Podcast appearances and mentions of danny jenkins

  • 28PODCASTS
  • 53EPISODES
  • 52mAVG DURATION
  • 1WEEKLY EPISODE
  • Apr 16, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about danny jenkins

Latest podcast episodes about danny jenkins

Paul's Security Weekly
Deny By Default as CISOs Battle Platform Fatigue and Show Value to the Board - Danny Jenkins - BSW #391

Paul's Security Weekly

Play Episode Listen Later Apr 16, 2025 65:34


Zero Trust isn't a new concept, but not one easily implemented. How do organizations transform cybersecurity from a "default allow" model, where everything is permitted unless blocked, to a "default deny" model? Danny Jenkins, Co-founder and CEO at ThreatLocker, joins Business Security Weekly to discuss this approach. Deny by default means all actions are blocked by default, with only explicitly approved activities allowed. This shift enhances security, reduces vulnerabilities, and sets a new standard for protecting organizations from cyber threats. ‍ Danny will discuss how ThreatLocker not only protects your endpoints and data from zero-day malware, ransomware, and other malicious software, but provides solutions for easy onboarding, management, and eliminates the lengthy approval processes of traditional solutions. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! In the leadership and communications section, Bridging the Gap Between the CISO & the Board of Directors, CISO MindMap 2025: What do InfoSec Professionals Really Do?, How to Prevent Strategy Fatigue, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-391

Paul's Security Weekly TV
Deny By Default as CISOs Battle Platform Fatigue and Show Value to the Board - Danny Jenkins - BSW #391

Paul's Security Weekly TV

Play Episode Listen Later Apr 16, 2025 65:34


Zero Trust isn't a new concept, but not one easily implemented. How do organizations transform cybersecurity from a "default allow" model, where everything is permitted unless blocked, to a "default deny" model? Danny Jenkins, Co-founder and CEO at ThreatLocker, joins Business Security Weekly to discuss this approach. Deny by default means all actions are blocked by default, with only explicitly approved activities allowed. This shift enhances security, reduces vulnerabilities, and sets a new standard for protecting organizations from cyber threats. ‍ Danny will discuss how ThreatLocker not only protects your endpoints and data from zero-day malware, ransomware, and other malicious software, but provides solutions for easy onboarding, management, and eliminates the lengthy approval processes of traditional solutions. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! In the leadership and communications section, Bridging the Gap Between the CISO & the Board of Directors, CISO MindMap 2025: What do InfoSec Professionals Really Do?, How to Prevent Strategy Fatigue, and more! Show Notes: https://securityweekly.com/bsw-391

Business Security Weekly (Audio)
Deny By Default as CISOs Battle Platform Fatigue and Show Value to the Board - Danny Jenkins - BSW #391

Business Security Weekly (Audio)

Play Episode Listen Later Apr 16, 2025 65:34


Zero Trust isn't a new concept, but not one easily implemented. How do organizations transform cybersecurity from a "default allow" model, where everything is permitted unless blocked, to a "default deny" model? Danny Jenkins, Co-founder and CEO at ThreatLocker, joins Business Security Weekly to discuss this approach. Deny by default means all actions are blocked by default, with only explicitly approved activities allowed. This shift enhances security, reduces vulnerabilities, and sets a new standard for protecting organizations from cyber threats. ‍ Danny will discuss how ThreatLocker not only protects your endpoints and data from zero-day malware, ransomware, and other malicious software, but provides solutions for easy onboarding, management, and eliminates the lengthy approval processes of traditional solutions. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! In the leadership and communications section, Bridging the Gap Between the CISO & the Board of Directors, CISO MindMap 2025: What do InfoSec Professionals Really Do?, How to Prevent Strategy Fatigue, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-391

Business Security Weekly (Video)
Deny By Default as CISOs Battle Platform Fatigue and Show Value to the Board - Danny Jenkins - BSW #391

Business Security Weekly (Video)

Play Episode Listen Later Apr 16, 2025 65:34


Zero Trust isn't a new concept, but not one easily implemented. How do organizations transform cybersecurity from a "default allow" model, where everything is permitted unless blocked, to a "default deny" model? Danny Jenkins, Co-founder and CEO at ThreatLocker, joins Business Security Weekly to discuss this approach. Deny by default means all actions are blocked by default, with only explicitly approved activities allowed. This shift enhances security, reduces vulnerabilities, and sets a new standard for protecting organizations from cyber threats. ‍ Danny will discuss how ThreatLocker not only protects your endpoints and data from zero-day malware, ransomware, and other malicious software, but provides solutions for easy onboarding, management, and eliminates the lengthy approval processes of traditional solutions. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! In the leadership and communications section, Bridging the Gap Between the CISO & the Board of Directors, CISO MindMap 2025: What do InfoSec Professionals Really Do?, How to Prevent Strategy Fatigue, and more! Show Notes: https://securityweekly.com/bsw-391

ITSPmagazine | Technology. Cybersecurity. Society
From Chaos to Control: What If Your Cyber Program Helped You Sleep at Night? | A ThreatLocker Brand Story with Rob Allen

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 15, 2025 38:59


In this Brand Story episode, Sean Martin and Marco Ciappelli sit down with Rob Allen, Chief Product Officer at ThreatLocker, to unpack how the company is reshaping endpoint security through a unique, control-first approach. Rob shares how ThreatLocker is challenging long-held assumptions about trust, visibility, and control in enterprise environments—and why the traditional “trust but verify” model is no longer good enough.From Default Permit to Default DenyThreatLocker's philosophy centers on a fundamental shift: moving from a default permit posture to a default deny stance. This approach, according to Rob, doesn't hinder operations—it creates boundaries that allow organizations to function safely and efficiently. It's not about locking systems down; it's about granting permissions with precision, so users can operate without even noticing security is present.Product Innovation Driven by Real FeedbackThe conversation highlights how customer input—and CEO Danny Jenkins' relentless presence at industry events—drives product development. New solutions like Web Control and Patch Management are designed as logical extensions of existing tools, allowing security teams to reduce risk without creating friction for end users. The addition of a software store, suggested by enterprise customers, gives users clarity on what's approved while reducing IT support tickets.Insights and the Detect DashboardRob also explains how ThreatLocker is unlocking the value of big data. With billions of data points collected every hour, their new Insights platform aggregates and analyzes cross-customer trends to better inform security decisions. Combined with the Detect Dashboard, teams now gain not only visibility but actionable intelligence—supported by polished visuals and streamlined workflows.More Than Just Tech—It's Peace of MindWhile the technology is impressive, Rob says the most rewarding feedback is simple: “ThreatLocker helps me sleep at night.” For many customers, that level of confidence is priceless. And in unexpected situations—like a blue-screen incident caused by third-party software—ThreatLocker has even been used to mitigate impacts in creative ways.Whether you're leading a global IT team or managing a growing MSP, this episode will make you think differently about how security fits into your operational strategy. Tune in to hear how ThreatLocker is turning bold ideas into real-world control.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Rob Allen, Chief Product Officer at ThreatLockerOn LinkedIn | https://www.linkedin.com/in/threatlockerrob/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Paul's Security Weekly
What is old is new again: default deny on the endpoint - Colby DeRodeff, Danny Jenkins - ESW #402

Paul's Security Weekly

Play Episode Listen Later Apr 14, 2025 123:21


Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred firewall rules at most. The idea of implementing default deny principles elsewhere were attempted, but without much success. Internal networks (NAC), and endpoints (application control 1.0) were too dynamic for the default deny approach to be feasible. Vendors built solutions, and enterprises tried to implement them, but most gave up. Default deny is still an ideal approach to protecting assets and data against attacks - what it needed was a better approach. An approach that could be implemented at scale, with less overhead. This is what we'll be talking to Threatlocker's CEO and co-founder, Danny Jenkins, about on this episode. They seemed to have cracked the code here and are eager to share how they did it. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! We wanted security data? We got it! Now, what the heck do we DO with all of it? The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we're seeing companies like Abstract Security pop up to address some of these challenges. Abstract just released a comprehensive eBook on security data strategy, linked below, and you don't even need to give up an email address to read it! In this interview, we'll talk through some of the highlights: Challenges Myths Pillars of a data security strategy Understanding the tools available Segment Resources A Leader's Guide to Security Data Strategy eBook In the enterprise security news, new startup funding what happened to the cybersecurity skills shortage? tools for playing with local GenAI models CVE assignment drama a SIEM-agnostic approach to detection engineering pitch for charity a lost dog that doesn't want to be found All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-402

Enterprise Security Weekly (Audio)
What is old is new again: default deny on the endpoint - Colby DeRodeff, Danny Jenkins - ESW #402

Enterprise Security Weekly (Audio)

Play Episode Listen Later Apr 14, 2025 123:21


Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred firewall rules at most. The idea of implementing default deny principles elsewhere were attempted, but without much success. Internal networks (NAC), and endpoints (application control 1.0) were too dynamic for the default deny approach to be feasible. Vendors built solutions, and enterprises tried to implement them, but most gave up. Default deny is still an ideal approach to protecting assets and data against attacks - what it needed was a better approach. An approach that could be implemented at scale, with less overhead. This is what we'll be talking to Threatlocker's CEO and co-founder, Danny Jenkins, about on this episode. They seemed to have cracked the code here and are eager to share how they did it. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! We wanted security data? We got it! Now, what the heck do we DO with all of it? The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we're seeing companies like Abstract Security pop up to address some of these challenges. Abstract just released a comprehensive eBook on security data strategy, linked below, and you don't even need to give up an email address to read it! In this interview, we'll talk through some of the highlights: Challenges Myths Pillars of a data security strategy Understanding the tools available Segment Resources A Leader's Guide to Security Data Strategy eBook In the enterprise security news, new startup funding what happened to the cybersecurity skills shortage? tools for playing with local GenAI models CVE assignment drama a SIEM-agnostic approach to detection engineering pitch for charity a lost dog that doesn't want to be found All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-402

Paul's Security Weekly TV
What is old is new again: default deny on the endpoint - Danny Jenkins - ESW #402

Paul's Security Weekly TV

Play Episode Listen Later Apr 14, 2025 36:20


Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred firewall rules at most. The idea of implementing default deny principles elsewhere were attempted, but without much success. Internal networks (NAC), and endpoints (application control 1.0) were too dynamic for the default deny approach to be feasible. Vendors built solutions, and enterprises tried to implement them, but most gave up. Default deny is still an ideal approach to protecting assets and data against attacks - what it needed was a better approach. An approach that could be implemented at scale, with less overhead. This is what we'll be talking to Threatlocker's CEO and co-founder, Danny Jenkins, about on this episode. They seemed to have cracked the code here and are eager to share how they did it. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweekly.com/esw-402

Enterprise Security Weekly (Video)
What is old is new again: default deny on the endpoint - Danny Jenkins - ESW #402

Enterprise Security Weekly (Video)

Play Episode Listen Later Apr 14, 2025 36:20


Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred firewall rules at most. The idea of implementing default deny principles elsewhere were attempted, but without much success. Internal networks (NAC), and endpoints (application control 1.0) were too dynamic for the default deny approach to be feasible. Vendors built solutions, and enterprises tried to implement them, but most gave up. Default deny is still an ideal approach to protecting assets and data against attacks - what it needed was a better approach. An approach that could be implemented at scale, with less overhead. This is what we'll be talking to Threatlocker's CEO and co-founder, Danny Jenkins, about on this episode. They seemed to have cracked the code here and are eager to share how they did it. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweekly.com/esw-402

Cyber Security Weekly Podcast
Episode 443 - Embracing a default-deny security posture

Cyber Security Weekly Podcast

Play Episode Listen Later Mar 24, 2025 8:37


We speak with Danny Jenkins, CEO & Founder of Threatlocker during Zero Trust World 2025, held annually in Orlando, Florida with IT professionals from 28 countries in attendance. Zero Trust World 2025 aims to empower IT professionals to embrace a default-deny security posture and build stronger, more resilient cybersecurity frameworks. Attendees gain a deeper understanding of both known and unknown cyber threats and gain actionable strategies to secure their environments and elevate their cybersecurity efforts. Plus, it's a unique opportunity to network and collaborate with the brightest minds in the industry.#ztw25 #zerotrust #zerotrustworld #mysecuritytv #threatlocker

David Bombal
#496: Left school at 15 ... hacks and creates $$$ Billion dollar Cybersecurity company

David Bombal

Play Episode Listen Later Mar 14, 2025 25:09


Big thank you to ThreatLocker for sponsoring my trip to ZTW25 and also for sponsoring this video. To start your free trial with ThreatLocker please use the following link: https://www.threatlocker.com/davidbombal // Danny Jenkin's SOCIAL // X: https://x.com/threatlocker LinkedIn: / dannyjenkinscyber // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Languages the ThreatLocker CEO can code in // Being a CEO that is technical 02:04 - How Danny became CEO // The backstory of Danny Jenkins, CEO & Co-Founder of ThreatLocker 08:37 - Being a technical CEO 10:28 - Having a team that is dedicated 13:23 - The importance of being technical and understanding every department 14:21 - Lessons learnt and advices 17:30 - Long-term vision for ThreatLocker 18:30 - What lead to starting ThreatLocker 19:59 - New releases from ThreatLocker 21:18 - Thoughts on AI // The influence of AI in cyber attacks 24:35 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. 



Jim Colbert Show:  The Goods
JCS: ThreatLocker On The Latest Cybersecurity News

Jim Colbert Show: The Goods

Play Episode Listen Later Mar 11, 2025 32:28


Danny Jenkins, ThreatLocker CEO & Co-Founder, and Slava Konstantinov, ThreatLocker MAC Software Developer, share the latest cybersecurity news, including tips for businesses to defend against foreign cyberattacks. 

CISO-Security Vendor Relationship Podcast
Fix it? Let's Just Get Rid of It.

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Feb 18, 2025 36:47


All links and images for this episode can be found on CISO Series. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is our sponsored guest, Danny Jenkins, CEO, ThreatLocker. In this episode: A zero-day upgrade Don't let a pentest go bad Improving user training Cybersecurity is made for people Thanks to our podcast sponsor, ThreatLocker! ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

Irish Tech News Audio Articles
From Hacker to Cyber Gamekeeper, Danny Jenkins

Irish Tech News Audio Articles

Play Episode Listen Later Feb 10, 2025 8:48


Interview with Danny Jenkins, CEO and co-founder of Threatlocker Danny Jenkins didn't take the conventional route into cybersecurity. In fact, his journey started in an entirely different world - writing malware as a teenager in the UK. Now, as the CEO and co-founder of ThreatLocker, he's one of the leading voices in cybersecurity, helping businesses and IT professionals defend against the very threats he once explored. With the rise of AI-driven cyberattacks, Jenkins is more determined than ever to educate and arm businesses with the right tools. Through hands-on training, live demonstrations, and a deep dive into emerging cyber threats, he's helping IT professionals develop the skills and strategies needed to combat modern cyber risks. A Childhood Curiosity Turned Cybersecurity Mission Jenkins' fascination with technology began at an early age - though not in the most conventional way. "I was very short and used to get beaten up a lot," Jenkins admits. "I wasn't very good at fighting back, so I responded by writing malware. This was in the days of Windows 3.1, and I would create scripts that waited for floppy disks to be plugged in and then deleted work from people I didn't like." Despite this early experimentation with hacking, Jenkins never went down the black-hat route. Instead, he secured an IT apprenticeship at just 15 years old, earning £50 a week. His passion for understanding how systems worked quickly led him into corporate IT security, where he learned firsthand how to defend large-scale networks from cyber threats. The Evolution of Threats: AI and the New Cybersecurity Battlefield Jenkins built his career by securing global enterprises, but today's cyber threats are evolving faster than ever - especially with the rise of AI-generated malware. What once required deep coding knowledge can now be created in minutes by someone with no prior experience. "Two years ago, if you wanted to create malware, you either had to buy it off the dark web or write it yourself," Jenkins explains. "Now, anyone with a computer can generate malware using AI. We tested ChatGPT last year. At first, it refused to write malicious code, but when we told it we were cybersecurity professionals, it gave us exactly what we needed." The experiment was eye-opening. When Jenkins' team compared a ChatGPT-generated malware script with a publicly available one from Google, traditional antivirus software immediately flagged the Google script - but the AI-generated one slipped through undetected. "The problem isn't just that AI is making it easier to create malware. It's that new, unique malware is being generated in real time, making it nearly impossible for traditional detection-based security to keep up," Jenkins warns. The Zero Trust Approach: Deny by Default Jenkins and ThreatLocker advocate for a zero trust approach to cybersecurity - one that flips traditional security models on their heads. Instead of trying to detect and block bad software, Jenkins believes in denying everything by default and only allowing applications that have been explicitly approved. "We don't care whether a piece of software is good or bad. If it hasn't been approved, it doesn't run. Period," he explains. "Hackers constantly find new ways to get past antivirus and detection tools, but if they can't execute their code, they can't do anything." This "deny by default, allow by exception" approach eliminates a key weakness of traditional security models: the reliance on knowing what's bad. With AI-generated threats emerging at an unprecedented pace, zero trust security is becoming a necessity, not a luxury. AI Agents, Web3, and the Future of Cybersecurity The rise of AI agents - autonomous systems capable of performing complex tasks - also presents new cybersecurity challenges. These agents can transact, make decisions, and access personal data without direct human oversight, raising concerns about data privacy, fraud, and security breaches. "The biggest risk isn't just w...

Jim Colbert Show:  The Goods
JCS: Interview w/Threatlocker CEO Danny Jenkins 1/7/2025

Jim Colbert Show: The Goods

Play Episode Listen Later Jan 7, 2025 25:36


Threatlocker CEO and Co-Founder Danny Jenkins joins us to discuss the latest in cyber security threats, including WiFi Pineapples, which can impersonate a wireless network and even be sent by mail. Danny also discusses where it's safe to plug in your phone to charge, and it's actually few and far between. He also shares why working remotely leaves you and your company vulnerable, and for added security, how parents should consider having a separate WiFi network from their children. Find out more at www.threatlocker.com.

Jim Colbert Show:  The Goods
JCS - Threatlocker CEO Danny Jenkins 12/16/24

Jim Colbert Show: The Goods

Play Episode Listen Later Dec 16, 2024 23:47


Threatlocker CEO Danny Jenkins on the lastest cyber-threats and why he may be the world's best boss

ITSPmagazine | Technology. Cybersecurity. Society
Cyber Heroes in Action: Delivering Advanced Security Measures for Modern Businesses | A ThreatLocker Story with Danny Jenkins

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Nov 20, 2024 37:22


In this Brand Story episode, Marco Ciappelli and Sean Martin sit down with Danny Jenkins, CEO and co-founder of ThreatLocker, to uncover the fascinating journey and innovative approach of ThreatLocker in the cybersecurity realm. The episode sheds light on the company's mission, the challenges it faces, and the transformative solutions it offers.Danny Jenkins recounts the origin story of ThreatLocker, beginning with his early career in IT and his fortuitous stumble into cybersecurity. He explains how witnessing firsthand the devastating impact of ransomware led to the inception of ThreatLocker. His experience with ethical hacking and ransomware recovery highlighted a critical need for more effective IT security solutions, enabling Jenkins to spearhead the development of ThreatLocker with a central philosophy: deny by default.ThreatLocker's primary goal is to help organizations implement a zero trust framework by making it as simple and automated as possible. Jenkins emphasizes that effective security requires blocking untrusted software and limiting what trusted software can do. He articulates the importance of learning the intricacies of each environment ThreatLocker protects, from small businesses to massive enterprises like JetBlue. By examining each endpoint and understanding the specific software and dependencies, ThreatLocker ensures that systems remain secure without disrupting daily operations.One of the key aspects discussed is ThreatLocker's unique human element combined with technological innovation. Jenkins introduces the concept of their 'cyber hero' team, dedicated to providing 24/7 support. This team is crucial, especially when onboarding new clients or assisting those already affected by ransomware. This commitment to customer service underscores ThreatLocker's philosophy of not only providing top-tier solutions but ensuring they are successfully implemented and maintained.Jenkins also touches upon the broader industry challenges, specifically the common pitfalls enterprises fall into by relying on endpoint detection and response (EDR) systems alone. He argues that such systems are often reactive, addressing symptoms rather than root causes. ThreatLocker's approach, focusing on proactive prevention and least privilege access, aims to mitigate vulnerabilities before they can be exploited.Finally, Jenkins discusses the future vision for ThreatLocker, highlighting continued growth and innovation. The company's commitment to maintaining high support levels while expanding its product offerings ensures it remains at the forefront of cybersecurity solutions. Events like Zero Trust World serve as educational opportunities for clients to deepen their understanding and enhance their security postures.Overall, this episode provides an in-depth look at ThreatLocker's strategic approach to cybersecurity, emphasizing the importance of proactive prevention, customer service, and continuous improvement.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Danny Jenkins, CEO of ThreatLocker [@ThreatLocker]On LinkedIn | https://www.linkedin.com/in/dannyjenkinscyber/ResourcesZero Trust World Conference: https://itspm.ag/threat5mu1Learn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerView all of our HITRUST Collaborate 2024 coverage: https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Redefining CyberSecurity
Cyber Heroes in Action: Delivering Advanced Security Measures for Modern Businesses | A ThreatLocker Brand Story with Danny Jenkins

Redefining CyberSecurity

Play Episode Listen Later Nov 20, 2024 37:22


In this Brand Story episode, Marco Ciappelli and Sean Martin sit down with Danny Jenkins, CEO and co-founder of ThreatLocker, to uncover the fascinating journey and innovative approach of ThreatLocker in the cybersecurity realm. The episode sheds light on the company's mission, the challenges it faces, and the transformative solutions it offers.Danny Jenkins recounts the origin story of ThreatLocker, beginning with his early career in IT and his fortuitous stumble into cybersecurity. He explains how witnessing firsthand the devastating impact of ransomware led to the inception of ThreatLocker. His experience with ethical hacking and ransomware recovery highlighted a critical need for more effective IT security solutions, enabling Jenkins to spearhead the development of ThreatLocker with a central philosophy: deny by default.ThreatLocker's primary goal is to help organizations implement a zero trust framework by making it as simple and automated as possible. Jenkins emphasizes that effective security requires blocking untrusted software and limiting what trusted software can do. He articulates the importance of learning the intricacies of each environment ThreatLocker protects, from small businesses to massive enterprises like JetBlue. By examining each endpoint and understanding the specific software and dependencies, ThreatLocker ensures that systems remain secure without disrupting daily operations.One of the key aspects discussed is ThreatLocker's unique human element combined with technological innovation. Jenkins introduces the concept of their 'cyber hero' team, dedicated to providing 24/7 support. This team is crucial, especially when onboarding new clients or assisting those already affected by ransomware. This commitment to customer service underscores ThreatLocker's philosophy of not only providing top-tier solutions but ensuring they are successfully implemented and maintained.Jenkins also touches upon the broader industry challenges, specifically the common pitfalls enterprises fall into by relying on endpoint detection and response (EDR) systems alone. He argues that such systems are often reactive, addressing symptoms rather than root causes. ThreatLocker's approach, focusing on proactive prevention and least privilege access, aims to mitigate vulnerabilities before they can be exploited.Finally, Jenkins discusses the future vision for ThreatLocker, highlighting continued growth and innovation. The company's commitment to maintaining high support levels while expanding its product offerings ensures it remains at the forefront of cybersecurity solutions. Events like Zero Trust World serve as educational opportunities for clients to deepen their understanding and enhance their security postures.Overall, this episode provides an in-depth look at ThreatLocker's strategic approach to cybersecurity, emphasizing the importance of proactive prevention, customer service, and continuous improvement.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Danny Jenkins, CEO of ThreatLocker [@ThreatLocker]On LinkedIn | https://www.linkedin.com/in/dannyjenkinscyber/ResourcesZero Trust World Conference: https://itspm.ag/threat5mu1Learn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cyber Pro Podcast
CPP 331 | Danny Jenkins | CEO and Co Founder | ThreatLocker, Inc

Cyber Pro Podcast

Play Episode Listen Later Oct 23, 2024 12:58


In todays episode Danny and Rick dive into the evolution of cybersecurity, focusing on the shift towards a Zero Trust model and the critical need for sensible controls like blocking unnecessary applications and limiting privileges. They emphasize how ThreatLockers innovative security solution effectively prevents ransomware, zero-day exploits, and other attacks by adopting a "deny-by-default" approach. Danny explains the importance of moving from a model of allowing everything to blocking everything unless explicitly permitted, making cybersecurity more accessible for everyone. They highlight the benefits of Zero Trust and robust hygiene practices in endpoint protection. Together, they stress the role of innovation and a proactive mindset in building stronger cybersecurity defenses.   Connect with Danny: https://www.linkedin.com/in/dannyjenkinscyber/  Visit ThreatLocker: https://www.threatlocker.com/  Learn more about ThreatLocker: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=danny_10.23.24&utm_content=danny&utm_term=podcast   Visit ShortArms website: https://www.shortarmsolutions.com/    You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions  YouTube: https://www.youtube.com/@shortarmsolutions   Twitter/X: https://twitter.com/ShortArmSAS

Cyber Pro Podcast
CPP 331 | Danny Jenkins | CEO and Co Founder | ThreatLocker, Inc

Cyber Pro Podcast

Play Episode Listen Later Oct 23, 2024 12:58


In todays episode Danny and Rick dive into the evolution of cybersecurity, focusing on the shift towards a Zero Trust model and the critical need for sensible controls like blocking unnecessary applications and limiting privileges. They emphasize how ThreatLockers innovative security solution effectively prevents ransomware, zero-day exploits, and other attacks by adopting a "deny-by-default" approach. Danny explains the importance of moving from a model of allowing everything to blocking everything unless explicitly permitted, making cybersecurity more accessible for everyone. They highlight the benefits of Zero Trust and robust hygiene practices in endpoint protection. Together, they stress the role of innovation and a proactive mindset in building stronger cybersecurity defenses.   Connect with Danny: https://www.linkedin.com/in/dannyjenkinscyber/  Visit ThreatLocker: https://www.threatlocker.com/  Learn more about ThreatLocker: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=danny_10.23.24&utm_content=danny&utm_term=podcast   Visit ShortArms website: https://www.shortarmsolutions.com/    You can follow us at: Linked In: https://www.linkedin.com/company/shortarmsolutions  YouTube: https://www.youtube.com/@shortarmsolutions   Twitter/X: https://twitter.com/ShortArmSAS

The Jim Colbert Show
Vindalose a Third of Your Colon

The Jim Colbert Show

Play Episode Listen Later Oct 18, 2024 162:19


Friday – New trends in Halloween candy, water softeners and cloudy ice cubes, and playoff baseball. We talk cyber-security with Danny Jenkins, CEO and Co-founder of Threatlocker. We talk Universal's Epic Universe with Scott Harris from the Theme Park Podcast. Plus, WOKE News, Sink or Sail, Embers Only, JCS Trivia & You Heard it Here First.

Jim Colbert Show:  The Goods
JCS - Interview w/ Danny Jenkins, Threatlocker CEO

Jim Colbert Show: The Goods

Play Episode Listen Later Oct 18, 2024 23:11


We talk cyber-security with Danny Jenkins, CEO and Co-founder of Threatlocker.

Paul's Security Weekly
What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374

Paul's Security Weekly

Play Episode Listen Later Aug 30, 2024 104:09


The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that improving asset management isn't an aspiration unique to the security team. IT, finance, facilities, and other groups within large enterprises are concerned with this as well. This often leads to challenges: should all these groups attempt to standardize on one common asset database or CMDB? Or should security go their own way, and purchase their own asset management tool? Answering these questions would be a lot easier if we had someone with an IT asset management (ITAM) perspective, and fortunately, we do! Jeremy Boerger of Boerger Consulting joins us to help us understand the IT perspective, so we can understand if there are opportunities for security and IT to help each other out, or at least find some common ground! Boerger Consulting Resources: Email newsletter LinkedIn newsletter Book page Amazon book page I often say that it isn't the concepts or ideas in cybersecurity that are bad, but the implementations of them. Sometimes the market timing is just wrong and the industry isn't ready for a particular technology (e.g. enterprise browsers). Other times, the technology just isn't ready yet (e.g. SIEMs needed better database technology and faster storage). Since the ideas are solid, we see these concepts return after a few years. Application allowlisting is one of these product categories. Threatlocker has been around since 2017 and is now a late stage startup that has achieved market fit. We chat with the company's CEO and founder, Danny Jenkins to find out how they learned from the mistakes made before them, and differentiate from the technology some of us remember from the late 2000s and early 2010s. Segment Resources: ThreatLocker Solutions This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! In this interview, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the evolving landscape of SaaS Security. He highlights the challenges posed by the security gap resulting from the rapid adoption of SaaS applications and why SaaS security is beyond just misconfiguration management. Segment Resources: https://www.adaptive-shield.com/landing-page/the-annual-saas-security-survey-report-2025-ciso-plans-and-priorities/ This segment is sponsored by Adaptive Shield. Visit https://securityweekly.com/adaptiveshieldbh to download the Annual SaaS Security Survey Report! Cybersecurity professionals are often confronted with ethical dilemmas that need to be carefully navigated. In 25 years of teaching incident handling and penetration testing, Ed has often been asked by his students for help in ethical decision-making. Ed will share some of their questions and his recommended approaches for addressing them. Ed also has a new book out, The Code of Honor, about cybersecurity ethics. All proceeds go to scholarships for college students. Segment Resources: 1) Ed's book, published June 18, 2024: https://www.amazon.com/Code-Honor-Embracing-Ethics-Cybersecurity/dp/1394275862/ref=sr11?crid=1DSHPCXDIQ1VT&dib=eyJ2IjoiMSJ9.rmZX2-3mj1nI74iKkjbKkQSNKCuRjjn-QQ8qrzVy21tMRAXuKu5Qr5rPgtszkVd7zJMV7oVTuImUZIxMQfecnaRlNRfAVI5G7azyWi8lY.WHOujvlsQXPTJaHuEafwRC2WVKZe474eVXHn46kLiEY&dib_tag=se&keywords=skoudis&qid=1722767581&sprefix=skoudis%2Caps%2C90&sr=8-1 2) Holiday Hack Challenge - sans.org/holidayhack Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-374

Enterprise Security Weekly (Audio)
What asset management (ITAM) looks like outside cybersecurity - Danny Jenkins, Ed Skoudis, Jeremy Boerger, Maor Bin - ESW #374

Enterprise Security Weekly (Audio)

Play Episode Listen Later Aug 30, 2024 104:09


The top priority on the CIS Critical Security Controls list has never changed: inventory and control of enterprise assets. Yet it remains one of the most challenging controls to implement, much less master. The refrain, "you can't secure what you don't know about" is as old as information security itself. Complicating this task is the fact that improving asset management isn't an aspiration unique to the security team. IT, finance, facilities, and other groups within large enterprises are concerned with this as well. This often leads to challenges: should all these groups attempt to standardize on one common asset database or CMDB? Or should security go their own way, and purchase their own asset management tool? Answering these questions would be a lot easier if we had someone with an IT asset management (ITAM) perspective, and fortunately, we do! Jeremy Boerger of Boerger Consulting joins us to help us understand the IT perspective, so we can understand if there are opportunities for security and IT to help each other out, or at least find some common ground! Boerger Consulting Resources: Email newsletter LinkedIn newsletter Book page Amazon book page I often say that it isn't the concepts or ideas in cybersecurity that are bad, but the implementations of them. Sometimes the market timing is just wrong and the industry isn't ready for a particular technology (e.g. enterprise browsers). Other times, the technology just isn't ready yet (e.g. SIEMs needed better database technology and faster storage). Since the ideas are solid, we see these concepts return after a few years. Application allowlisting is one of these product categories. Threatlocker has been around since 2017 and is now a late stage startup that has achieved market fit. We chat with the company's CEO and founder, Danny Jenkins to find out how they learned from the mistakes made before them, and differentiate from the technology some of us remember from the late 2000s and early 2010s. Segment Resources: ThreatLocker Solutions This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! In this interview, Maor Bin, CEO and Co-Founder of Adaptive Shield, discusses the evolving landscape of SaaS Security. He highlights the challenges posed by the security gap resulting from the rapid adoption of SaaS applications and why SaaS security is beyond just misconfiguration management. Segment Resources: https://www.adaptive-shield.com/landing-page/the-annual-saas-security-survey-report-2025-ciso-plans-and-priorities/ This segment is sponsored by Adaptive Shield. Visit https://securityweekly.com/adaptiveshieldbh to download the Annual SaaS Security Survey Report! Cybersecurity professionals are often confronted with ethical dilemmas that need to be carefully navigated. In 25 years of teaching incident handling and penetration testing, Ed has often been asked by his students for help in ethical decision-making. Ed will share some of their questions and his recommended approaches for addressing them. Ed also has a new book out, The Code of Honor, about cybersecurity ethics. All proceeds go to scholarships for college students. Segment Resources: 1) Ed's book, published June 18, 2024: https://www.amazon.com/Code-Honor-Embracing-Ethics-Cybersecurity/dp/1394275862/ref=sr11?crid=1DSHPCXDIQ1VT&dib=eyJ2IjoiMSJ9.rmZX2-3mj1nI74iKkjbKkQSNKCuRjjn-QQ8qrzVy21tMRAXuKu5Qr5rPgtszkVd7zJMV7oVTuImUZIxMQfecnaRlNRfAVI5G7azyWi8lY.WHOujvlsQXPTJaHuEafwRC2WVKZe474eVXHn46kLiEY&dib_tag=se&keywords=skoudis&qid=1722767581&sprefix=skoudis%2Caps%2C90&sr=8-1 2) Holiday Hack Challenge - sans.org/holidayhack Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-374

Paul's Security Weekly TV
Interview with ThreatLocker: Is Application Allowlisting Making a Comeback? - Danny Jenkins - ESW #374

Paul's Security Weekly TV

Play Episode Listen Later Aug 30, 2024 33:59


I often say that it isn't the concepts or ideas in cybersecurity that are bad, but the implementations of them. Sometimes the market timing is just wrong and the industry isn't ready for a particular technology (e.g. enterprise browsers). Other times, the technology just isn't ready yet (e.g. SIEMs needed better database technology and faster storage). Since the ideas are solid, we see these concepts return after a few years. Application allowlisting is one of these product categories. Threatlocker has been around since 2017 and is now a late stage startup that has achieved market fit. We chat with the company's CEO and founder, Danny Jenkins to find out how they learned from the mistakes made before them, and differentiate from the technology some of us remember from the late 2000s and early 2010s. Segment Resources: Threat Locker Solutions This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweekly.com/esw-374

Enterprise Security Weekly (Video)
Interview with ThreatLocker: Is Application Allowlisting Making a Comeback? - Danny Jenkins - ESW #374

Enterprise Security Weekly (Video)

Play Episode Listen Later Aug 30, 2024 33:59


I often say that it isn't the concepts or ideas in cybersecurity that are bad, but the implementations of them. Sometimes the market timing is just wrong and the industry isn't ready for a particular technology (e.g. enterprise browsers). Other times, the technology just isn't ready yet (e.g. SIEMs needed better database technology and faster storage). Since the ideas are solid, we see these concepts return after a few years. Application allowlisting is one of these product categories. Threatlocker has been around since 2017 and is now a late stage startup that has achieved market fit. We chat with the company's CEO and founder, Danny Jenkins to find out how they learned from the mistakes made before them, and differentiate from the technology some of us remember from the late 2000s and early 2010s. Segment Resources: Threat Locker Solutions This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweekly.com/esw-374

Florida Business Minds
Orlando: ThreatLocker CEO Danny Jenkins Explains the Mysterious World of Cybersecurity

Florida Business Minds

Play Episode Listen Later Aug 27, 2024 23:55


The threat of a cyber attack alone is enough to keep business owners up at night. The confusing and often contradictory advice offered by IT and cybersecurity consultants is just as perplexing. In this episode, OBJ Editor-in-Chief Richard Bilbao invites Danny Jenkins, CEO of the fast-growing Orlando-based ThreatLocker to share simple "hygiene tips" to help keep your business data safe.

Paul's Security Weekly
When Appsec Needs to Start Small - Kalyani Pawar, Danny Jenkins, Nikos Kiourtis - ASW #295

Paul's Security Weekly

Play Episode Listen Later Aug 13, 2024 68:53


Startups and small orgs don't have the luxury of massive budgets and large teams. How do you choose an appsec approach that complements a startup's needs while keeping it secure. Kalyani Pawar shares her experience at different ends of an appsec maturity spectrum. In complex software ecosystems, individual application risks are compounded. When it comes to mitigating supply chain risk, identifying backdoors or unintended vulnerabilities that can be exploited in your environment is just as critical as staying current with the latest hacking intel. Understand how to spot and reduce the risk to your environment and prevent disruption to your operation. This segment is sponsored by Threatlocker. Visit https://securityweekly.com/threatlockerbh for a free trial! Every mobile device connecting to enterprise assets hosts a unique blend of work and personal apps, creating a complex landscape of innumerable vulnerabilities. Thankfully, methods exist to provide security teams with the real-world insights necessary to proactively address threats and shield against attacks targeting mobile apps and device endpoints. Nikos Kiourtis, CTO at Quokka, shares the latest findings in mobile security, outlining emerging threats and effective measures to reduce your mobile app attack surface – and safeguarding against potential attacks and data breaches. Segment Resources: - Panelcast with SC Magazine: 8 ways attackers target mobile apps to steal your data (and how to stop them) https://www.scmagazine.com/cybercast/8-ways-attackers-target-mobile-apps-to-steal-your-data-and-how-to-stop-them - Ryan Johnson's talk at DEF CON 32, “Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone?” https://defcon.org/html/defcon-32/dc-32-speakers.html This segment is sponsored by Quokka. Visit https://securityweekly.com/quokkabh to learn more about their intelligence app solutions! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-295

Paul's Security Weekly TV
Reducing Supply Chain Risk & What's lurking in your phone? - Danny Jenkins, Nikos Kiourtis - ASW #295

Paul's Security Weekly TV

Play Episode Listen Later Aug 13, 2024 34:30


In complex software ecosystems, individual application risks are compounded. When it comes to mitigating supply chain risk, identifying backdoors or unintended vulnerabilities that can be exploited in your environment is just as critical as staying current with the latest hacking intel. Understand how to spot and reduce the risk to your environment and prevent disruption to your operation. Every mobile device connecting to enterprise assets hosts a unique blend of work and personal apps, creating a complex landscape of innumerable vulnerabilities. Thankfully, methods exist to provide security teams with the real-world insights necessary to proactively address threats and shield against attacks targeting mobile apps and device endpoints. Nikos Kiourtis, CTO at Quokka, shares the latest findings in mobile security, outlining emerging threats and effective measures to reduce your mobile app attack surface – and safeguarding against potential attacks and data breaches. Segment Resources: - Panelcast with SC Magazine: 8 ways attackers target mobile apps to steal your data (and how to stop them) https://www.scmagazine.com/cybercast/8-ways-attackers-target-mobile-apps-to-steal-your-data-and-how-to-stop-them - Ryan Johnson's talk at DEF CON 32, “Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone?” https://defcon.org/html/defcon-32/dc-32-speakers.html This segment is sponsored by Threatlocker. Visit https://securityweekly.com/threatlockerbh for a free trial! This segment is sponsored by Quokka. Visit https://securityweekly.com/quokkabh to learn more about their intelligence app solutions! Show Notes: https://securityweekly.com/asw-295

Application Security Weekly (Audio)
When Appsec Needs to Start Small - Kalyani Pawar, Danny Jenkins, Nikos Kiourtis - ASW #295

Application Security Weekly (Audio)

Play Episode Listen Later Aug 13, 2024 68:53


Startups and small orgs don't have the luxury of massive budgets and large teams. How do you choose an appsec approach that complements a startup's needs while keeping it secure. Kalyani Pawar shares her experience at different ends of an appsec maturity spectrum. In complex software ecosystems, individual application risks are compounded. When it comes to mitigating supply chain risk, identifying backdoors or unintended vulnerabilities that can be exploited in your environment is just as critical as staying current with the latest hacking intel. Understand how to spot and reduce the risk to your environment and prevent disruption to your operation. This segment is sponsored by Threatlocker. Visit https://securityweekly.com/threatlockerbh for a free trial! Every mobile device connecting to enterprise assets hosts a unique blend of work and personal apps, creating a complex landscape of innumerable vulnerabilities. Thankfully, methods exist to provide security teams with the real-world insights necessary to proactively address threats and shield against attacks targeting mobile apps and device endpoints. Nikos Kiourtis, CTO at Quokka, shares the latest findings in mobile security, outlining emerging threats and effective measures to reduce your mobile app attack surface – and safeguarding against potential attacks and data breaches. Segment Resources: - Panelcast with SC Magazine: 8 ways attackers target mobile apps to steal your data (and how to stop them) https://www.scmagazine.com/cybercast/8-ways-attackers-target-mobile-apps-to-steal-your-data-and-how-to-stop-them - Ryan Johnson's talk at DEF CON 32, “Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone?” https://defcon.org/html/defcon-32/dc-32-speakers.html This segment is sponsored by Quokka. Visit https://securityweekly.com/quokkabh to learn more about their intelligence app solutions! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-295

Application Security Weekly (Video)
Reducing Supply Chain Risk & What's lurking in your phone? - Danny Jenkins, Nikos Kiourtis - ASW #295

Application Security Weekly (Video)

Play Episode Listen Later Aug 13, 2024 34:30


In complex software ecosystems, individual application risks are compounded. When it comes to mitigating supply chain risk, identifying backdoors or unintended vulnerabilities that can be exploited in your environment is just as critical as staying current with the latest hacking intel. Understand how to spot and reduce the risk to your environment and prevent disruption to your operation. Every mobile device connecting to enterprise assets hosts a unique blend of work and personal apps, creating a complex landscape of innumerable vulnerabilities. Thankfully, methods exist to provide security teams with the real-world insights necessary to proactively address threats and shield against attacks targeting mobile apps and device endpoints. Nikos Kiourtis, CTO at Quokka, shares the latest findings in mobile security, outlining emerging threats and effective measures to reduce your mobile app attack surface – and safeguarding against potential attacks and data breaches. Segment Resources: - Panelcast with SC Magazine: 8 ways attackers target mobile apps to steal your data (and how to stop them) https://www.scmagazine.com/cybercast/8-ways-attackers-target-mobile-apps-to-steal-your-data-and-how-to-stop-them - Ryan Johnson's talk at DEF CON 32, “Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone?” https://defcon.org/html/defcon-32/dc-32-speakers.html This segment is sponsored by Threatlocker. Visit https://securityweekly.com/threatlockerbh for a free trial! This segment is sponsored by Quokka. Visit https://securityweekly.com/quokkabh to learn more about their intelligence app solutions! Show Notes: https://securityweekly.com/asw-295

CISO-Security Vendor Relationship Podcast
Everyone Has a Zero-Trust Plan Until They Get Punched in the Face

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Jul 23, 2024 39:12


All links and images for this episode can be found on CISO Series. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is our sponsored guest, Danny Jenkins, CEO, ThreatLocker. In this episode: The limits of zero-trust Pentesting for SMBs An ounce of prevention is worth a pound of response The cream of the security crop Thanks to our podcast sponsor, ThreatLocker! ThreatLocker® is a global leader in Zero Trust endpoint security offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

Paul's Security Weekly
Identifying Bad By Defining Good - Danny Jenkins - PSW #815

Paul's Security Weekly

Play Episode Listen Later Feb 1, 2024 177:21


When an RCE really isn't, your kernel is vulnerable, calling all Windows 3.11 experts, back to Ebay, Turkish websites and credentials, 10 public exploits for the same vulnerability, hacking Bitcoin ATMs, another vulnerability disclosure timeline gone wrong, Flipper Zero tips and how you should not use it to change traffic lights, Windows 11 S mode, and you're dead (but like in the movie Hackers dead), and more! Danny Jenkins, CEO & Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security, is a leading cybersecurity expert with over two decades of experience building and securing corporate networks, including roles on red and blue teams. He is dedicated to educating industry professionals about the latest cyber threats and frequently speaks on the topics of ransomware and Zero Trust. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-815

Paul's Security Weekly TV
Identifying Bad By Defining Good - Danny Jenkins - PSW #815

Paul's Security Weekly TV

Play Episode Listen Later Feb 1, 2024 54:41


Danny Jenkins, CEO & Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security, is a leading cybersecurity expert with over two decades of experience building and securing corporate networks, including roles on red and blue teams. He is dedicated to educating industry professionals about the latest cyber threats and frequently speaks on the topics of ransomware and Zero Trust. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweekly.com/psw-815

Paul's Security Weekly (Podcast-Only)
Identifying Bad By Defining Good - Danny Jenkins - PSW #815

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Feb 1, 2024 177:21


When an RCE really isn't, your kernel is vulnerable, calling all Windows 3.11 experts, back to Ebay, Turkish websites and credentials, 10 public exploits for the same vulnerability, hacking Bitcoin ATMs, another vulnerability disclosure timeline gone wrong, Flipper Zero tips and how you should not use it to change traffic lights, Windows 11 S mode, and you're dead (but like in the movie Hackers dead), and more! Danny Jenkins, CEO & Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security, is a leading cybersecurity expert with over two decades of experience building and securing corporate networks, including roles on red and blue teams. He is dedicated to educating industry professionals about the latest cyber threats and frequently speaks on the topics of ransomware and Zero Trust. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-815

Paul's Security Weekly (Video-Only)
Identifying Bad By Defining Good - Danny Jenkins - PSW #815

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Feb 1, 2024 54:41


Danny Jenkins, CEO & Co-Founder of ThreatLocker, a cybersecurity firm providing Zero Trust endpoint security, is a leading cybersecurity expert with over two decades of experience building and securing corporate networks, including roles on red and blue teams. He is dedicated to educating industry professionals about the latest cyber threats and frequently speaks on the topics of ransomware and Zero Trust. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweekly.com/psw-815

Hacker Valley Studio
Starting at the Endpoint with Danny Jenkins

Hacker Valley Studio

Play Episode Listen Later Oct 3, 2023 33:44


In this episode, host Ron Eddings is joined by Co-Founder and CEO of ThreatLocker, Danny Jenkins, to talk about his "Hero's Journey" from IT to launching ThreatLocker. From spam emails, bots, and ransomware to persuading people to take a new approach -- this story has all of the villains and obstacles any cybersecurity champion will inevitably face and conquer! Sponsor: Get unprecedented visibility and control of your cybersecurity, quickly, easily, and cost-effectively. Check out our friends at ThreatLocker today and let them know Hacker Valley sent you! https://www.threatlocker.com  Impactful Moments 00:00 - Welcome 00:55 - Introducing guest, Danny Jenkins 02:00 - The start of Danny's journey 04:10 - Moments it changed 06:55 - The worst job in the world 08:36 - Starting with the endpoint 09:18 - An uphill battle 13:25 - Going all in 15:21 - A word about our sponsor! 16:35 - Zero to hero 18:47 - Trust and ringfencing 22:53 - What is zero trust? 25:00 - Zero trust at ThreatLocker 28:25 - Tools to make decisions 29:09 - Productivity tools? Not anymore! 31:10 - Making yourself more secure Links: Connect with our guest Danny Jenkins: https://www.linkedin.com/in/dannyjenkinscyber/ Learn more about ThreatLocker: https://www.ThreatLocker.com Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/ Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com/ Continue the conversation by joining our Discord: https://hackervalley.com/discord

Breakfast Business
10 cyber threats facing businesses

Breakfast Business

Play Episode Listen Later Jan 13, 2023 6:29


In the same poll of company bosses undertaken by the World Economic Forum, cyber security came out in the top 10 threats facing business. Fraudsters are using many sophisticated ways to steal your identity, your intellectual property or to exhort money. One US business that is a leading light in the space is Threat Locker and they are opening their European headquarters in Blanchardstown and ThreatLocker's Chief Executive and Co-Founder, Danny Jenkins joined Joe this morning on the show.

To The Point - Cybersecurity
Today's Ransomware Relationship Status It's Complicated with Danny Jenkins

To The Point - Cybersecurity

Play Episode Listen Later Jan 10, 2023 52:27


Back from the archives! This week we're spotlighting one of our favorite episodes in Summer 2021 with The New York Times journalist Nicole Perlroth where she shares insights from her decade long research for her book "This is How They Tell Me the World Ends". (FORMERLY EPISODE 138) This week Nicole Perlroth, award-winning journalist for The New York Times and best-selling author of “This Is How They Tell Me The World Ends” joins the podcast to discuss her decade long journey covering cybersecurity and many terrifying discoveries navigating through the underbelly of the secretive cyberweapons market. She shares insights on the importance of making cyber understanding and awareness accessible to all audiences. And she details the many challenges governments and society face today as cyberattacks continue to ratchet up in scope of disruption and financial rewards with no consequences as we collectively wait for “the big event” that will be the forcing function to drive needed investment, global cooperation, and changed behaviors to truly take some of the advantage out of attackers' hands.   Nicole Perlroth covers cybersecurity and digital espionage for The New York Times. She has covered Russian hacks of nuclear plants, airports, and elections, North Korea's cyberattacks against movie studios, banks and hospitals, Iranian attacks on oil companies, banks and the Trump campaign and hundreds of Chinese cyberattacks, including a months-long hack of The Times. Her first book, “This Is How They Tell Me The World Ends,” about the global cyber arms race, will publish in February 2021. The book, and several of her Times articles, have been optioned for television. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e215

SecureConnection Podcast: IT Security/Security Experts for MSP’s

There is still some fear out there about implementing Zero Trust environments and what exactly that means for SMB customers. Julian pulls back the curtain with Threatlocker, CEO Danny Jenkins about what exactly a Zero Trust solution looks like. You simply can't secure what you can't control and it really can be a seamless solution.  Danny gives some great examples and stories from the field where Zero Trust has hardened an environment and protects against active attacks on a regular basis. For more information on Threatlocker or to schedule a free demo you can visit them in our Security Solutions Showcase or by going to https://www.threatlocker.com/ and click on Book Demo.

SecureConnection Podcast: IT Security/Security Experts for MSP’s

Danny Jenkins, CEO at ThreatLocker tells us ‘Control your cybersecurity' when Ryan catches up with him. When you are controlling your security, you are out in front of it, not chasing it and Danny tells us that apart from the fundamentals, this should be the first step to securing environments not the last. The result, The post Reactive to Proactive Cybersecurity appeared first on IOT Security Services Association.

SecureConnection Podcast: IT Security/Security Experts for MSP’s

Danny Jenkins, CEO at ThreatLocker tells us ‘Control your cybersecurity' when Ryan catches up with him. When you are controlling your security, you are out in front of it, not chasing it and Danny tells us that apart from the fundamentals, this should be the first step to securing environments not the last. The result, beyond better security is also better IT Hygiene as a whole. For more information on Threatlocker or to contact Danny, you can visit them in our Security Solutions Showcase.

Federal Tech Talk
Cybersecurity in federal IT

Federal Tech Talk

Play Episode Listen Later Jan 8, 2022 41:57


ThreatLocker CEO and co-founder Danny Jenkins joins host John Gilroy on this week's Federal Tech Talk to discuss cybersecurity. zero trust software, and issues brought up by the Log4j cyber attack.

federal cybersecurity danny jenkins john gilroy federal tech talk
SecureConnection Podcast: IT Security/Security Experts for MSP’s

Danny Jenkins, CEO at ThreatLocker breaks down security stacks with Ryan. Controls, Detection and Training being the three main pillars. Where some go heavy with multiple layers of detection, controls can often time get over looked. Danny gives us a scenario where hackers can actually use a compromised customer environment as recon against you the MSP to get around detection tools, where controls like Zero Trust and MFA can prevent these attacks and ultimate breach.

SecureConnection Podcast: IT Security/Security Experts for MSP’s

Danny Jenkins, CEO at ThreatLocker breaks down security stacks with Ryan. Controls, Detection and Training being the three main pillars. Where some go heavy with multiple layers of detection, controls can often time get over looked. Danny gives us a scenario where hackers can actually use a compromised customer environment as recon against you the The post Controls vs. Redundancy appeared first on IOT Security Services Association.

@BEERISAC: CPS/ICS Security Podcast Playlist
Today's Ransomware Relationship Status: It's Complicated, With Danny Jenkins

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Oct 10, 2021 52:27


Podcast: To The Point - Cybersecurity (LS 35 · TOP 3% what is this?)Episode: Today's Ransomware Relationship Status: It's Complicated, With Danny JenkinsPub date: 2021-10-05Joining us this week is Danny Jenkins, CEO and Co-founder of ThreatLocker, an Orlando-based cybersecurity firm providing zero-trust endpoint security. Danny shares insights on the challenges facing critical infrastructure, particularly water systems that continue to be targeted with today's latest headline grabbing financial + idealogical threat of ransomware. And he poses the question, “Will we get to a point where we have to stop drinking tap water?” He also provides perspective around the nuances of compliance (note: listen for the motorcyclist example!) versus regulation and getting on a path to proactive versus reactive security while moving to a collective mindset of ‘what can I do to improve security this week'? And you don't want to miss ThreatLocker's must read report on protecting water infrastructure from cyber attacks available here on our show notes at https://www.forcepoint.com/govpodcast/e153The podcast and artwork embedded on this page are from Forcepoint | Global Cybersecurity Leader | Protecting the Human Point, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

To The Point - Cybersecurity
Today's Ransomware Relationship Status: It's Complicated, With Danny Jenkins

To The Point - Cybersecurity

Play Episode Listen Later Oct 5, 2021 52:27


Joining us this week is Danny Jenkins, CEO and Co-founder of ThreatLocker, an Orlando-based cybersecurity firm providing zero-trust endpoint security. Danny shares insights on the challenges facing critical infrastructure, particularly water systems that continue to be targeted with today's latest headline grabbing financial + idealogical threat of ransomware. And he poses the question, “Will we get to a point where we have to stop drinking tap water?” He also provides perspective around the nuances of compliance (note: listen for the motorcyclist example!) versus regulation and getting on a path to proactive versus reactive security while moving to a collective mindset of ‘what can I do to improve security this week'? And you don't want to miss ThreatLocker's must read report on protecting water infrastructure from cyber attacks available here on our show notes at https://www.forcepoint.com/govpodcast/e153

The CyberCast
Control 4: Secure Configuration of Enterprise Assets - sponsored by ThreatLocker

The CyberCast

Play Episode Listen Later Aug 26, 2021 45:36


Abstract:  Learn why the number one thing organizations can do to defend their networks against top attacks, is to implement secure configurations! Azure Breach (8/26/2021): According To Wiz who found the CosmosDB Vulnerability, they quote: "Database exposures have become alarmingly common in recent years as more companies move to the cloud, and the culprit is usually a misconfiguration in the customer's environment."   https://www.wiz.io/blog/chaosdb-how-we-hacked-thousands-of-azure-customers-databasesSponsor: ThreatLocker interview with CEO, Danny Jenkins at minute 31:58.  Learn more here: https://www.threatlocker.com/Sponsor: CIS CIS-CAT (https://learn.cisecurity.org/cis-cat-lite)Co-hosts:Ryan Weeks: https://www.linkedin.com/in/ryanweeks/Phyllis Lee: https://www.linkedin.com/in/phyllis-lee-21b58a1a4/Wes Spencer: https://www.linkedin.com/in/wesspencer/

Zero Trust World Podcast
Expanding the MSP Customer Base with CMMC Compliance

Zero Trust World Podcast

Play Episode Play 24 sec Highlight Listen Later Jun 21, 2021 57:18


For MSPs, a new market exists with customers looking to become CMMC compliant. As MSP customers seek CMMC certification, they need business partners who can support their strategic goals. Meanwhile, MSPs find themselves trying to understand what certification level they require so that their customers can trust them.Presented by:Danny Jenkins, CEO and Founder, ThreatLockerKaren Walsh, CEO and Founder, Allegro Solutions, LLCDownload the E-Book here: https://www.threatlocker.com/resources/cmmc-compliance-as-a-service

Zero Trust World Podcast
Building and Packaging a Cybersecurity Stack That Sells Itself | Zero Trust World

Zero Trust World Podcast

Play Episode Play 25 sec Highlight Listen Later May 31, 2021 35:42


 Are your clients and prospects uninterested, unwilling, or “unable” to invest in security? Imagine being able to cut through the noise and increase your recurring revenue while putting protections in place that your clients actually need. In this episode, Danny Jenkins and Bruce McCully reveal five simple steps most MSPs overlook when it comes to building a cybersecurity stack that sells itself. https://zerotrustworld.threatlocker.com/building-and-packaging-a-cybersecurity-stackPresented by:Danny Jenkins, CEO and Founder, ThreatLockerBruce McCully, President, Galactic Advisors

SecureConnection Podcast: IT Security/Security Experts for MSP’s

Danny Jenkins, CEO at ThreatLocker joins Ryan to discuss taking a Zero Trust approach to cybersecurity. Danny explains, ‘When deploying cybersecurity, more, doesn't always mean better'. ‘Operate in the world of controls when securing your clients'. Great conversation touching on recent attacks and how they could have been avoided to having tough or not so tough customer conversations. For more information on Threatlocker or to contact Danny, you can visit them in our Security Solutions Showcase.

SecureConnection Podcast: IT Security/Security Experts for MSP’s

Danny Jenkins, CEO at ThreatLocker joins Ryan to discuss taking a Zero Trust approach to cybersecurity. Danny explains, ‘When deploying cybersecurity, more, doesn’t always mean better’. ‘Operate in the world of controls when securing your clients’. Great conversation touching on recent attacks and how they could have been avoided to having tough or not so The post Deny by Default appeared first on IOT Security Services Association.

Zero Trust World Podcast
The State of Cybersecurity | Zero Trust World | Welcome Session

Zero Trust World Podcast

Play Episode Play 54 sec Highlight Listen Later May 4, 2021 59:02


The cybersecurity paradigm is shifting. What can you do to move forward and protect against the latest cybersecurity threats? https://zerotrustworld.threatlocker.com/the-state-of-cybersecurityPresented by:Danny Jenkins, CEO and Co-Founder, ThreatLockerDr. Chase Cunningham, Author, Cyber Warfare - Truth, Tactics, and Strategies