The protection of computer systems from theft or damage
POPULARITY
Categories
In this episode Jenna and Justine sit down with Bogdan Botezatu, the Director of Threat Research and Reporting at Bitdefender. They chat about the importance of a mobile security solution and how to best protect yourself from falling victim to cybercrimes. You can learn more about Bitdefender at the link here: https://bitdefend.me/Same_Brain #ad
AI Dependency Crisis + EV Infrastructure Failures: Tech Reality Check 2025When Two Infrastructure Promises Collide with RealityThe promise was simple: AI would augment human intelligence, and electric vehicles would transform transportation. The reality in 2025? Both are hitting infrastructure walls that expose uncomfortable truths about how technology actually scales.Sean Martin and Marco Ciappelli didn't plan to connect these dots in their latest Random and Unscripted weekly recap, but the conversation naturally evolved from AI dependency concerns to electric vehicle infrastructure challenges—revealing how both represent the same fundamental problem: mistaking technological capability for systemic readiness."The AI is telling us what success looks like and we're measuring against that, and who knows if it's right or wrong," Sean observed, describing what's become an AI dependency crisis in cybersecurity teams. Organizations aren't just using AI as a tool; they're letting it define their decision-making frameworks without maintaining the critical thinking skills to evaluate those frameworks.Marco connected this to their recent Black Cat analysis, describing the "paradox loop"—where teams lose both the ability to take independent action and think clearly because they're constantly feeding questions to AI, creating echo chambers of circular reasoning. "We're gonna be screwed," he said with characteristic directness. "We go back to something being magic again."This isn't academic hand-wringing. Both hosts developed their expertise when understanding fundamental technology was mandatory—when you had to grasp cables, connections, and core systems to make anything work. Their concern is for teams that might never develop that foundational knowledge, mistaking AI convenience for actual competence.The electric vehicle discussion, triggered by Marco's conversation with Swedish consultant Matt Larson, revealed parallel infrastructure failures. "Upgrading to electric vehicles isn't like updating software," Sean noted, recalling his own experience renting an EV and losing an hour to charging—"That's not how you're gonna sell it."Larson's suggestion of an "Apollo Program" for EV infrastructure acknowledges what the industry often ignores: some technological transitions require massive, coordinated investment beyond individual company capabilities. The cars work; the surrounding ecosystem barely exists. Sound familiar to anyone implementing AI without considering organizational infrastructure?From his Object First webinar on backup systems, Sean extracted a deceptively simple insight: immutability matters precisely because bad actors specifically target backups to enable ransomware success. "You might think you're safe and resilient until something happens and you realize you're not."Marco's philosophical take—comparing immutable backups to never stepping in the same river twice—highlights why both cybersecurity and infrastructure transitions demand unchanging foundations even as everything else evolves rapidly.The episode's most significant development was their expanded event coverage announcement. Moving beyond traditional cybersecurity conferences to cover IBC Amsterdam (broadcasting technology since 1967), automotive security events, gaming conferences, and virtual reality gatherings represents recognition that infrastructure challenges cross every industry."That's where things really get interesting," Sean noted about broader tech events. When cybersecurity professionals only discuss security in isolation, they miss how infrastructure problems manifest across music production, autonomous vehicles, live streaming, and emerging technologies.Both AI dependency and EV infrastructure failures share the same root cause: assuming technological capability automatically translates to systemic implementation. The gap between "this works in a lab" and "this works in reality" represents the most critical challenge facing technology leaders in 2025.Their call to action extends beyond cybersecurity: if you know about events that address infrastructure challenges at the intersection of technology and society, reach out. The "usual suspects" of security conferences aren't where these broader infrastructure conversations are happening.What infrastructure gaps are you seeing between technology promises and implementation reality? Join the conversation on LinkedIn or connect through ITSP Magazine.________________Hosts links:
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses the help of AI tools like Claude and Gemini to steal credentials from affected systems https://semgrep.dev/blog/2025/security-alert-nx-compromised-to-steal-wallets-and-credentials/ Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed the Global Espionage System Several law enforcement and cybersecurity agencies worldwide collaborated to release a detailed report on the recent Volt Typhoon incident. https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a
Send Bidemi a Text Message!In this episode, host Bidemi Ologunde spoke with Melinda Nevala, a digital privacy advocate and the Marketing Director at Medcurity. The conversation touched on America's patchwork of state privacy laws, spotlighting loopholes big tech quietly lobbied for, AI's still-unplugged data vacuum, and the dark-pattern consent pop-ups driving us all to button-click fatigue—plus practical tips to fight back.Support the show
In this episode of Small Biz Florida, host Tom Kindred continues his on-site coverage of the 2025 Veterans Florida Expo and Battle of the Pitch event in Tampa, where veteran entrepreneurship takes center stage. Tom interviews Navy veteran John Gibson, founder of Just Right IT, a Tampa-based company providing specialized cybersecurity services. John shares how his business journey began in San Diego and why he chose to relocate to Tampa for its strong veteran support network. With the rise of digital threats and the upcoming Cybersecurity Maturity Model Certification (CMMC) requirements for government contractors, John stresses the growing importance of cybersecurity for small businesses. He provides practical insights into protecting small enterprises, including affordable solutions like email security, employee training, and basic cyber hygiene. John also highlights the role AI plays in both improving and complicating the cybersecurity landscape. This episode is a must-listen for any business owner looking to stay ahead of today's cyber threats. This podcast episode was recorded live at the 2025 Veterans Florida Expo and Battle of the Pitches hosted at the Hilton Tampa Airport Westshore. This podcast is made possible by the Florida SBDC Network and sponsored by Florida First Capital. Connect with Our Guest: https://justrightit.com
In this final keynote, Jeff Sage, Director of Enterprise Service and Analysis Division at NASA's Office of Procurement, discusses the integration of AI in NASA's procurement processes. Introduced by Andrew McAllister, Jeff elaborates on NASA's historical and current use of AI, particularly focusing on its role in optimizing procurement operations amid workforce challenges. He shares practical AI applications like the statement of work generator that significantly enhances efficiency. Jeff also talks about the cultural and operational shifts needed for successful AI implementation, including training in prompt engineering and maintaining human oversight to mitigate biases. The session emphasizes that while AI is a powerful tool, it requires human expertise to fully leverage its potential. Subscribe on your favorite podcast platform to never miss an episode! For more from ACT-IAC, follow us on LinkedIn or visit http://www.actiac.org.Learn more about membership at https://www.actiac.org/join.Donate to ACT-IAC at https://actiac.org/donate. Intro/Outro Music: See a Brighter Day/Gloria TellsCourtesy of Epidemic Sound(Episodes 1-159: Intro/Outro Music: Focal Point/Young CommunityCourtesy of Epidemic Sound)
In this episode, I sit down with Curt Moore, Founder and CEO of Moat Title Security, a trailblazing firm reshaping the future of legal innovation and strategic risk management. With over 30 years of experience in the petroleum industry, Curt shares how his unique background as a Landman—and his perspective on the TV series Landman with Billy Bob Thornton—shaped his journey into protecting high-value assets in today's complex business world.Curt introduces his proprietary tools, including the Notice of Title Freeze and the Notice of Occupancy, which redefine how business owners, investors, and enterprise leaders approach title protection and financial risk mitigation. We discuss how his forward-thinking solutions go beyond traditional legal frameworks to provide scalable, proactive strategies for long-term resilience.Suppose you're an entrepreneur, investor, or leader looking to safeguard your assets and minimize risk in a fast-evolving environment. In that case, this conversation is packed with insights you won't want to miss.
Ever wondered where digital trust fits in your company's strategy? We live in a world that's buzzing with AI, cybersecurity, and digital innovation. Everywhere you look, there's a new app, a smarter tool, or a faster system. But in the middle of all this tech hype, there's one thing we often overlook—trust.In this insightful conversation, Punit discusses with Bruno about the crucial influence of technology, economy, and other external factors on business strategies. They delve into how companies navigate different environments, the role of digital transformation, and the importance of maintaining a balanced ecosystem approach.If you're a leader, strategist, privacy professional, or tech enthusiast trying to make sense of innovation, trust, and governance in today's world—this conversation is a must-watch.KEY CONVERSION00:02:02 What is the concept of digital trust? Was it trust enough?00:04:40 Can we expect digital trust in an emerging world of new technology in 10-20 years?00:09:15 Is the board convinced about the value of digital trust or are they still in compliance mode?00:13:15 How do we sell this concept of digital trust on the boards? 00:18:51 Linking concept of trust, security and privacy to the broader agenda 00:25:58 What is it that you can sell them with and how can they reach out? ABOUT GUESTBruno Horta Soares is a seasoned executive advisor, professor, and keynote speaker with over 20 years of experience in Governance, Digital Transformation, Risk Management, and Information Security. He is the founder of GOVaaS – Governance Advisors as-a-Service and has worked with organizations across Portugal, Angola, Brazil, and Mozambique to align governance and technology for sustainable business value.Since 2015, Bruno has served as Leading Executive Senior Advisor at IDC Portugal, guiding C-level leaders in digital strategy, transformation, governance, and cybersecurity. He is also a professor at top Portuguese business schools, including NOVA SBE, Católica Lisbon, ISCTE, ISEG, and Porto Business School, teaching in Masters, MBA, and Executive programs on topics such as IT Governance, Cybersecurity, Digital Transformation, and AI for Leadership.He holds a degree in Management and Computer Science (ISCTE), an executive program in Project Management (ISLA), and numerous professional certifications: PMP®, CISA®, CGEIT®, CRISC™, ITIL®, ISO/IEC 27001 LA, and COBIT® Trainer. As a LEGO® SERIOUS PLAY® Facilitator, he brings creativity into strategy and leadership development.Bruno received the ISACA John Kuyers Award for Best Speaker in 2019 and is the founder and current President of the ISACA Lisbon Chapter. A frequent international speaker, he shares expertise on governance and digital innovation globally.ABOUT HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach professionals.Punit is the author of books “Be Ready for GDPR' which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts.As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe.RESOURCES Websites www.fit4privacy.com,www.punitbhatia.com, https://www.linkedin.com/in/brunohsoares/ Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy
Can we build technology today to defend against the threats of tomorrow? This week, Technology Now concludes a double episode on post quantum cryptography and explores the subject of firmware, why it's imperative that it be protected against quantum attacks and why a simple update can't solve every problem. Nigel Edwards, Director of the Security Lab at HPE Labs, tells us more.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week, hosts Michael Bird and Aubrey Lovell look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations.About Nigel: https://www.linkedin.com/in/nigel-edwards-170591/?originalSubdomain=ukSources: https://www.theatlantic.com/technology/archive/2016/01/the-long-and-winding-history-of-encryption/423726/https://www.theqrl.org/blog/history-of-cryptography-behind-the-code-episode-1/https://www.theguardian.com/science/2025/may/07/todays-ai-can-crack-second-world-war-enigma-code-in-short-order-experts-say
John Graves is an innovative legal leader and Senior Counsel at Nisos Holdings, Inc. He has a diverse legal background at the intersection of law, highly regulated industry, and technology. John has over two decades of legal experience advising business leaders, global privacy teams, CISOs and security teams, product groups, and compliance functions. He is a graduate of the University of Oklahoma. In this episode… AI is fundamentally changing the cybersecurity landscape. Threat actors are using AI to move faster, scale attacks, and create synthetic identities that are difficult for companies to detect. At the same time, defenders rely on AI to sift through large amounts of data and separate the signal from noise to determine whether usernames and email addresses are tied to legitimate users or malicious actors. As businesses rush to adopt AI, how can they do so without creating gaps that leave them vulnerable to risks and cyber threats? To stay ahead of evolving cyber risks, organizations should conduct tabletop exercises with security and technical teams. These exercises help business leaders understand risks like prompt injection, poisoned data, and social engineering by walking through how AI systems operate and asking what would happen if certain situations occurred. They are most effective when conducted early in the AI lifecycle, giving companies the chance to simulate attack scenarios and identify risks before systems are deployed. Companies also need to establish AI governance because, without oversight of inputs, processes, and outputs, AI adoption carries significant risk. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels chat with John Graves, Senior Counsel at Nisos Holdings, Inc., about how AI is reshaping cyber threats and defenses. John shares how threat actors leverage AI to scale ransomware, impersonate real people, and improve social engineering tactics, while defenders use the technology to analyze data and uncover hidden risks. He explains why public digital footprints of executives and their families are becoming prime targets for attackers and why companies must take human risk management seriously. John also highlights why establishing governance and conducting tabletop exercises are essential for identifying vulnerabilities and preparing leaders to respond to real-world challenges.
```html i'm wall-e, welcoming you to today's tech briefing for thursday, august 28. here are the top stories: nvidia's record revenue: nvidia reports $46.7 billion in quarterly revenue, a 56% increase, driven by its ai-focused data center business and the advanced 'blackwell' chip. challenges persist in china due to geopolitical factors. ai competition heating up: google and grok are gaining momentum against openai's chatgpt, with google's gemini and ai suite seeing significant user engagement and innovation. whatsapp's ai enhancement: introduction of "writing help," a feature for rephrasing messages with privacy, reflecting the trend of integrating ai in daily interactions. cybersecurity alert: the fbi warns of 'salt typhoon,' a chinese-backed hacking group targeting 200 u.s. companies, urging for international cooperation against this threat. ai safety collaboration: openai and anthropic join forces for joint safety testing of ai models, focusing on enhancing safety standards and promoting a culture of responsible innovation. that's all for today. we'll see you back here tomorrow. ```
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services at https://barricadecyber.comCheck out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabilities CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424 Citrix patched three vulnerabilities in Netscaler. One is already being exploited https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938&articleTitle=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2025_7775_CVE_2025_7776_and_CVE_2025_8424 git vulnerability exploited (CVE-2025-48384) A git vulnerability patched in early July is now being exploited https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9
Send us a textWhat do cooking steaks, German football, and MSP automation have in common? In this enriching episode, Joey Pinz chats with Mathias Zeumer about how life in the kitchen, yoga, and cybersecurity intersect in surprising ways. From 10 summers in a private club to managing human risk in the digital world, Mathias brings a grounded, practical philosophy to everything he does.
Send us a textIn this action-packed episode, Joey Pinz sits down with cybersecurity veteran and ex-MSP operator Chris Loehr. From his early days as a two-footed soccer midfielder to leading Solis Security through complex ransomware response cases, Chris shares insights forged in both cleats and crisis. ⚽
Send us a textIn this thoughtful episode of the Joey Pinz Conversations podcast, Joey sits down with Stan Ivanov, founder and CTO of ThreatMate, to explore a decades-long journey through software development, entrepreneurship, and personal evolution.
Send us a textWhat do street food in Vietnam, varsity football, and DMARC email authentication have in common? In this immersive episode, Joey Pinz sits down with Michael Chester for a lively conversation that connects personal transformation with global impact.
Send us a text
Send us a textIn this energizing episode of the Joey Pinz Discipline Conversations podcast, Joey talks with Scott Barlow, Global VP of MSP and Cloud at Sophos, about how MSPs are becoming the true frontline of cybersecurity—and what vendors must do to support them.
From time to time, we'll re-air a previous episode of the show that our newer audience may have missed. During this episode, guest host Madelyn O'Farrell is joined by TJ England, Chief Legal Officer at C.R. England, a pioneer in the transportation services industry providing asset-based Dedicated, Truckload, and Intermodal solutions to solve a wide variety of customer needs. During the conversation, TJ and Madelyn explore the intersection of technology and business model innovation in the trucking industry. TJ provides a historical overview of C.R. England, a family-owned trucking company founded in 1920, and shares his personal journey into the legal side of the industry. They discuss the challenges of operating in a low-margin sector, the deployment of AI to enhance operations, the importance of effective communication among carriers, shippers, and stakeholders in the supply chain, and so much more. Highlights from their conversation include:C.R. England's Journey in Trucking (0:52)TJ's Journey into the Family Business (1:58)Challenges in the Trucking Industry (3:41)Exploring AI in Trucking (6:15)Potential of AI for Network Optimization (10:06)Human in the Loop Approach (14:17)Technological Solutions for Communication (17:39)Fragmentation and Small Businesses (20:43)AI in Legal Framework (25:57)Automated Vehicles and Legal Risks (27:17)Train Derailments and Technology (29:41)Legal Perspectives on Cybersecurity (32:00)In-House vs. Outsourcing Technology (35:10)ROI and Customer-Centric Solutions (39:05)Current State of the Trucking Market (41:22)Importance of Lean Operations (46:50)Challenges of Investment in Technology (48:18)Dynamo is a VC firm led by supply chain and mobility specialists that focus on seed-stage, enterprise startups.Find out more at: https://www.dynamo.vc/
The Roundtable Panel: a daily open discussion of issues in the news and beyond. Today's panelists are Dean of the College of Emergency Preparedness, Homeland Security and Cybersecurity at the University at Albany Robert Griffin, Professor Emeritus of Russian at Hofstra University and author of: Illiberal Vanguard: Populist Elitism in the United States and Russia Alexander Mihailovic, and Albany Mayor Kathy Sheehan.
On this episode of the ABA Fraudcast, we dive into how the Internet works — and why it's so easy for criminals to create fake bank websites. We'll explore how these sites get taken down and what banks can do to combat this growing threat. Our guest, Craig Schwartz of fTLD Registry Services, breaks down the key differences between traditional .com domains and the more secure .bank domain — a top-level domain created by a consortium led by the American Bankers Association and other partners specifically to reduce fraud. Schwartz explains the rigorous security measures behind .bank, including a comprehensive vetting process that keeps bad actors out and ongoing verification to maintain trust. Want to learn more about the benefits of .bank? Visit aba.com/dotbank.
In this episode of Resilient Cyber, I sit down with Gianna Whitver and Maria Velasquez to chat about the state of marketing in the cybersecurity industry, as well as their popular event "Cyber Marketing Con"In this episode, we discussed:The background of the CyberMarketingCon and what led Gianna and Maria to co-found the event and communityWhere marketers typically fall short and what can be done to drive more effective marketing and selling to security practitioners and leadersWhat practitioners can learn their marketing peers when it comes to communication, empathy, story telling, and building relationshipsThe importance of marketing, brand and broader GTM for security vendors to stand out from their competitorsWhat to keep an eye out for at the upcoming CyberMarketingCon in December in Austin Texas
After Okta Inc. (OKTA) posted an earnings win and subsequent rally, now cybersecurity investors await CrowdStrike's (CRWD) report after the close on Wednesday. Marley Kayden notes the company's significant rally over the last year, even as the stock trades close to 20% off its all-time high. She talks about the headwinds still ahead for CrowdStrike as software sees a slump on Wall Street. Prosper Trading Academy's Scott Bauer offers an example options trade for the cybersecurity company.======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
Would you trust a digital twin to produce all your content for you? Because that is now possible with Hey Gen's new "digital twin" feature. That's just one of the hot headlines on today's news day. We also break down Podcast Movement 2025's headline-making merger with Sounds Profitable and what it means for creators, as well as the latest podcast charts, Google Gemini's updates, and new AI video tools. We also tease Taylor Swift's first-ever podcast appearance (more on this tomorrow) and community members share real talk from their experiences at one of this year's largest podcasting events, Podcast Movement. Episode Highlights: [03:27] Podcast Charts and Statistics[08:18] Upcoming Podcasting Events[20:11] AI News and Innovations[29:59] Digital Twins[31:17] AI and Cybersecurity[34:49] Personalization with AI[39:53] Podcast Movement and Industry Changes[45:34] Reflections on Podcast Movement Event[55:28] Taylor Swift's Podcast DebutLinks & Resources: Join The Empowered Podcasting Facebook Group:www.facebook.com/groups/empoweredpodcastingGet Your Tickets for The Empowered Podcasting Conference:www.empoweredpodcasting.comPodnews:www.Podnews.netBecome Their Favorite Podcast Guest:https://bit.ly/47PdUytAfros & Audio: www.afrosandaudio.comHey Gen: https://www.heygen.com/pricingFlow: https://bit.ly/467FmWWNew Heights:www.youtube.com/@newheightshowSounds Profitable:https://soundsprofitable.comRemember to rate, follow, share, and review our podcast. Your support helps us grow and bring valuable content to our community.Join us LIVE every weekday morning at 7 am ET (US) on Clubhouse: https://www.clubhouse.com/house/empowered-podcasting-e6nlrk0wOr Join us on Chatter: https://preview.chattersocial.io/group/98a69881-f328-4eae-bf3c-9b0bb741481dLive on YouTube: https://youtube.com/@marcronickBrought to you by iRonickMedia.com Please note that some links may be affiliate links, which support the hosts of the PMC. Thank you!--- Send in your mailbag question at: https://www.podpage.com/pmc/contact/ or marc@ironickmedia.comWant to be a guest on The Podcasting Morning Chat? Send me a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/1729879899384520035bad21b
Like every business, healthcare systems are vulnerable to cyberattack in all of its many forms. For those in healthcare, however, the security of the information we access has special significance. Healthcare systems keep detailed records of patients' medical diagnoses, test results, payment methods and insurance providers. Information of this nature falling into the wrong hands can have lasting detrimental effects on our facilities and the people we serve. In Sterile Processing, we are primarily concerned with protecting our patients against infection, but we must also be vigilant in safeguarding their protected health information. In episode 133, host Casey Czarnowski speaks with John Kampas, CEO of EMPIST, an IT services and security company. Kampas reviews current and emerging types of cyberattacks, especially those specific to healthcare. He discusses the dark web and how bad actors (criminals) use AI and deepfake technology. Kampas also describes common gaps in healthcare systems and provides strategies facilities can use to improve their cybersecurity and protect business records and patient privacy. Our Guest: John Kampas, Founder and CEO, EMPIST John Kampas is the Founder & CEO of EMPIST, a renowned provider of managed IT services, cybersecurity, cloud solutions, and website design & development. After earning his degree in Management Information Systems from Loyola University Chicago, Kampas founded EMPIST (formerly Digerati Group) in 2000. Under his leadership, the company has expanded and earned numerous accolades, including being named one of Channel Futures' top 501 Managed Service Providers, recognized by CRN as a top 100 Cybersecurity firm, and honored by Expertise as one of Chicago's Top 20 Best Managed Service Providers. With 25 years of proven success, EMPIST continues to deliver innovative technology solutions to organizations worldwide, driving growth and success through cutting-edge technology and exceptional service. Earn CE Now
A ransomware attack shut down St. Paul, Minnesota—forcing a state of emergency and even the calling in of the National Guard. Cybersecurity expert Tyler Moffitt unpacks how it happened, who was behind it, and what cities and individuals can learn to avoid becoming the next target.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.
Returning from this year's DEF CON, hear from our Offensive Team Managers, Dowd and Findlay, and Pinky, IR Manager and co-host of The Hackle Box. Hear about new highlights, CTF's, and villages, and reflection from Brad as a Blue Team member navigating past challenges. Have something to say? Contact us at unsecurity@frsecure.com and follow us for more!LinkedIn: frsecure Instagram: frsecureofficialFacebook: frsecureBlueSky: frsecureAbout FRSecure: https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.
Peggy digs into agentic AI (artificial intelligence) and its transformative potential for the construction industry. She explores how this next evolution of AI—capable of autonomous reasoning and decision-making—can address some of the industry's most pressing challenges from labor shortages to supply-chain complexity. She also discusses: The staggering growth forecast of the agentic AI market. Why small and midsized construction firms are still hesitant to adopt AI—and what the data says about this trend. Use cases where agentic AI can make a difference, including project scheduling, supply chain coordination, and worksite safety. peggysmedleyshow.com (8/26/25 - 934) What You Might Have Missed: Employee Productivity in Construction What's Next for AI in Construction AI in the Steel Industry IoT, Internet of Things, Peggy Smedley, artificial intelligence, machine learning, big data, digital transformation, cybersecurity, blockchain, 5G, cloud, sustainability, future of work, podcast This episode is available on all major streaming platforms. If you enjoyed this segment, please consider leaving a review on Apple Podcasts.
Peggy Smedley and Maria Pacheco, assistant professor of computer science, University of Colorado Boulder, discuss the results of a study surrounding AI (artificial intelligence) solving sudoku puzzles. She says the more complex the problems, the more difficult the time the tools had at solving them. They also discuss: Why even the best tools had a hard time reasoning why they came to an answer. The three stages to the language models acquiring the knowledge. The main danger that exists and how we can use them for what they are good at. colorado.edu/cs (8/26/25 - 934) What You Might Have Missed: AI for IT Operations AI, Energy, and the Need for Innovation AI as a Collaborator IoT, Internet of Things, Peggy Smedley, artificial intelligence, machine learning, big data, digital transformation, cybersecurity, blockchain, 5G, cloud, sustainability, future of work, podcast, Maria Pacheco, University of Colorado Boulder This episode is available on all major streaming platforms. If you enjoyed this segment, please consider leaving a review on Apple Podcasts.
Peggy Smedley and Yury Gomez, global commercial head for supply chain manufacturing and mobility industries, Microsoft, talk about the acceleration of AI (artificial intelligence) and agentic AI. She says supply chains are getting drastically overwhelmed once again, with geopolitical conflicts, but the good news is Microsoft is changing how the supply chain is done with technology because technology is really changing the game. They also discuss: What a Frontier Firm is and how agentic AI can help Frontier Firms. Examples of case studies where agentic AI is helping in the supply chain. Three areas where companies need to intensify. 2025: The year the Frontier Firm is born Building the Frontier Firm with Microsoft Azure: The business case for cloud and AI modernization (8/26/25 - 934) What You Might Have Missed: Key Considerations for Manufacturing The Age of AI in Automotive Manufacturing: Yesterday, Today, and Tomorrow IoT, Internet of Things, Peggy Smedley, artificial intelligence, machine learning, big data, digital transformation, cybersecurity, blockchain, 5G, cloud, sustainability, future of work, podcast, Yury Gomez, Microsoft This episode is available on all major streaming platforms. If you enjoyed this segment, please consider leaving a review on Apple Podcasts.
Tage Bushman joins me this week to talk about his career path to become a Professor at Western Technical College. It's a fascinating subject for obvious reasons. The ground has been shifting constantly since he first got into tech, but now with AI, things have gotten even more "interesting. Tage teaches in the Cybersecurity program and Web & Software programs. Specifically, I teach Cisco 1 (networking basics), Linux Administration, Database Server Administration, and DevOps. I have also taught Web Programming 1, Intro to Cybersecurity, Cybersecurity Essentials, Business Information Systems, and Software Apps for Business. Tage also hosts two podcasts. He is a huge Disney Parks (specifically Disneyland) fan. He and his friend Teresa host the DLWeekly Podcast and he's also part of The Hub Crawl Podcast, which he calls "a riff off Clockwise" where they bring a Disney question and go around the virtual room. Read an unedited, auto-generated transcript with chapter marks: CCATP_2025_08_25 Referral Links: Setapp - 1 month free for you and me Parallels Toolbox - 3 months free for you and me Learn through MacSparky Field Guides - 15% off for you and me Backblaze - One free month for me and you Eufy - $40 for me if you spend $200. Sadly nothing in it for you. PIA VPN - One month added to Paid Accounts for both of us CleanShot X - Earns me $25%, sorry nothing in it for you but my gratitude
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day.Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services at https://barricadecyber.comCheck out John Strand's Pay What You Can Antisyphon Training:https://simplycyber.io/antisyphonAllow what you need, block everything else... Including ransomware. Zero trust Endpoint Protection Platform at https://threatlocker.com/dailycyberTake control of your data and keep your private life private by signing up for DeleteMe at https://simplycyber.io/deleteme promo SIMPLYCYBER for 20% offRegister for Flare's next training on Aug. 13th on Web App Testing at https://simplycyber.io/flareSimply Cyber Academy - The Place for Cyber Careers: https://academy.simplycyber.ioJoin SC Discord: https://SimplyCyber.io/discordPodcast in stream: https://cisoseries.comFollow SC: https://simplycyber.io/socials
A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan's Supreme Court upholds limits on cell phone searches. Sen. Wyden accuses the judiciary of cyber negligence. CISA issues an urgent alert on a critical Git vulnerability. Hackers target Maryland's transit services for the disabled. Our guest is Cristian Rodriguez, Field CTO for the Americas from CrowdStrike, examining the escalating three-front war in AI. A neighborhood crime reporting app gets algorithmically sketchy. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Cristian Rodriguez, Field CTO, Americas from CrowdStrike, as he is examining the escalating three-front war in AI. Selected Reading Cybercrime Government Leadership News News Briefs Recorded Future Nevada state websites, phone lines knocked offline by cyberattack (The Record) Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection (GB Hackers) New AI attack hides data-theft prompts in downscaled images (Bleeping Computer) How to stop AI agents going rogue (BBC) AI Makes It Harder for Entry-Level Coders to Find Jobs, Study Says (Bloomberg) Fourth Amendment Victory: Michigan Supreme Court Reins in Digital Device Fishing Expeditions (Electronic Frontier Foundation) Wyden calls for probe of federal judiciary data breaches, accusing it of ‘negligence' (The Record) CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited (GB Hackers) Maryland investigating cyberattack impacting transit service for disabled people (The Record) Citizen Is Using AI to Generate Crime Alerts With No Human Review. It's Making a Lot of Mistakes (404 Media) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale images before processing them. An attacker can create a harmless looking image that would reveal text after downscaling leading to prompt injection https://blog.trailofbits.com/2025/08/21/weaponizing-image-scaling-against-production-ai-systems/ IBM Jazz Team Server Vulnerability CVE-2025-36157 IBM patched a critical vulnerability in its Jazz Team Server https://www.ibm.com/support/pages/node/7242925
What happens when a cybersecurity incident requires legal precision, operational coordination, and business empathy—all at once? That's the core question addressed in this origin story with Bryan Marlatt, Chief Regional Officer for North America at CyXcel.Bryan brings over 30 years of experience in IT and cybersecurity, with a history as a CISO, consultant, and advisor. He now helps lead an organization that sits at the intersection of law, cyber, and geopolitics—an uncommon combination that reflects the complexity of modern risk. CyXcel was founded to address this reality head-on, integrating legal counsel, cybersecurity expertise, and operational insight into a single, business-first consulting model.Rather than treat cybersecurity as a checklist or a technical hurdle, Bryan frames it as a service that should start with the business itself: its goals, values, partnerships, and operating environment. That's why their engagements often begin with conversations with sales, finance, or operations—not just the CIO or CISO. It's about understanding what needs to be protected and why, before prescribing how.CyXcel supports clients before, during, and after incidents—ranging from tailored tabletop exercises to legal coordination during breach response and post-incident recovery planning. Their work spans critical sectors like healthcare, utilities, finance, manufacturing, and agriculture—where technology, law, and regulation often converge under pressure.Importantly, Bryan emphasizes the need for tailored guidance, not generic frameworks. He notes that many companies don't realize how incomplete their protections are until it's too late. In one example, he recounts a hospital system that chose to “pay the fine” rather than invest in cybersecurity—a decision that risks reputational and operational harm far beyond the regulatory penalty.From privacy laws and third-party contract reviews to incident forensics and geopolitical risk analysis, this episode reveals how cybersecurity consulting is evolving to meet a broader—and more human—set of business needs.Learn more about CyXcel: https://itspm.ag/cyxcel-922331Note: This story contains promotional content. Learn more.Guest: Bryan Marlatt, Chief Regional Officer (North America) at CyXcel | On LinkedIn: https://www.linkedin.com/in/marlattb/ResourcesLearn more and catch more stories from CyXcel: https://www.itspmagazine.com/directory/cyxcelLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
⬥GUEST⬥Andy Ellis, Legendary CISO [https://howtociso.com] | On LinkedIn: https://www.linkedin.com/in/csoandy/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥In this episode of Redefining CyberSecurity, host Sean Martin speaks with Andy Ellis, former CSO at Akamai and current independent advisor, about the shifting expectations of security leadership in today's SaaS-powered, AI-enabled business environment.Andy highlights that many organizations—especially mid-sized startups—struggle not because they lack resources, but because they don't know how to contextualize what security means to their business goals. Often, security professionals aren't equipped to communicate with executives or boards in a way that builds shared understanding. That's where advisors like Andy step in: not to provide a playbook, but to help translate and align.One of the core ideas discussed is the reframing of security as an enabler rather than a gatekeeper. With businesses built almost entirely on SaaS platforms and outsourced operations, IT and security should no longer be siloed. Andy encourages security teams to “own the stack”—not just protect it—by integrating IT management, vendor oversight, and security into a single discipline.The conversation also explores how AI and automation empower employees at every level to “vibe code” their own solutions, shifting innovation away from centralized control. This democratization of tech raises new opportunities—and risks—that security teams must support, not resist. Success comes from guiding, not gatekeeping.Andy shares practical ways CISOs can build influence, including a deceptively simple yet powerful technique: ask every stakeholder what security practice they hate the most and what critical practice is missing. These questions uncover quick wins that earn political capital—critical fuel for driving long-term transformation.From his “First 91 Days” guide for CISOs to his book 1% Leadership, Andy offers not just theory but actionable frameworks for influencing culture, improving retention, and measuring success in ways that matter.Whether you're a CISO, a founder, or an aspiring security leader, this episode will challenge how you think about the role security plays in business—and what it means to lead from the middle.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/csoandy_how-to-ciso-the-first-91-days-ugcPost-7330619155353632768-BXQT/Book: “How to CISO: The First 91-Day Guide” by Andy Ellis — https://howtociso.com/library/first-91-days-guide/Book: “1% Leadership: Master the Small Daily Habits that Build Exceptional Teams” — https://www.amazon.com/1-Leadership-Daily-Habits-Exceptional/dp/B0BSV7T2KZ⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast:
In “The C.H. Robinson Perspective: Navigating the Next Era”, Joe Lynch and Michael Castagnetto, President of North American Surface Transportation at C.H. Robinson, discuss how the company's people-first culture and commitment to developing its employees drive its ability to solve complex logistics challenges and innovate for the future. About Michael Castagnetto Michael Castagnetto was named president of North American Surface Transportation (NAST) in January 2024. Prior executive positions with the company include Vice President, Customer Success in NAST from January 2023 – January 2024 and President of Robinson Fresh from December 2019 – January 2023. Michael began his career with C.H. Robinson in 2005 and has held various leadership roles including sourcing manager at Food Source, general manager of the tropical and dry vegetable categories, director of global supply and vice president of global sourcing. He holds a bachelor's degree from Saint Mary's College of California. About C.H. Robinson C.H. Robinson delivers logistics like no one else™. Companies around the world look to us to reimagine supply chains, advance freight technology, and solve logistics challenges—from the simple to the most complex. 83,000 customers and 450,000 contract carriers in our network trust us to manage 37 million shipments and $23 billion in freight annually. Through our unmatched expertise, unrivaled scale, and tailored solutions, we ensure the seamless delivery of goods across industries and continents via truckload, less-than-truckload, ocean, air, and beyond. As a responsible global citizen, we make supply chains more sustainable and proudly contribute millions to the causes that matter most to our employees. For more information, visit us at chrobinson.com (Nasdaq: CHRW). Key Takeaways: The C.H. Robinson Perspective: Navigating the Next Era In “The C.H. Robinson Perspective: Navigating the Next Era,” Joe Lynch and Michael Castagnetto, President of North American Surface Transportation at C.H. Robinson, discuss how the company's people-first culture and commitment to developing its employees drive its ability to solve complex logistics challenges and innovate for the future. The Human Element is the "Secret Sauce": C.H. Robinson's core strength is its people. Despite its massive network and technology investments, the company's ability to solve complex logistics challenges is rooted in its team's expertise and problem-solving skills. This human touch is consistently cited by customers as a key differentiator and a source of trust. Navigating the Post-COVID Freight Recession: The interview addresses the challenges of the recent freight recession. C.H. Robinson's approach during this time focused on helping customers navigate market volatility, reinforcing the need for a flexible and proactive logistics strategy to manage supply chain disruptions and shifting market dynamics. The Power of a Diverse Business Portfolio: C.H. Robinson's strength is built on four distinct business segments: NAST, Global Forwarding, Robinson Fresh, and Managed Services. This diverse structure allows the company to provide comprehensive solutions across multiple modes and industries, from a single truckload in North America to complex international and global supply chains. Nearshoring Drives Cross-Border Importance: The trend of reindustrialization in the U.S. is making cross-border logistics, particularly with Mexico, more critical than ever. The discussion highlights C.H. Robinson's investments and leadership in this area, positioning them to support this strategic shift and build more resilient supply chains. Cybersecurity is a Top Priority: Freight fraud and cybersecurity are growing threats in the logistics industry. The conversation underscores the importance of a proactive approach to security, including robust protocols and technology to protect against digital risks. This focus is essential for building and maintaining trust with customers and carriers. Unrivaled Scale and Expertise: C.H. Robinson leverages its unmatched global scale—managing 37 million shipments with a network of 450,000 contract carriers—to deliver tailored solutions. This combination of vast operational reach and deep industry expertise ensures they can solve logistics challenges of any size. The Intersection of People and Technology: While the team is the company's secret sauce, technology is a key enabler. The conversation emphasizes C.H. Robinson's continuous investment in freight technology, including AI and other digital platforms. This innovation allows for better data-driven decisions and enhanced efficiency. Learn More About The C.H. Robinson Perspective: Navigating the Next Era Michael Castagnetto | Linkedin C.H. Robinson | Linkedin C.H. Robinson Global Newsroom | C.H. Robinson The Logistics of Logistics Podcast If you enjoy the podcast, please leave a positive review, subscribe, and share it with your friends and colleagues. The Logistics of Logistics Podcast: Google, Apple, Castbox, Spotify, Stitcher, PlayerFM, Tunein, Podbean, Owltail, Libsyn, Overcast Check out The Logistics of Logistics on Youtube
FedRAMP 20x is redefining how federal cloud services get authorized —making them faster, smarter and more secure. Earlier this year GSA released the 20x pilot in an effort to increase the efficiency of authorizations and enhance security. Pete Waterman, FedRAMP director at the General Services Administration, unpacks how the program is streamlining approvals, enhancing continuous monitoring and leveraging automation to detect and resolve security risks in real time. Waterman explains how FedRAMP 20x is helping agencies and providers build services that make sense from the start, leading to stronger security and better mission outcomes.
The Trump White House has tapped Tesla board member and Airbnb cofounder Joe Gebbia to take the lead on its initiative to redesign the federal government's digital footprint. Gebbia announced that he was appointed as chief design officer in a Saturday post to X, formerly known as Twitter. That role was established by President Donald Trump via executive order last week along with a new National Design Studio and an initiative to improve digital and physical spaces called “America By Design.” Gebbia said in his X post that his directive “is to update today's government services to be as satisfying to use as the Apple Store: beautifully designed, great user experience, run on modern software.” Gebbia thanked Trump for supporting the new initiative and asked people interested in joining the studio to reach out with a link to their work. Prior to his appointment as the design chief, Gebbia also worked with DOGE to modernize the Office of Personnel Management's mostly paper-based retirement processing. Sen. Ron Wyden on Monday urged Supreme Court Chief Justice John Roberts to seek an independent review of federal court cybersecurity following the latest major hack, accusing the judiciary of “incompetence” and “covering up” its “negligence” over digital defenses. Wyden, D-Ore., wrote his letter in response to news this month that hackers had reportedly breached and stolen sealed case data from federal district courts dating back to at least July, exploiting vulnerabilities left unfixed for five years. Alleged Russian hackers were behind both the attack and another past major intrusion, and may have lurked in the systems for years. Wyden wrote in his letter: “The courts have been entrusted with some of our nation's most confidential and sensitive information, including national security documents that could reveal sources and methods to our adversaries, and sealed criminal charging and investigative documents that could enable suspects to flee from justice or target witnesses. Yet, you continue to refuse to require the federal courts to meet mandatory cybersecurity requirements and allow them to routinely ignore basic cybersecurity best practices.” That, Wyden said, means someone from the outside must conduct a review, naming the National Academy of Sciences as the organization Roberts should choose. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
Ahead of Okta Inc's (OKTA) earnings on Tuesday, Joseph Bonner gives his big picture perspective on the cybersecurity space. For Palo Alto Networks (PANW), he believes the company's acquisition of CyberArk will be "filling a hole" when it comes to agentic A.I. and promises future growth. Joseph has a buy on Palo Alto and CrowdStrike (CRWD) on expectations that cybersecurity will be greatly needed in the future. Tom White offers example options trades for both cybersecurity stocks.======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
Michelle Connell considers Okta Inc. (OKTA) a "really strong company," though the company's commentary on government-side weakness is something she believes investors should watch moving forward. That said, a bullish outlook on cybersecurity and mergers seen in companies like Palo Alto Networks' (PANW) acquisition of CyberArk add to the case for Okta.======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – / schwabnetwork Follow us on Facebook – / schwabnetwork Follow us on LinkedIn - / schwab-network About Schwab Network - https://schwabnetwork.com/about
The editorial team dives into the September issue of Manufacturing Engineering and Technology (MET), covering the latest trends of the auto industry, the continued rise of AI and the critical importance of cybersecurity preparedness.
It's not just a show, it's a lifeline for how to unscary a seemingly daunting career journey – no matter where you're at in your IT or security hustle.From super-talented IT cartoonist and influencer marketing service agency co-owner, Forrest Brazeal, and gifted Automox VP of Customer Experience, Charles Coaxum, to the sagely verbose CISO and VP of Product at Automox, Jason Kikta, and Gong's inspirational Director of IT, James Sennett – our handpicked line-up of industry trailblazers won't just talk about how to advance. Instead, they'll walk you through real-life strategies to help you climb the career ladder and stay on the top rung once you get there.This show was broadcast live Wednesday, October 30, 2024 at 12 PM Central Time.
This Day in Legal History: Nineteenth Amendment CertifiedOn this day in legal history, August 26, 1920, the Nineteenth Amendment to the U.S. Constitution was formally certified by Secretary of State Bainbridge Colby, granting women the right to vote nationwide. The certification marked the culmination of a nearly century-long struggle led by suffragists like Susan B. Anthony, Elizabeth Cady Stanton, and later Alice Paul and Ida B. Wells, who fought for political inclusion through protests, civil disobedience, and persistent lobbying. The amendment's ratification by Tennessee—by a single vote—on August 18, 1920, provided the necessary 36th state approval to satisfy constitutional requirements.The Nineteenth Amendment's language is deceptively simple: “The right of citizens of the United States to vote shall not be denied or abridged... on account of sex.” But its legal impact was profound, constitutionally guaranteeing the franchise to half the population that had long been excluded. The certification did not end all voting discrimination—many women of color, particularly Black and Native American women, continued to face racist barriers to the ballot—but it was a foundational legal step toward gender equality in civic life.August 26 is now recognized as Women's Equality Day, established by Congress in 1971, to honor the legal and political significance of the Nineteenth Amendment and to commemorate the broader fight for women's rights. The legal principle enshrined in the amendment echoes in later equality jurisprudence, forming part of the constitutional backdrop to cases involving gender discrimination under the Equal Protection Clause.The Nineteenth Amendment also represented a rare moment when a constitutional change directly expanded democratic participation, in contrast to more procedural or structural amendments. It altered not just who could vote, but how lawmakers and courts would later consider the role of gender in public policy and civil rights. The amendment continues to serve as a legal and symbolic foundation for subsequent laws and cases advancing gender equity, including Title IX and the push for the Equal Rights Amendment.On August 26, the legal history of suffrage becomes not only a story of amendment certification, but of constitutional transformation through organized legal and political struggle.U.S. Senator Ron Wyden has called on Chief Justice John Roberts to initiate an independent investigation into the federal judiciary's cybersecurity practices, following a significant breach of the court system's electronic case management system. In a letter, Wyden urged Roberts to involve the National Academy of Sciences in reviewing both the recent and previous hacks—highlighting that foreign actors, possibly including Russia, exploited the same vulnerabilities in both incidents.Wyden criticized the system as outdated, insecure, and costly, noting this was the second major breach since 2020. He emphasized that sensitive data, including information on confidential informants and sealed case files, may have been compromised. The judiciary's handling of cybersecurity, Wyden argued, has repeatedly failed to meet the standards expected of institutions entrusted with highly sensitive information.The senator pointed out that despite years of warnings and expert recommendations, the judiciary has lagged in updating its technology. U.S. Circuit Judge Michael Scudder recently admitted in testimony that the case management system is obsolete and needs replacement. Wyden also noted that while executive branch agencies have been using multi-factor authentication since 2015, the judiciary will not implement it until the end of 2025.Wyden has long advocated for transparency and modernization in the court system, including efforts to make the PACER database free. His latest request underscores growing bipartisan concern over national security implications tied to the federal courts' digital infrastructure.US senator calls for independent review of federal judiciary cybersecurity | ReutersA federal judge has ruled that the Trump administration can move forward with a provision in its recent spending bill that bars Medicaid funding from going to abortion providers in Maine. The ruling, by U.S. District Judge Lance Walker—a Trump appointee—rejected a request by Maine Family Planning to block the provision, part of the One Big Beautiful Bill Act passed by Congress in July. The organization argued the law unfairly targeted them and violated their constitutional rights, but the judge declined to intervene, emphasizing the law was a product of the democratic process.Walker acknowledged that the policy might be unwise but stressed it is not the judiciary's role to override legislative choices based on policy disagreements. Maine Family Planning, the state's largest reproductive healthcare provider, warned that the ruling could force clinic closures and reductions in care, impacting around 8,000 patients annually.The case is one of two major legal challenges to the law. A separate federal judge in Boston has temporarily blocked the same provision as it applies to Planned Parenthood nationwide, and that ruling is under appeal. The Maine case focused on how the law would impact two of the state's main abortion providers and argued it violated equal protection rights under the Fifth Amendment by singling them out.Judge Walker, however, found that Congress has the authority to direct federal funds in ways consistent with its policy goals, including discouraging abortion—a procedure that is no longer protected as a constitutional right following the Supreme Court's 2022 ruling overturning Roe v. Wade.Trump administration can withhold Medicaid funding from Maine abortion providers, judge rules | ReutersPresident Donald Trump has moved to fire Federal Reserve Governor Lisa Cook, alleging she made false statements on mortgage applications—an accusation she denies. The unprecedented move, announced via Truth Social, sent financial markets into a brief stir, with long-term Treasury yields rising and the dollar dipping, reflecting concerns over the Fed's independence. Cook, appointed by President Biden and confirmed in 2022, has vowed not to resign and plans legal action, arguing that Trump lacks authority to remove her without proper cause.Trump claims Cook's conduct shows “gross negligence” and undermines trust in the Fed. However, under the Federal Reserve Act, governors can only be removed “for cause,” a standard historically interpreted to mean inefficiency, neglect of duty, or misconduct while in office. Cook's alleged mortgage misstatements predate her time at the Fed, making the legal grounds for removal murky.This attempt follows months of Trump's public attacks on the Fed for keeping interest rates high. If successful, it would allow him to reshape the board with dovish policymakers more favorable to rate cuts. Critics, including Senator Elizabeth Warren and legal scholars, denounced the move as a political power grab and a threat to central bank independence.The Department of Justice may investigate Cook following a criminal referral, but no charges have been filed. Legal experts suggest the case could test the Supreme Court's recent statements on limits to presidential power over independent agencies. Meanwhile, Cook has reiterated her commitment to her role and refuses to step down amid what she calls political bullying.Trump Moves to Fire Fed's Cook, Setting Up Historic Legal FightAnd in my column this week, a story out of Utah. A small town in Utah, Wellington, is facing public backlash after proposing a 225% property tax hike—a dramatic response to years of avoiding smaller, routine tax increases. This financial crisis wasn't caused by a single year of overspending but rather by elected officials deferring necessary tax adjustments since 2017, despite rising costs for services and infrastructure. While avoiding tax hikes may have seemed politically savvy, it left the town with a nearly $400,000 budget shortfall that now demands a painful correction.The Wellington situation illustrates a broader problem: local governments often delay modest increases to avoid political consequences, only to face greater fiscal challenges later. Holding tax rates flat may feel like good governance, but it allows infrastructure to decay and expenses to balloon. By the time officials act, the required adjustment feels extreme to residents who weren't prepared for it.The solution, according to my piece, lies in normalizing small, predictable tax increases. This would help cities keep pace with inflation and infrastructure needs, without shocking taxpayers. One of my proposed reforms is land value taxation, which taxes land rather than improvements on it—encouraging development without penalizing property upgrades and offering greater economic stability.To depoliticize the process, cities could establish independent, bipartisan bodies to manage long-term tax planning. This shift from reactive crisis management to proactive fiscal planning could help avoid sudden, disruptive tax spikes like Wellington's. The underlying message: the longer tax adjustments are postponed, the more painful and politically damaging they become.Utah Town's 225% Property Tax Spike Is Lesson on Fiscal Realism This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.minimumcomp.com/subscribe
Wire fraud isn't just a headline—it's a threat every title professional faces. In this episode, Kevin Tacher, founder of Independence Title and bestselling author of Intercepted, recounts the $275,000 fraud that nearly derailed his business, the recovery process, and the hard lessons learned. Hear how Kevin turned crisis into a movement for education, prevention, and resilience across the title industry. What you'll learn from this episode How a $275,000 wire fraud unfolded and the exact steps Kevin used to recover nearly all of it Why relying on the FBI and underwriters may not save you, and who you should call first Practical fraud-prevention measures every title company must implement today The emotional and leadership lessons Kevin learned from crisis recovery How reputation, transparency, and trust can protect your business during its toughest challenges Resources mentioned in this episode Intercepted by Kevin Tacher | Paperback, Hardcover, and Kindle The Go-Giver by Bob Burg and John David Mann | Paperback, Hardcover, and Kindle LinkedIn Citizens Bank SAFEvalidation About Kevin TacherKevin Tacher, known as “The Title King,” is the Founder and CEO of Independence Title Inc., a leading Florida-based title company. He is an Amazon bestselling author, national real estate speaker, and creator of the resource hub TitleRate.com. A former firefighter from Long Island, Kevin brings a service-first mentality to the title industry, combining deep real estate expertise with a passion for protecting clients and communities. He and his wife are active philanthropists supporting children, families, and military organizations. Kevin lives in South Florida with his wife Alana and their two children. Connect with Kevin Website: Independence Title LinkedIn: Kevin (Title King™) Tacher Connect With UsLove what you're hearing? Don't miss an episode! Follow us on our social media channels and stay connected. Explore more on our website: www.alltechnational.com/podcast Stay updated with our newsletter: www.mochoumil.com Follow Mo on LinkedIn: Mo Choumil Stop waiting on underwriter emails or callbacks—TitleGPT.ai gives you instant, reliable answers to your title questions. Whether it's underwriting, compliance, or tricky closings, the information you need is just a click away. No more delays—work smarter, close faster. Try it now at www.TitleGPT.ai. Closing more deals starts with more appointments. At Alltech National Title, our inside sales team works behind the scenes to fill your pipeline, so you can focus on building relationships and closing business. No more cold calling—just real opportunities. Get started at AlltechNationalTitle.com. Extra hands without extra overhead—that's Safi Virtual. Our trained virtual assistants specialize in the title industry, handling admin work, client communication, and data entry so you can stay focused on closing deals. Scale smarter and work faster at SafiVirtual.com.
Host Paul Spain chats with Saveun Man, founder of Carpoolin, as they discuss the latest tech news, from emergency service capabilities that allow authorities to pinpoint your location, to the growing debate over privacy, data security, and the use of AI in public policy and elections. Paul and Saveun explore device tracking for road user charges, AI in local elections, the government's fresh warnings about cybersecurity risks, anti-drone tech, and the ethical dilemmas of facial recognition and digital identity. Plus, Saveun shares about gaming and design at Grinding Gear Games and launching Carpoolin—an app aiming to reduce NZ's traffic and build stronger communities through shared rides. Join us for another thought-provoking ride on the NZ Tech Podcast!A big thank you to our show partners One NZ, Spark, HP, 2degrees and Gorilla Technology.
Aseem Jakhar, Cybersecurity Entrepreneur, Technologist, and Founder of EXPLIoT, joins Phillip Wylie to address the current state and evolution of IoT and hardware security, examining why security has lagged in this sector compared to other technological advances. By exploring regulatory changes, practical security considerations for both researchers and consumers, and the expanding avenues for learning, Aseem emphasizes the urgent need for awareness, compliance, and practical know-how. The conversation also highlights the importance of AI in enhancing security research and provides actionable guidance for securing connected environments. Let's connect about IoT Security!Follow Phillip Wylie at https://www.linkedin.com/in/phillipwyliehttps://youtube.com/@phillipwylieThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast
In this episode of Inside the Network, we sit down with Jay Chaudhry, founder and CEO of Zscaler, one of the most valuable cybersecurity companies in the world with a market cap of over $40 billion and $3 billion in ARR.Jay's journey is unlike any other. Raised in a remote Indian village with no electricity, no running water, and a two-and-a-half-mile walk to school, he went on to build five companies and pioneer the modern Zero Trust cloud security model. Zscaler, his most iconic company, was launched in 2007 with $50 million of his own capital and no VC investment - a bold bet in the middle of a market downturn, at a time when few believed enterprise security could move to the cloud.This episode is packed with powerful lessons from a founder who's played the long game. Jay talks about the mindset he carried from his early years farming with oxen, how working alongside his wife Jyoti gave him unmatched focus and alignment, and why startups should be “a foot wide and 20 feet deep.” He explains how Zscaler rewrote not just the playbook for go-to-market in security, but also the TCP/IP stack, and the early challenges of selling Zero Trust well before the term even existed. He also shares his wisdom on why most founders pivot too late when their sales motion fails. Jay provides his view of the future of cybersecurity and the Internet itself, from why the private corporate network is dying to why firewalls will eventually go the way of mainframes.Throughout it all, Jay shares a rare combination of conviction, humility, and self-discipline. Whether you're a first-time founder or running a $10 billion company, this is an absolute masterclass in how to build enduring companies and stay grounded in the process.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .desktop files used in an attack against Linux Desktops Pakistani attackers are using .desktop files to target Indian Linux desktops. https://www.cyfirma.com/research/apt36-targets-indian-boss-linux-systems-with-weaponized-autostart-files/ Malicious Go Module Disguised as SSH Brute Forcer Exfiltrates Credentials via Telegram A go module advertising its ability to quickly brute force passwords against random IP addresses, has been used to exfiltrate credentials from the person running the module. https://socket.dev/blog/malicious-go-module-disguised-as-ssh-brute-forcer-exfiltrates-credentials Limiting Onmicrosoft Domain Usage for Sending Emails Microsoft is limiting how many emails can be sent by Microsoft 365 users using the onmicrosoft.com domain. https://techcommunity.microsoft.com/blog/exchange/limiting-onmicrosoft-domain-usage-for-sending-emails/4446167