in sicurezza informatica per le aziende di tutte le dimensioniGli errori commessi dal conduttore nella precedente puntata e la necessità di comunicare in modo chiaro e preciso.
Welcome to the Data Security Decoded podcast, brought to you by Rubrik Zero Labs. In each installment, we discuss cybersecurity with thought leaders and industry experts, and get their take on trends, themes, and where they see the sector going next. This is a must-listen for organizations and individuals looking to secure their data and achieve cyber resilience. In this episode, your host, Steve Stone, is joined by Renata Spinks, Former SES - Deputy CIO IC4, US Marine Corp, and current CEO at CyberSec International. In the second of two episodes, Steve and Renata highlight the importance of understanding an organization's data assets and utilizing them properly, and discuss the value of continuous training, collaboration with industry partners, and staying proactive in the face of evolving threats. They also explore the discussion of the talent shortage in cybersecurity, and why organizations need to have the vision to tap into underrepresented and under-resourced areas.
La legge sulla cyber security in italia https://www.gazzettaufficiale.it/eli/id/2023/01/10/23A00114/SG
We highlight the low adoption rate of enterprise-wide AI plans, with only 17% of businesses actively discussing and implementing AI strategies. The need for more robust strategic frameworks to integrate AI effectively is emphasized, as early adopters with clear plans stand to gain a competitive edge in the market.The episode also covers updates on cybersecurity measures, with the White House urging federal agencies to request additional funding for enhancing the nation's cybersecurity defenses. The memo directs agencies to align their budget requests with the National Cyber Strategy and Implementation Plan, emphasizing the adoption of mature zero-trust architectures and minimum cybersecurity requirements for critical infrastructure sectors.Furthermore, the U.S. Department of Labor has introduced new overtime rules impacting small businesses with salaried employees, requiring compliance with updated pay thresholds by 2025. The episode also touches on the temporary halt of net neutrality rules reinstatement by a federal appeals court, influenced by recent legal developments that may weaken the FCC's position.Lastly, the episode delves into the market performance of Apple's Vision Pro headset, predicting a significant drop in sales and the suspension of work on a high-end model in favor of a more affordable release by 2025. Despite challenges in product sales, the Apple Vision Pro is recognized for its accessibility features benefiting users with disabilities. Three things to know today 00:00 Only 17% of Businesses Making Enterprise-Wide AI Plans, Tata Reports03:00 Small Businesses Must Comply with New Overtime Pay Thresholds by 202506:27 Apple Vision Pro Sales Flop: Future Hinges on Affordable Model Release by 2025 Supported by: https://huntress.com/mspradio/https://mspradio.com/engage/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social
In questa impegnativa puntata parliamo di due problemi di cybersecurity, una vulnerabilità trovata in OpenSSH e chiamata regreSSHion e un attacco alla supply chain JavaScript sfruttando la CDN di Polyfill.io. Links: regreSSHion: RCE in OpenSSH's server - https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt Polykill - https://polykill.io/ 00:00 Intro 03:19 RegreSSHion 17:05 Polyfill.io 25:47 Links #regresshion #cybersecurity #openssh #polyfill #javascript === Podcast Spotify - https://open.spotify.com/show/4B2I1RTHTS5YkbCYfLCveU Apple Podcasts - https://podcasts.apple.com/us/podcast/buongiorno-da-edo/id1641061765 Amazon Music - https://music.amazon.it/podcasts/5f724c1e-f318-4c40-9c1b-34abfe2c9911/buongiorno-da-edo = RSS - https://anchor.fm/s/b1bf48a0/podcast/rss
WordPress sotto attacco e consigli di sicurezza a gestori e titolari di sitiVari alert sono un ottimo pretesto per ricordare come attenzionare i siti.
Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: On DeepMind's Frontier Safety Framework, published by Zvi on June 18, 2024 on LessWrong. On DeepMind's Frontier Safety Framework Previously: On OpenAI's Preparedness Framework, On RSPs. The First Two Frameworks To first update on Anthropic and OpenAI's situation here: Anthropic's RSP continues to miss the definitions of the all-important later levels, in addition to other issues, although it is otherwise promising. It has now been a number of months, and it is starting to be concerning that nothing has changed. They are due for an update. OpenAI also has not updated its framework. I am less down on OpenAI's framework choices than Zac Stein-Perlman was in the other review I have seen. I think that if OpenAI implemented the spirit of what it wrote down, that would be pretty good. The Critical-level thresholds listed are too high, but the Anthropic ASL-4 commitments are still unspecified. An update is needed, but I appreciate the concreteness. The bigger issue with OpenAI is the two contexts around the framework. First, there's OpenAI. Exactly. A safety framework you do not adhere to is worth nothing. A safety framework where you adhere to the letter but not the spirit is not worth much. Given what we have learned about OpenAI, and their decision to break their very public commitments about committing compute to superalignment and driving out their top safety people and failure to have a means for reporting safety issues (including retaliating against Leopold when he went to the board about cybersecurity) and also all that other stuff, why should we have any expectation that what is written down in their framework is meaningful? What about the other practical test? Zac points out that OpenAI did not share the risk-scorecard for GPT-4o. They also did not share much of anything else. This is somewhat forgivable given the model is arguably not actually at core stronger than GPT-4 aside from its multimodality. It remains bad precedent, and an indication of bad habits and poor policy. Then there is Microsoft. OpenAI shares all their models with Microsoft, and the framework does not apply to Microsoft at all. Microsoft's track record on safety is woeful. Their submission at the UK Summit was very weak. Their public statements around safety are dismissive, including their intention to 'make Google dance.' Microsoft Recall shows the opposite of a safety mindset, and they themselves have been famously compromised recently. Remember Sydney? Microsoft explicitly said they got safety committee approval for their tests in India, then had to walk that back. Even what procedures they have, which are not much, they have broken. This is in practice a giant hole in OpenAI's framework. This is in contrast to Anthropic, who are their own corporate overlord, and DeepMind, whose framework explicitly applies to all of Google. The DeepMind Framework DeepMind finally has its own framework. Here is the blog post version. So first things first. Any framework at all, even a highly incomplete and unambitious one, is far better than none at all. Much better to know what plans you do have, and that they won't be enough, so we can critique and improve. So thanks to DeepMind for stepping up, no matter the contents, as long as it is not the Meta Framework. There is extensive further work to be done, as they acknowledge. This includes all plans on dealing with misalignment. The current framework only targets misuse. With that out of the way: Is the DeepMind framework any good? In the Framework, we specify protocols for the detection of capability levels at which models may pose severe risks (which we call "Critical Capability Levels (CCLs)"), and articulate a spectrum of mitigation options to address such risks. We are starting with an initial set of CCLs in the domains of Autonomy, Biosecurity, Cybersec...
Link to original articleWelcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: On DeepMind's Frontier Safety Framework, published by Zvi on June 18, 2024 on LessWrong. On DeepMind's Frontier Safety Framework Previously: On OpenAI's Preparedness Framework, On RSPs. The First Two Frameworks To first update on Anthropic and OpenAI's situation here: Anthropic's RSP continues to miss the definitions of the all-important later levels, in addition to other issues, although it is otherwise promising. It has now been a number of months, and it is starting to be concerning that nothing has changed. They are due for an update. OpenAI also has not updated its framework. I am less down on OpenAI's framework choices than Zac Stein-Perlman was in the other review I have seen. I think that if OpenAI implemented the spirit of what it wrote down, that would be pretty good. The Critical-level thresholds listed are too high, but the Anthropic ASL-4 commitments are still unspecified. An update is needed, but I appreciate the concreteness. The bigger issue with OpenAI is the two contexts around the framework. First, there's OpenAI. Exactly. A safety framework you do not adhere to is worth nothing. A safety framework where you adhere to the letter but not the spirit is not worth much. Given what we have learned about OpenAI, and their decision to break their very public commitments about committing compute to superalignment and driving out their top safety people and failure to have a means for reporting safety issues (including retaliating against Leopold when he went to the board about cybersecurity) and also all that other stuff, why should we have any expectation that what is written down in their framework is meaningful? What about the other practical test? Zac points out that OpenAI did not share the risk-scorecard for GPT-4o. They also did not share much of anything else. This is somewhat forgivable given the model is arguably not actually at core stronger than GPT-4 aside from its multimodality. It remains bad precedent, and an indication of bad habits and poor policy. Then there is Microsoft. OpenAI shares all their models with Microsoft, and the framework does not apply to Microsoft at all. Microsoft's track record on safety is woeful. Their submission at the UK Summit was very weak. Their public statements around safety are dismissive, including their intention to 'make Google dance.' Microsoft Recall shows the opposite of a safety mindset, and they themselves have been famously compromised recently. Remember Sydney? Microsoft explicitly said they got safety committee approval for their tests in India, then had to walk that back. Even what procedures they have, which are not much, they have broken. This is in practice a giant hole in OpenAI's framework. This is in contrast to Anthropic, who are their own corporate overlord, and DeepMind, whose framework explicitly applies to all of Google. The DeepMind Framework DeepMind finally has its own framework. Here is the blog post version. So first things first. Any framework at all, even a highly incomplete and unambitious one, is far better than none at all. Much better to know what plans you do have, and that they won't be enough, so we can critique and improve. So thanks to DeepMind for stepping up, no matter the contents, as long as it is not the Meta Framework. There is extensive further work to be done, as they acknowledge. This includes all plans on dealing with misalignment. The current framework only targets misuse. With that out of the way: Is the DeepMind framework any good? In the Framework, we specify protocols for the detection of capability levels at which models may pose severe risks (which we call "Critical Capability Levels (CCLs)"), and articulate a spectrum of mitigation options to address such risks. We are starting with an initial set of CCLs in the domains of Autonomy, Biosecurity, Cybersec...
“You have to fight AI with AI.” In this episode, we take a slight detour from our planned look at Consensus 24 to bring you a special conversation with Matt O'Neil, co-founder and partner at 50H Consulting and former Deputy Special Agent in Charge of Cyber at the @US Secret Service.Matt shares his unique insights and experiences with our host, Aidan Larkin. Together, they delve into the challenges of asset recovery and forfeiture, especially those concerning cyber-enabled fraud. They discuss why the Secret Service investigates financial crimes, the importance of leveraging emerging technologies like AI to combat sophisticated transnational cybercrime and the necessity for enhanced information-sharing practices between the public and private sectors.Timestamps00:00 - Matt's journey with the US Secret Service05:00 - Using asset seizures to fight cyber-enabled fraud09:30 - The Secret Service's role in investigating financial crime12:00 - Challenges in asset recovery and forfeiture15:00 - Operation Shamrock and enhancing cross-sector information-sharing22:30 - Reimagining regulations for technology and finance29:00 - Understanding a typical scam case31:30 - Leveraging AI to combat transnational crime35:30 - Future trends in financial crime and asset recoveryResources Mentioned:Operation ShamrockErin West and Pig Butchering on Seize & DesistAbout our Guest:Matt O'Neil has over 25 years of experience disrupting and dismantling financially motivated transnational organised criminal groups with the US Secret Service.As the former Managing Director of the USSS Global Cyber Investigative Operations Center (GIOC) and Cyber Intelligence Section (CIS), Matt was instrumental in coordinating international takedowns of digital money laundering networks and dark web marketplaces. His efforts led to the prosecution of globally notorious cybercriminals responsible for stealing and laundering billions. He also led their Asset Forfeiture Branch to successfully recover more than US$2 billion in seized assets in just 2 years. Since retiring from the Secret Service, Matt has dedicated himself to raising awareness for the threats posed by transnational organised crimes like pig butchering, ransomware and phishing.DisclaimerOur podcasts are for informational purposes only. They are not intended to provide legal, tax, financial, and/or investment advice. Listeners must consult their own advisors before making decisions on the topics discussed. Asset Reality has no responsibility or liability for any decision made or any other acts or omissions in connection with your use of this material.The views expressed by guests are their own and their appearance on the program does not imply an endorsement of them or any entity they represent. Views and opinions expressed by Asset Reality employees are those of the employees and do not necessarily reflect the views of the company. Asset Reality does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in any particular podcast and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material. Unless stated otherwise, reference to any specific product or entity does not constitute an endorsement or recommendation by Asset Reality.
Il rapporto Svizzero aiuta ad avere le idee chiare sul fenomeno.Guardiamolo insieme per capire come difenderci
NTTアドバンステクノロジ株式会社は5月16日、株式会社CyCraft Japanとの間で協業契約を締結し、台湾のサイバーセキュリティイベント「CYBERSEC」で締結の式典を同日、実施したと発表した。
Attrezzi e cybersec - Monitor e Firewall per l'autocontrollo - Portmaster alternativa a OpenSwitchUn software che vorrete avere sempre sui vostri pc.Nelle note solo per ascoltatori PRO, il riepilogo dei miei preferiti
Welcome to episode 257 of the Cloud Pod podcast – where the forecast is always cloudy! This week your hosts Justin, Matthew, Ryan, and Jonathan are in the barnyard bringing you the latest news, which this week is really just Meta's release of Llama 3. Seriously. That's every announcement this week. Don’t say we didn't warn you. Titles we almost went with this week: Meta Llama says no Drama No Meta Prob-llama Keep Calm and Llama on Redis did not embrace the Llama MK The bedrock of good AI is built on Llamas The CloudPod announces support for Llama3 since everyone else was doing it Llama3, better know as Llama Llama Llama The Cloud Pod now known as the LLMPod Cloud Pod is considering changing its name to LlamaPod Unlike WinAMP nothing whips the llamas ass A big thanks to this week's sponsor: Check out Sonrai Securities‘ new Cloud Permission Firewall. Just for our listeners, enjoy a 14 day trial at www.sonrai.co/cloudpod Follow Up 01:27 Valkey is Rapidly Overtaking Redis Valkey has continued to rack up support from AWS, Ericsson, Google, Oracle and Verizon initially, to now being joined by Alibaba, Aiven, Heroku and Percona backing Valkey as well. Numerous blog posts have come out touting Valkey adoption. I'm not sure this whole thing is working out as well as Redis CEO Rowan Trollope had hoped. AI Is Going Great – Or How AI Makes All It's Money 03:26 Introducing Meta Llama 3: The most capable openly available LLM to date Meta has launched Llama 3, the next generation of their state-of-the-art open source large language model. Llama 3 will be available on AWS, Databricks, GCP, Hugging Face, Kaggle, IBM WatsonX, Microsoft Azure, Nvidia NIM, and Snowflake with support from hardware platforms offered by AMD, AWS, Dell, Intel, Nvidia and Qualcomm Includes new trust and safety tools such as Llama Guard 2, Code Shield and Cybersec eval 2 They plan to introduce new capabilities, including longer context windows, additional model sizes and enhanced performance. The first two models from Meta Lama3 are the 8B and 70B parameter variants that can support a broad range of use cases. Meta shared some benchmarks against Gemma 7B and Mistral 7B vs the Lama 3 8B models and showed improvements across all major benchmarks. Including Math with Gemma 7b doing 12.2 vs 30 with Llama 3 It had highly comparable performance with the 70B model against Gemini Pro 1.5 and Claude 3 Sonnet scoring within a few points of most of the other scores. Jonathan recommends using LM Studio to get start playing around with LLMS, which you can find at https://lmstudio.ai/ 04:42 Jonathan – “Isn’t it funny how you go from an 8 billion parameter model to a 70 billion parameter model but nothing in between? Like you would have thought there would be some kind of like, some middle ground maybe? But, uh, but… No. But, um,
O que os hackers NÃO querem que você saiba!No novo episódio do PodCafé da TI, Lucas Agnoletto, Head de Cyber Security na JSL, revela estratégias sobre como grandes empresas protegem seus dados de ataques cibernéticos. Uma aula para quem busca se manter protegido no mundo digital!Descubra as melhores práticas de segurança e esteja um passo à frente dos hackers!Dê o play, e saiba mais como se proteger!Participantes:Lucas Agnoletto - Head de Cyber Security na JSLDyogo Junqueira - CEO da ACSoftwareGuilherme Gomes - Diretor ACSoftwareAnderson Fonseca - Diretor ACSoftwarePodCafé da TI é um podcast da ACSoftware seu parceiro ManageEngine no Brasil.https://www.acsoftware.com.br/manageengineWeb: https://podcafe.com.br/Instagram: https://www.instagram.com/acsoftwarebr/Linkedin: https://www.linkedin.com/company/acsoftwareTwitter: https://twitter.com/acsoftwarebrYouTube: https://www.youtube.com/c/PODCAFEdaTI
The Midwestern Small Business Digital Success Initiative is here, and it will allow your Wabash, IN area business to access Aptica's total business technology auditing service for free. To hear how they may be able to help your business, visit https://apticallc.com/ Aptica, LLC City: Angola Address: 113 E Maumee St Website: https://apticallc.com/ Phone: +1 260 243 5100
Tonight at 8:30 pm CST, on the Flyover Conservatives show we are tackling the most important things going on RIGHT NOW from a Conservative Christian perspective! TO WATCH ALL FLYOVER CONSERVATIVES SHOWS -https://flyover.live/media/series/qhfzzzr/the-flyover-conservatives-showTO WATCH ALL FLYOVER CONTENT: www.flyover.liveJeff BermantWEBSITE: www.tuskbrowser.com To Schedule A Time To Talk To Dr. Dr. Kirk Elliott Go To ▶ https://flyovergold.comOr Call 720-605-3900 SPONSORS FOR TODAY'S VIDEO► ReAwaken America- text the word EVENTS to 40509(Message and data rates may apply. Terms/privacy: 40509-info.com)► Kirk Elliott PHD - http://FlyoverGold.com ► My Pillow - https://MyPillow.com/Flyover► Z-Stack - https://flyoverhealth.com ► Dr. Jason Dean (BraveTV) - https://parakiller.com ► Patriot Mobile - www.patriotmobile.com/flyoverWant to help spread the Wake Up • Speak Up • Show Up -https://shop.flyoverconservatives.com/-------------------------------------------Follow our Social Media so we can be best friends
Podcast: ICS Cyber Talks PodcastEpisode: Startup follow-up: Alexander Tartakovsky founder & CEO @iOT365 on OT cybersec defense change mindsetPub date: 2024-02-07Nachshon Pincu Hosts Alexander Tartakovsky the founder and CEO of iOT365 OT Cyber Security Platform delivered as a SAAS. We discussed changing the mindset for traditional and innovative OT infrastructure as part of Industry 4.0, Open PLC, and digital twin technologies. Why should IDS and SIEM for OT cybersecurity Not be on two different platforms? Why is there a need to remove the OT and cloud computing bindings? How do you “play” safe when implementing OT cyber security solutions? How do we get in the age of digital twins as labs for checking new firmware or training teams on their own OT infrastructure without risk? And more The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: ICS Cyber Talks PodcastEpisode: Startup follow-up: Alexander Tartakovsky founder & CEO @iOT365 on OT cybersec defense change mindsetPub date: 2024-02-07Nachshon Pincu Hosts Alexander Tartakovsky the founder and CEO of iOT365 OT Cyber Security Platform delivered as a SAAS. We discussed changing the mindset for traditional and innovative OT infrastructure as part of Industry 4.0, Open PLC, and digital twin technologies. Why should IDS and SIEM for OT cybersecurity Not be on two different platforms? Why is there a need to remove the OT and cloud computing bindings? How do you “play” safe when implementing OT cyber security solutions? How do we get in the age of digital twins as labs for checking new firmware or training teams on their own OT infrastructure without risk? And more The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
CyberUp is only weeks into 2024! This affords a fantastic time for a quick update on everything CyberUp.In this episode, we will cover the following:- Summarize 2023 and all of our wins and losses.- Talk about the recent strategic plan that we completed and approved.- Review 2024 and the goals we set to accomplish.- Discuss how people can support and get involved.- Answer any questions you may have.2024 brings a lot to the table. We believe these are opportunities but also some risks to the industry. Join us and participate in a quick discussion.
As artificial intelligence (AI) becomes increasingly sophisticated, so do the methods and tactics used by hackers to exploit it. Join Anne Valaitis, Keypoint Intelligence's Principal Analyst of Managed IT Services, as she mines the topic of AI-powered hacking with Carlos Fernandes and Steve Britt of Agile Cybersecurity Solutions (ACS), exploring the latest trends and discussing how organizations can remain secure and compliant.
Bill reports that Mastodon lives on and how awful Twitter is, we talk about the SEC complaint re: the SolarWinds CISO, and Greg reports on his Digital Fight Club experience in Dallas (and how awesome it was)
This week's episode turns squarely to a growth industry with no visible end to the growth, Cybersecurity with Jihana Barrett. The stark reality is that "Everyone will be compromised," emphasizing the critical need to stay informed to protect yourself effectively. Jihana shares essential strategies to fortify your defenses, including the imperative to avoid complacency with passwords and the use of "weak passwords." Throughout this episode, you are encouraged to adopt a "security lens" in your thinking, understanding how this perspective can safeguard you from the ever-evolving landscape of cyber threats. Jihana Barrett's unique journey is unveiled as she divulges the reasons behind her departure from the cybersecurity field a year ago and her triumphant return. Her story resonates with those seeking to align passion with innate talents, underscoring a powerful revelation: When your expertise is a divine gift, even when it doesn't energize you, you can become an expert if you find your path. Let's Hack! Connect with Jihana Barrett: https://www.cybrsuite.com/ Rate & Review the podcast and send us a screenshot of your review on Instagram https://bit.ly/5mchinstagram and we will send you a premium course for FREE.
Podcast: ICS Cyber Talks PodcastEpisode: Yosi Shneck Founder & CEO @YSICONS ex ICT SVP @ECI on OT CyberSec defense in critical infrastructurePub date: 2023-09-12Nachshon Pincu hosts Yosi Shneck, Founder and CEO at YSICONS company, former Head of cyber Entrepreneurship and BIZ DEV, and SVP for information and communication technologies at Israel Electric Corporation (IEC) in a conversation about critical infrastructure cyber defense for systems that are 50 years old, build synergy between IT and OT cyber teams. As a senior manager and one of the first to deal with cyber defense for critical infrastructures in the most significant infrastructure in Israel, what was the approach to cyber defense in such a conglomerate? The OT world of an electricity company includes systems that are 50 years old or older without Cybersecurity in the planning and execution considerations. How can we protect and control planets that did not have "cyber by design" and without supporting cyber OT technologies? What is the importance of divisional integration within the cyber IT and OT organizations? You said the readiness is a matter for the whole company. Awareness alone is not enough. It also requires cyber knowledge, so every employee should be a cyber specialist? The electric company is subject to many regulators (as many as 23). How do you enable practical progress in the face of so much regulation? How do you perceive the role of CISO in the organization and not necessarily at the electric company? You have proven there is room for business innovation, even in a company like IEC. How do you create an innovative business environment in a traditional corporation? Tell us a little about your activity today at YSICONS. נחשון פינקו מארח את יוסי שנק, מייסד ומנכ"ל חברת וי.אס.איקונס, לשעבר ראש תחום יזמות סייבר ופיתוח עיסקי וסמנכ"ל בכיר לטכנולוגיות מידע ותקשורת בחברת החשמל, בשיחה על הגנת סייבר בתשתיות קריטיות לעיתים בנות חמישים שנה. איך בונים סינרגיה בין צוותי סייבר של מערכות מידע ותשתיות קריטיות ואיך יוצרים "מוכנות" סייבר כמי שהיה מנהל בכיר ומהראשונים להתמודד עם נושא הגנת סייבר לתשתיות קריטיות בגוף התשתיות הגדול בישראל, איך ניגשים בכלל להגנת סייבר בכזה קונגלומרט המערכות התפעוליות של חברת חשמל כוללות מערכות בנות חמישים שנים ויותר כמו תחנת הכוח בחדרה שהוקמה בשנות השיבעים של המאה הקודמת, הגנת סייבר לא נלקחה בשיקולי התכנון והביצוע, איך מייצרים הגנה ובקרות במקום שלא תוכנן לסייבר וללא טכנולוגיות תומכות עמלת רבות על ביצוע אינטגרציה ושת"פ חטיבתי בין ארגוני הסייבר למערכות המידע והמערכות התפעוליות, מה הייתה התבונה שהובילה אותך למהלך הזה דיברנו על השקעה במוכנות ואמרת שזה עניין של כול החברה, מודעות בלבד אינה מספיקה אלא מחייבת גם ידע בסייבר, אז כול עובד צריך להיות סייבריסט חברת החשמל כפופה לכמות עצומה של רגולטורים, כמדומני 23 ,איך מאפשרים התקדמות מעשית מול כול כך הרבה רגולציה איך אתה תופס את תפקיד הסיסו בארגון ולאו דווקא בחברת החשמל הוכחת שגם בחברה גדולה ומסורתית כמו חברת החשמל יש מקום להרבה חדשנות עסקית. נזכיר את סייברג'ים, חברת תקשורת הסיבים, מכירת עפר פחם והרשימה עוד ארוכה. איך מייצרים סביבה עסקית חדשנית בגוף מסורתי ספר לנו קצת על הפעילות שלך היום ב וי.אס.איקונס, היות וכרגיל אתה לא נח על זרי הדפנהThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: ICS Cyber Talks PodcastEpisode: Cyber Edu 4: May Brooks-Kempler Director @CRS ISC2 Instructor CISSP & HCISPP about CyberSec trainingPub date: 2023-06-17נחשון פינקו ומלי בר מארחים את מיי (מיטל) ברוקס קמפלר דירקטורית בחברת סייבר באבו דאבי, יועצת, מרצה ומכשירה וותיקה לסיסויים למבחני אי.אס.סי בריבוע מה הם האתגרים של הכשרת סייבר בישראל מה המסלול הנכון למי שרוצה להיכנס לתחום הסייבר בישראל עלויות ההכשרה לסייבר מהווה לא פעם חסם להתמקצעות. מדובר בהרבה אלפי שקלים עד עשרות אלפי שקלים. מדובר בנושא "כואב" ולא פשוט למי שאין את האמצעים, האם קיימת דרך לחסוך חלק מהעלויות? את מראשוני/ות העוסקים בהכשרה להסמכות סייבר בינלאומיות בישראל. מעבר לתעודה, האם יש ערך מוסף לקורס שעוסקים באתגרים של הכשרת לסייבר הנושא מועצם פי כמה וכמה שמגיעים לנושא הכשרת סייבר לסביבות תפעוליות. מאיפה מתחילים ומה לדעתך הדרישות המקדמיות ממי שרוצה ללמוד ולהיכנס לתחום הסייבר בכלל ומערכות תפעוליות בפרט Nachshon Pincu and Mally Bar co-hosting May (Maytal) Brooks-Kempler, Director at Cyber Range Solutions inc (CRS) and ISC2 Instructor for CISSP ו& HCISPP. Discussing Cyber Security Education and training. Cyber training in Israel, what are the challenges? What do you think is the right path for those who want to enter the cyber field in Israel? The costs of cyber training are often a barrier to professionalization. It is about many thousands of shekels to tens of thousands of shekels, and it is a "painful" issue and not easy for those who don't have the means. Is there a way to save some of the costs? You are among the first to train for the CISSP exams in Israel and have invested a lot in the subject. Beyond the test and the certificate, is there any added value to the course? We said that there are challenges in cyber training. The issue is often intensified in ICS/OT cyber training. Where do you start, and what are the preliminary requirements for those who want to study and enter the field? And moreThe podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Cybersecurity is a field that is for everyone. With so many people thinking they can't do it, Andrea Myler is coming on as a special guest to reinforce the fact that no matter where you come from, what you look like, and who you are you belong here. Stand up for yourself, fight for what you want, and be ready for hard work. No matter what you can do it and you belong in the trenches with us.Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and discussions.Bio Links:https://cyberwarriorstudios.bio.linkConnect with our guest(s):Andrea MylerLinkedIn: https://www.linkedin.com/in/andrea-mylerPodcast Version: Available on all major platforms! (Google, Apple, Spotify, Amazon, iHeart Radio, and more)Podcast RSS: https://feeds.buzzsprout.com/1315237.rssHow to Support:Buy Me A Beer: https://www.buymeacoffee.com/CyberWarriorPayPal: https://paypal.me/cyberwarriorstudiosCashApp: $CyberWarriorStudiosWebsite:https://www.cyberwarriorstudios.comHow to connect with Cyber Warrior:Twitch: https://twitch.tv/CyberWarriorStudiosTwitter: https://www.twitter.com/CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJfDiscord Servers:Hacker Valley Media - https://hackervalley.com/discordRaices Cyber - https://bio.link/raicescyKevTech IT - https://discord.gg/UPmXKjX2GuSupport the showMerch: https://cyberwarriorstudios.com/storeYoutube: https://youtube.cyberwarriorstudios.comTwitch: https://twitch.tv/CyberWarriorStudiosTwitter: @CyberWarriorSt1Discord: https://discord.gg/eCSRzM6mJf
In the security news, FBI seizes one of the biggest stolen credential markets, Is catching ransomware the baseline for detection and response? Potential outcomes of the US National Cybersecurity Strategy, Thieves are using headlights to steal cars, China wants to censor generative AI, Tesla sued for snooping on owners through built-in cameras, All that and more, on this episode of Paul's Security Weekly. Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw780
senior IT/cybersec reporter, Tom McKay shares his article for Rolling Stone & the ridiculousness of CPAC. figures on the MAGA right, Twitter nonsense & more!
In the enterprise security news, A light week in funding, after last week's mega raises from Wiz and Sandbox AQ HP acquires some Zero Trust and CASB with Axis Security InfoSec-themed Table Top gaming is really catching on The White House's updated cybersecurity strategy is more of an update than a game changer I go a bit nuts with AI news and essays, but a lot of it is really worth your time, I promise Doing evil things with chrome extensions Women in cybersecurity Letting strangers call you, on purpose All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw308
CISOs often have a love/hate relationship with auditors, as it is the auditors that are placing judgment on the adequacy of company cybersecurity controls. Join this session from the perspective of an IT Audit leader and former CISO, as to how to view the auditors and strengthen the cybersecurity program amid adversity. Show Notes: https://securityweekly.com/csp105 This segment is sponsored by Wiz. Visit https://securityweekly.com/wiz to learn more about them! Visit https://securityweekly.com/csp for all the latest episodes! Follow us on Twitter: https://www.twitter.com/cyberleaders Follow us on LinkedIn: https://www.linkedin.com/company/cybersecuritycollaborative/
Finally, in the enterprise security news, Not much funding this week, but Netskope raises $400M, and Hack the Box raises $55M! Also, what went wrong with IronNet? The Open Source Index highlights popular security projects, Windows 7 and Windows 8.1 have been put out to pasture, Predictions about personal cybersecurity, Cloud security trends, The ongoing impact of ChatGPT on the security industry, Password hygiene revealed to be terrible in the US Government, All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw302
In the enterprise security news, Funding announcements take a bit of a break, We explore a few new vendors and organizations that have come to our attention recently, Wiz researchers annoy yet another cloud service by pointing out ridiculous vulnerabilities - IBM Cloud, this time, Docker Hub has tons of shady stuffs going on, EU strengthens cybersecurity with new legislation, The US Department of Defense releases Zero Trust strategy (no more Five Eyes?), Microsoft 365… outlawed in the EU?, Ransomware makes up the majority of all UK government crisis management meetings, AI can now tell kids bedtime stories, what could go wrong? Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw298
CYBERSEC 2022 臺灣資安大會 9/20 – 9/22 臺北南港展覽二館 強勢登場! ★ 3 日專業資安會展、吸引 3,000+ 頂尖企業指定參會 ★ 匯集 250+ 堂優質資安議程、 250+ 家國內外參展品牌 ★ 吸引破 10,000 人次朝聖觀展,產官學交流的最佳途徑 資安領航轉型未來,最具指標性的年度資安盛事「CYBERSEC 2022 臺灣資安大會」將帶來最多元完整資安知識精華、最豐富防禦需求解方與國內外資安市場情報,立即免費報名,開始踏上資安升級道路! CYBERSEC 2022 臺灣資安大會 SEP 20 - 22│臺北南港展覽二館 ☛ https://r.itho.me/miula0902 --- 本集主題 - 蘋果 iPhone 14 發表、谷歌要開始精實、特斯拉德州煉鋰 --- M觀點資訊 --- 科技巨頭解碼: https://bit.ly/3koflbU M觀點 Telegram - https://t.me/miulaviewpoint M觀點 IG - https://www.instagram.com/miulaviewpoint/ M觀點 Podcast - https://bit.ly/34fV7so M報 - https://bit.ly/345gBbA M觀點YouTube頻道訂閱 - https://bit.ly/2nxHnp9 M觀點粉絲團 - https://www.facebook.com/miulaperspective/ 任何合作邀約請洽 miula@outlook.com
CYBERSEC 2022 臺灣資安大會 9/20 – 9/22 臺北南港展覽二館 強勢登場! ★ 3 日專業資安會展、吸引 3,000+ 頂尖企業指定參會 ★ 匯集 250+ 堂優質資安議程、 250+ 家國內外參展品牌 ★ 吸引破 10,000 人次朝聖觀展,產官學交流的最佳途徑 資安領航轉型未來,最具指標性的年度資安盛事「CYBERSEC 2022 臺灣資安大會」將帶來最多元完整資安知識精華、最豐富防禦需求解方與國內外資安市場情報,立即免費報名,開始踏上資安升級道路! CYBERSEC 2022 臺灣資安大會 SEP 20 - 22│臺北南港展覽二館 ☛ https://r.itho.me/miula0902 --- 主題 - 企業裁員為何是利多 + 景氣泡沫的根源 --- M觀點資訊 --- 科技巨頭解碼: https://bit.ly/3koflbU M觀點 Telegram - https://t.me/miulaviewpoint M觀點 IG - https://www.instagram.com/miulaviewpoint/ M觀點 Podcast - https://bit.ly/34fV7so M報 - https://bit.ly/345gBbA M觀點YouTube頻道訂閱 - https://bit.ly/2nxHnp9 M觀點粉絲團 - https://www.facebook.com/miulaperspective/ 任何合作邀約請洽 miula@outlook.com
Gone are the days when businesses can be without computers and the internet.Things were definitely so much simpler back in the day!Sure, we all use tools and technology. What's an engineering or construction business without the lifts and the cranes, the mixers and the excavators? And what's an architectural design firm without CAD, T-squares, drafting tech pens and compasses.However, you used to be able to run a business without heavily investing in so many computers and softwares and internet connectivity.But as computers evolved, as the online space grew, and as the internet became more accessible, markets changed!And so, businesses also had to change.The internet revolution has definitely made so many significant positive changes in the business world, but it also gave rise to new threats.Unfortunately, many businesses remain (deliberately or unintentionally) ignorant about looming threats within the online spaces that they now occupy.That's why we've made it our mission to deliver you a simplified version of:Things You NEED to KNOW About the Online Space and how you can better protect your business so you can keep on scaling!What is CyberSec? What is Ransomware as a Service? How are cyber threats toppling even the powerhouses in the AEC industry?At the end of the day, you need to understand that your business can easily be caught in the crossfire in an “invisible war”.Learning more about the online space and investing in CyberSec has become non-negotiable and is key for business continuity and future success!Discover how to future-proof your business today!Tune in to learn about the Hottest Insider News | Tips | Tricks | Hacks, and everything you need to know on Architecture, Engineering, Construction and Technology!Connect with the Justin & Will:Website: https://spotmigration.com/LinkedIn: https://www.linkedin.com/company/spot-migrationFacebook: https://www.facebook.com/spotmigrationYoutube: http://www.youtube.com/c/SpotmigrationWill's LinkedIn: https://www.linkedin.com/in/willforet/Justin's LinkedIn: https://www.linkedin.com/in/justneagle/Tune in to learn about the Hottest Insider News | Tips | Tricks | Hacks, and everything you need to know on Architecture, Engineering, Construction and Technology!
Watch the live stream: Watch on YouTube About the show Sponsored by FusionAuth: pythonbytes.fm/fusionauth Special guest: Ian Hellen Brian #1: gensim.parsing.preprocessing Problem I'm working on Turn a blog title into a possible url example: “Twisted and Testing Event Driven / Asynchronous Applications - Glyph” would like, perhaps: “twisted-testing-event-driven-asynchrounous-applications” Sub-problem: remove stop words ← this is the hard part I started with an article called Removing Stop Words from Strings in Python It covered how to do this with NLTK, Gensim, and SpaCy I was most successful with remove_stopwords() from Gensim from gensim.parsing.preprocessing import remove_stopwords It's part of a gensim.parsing.preprocessing package I wonder what's all in there? a treasure trove gensim.parsing.preprocessing.preprocess_string is one this function applies filters to a string, with the defaults almost being just what I want: strip_tags() strip_punctuation() strip_multiple_whitespaces() strip_numeric() remove_stopwords() strip_short() stem_text() ← I think I want everything except this this one turns “Twisted” into “Twist”, not good. There's lots of other text processing goodies in there also. Oh, yeah, and Gensim is also cool. topic modeling for training semantic NLP models So, I think I found a really big hammer for my little problem. But I'm good with that Michael #2: DevDocs via Loic Thomson Gather and search a bunch of technology docs together at once For example: Python + Flask + JavaScript + Vue + CSS Has an offline mode for laptops / tablets Installs as a PWA (sadly not on Firefox) Ian #3: MSTICPy MSTICPy is toolset for CyberSecurity investigations and hunting in Jupyter notebooks. What is CyberSec hunting/investigating? - responding to security alerts and threat intelligence reports, trawling through security logs from cloud services and hosts to determine if it's a real threat or not. Why Jupyter notebooks? SOC (Security Ops Center) tools can be excellent but all have limitations You can get data from anywhere Use custom analysis and visualizations Control the workflow…. workflow is repeatable Open source pkg - created originally to support MS Sentinel Notebooks but now supports lots of providers. When I start this 3+ yrs ago I thought a lot this would be in PyPI - but no