POPULARITY
This episode is sponsored by Delinea. Security and compliance concepts related to Dynamics 365 Finance and Supply Chain Management are constantly evolving, and our guest, Delinea principal software development engineer Alex Meyer, continue to work to help the community make sense of their options. Alex, a Microsoft MVP, recently presented a new webcast to the MSDW audience on native controls in D365 applications, and he joins the podcast to provide more perspective on the gaps that still exist. Auditors have become more familiar with D365 F&O solutions, Alex explains, and that means they know where to look for verification of segretation of duties. We also discuss another hot topic right now, D365 licensing and the new policies Microsoft is trying to finalize related to technical enforcement for users. Alex shares his experiences and observations thus far, including the latest known delays to Microsoft's implementation of this plan. More from Delinea: For all the latest expertise on D365 F&SCM security and compliance, as well as information on the Fastpath suite of solutions from Delinea, check out their page on MSDW: https://msdynamicsworld.com/vendor/fastpath-now-part-delinea
¡Queridos Truckeros!Bienvenidos a este podcast pensado para los apasionados de la industria transportista.Estamos de manteles largos ya que tenemos en entrevista exclusiva a Luis Villatoro después de su nombramiento como nuevo presidente de la ANERFPV aquí con “La Trucker”, dónde nos detalló los tres ejes principales en los que basará su estrategia de seguridad.Nos comentó que se actualizará el software de la Plataforma Centinela con programas de inteligencia artificial para conectarla con las nuevas tecnologías de la Guardia Nacional y los C5 del país, dónde se reporta el robo de un vehículo de carga o particular, y dicho protocolo funcionará con mayor eficacia a la localización de estos, donde también da parte de forma inmediata a las autoridades para el rastreo de la unidad a través de equipos GPS.Todo esto y más con, La Trucker.Ya saben, la idea de este programa es darles información, pero también pasar un buen rato. Así que…¡Arrancamos!
Donald Trump asumirá nuevamente la presidencia de Estados Unidos el próximo 20 de enero, por lo que ya se empezó a señalar quiénes podrían ser los miembros de su futuro gabinete. Ione Molinares, corresponsal de CNN en Español en Washington, presentó en Conclusiones la actualidad de la transición de poder. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Gartner defines privileged access management (PAM) as tools that provide an elevated level of technical access through the management and protection of accounts, credentials and commands used to administer or configure systems and applications. Available as software, SaaS or hardware appliances, PAM tools manage privileged access for both people (system administrators and others) and machines (systems or applications). Gartner defines four distinct tool categories for PAM tools: privileged account and session management (PASM), privilege elevation and delegation management (PEDM), secrets management, and cloud infrastructure entitlement management (CIEM).It is widely expected that in 2025, PAM will be shaped by advancements in artificial intelligence, machine learning, and automation, enabling more proactive and adaptive security measures. As regulatory compliance becomes more stringent across various industries in Asia, organizations will be compelled to adopt robust PAM solutions to safeguard sensitive data and ensure accountability. The convergence of hybrid work environments and cloud technologies will also necessitate re-evaluating PAM strategies, emphasizing the need for flexible yet secure access controls.In this PodChats for FutureCISO, Phil Calvin, Chief Product Officer, Delinea, shares his views on some of CISOs' approaches when modernising PAM strategies for a security-first world.1. How have PAM tools and strategies evolved in the last two years following hybrid work, the shift to the cloud, and more recently the heightened interest in AI, ML and automation?2. For those that have already started to embed AI, ML and automation into their PAM strategies, what has worked and not worked?3. Any lessons learned when it comes to integration AI and ML into existing PAM implementations?4. What metrics should CISOs use to measure the effectiveness of their PAM solutions and practices?5. Given the heightened interest around data privacy and protection, but disparate guidelines and frameworks, what steps should CISOs/enterprises take to ensure compliance with regional regulations concerning privileged access? 6. How can CISOs ensure that their PAM solutions are scalable as the organization grows?7. What role does zero-trust play in PAM strategies and how do you see zero trust evolving in 2025 to PAM implementations?8. How do you see enterprises leveraging identity governance to strengthen their PAM initiatives? 9. Our topic is modernising PAM strategies for a security-first world, what's in store for Privilege Access Management in 2025?
How do businesses protect themselves in an increasingly digital world where cyber threats evolve as quickly as the technologies designed to combat them? In this episode of Tech Talks Daily, we welcome Art Gilliland, CEO of Delinea, a leader in Privileged Access Management (PAM). Art joins us to discuss Delinea's strategic moves in the fast-paced cybersecurity landscape, including their recent acquisitions of Fastpath and Authomize, and the broader trend of market consolidation amid economic pressures. Under Art's leadership, Delinea has enhanced its capabilities in cloud and SaaS identity management, reflecting a commitment to addressing sophisticated cyber threats and improving organizational cyber defenses. Art will share insights on the necessity of identity security as the cornerstone of cyber defense strategies, especially critical as businesses increasingly adopt cloud technologies and face AI-powered threats. This conversation will also delve into the human aspect of M&A in the tech sector—how Delinea manages to integrate new acquisitions successfully within a matter of months and the role of executive leadership in these processes. Art's perspective on the ongoing consolidation in the cybersecurity industry highlights the push towards creating more comprehensive, efficient security platforms that reduce both complexity and costs for organizations. Art outlines the future of identity security, focusing on enhancing authorization capabilities and leveraging AI to automate threat response and decision-making. This discussion is not only about the technology but also about the strategic and human considerations that ensure these tools effectively secure and support the enterprises they are designed to protect. What challenges and opportunities do you see in the integration of new technologies and companies in the cybersecurity sector? Join the conversation and share your thoughts on how businesses can navigate these complex but essential advancements.
En su colaboración para MVS Noticias con Luis Cárdenas, el columnista financiero Mario Maldonado abordó uno de los temas más críticos que marcarán la agenda económica para el próximo sexenio: el elevado presupuesto y déficit que Hacienda perfila para el 2025.See omnystudio.com/listener for privacy information.
Send us a textIn the rapidly evolving landscape of cybersecurity, staying ahead of emerging threats and technologies is crucial. This episode delves into the intricate world of cybersecurity with Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, as we explore the latest advancements and challenges in the field.With over three decades of experience, Carson shares valuable insights on the evolution of cybersecurity, from its humble beginnings as a subset of IT to its current status as a critical business function. He discusses the pivotal moments that shaped his career and the industry as a whole, including the impact of major cyber incidents and the changing nature of threats.Key Topics Covered:The transition of cybersecurity from an IT function to a business-critical roleThe importance of aligning cybersecurity strategies with business objectivesThe role of AI and quantum computing in shaping future cybersecurity challengesHuman risk management and its significance in modern cybersecurity practicesThe ethical considerations surrounding emerging technologiesConnect with Joseph CarsonLinkedIn: https://www.linkedin.com/in/josephcarson/Twitter / X: https://twitter.com/joe_carsonConnect with usWebsite: securitymasterminds.buzzsprout.comKnowBe4 Resources:KnowBe4 Blog: https://blog.knowbe4.comJames McQuiggan - https://www.linkedin.com/in/jmcquigganJavvad Malik: https://www.linkedin.com/in/javvadMusic Composed by: Brian Sanyshyn - https://www.briansanyshynmusic.comAnnouncer: Sarah McQuiggan - https://www.sarahmcquiggan.comShow Notes created with Capsho - www.capsho.comSound Engineering - Matthew Bliss, MB Podcasts.If you'd like to ask Matt what he can do for your podcast, visit https://www.mbpod.com and schedule a consultation today!
People Work Technology stond dit keer in het teken van wachtwoord management. Had jij ook moeite om je wachtwoord na de vakantie weer te herinneren? Richard Bordes ging met Martin Kooiman van WinSys in gesprek over de impact van de LockBit 3.0-ransomware op zijn organisatie en klanten. Dennis Tossijn van Huawei en Wim Bos van Lumiad schoven aan om uit te leggen welke invloed AI heeft op de kwaliteit, capaciteit en veiligheid van ICT-netwerken. Ook werd er gesproken met Roelant van der Munnik van Nationale Nederlanden en Alexandra Krasnitskaya van Delinea. Hoe passen zij Privileged Access Management toe? Tot slot schoven Cameron Boswell en Wilco van Dijk van Intermedia Cloud Communications aan in de studio. Wat zijn de laatste ontwikkelingen op het gebied van Unified Communications as a Service (UCaaS)? People Work Technology wordt elke tweede vrijdag van de maand, van 14:00 tot 16:00 uur, live uitgezonden op New Business Radio en is achteraf terug te luisteren via alle bekende podcastkanalen.
People Work Technology stond dit keer in het teken van wachtwoord management. Had jij ook moeite om je wachtwoord na de vakantie weer te herinneren? Richard Bordes ging met Martin Kooiman van WinSys in gesprek over de impact van de LockBit 3.0-ransomware op zijn organisatie en klanten. Dennis Tossijn van Huawei en Wim Bos van Lumiad schoven aan om uit te leggen welke invloed AI heeft op de kwaliteit, capaciteit en veiligheid van ICT-netwerken. Ook werd er gesproken met Roelant van der Munnik van Nationale Nederlanden en Alexandra Krasnitskaya van Delinea. Hoe passen zij Privileged Access Management toe? Tot slot schoven Cameron Boswell en Wilco van Dijk van Intermedia Cloud Communications aan in de studio. Wat zijn de laatste ontwikkelingen op het gebied van Unified Communications as a Service (UCaaS)? People Work Technology wordt elke tweede vrijdag van de maand, van 14:00 tot 16:00 uur, live uitgezonden op New Business Radio en is achteraf terug te luisteren via alle bekende podcastkanalen.
In this episode, Frank Vukovits, Chief Security Scientist at Delinea, delves into why authentication alone isn't enough for robust cybersecurity. We discussed the critical role of authorization, the evolution of identity GRC, and the importance of least privilege access. Frank, a seasoned expert with over 30 years in audit and compliance, shares insights on mitigating internal and external threats, emphasizing the need for both authentication and authorization controls. If you want to be our guest or suggest someone, send your email to info@globalriskconsult.com with "Guest Inquiry" as the subject. Join us as we explore the intersection of risk management, cyber security, and sustainability with industry leaders.
In this episode of the Identity at the Center podcast, hosts Jeff and Jim engage in a lively discussion with Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea. They explore Joseph's extensive career journey in identity and access management, cybersecurity, and his hands-on experiences in Estonia's pioneering digital identity ecosystem. The conversation delves into the challenges and successes of implementing digital identity systems, the evolving landscape of Identity Threat Detection and Response (ITDR), and the interplay between digital identity, authentication, and AI in cybersecurity. Joseph also shares some behind-the-scenes anecdotes from his public speaking experiences and provides valuable insights into the future of identity management. The episode highlights valuable lessons for professionals in the field, practical advice for attending conferences, and the importance of continuous learning and adaptation in the rapidly evolving world of cybersecurity. 00:00 Introduction and Casual Banter 02:12 Conference Experiences and Swag 02:51 Upcoming Conferences and Discounts 06:09 Introducing the Guest: Joseph Carson 06:35 Joseph Carson's Career Journey 07:25 Estonia's Digital Identity Revolution 10:25 Delinea and Cybersecurity Research 12:46 Qubit Cybersecurity Conference 14:25 401 Access Denied Podcast 18:32 Estonia's Digital Identity Success 29:38 Identity Threat Detection and Response (ITDR) 32:40 The Evolution of Identity Access Management 33:48 The Convergence of Authentication and Authorization 35:00 The Role of AI in Identity Security 36:31 Digital Identity vs. Identity Access Management 38:47 Machine Identities and Asset Management 41:36 AI Agents and Identity Assistance 45:25 Challenges and Future of AI in Cybersecurity 51:07 Behind the Scenes of Public Speaking 60:06 Final Thoughts and Wrap-Up Connect with Joseph: https://www.linkedin.com/in/josephcarson Learn more about Delinea: https://delinea.com/ QuBit Cybersecurity Conference: https://qubitconference.com/ 401 Access Denied Podcast - https://delinea.com/events/podcasts Estonia Kratt AI Bot: https://www.ria.ee/en/state-information-system/personal-services/burokratt Attending Identity Week in Europe, America, or Asia? Use our discount code IDAC30 for 30% off your registration fee! Learn more at: Authenticate Conference - Use code IDAC15 for 15% off: https://authenticatecon.com/event/authenticate-2024-conference/ Connect with us on LinkedIn: Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/ Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/ Visit the show on the web at idacpodcast.com and follow @IDACPodcast on Twitter.
In deze uitzending van People Work Technology stonden netwerken, cybergevaren en de toekomst van 5G centraal. Richard Bordes ging in gesprek met Erik de Jong van Thales en Jeroen Meuleman van Geuzenet over de grootste cybergevaren en de impact van de uitrol van 5G, die nu na het sluiten van de veiling gaat beginnen. Een ander belangrijk onderwerp in de ICT-sector is het vinden van geschikt personeel. Het vinden van gekwalificeerd personeel blijft een grote uitdaging voor bedrijven. Gert-Jan Scheer van M-Search vertelde ons over de do's en don'ts bij het werven van de juiste mensen. De beveiliging van ICT-netwerken en data begint bij toegangsbewaking. Patrick van der Veen van Delinea en Ronald Kingma van Access42 zijn experts op dit gebied en bespraken hoe ze de toegang tot netwerken en data kunnen beveiligen en beschermen. Daarnaast is er niets fijner dan een helpdesk die je uit de brand helpt als je vastloopt met je laptop. Nerds Platform ondersteunt organisaties bij het bieden van een goede helpdesk aan hun medewerkers. Richard ging in gesprek met Michel Scheidt en Lars Houben, Founder en Managing Partner van Nerds Platform, over hoe ze bedrijven helpen om technische problemen snel op te lossen. People Work Technology wordt elke tweede vrijdag van de maand, van 14:00 tot 16:00 uur, live uitgezonden op New Business Radio en is achteraf terug te luisteren via alle bekende podcastkanalen.
In deze uitzending van People Work Technology stonden netwerken, cybergevaren en de toekomst van 5G centraal. Richard Bordes ging in gesprek met Erik de Jong van Thales en Jeroen Meuleman van Geuzenet over de grootste cybergevaren en de impact van de uitrol van 5G, die nu na het sluiten van de veiling gaat beginnen. Een ander belangrijk onderwerp in de ICT-sector is het vinden van geschikt personeel. Het vinden van gekwalificeerd personeel blijft een grote uitdaging voor bedrijven. Gert-Jan Scheer van M-Search vertelde ons over de do's en don'ts bij het werven van de juiste mensen. De beveiliging van ICT-netwerken en data begint bij toegangsbewaking. Patrick van der Veen van Delinea en Ronald Kingma van Access42 zijn experts op dit gebied en bespraken hoe ze de toegang tot netwerken en data kunnen beveiligen en beschermen. Daarnaast is er niets fijner dan een helpdesk die je uit de brand helpt als je vastloopt met je laptop. Nerds Platform ondersteunt organisaties bij het bieden van een goede helpdesk aan hun medewerkers. Richard ging in gesprek met Michel Scheidt en Lars Houben, Founder en Managing Partner van Nerds Platform, over hoe ze bedrijven helpen om technische problemen snel op te lossen. People Work Technology wordt elke tweede vrijdag van de maand, van 14:00 tot 16:00 uur, live uitgezonden op New Business Radio en is achteraf terug te luisteren via alle bekende podcastkanalen.
México sede de la III Conferencia Ministerial sobre Políticas Exteriores Feministas Programa Hoy No Circula sabatino ¿Que autos no circulan?Vladimir Putin molesto con la Cumbre G7 por préstamo a Ucrania Más información en nuestro podcast
00:00 - PreShow Banter™ — Retro Actions 04:48 - BHIS - Talkin' Bout [infosec] News 2024-04-15 07:05 - Story # 1: FCC to vote on net neutrality rules on April 25 18:52 - Story # 2: “All Your Secrets Are Belong To Us” — A Delinea Secret Server AuthN/AuthZ Bypass 23:40 - Story # 2b: Delinea has cloud security incident in Thycotic Secret Server gaff 28:23 - Story # 3: CISA Releases Malware Next-Gen Analysis System for Public Use 40:36 - Story # 4: Hacker Leaks 8.5M U.S. Environmental Protection Agency (EPA) Contact Data 45:55 - Story # 5: SoCal Man Arrested on Federal Charges Alleging He Schemed to Advertise and Sell ‘Hive' Computer Intrusion Malware
This episode reports on security updates from Delinea and PuTTY, and reports on bad bots and threat actors going after Zoom meetings
Today, we discuss the recent Chirp Systems smart lock vulnerability, Delinea's rapid response to a critical API flaw, and the ongoing debate over ransomware payment policies. Explore the implications of these security breaches and the strategies to enhance digital safety without compromising on the details. Keywords: Cybersecurity, Chirp Systems, Delinea, Ransomware Payment Ban, Smart Locks, API Vulnerability, U.S. Cybersecurity & Infrastructure Security Agency Sources: Chirp Systems Smart Lock Issue: krebsonsecurity.com/2024/04/crickets-from-chirp-systems-in-smart-lock-key-leak Delinea Secret Server SOAP API Vulnerability: helpnetsecurity.com/2024/04/15/delinea-secret-server-vulnerability Ransomware Payment Ban Debate: cybersecuritydive.com/news/ransom-payment-ban-pushback/713206 Feel free to let me know if there are any tweaks you'd like to make! Follow us on Instagram: https://www.instagram.com/the_daily_decrypt/ Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags for the Episode: Cybersecurity, Chirp Systems, Delinea, Ransomware, Smart Lock Security, API Vulnerability, Digital Safety, Cyber Attack, Security Breach, Tech News Search Phrases: Chirp Systems smart lock security issues Delinea SOAP API vulnerability fix Ransomware payment policy debate Cybersecurity latest news Smart lock vulnerabilities and solutions How to secure digital locks from hackers API security breaches and responses Impact of ransomware payment bans Expert analysis on Chirp Systems breach Preventing unauthorized access in smart devices Transcript: Apr16 Welcome back to the Daily Decrypt. Chirp system's smart locks are compromised With hard coded credentials, potentially unlocking 50, 000 U. S. homes remotely, warns the U. S. Cybersecurity Infrastructure Security Agency, highlighting severe oversight in digital security protocols. What can be done to secure these smart locks and prevent unauthorized remote access? Delinea acted swiftly to patch a critical vulnerability in their secret server SOAP API, which could have allowed attackers to gain administrative access and seize sensitive data. And finally, ransomware victims in the US shelled out 1. 5 billion between May 2022 and June of 2023 amidst heated debates over the effectiveness of ransomware payment bans, as highlighted by the Institute for Security and Technology. What strategies are cybersecurity experts recommending to reduce ransom payments without implementing a ban? In a recent warning issued by the U. S. Cybersecurity and Infrastructure Security Agency, or CISA, an estimated 50, 000 smart locks across the country are vulnerable to breaches due to hard coded credentials that allow remote access. These locks, developed by Chirp Systems, have been criticized for storing sensitive access information within their source code, making them susceptible to unauthorized entries with a CVSS severity rating of 9. 1 out of 10. Despite these concerns, Chirp Systems has yet to respond or collaborate with CISA to address these vulnerabilities. The issue first came to light when Matt Brown, a senior systems development engineer at Amazon Web Services, detected the flaw. Brown, while installing the Chirp app to his Access His Apartment, opted to scrutinize the app's security. He discovered that the app stored passwords and private keystrings in a decodable format, leaving residence doors wide open to potential hackers. In response to his findings, Brown approached his leasing office, which provided him with a 50 NFC key fob as a workaround. However, Brown pointed out that the FOB still transmitted the credentials in plain text, vulnerable to cloning via NFC enabled devices. The parent company of Chirp Systems, RealPage, Inc., is currently facing legal challenges including a massive lawsuit supported by the U. S. Department of Justice and multiple state attorneys general. The suits accuse RealPage of using its software to artificially inflate rents through collusion with landlords, employing algorithms that limit negotiation and push maximum possible rents on tenants. In a swift response to a security breach, Delinea, a leading provider of privileged access management solutions, recently addressed a critical vulnerability in their secret server SOAP API. The company first became aware of the issue late last week and took immediate action by blocking SOAP endpoints for its cloud customers. This precaution was necessary to mitigate any potential unauthorized access. while the cloud service was patched on the same day. By Saturday, Delenia confirmed their awareness of the vulnerability and assured that their engineering and security teams had conducted thorough investigations, revealing no evidence of compromised customer data or attempts to exploit the flaw. By Sunday, the company had released an update for Secret Server on premises, version 11. 7. 000001. Effectively fixing the vulnerability and announcing forthcoming patches for earlier versions upon completion of testing. Moreover, Delinea has provided a guide for customers using on premise versions to help determine if their systems were compromised. This includes instructions to generate custom reports to trace potentially unauthorized access, particularly from unfamiliar IP addresses which could indicate malicious activity. Kevin Beaumont, a security researcher, noted that the temporary unavailability of Delinia's secret server cloud last Friday stemmed from a published blog post by security engineer Johnny Yu, who discovered the vulnerability. Yu's post, which included a proof of concept for creating a golden token allowing admin access, was crucial in prompting the company's rapid response. Delinia has also established a continuous monitoring process updates on their service status to ensure ongoing security for their users. They urge all users to review any unusual audit records and verify the authenticity of the secret server mobile application access as part of their comprehensive security measures. In a report issued this past Wednesday, the Institute for Security and Technology's Ransomware Task Force has decided against the need for a ransomware payment ban. The report highlights several reasons, including concerns that a ban might discourage victims from reporting ransom payments, potentially pushing these transactions underground, and the complexity of any Exempting critical infrastructure. Instead of implementing a ban, the task force recommends focusing on 16 milestones they believe will effectively reduce ransom payments. And there's a quote from the RTF co chairs from an email that says, while a ban may be an easier policy lift than activities designing to drive preparedness, it will almost certainly create the wrong kind of impact. They noted a decline in organizations making payments, suggesting that current strategies may already be making an impact. Despite the resistance to a payment ban, the task force revealed that more than half of their proposed measures are already in progress or completed. These include significant policy changes like the requirement for publicly traded companies to report substantial cyber incidents, and the upcoming rule from CISA mandating that US critical infrastructure entities quickly report cyber attacks and ransom payments. The discussion on how best to tackle ransomware continues to evolve. While the Biden administration previously steered clear of a complete ban on ransomware payments, there are renewed calls for reconsidering this policy. Brett Callow, a threat analyst at Emsisoft, is an outspoken supporter of a ban, suggesting that even if attackers may not be aware of state level bans, a national policy might have a significant deterrent effect. The Ransomware Task Force, by figures like Kemba Walden, the former acting National Cyber Director, advocates for bolstering existing efforts rather than imposing new bans, indicating a strategic commitment to enhance cybersecurity resilience amidst ongoing debates. That's all I got for you today. Thanks for tuning in to this quick, news focused episode. Be sure to tune in later this week for a discussion on HackspaceCon, which just took place last weekend in Florida at Kennedy Space Center. Still working on editing that episode, but dogespan and I discussed our key takeaways and we wanted to share them with you. So stick around for that.
Palo Alto Networks releases hotfixes for an exploited zero-day. Delinea issues an urgent update for a critical flaw. Giant Tiger data is leaked online. A European semiconductor manufacturer deals with a data breach. Roku suffers its second breach of the year. Operators of the Hive RAT face charges. A former Amazon security engineer gets three years in prison for hacking cryptocurrency exchanges. Zambian officials arrest 77 in a scam call center crack down. Our guest Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division describes dual ransomware. And Rob Boyce, Managing Director at Accenture, shares his thoughts on security testing of generative AI. And selling Pokemon cheats leaves one man in Japan feeling like he had a run-in with a Scaldiburn. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, we have two guests, Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division discussing dual ransomware. Followed by Rob Boyce, Managing Director at Accenture, sharing some thoughts on security testing of generative AI. Selected Reading Palo Alto Networks Releases Fixes for Firewall Zero-Day as First Attribution Attempts Emerge (SecurityWeek) A critical vulnerability in Delinea Secret Server allows auth bypass, admin access (Help Net Security) Hacker claims Giant Tiger data breach, leaks 2.8M records online (Bleeping Computer) Press statement: Nexperia IT Breach (Nexperia) Roku issues warning over massive customer account breach (ITPro) Two People Arrested in Australia and US for Development and Sale of Hive RAT (SecurityWeek) Ex-Amazon engineer gets 3 years for hacking crypto exchanges (Bleeping Computer) Zambia arrests 77 people in swoop on "scam" call centre (Bitdefender) Japanese Police Arrest 36-Year-Old Man on Suspicion of Tampering With Pokémon Violet Save Data (IGN) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Unlock the secrets of thriving channel partnerships with Peter Geytenbeek, Director of EMEA Channel for Delinea, a company delivering PAM solutions for enterprises with complex IT environments. Peter's decades of industry expertise spanning the entire EMEA region are distilled into pivotal advice for vendors and resellers, revealing how the landscape has shifted from a vendor pursuit to a selective dance led by resellers. How can you cope with this new dynamic while building long-term, sustainable partnerships? Peter's conversation with Partnerships Unraveled host Alex Whitford cover: Peter's 8-step plan for building and managing channel organizationsGlobal expansion strategy and techniques while adapting to local partner dynamics for a triumphant market entry 4-tiers of partner enablement, ensuring partners are not only onboarded but truly engaged. And his latest book which covers A-Z of channel Whether you're a seasoned professional or new to the channel landscape, Peter's expertise and forward-thinking approach provide invaluable lessons in navigating and thriving within this dynamic field. Don't miss out on this episode packed with practical strategies, personal anecdotes, and a vision for the future of channel partnerships._________________________Connect with the podcast hosts
Damos un repaso a METASPLOIT, además volvemos a contar lo que es la PAM (Gestión de Cuentas Privilegiadas) con la ayuda de Juan Denia, de DELINEA. Acabamos con Eva Puerta, la responsable del integrador KEYTRON. Con: Belén Muñoz, Maribel Morales y Carlos Vaquero. Dirige: Carlos Lillo. clickciber.com --- Send in a voice message: https://podcasters.spotify.com/pod/show/clickcibernews/message
Damos un repaso a METASPLOIT, además volvemos a contar lo que es la PAM (Gestión de Cuentas Privilegiadas) con la ayuda de Juan Denia, de DELINEA. Acabamos con Eva Puerta, la responsable del integrador KEYTRON. Con: Belén Muñoz, Maribel Morales y Carlos Vaquero. Dirige: Carlos Lillo clickciber.com
In the final, crossover episode of our three-part Halloween series, Eric Monterastelli, Public Sector SE at Delinea, Founder, Crew Chief of Gran Touring Motorsports and Host of the Break/Fix Podcast, joins Carolyn Ford and Tracy Bannon to discuss the scary reality of car security. Is your car spying on you? Can a nefarious actor take over your car? Does your car know your deep personal data like your immigration status, race and more? Hint: It can and it does.Key Topics00:02:05 Technology advances put vehicles at risk.00:06:25 Hijacked Jeep's wireless signal, turning it off.00:07:35 Chrysler systems hacked due to digital admission.00:10:47 New EV platforms streamline technology for efficiency.00:15:13 Disconnect, purge and be careful: data can be accessed.00:18:58 Using TrueCar, author obtained personal information illegally.00:21:54 Pre-OBD2 Mercedes is OBD1.00:25:12 Mozilla uncovers alarming auto data collection.00:28:29 Future vehicles will have integrated alcohol-detection systems.00:32:48 Routers, cars can be hacked, collect data.00:35:42 Read your vehicle's owner's manual for instructions.00:36:55 Speak to rental clerk about removing data.The Intersection of Cybersecurity, Car Security and the Ghostbusters MissionGhostbusters Mission: Car Security & Car HackingEric Monterastelli talks about how cars have evolved to include more computing technology, which opens them up to potential attacks. He gives the example of a Jeep that was hacked to shut off while driving, demonstrating the real dangers. Tracy Bannon contrasts U.S. car manufacturers that use many third-party components versus Tesla's more integrated system. She argues Tesla's approach may lend itself to more car security. The hosts explore different potential attack vectors into vehicles, like Bluetooth connections.Mozilla Participants Share Automotive InfoSec InsightsEric Monterastelli shares findings from a Mozilla report about the wide range of deep personal data that can be collected from cars. Including things like facial expressions, weight, health information and more. The hosts are alarmed by the privacy implications.Tracy Bannon advocates that car manufacturers need to make cybersecurity a priority alongside traditional safety. She indicates cars are data centers on wheels, collecting information that gets sent back to big cloud data centers. They emphasize the need for vigilance from car owners about what information they allow their vehicles to collect.Concerns About Data Collection in Modern VehiclesModern Car Security: Braking, Speed and Steering PatternsEric discusses the extensive data that is now collected by modern vehicles, especially EVs. He notes that information is gathered on things like stopping distances, brake pressure applied, vehicle speed and overall driving habits. This data is no different than the type of driver performance analysis done in race cars. Automakers are collecting real-world usage data from customer vehicles to analyze driving patterns and vehicle responses. Tracy adds that the average new vehicle contains over 100 different computers and millions of lines of code that are all networked together. This networked data covers areas like powertrain functions, safety features and infotainment systems. All of this interconnected data presents opportunities for tracking very detailed driving behaviors.Privacy Risks in Driving: Collecting Personal Data and ConcernsEric cites a concerning report that modern vehicles can potentially collect extremely sensitive personal data simply through normal driving. Including information on immigration status, race, facial expressions, weight,...
On this episode of The Insuring Cyber Podcast, Joseph Carson, chief security scientist and advisory chief information security officer at Delinea, shared findings from Delinea’s latest report on … Read More » The post EP. 71: The Challenges of a Widening Cyber Insurance Protection Gap appeared first on Insurance Journal TV.
Podcast: 401 Access Denied (LS 34 · TOP 3% what is this?)Episode: 401 Access Denied Podcast Ep. 89 | Smart Hacking with Ken MunroPub date: 2023-09-20Hear how hackers target everything from airplanes to talking dolls. Pen testing expert Ken Munro discusses ways to close security gaps and protect embedded systems and connected devices.Connect with Ken Munro:Ken Munro on LinkedInTwitter: @TheKenMunroShowConnect with Delinea:Delinea WebsiteDelinea LinkedInDelinea TwitterDelinea FacebookDelinea YouTubeThe podcast and artwork embedded on this page are from Delinea, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
On this episode of The Insuring Cyber Podcast, Joseph Carson, chief security scientist and advisory chief information security officer at Delinea, shared findings from Delinea’s latest report on … Read More » The post EP. 71: The Challenges of a Widening Cyber Insurance Protection Gap appeared first on Insurance Journal TV.
Join me in conversation with Joseph Carson, Chief Security Scientist at Delinea, where we delve into a critical but often overlooked aspect of cybersecurity: its alignment with business metrics. Based on alarming statistics from Delinea's Global CISO research, this episode urges cyber decision-makers to reframe their perspective and underscores the pressing need for integrating cybersecurity with business objectives. We explore the challenges stemming from the traditional cybersecurity-focused approach, emphasizing a seismic shift towards holistic business security. The statistics from Delinea's Global CISO research set the tone: 89% of survey respondents reported experiencing at least one negative business impact in the past year due to the absence of alignment between cybersecurity and business strategies. This underscores the importance of the conversation and the pressing need for structural changes. We discuss the art of communicating the value of cybersecurity initiatives to executive boards. Joseph argues that merely focusing on technical or activity-based metrics such as the number of prevented attacks isn't enough. These metrics must be integrated into strategic business objectives, helping to break down the conventional silos within organizations and positioning cybersecurity as a crucial enabler of business growth. Joseph shares why businesses need to prioritize the most critical assets and incorporate security considerations early in project development phases. He underscores the significance of a symbiotic relationship between the CIO and CISO roles for better alignment and fortification against looming cyber threats. Whether you are a CISO, a business leader, or an executive, the discussion renders invaluable insights into aligning cybersecurity strategy with business goals to gain consensus, appropriate budgets, and, ultimately, a seat at the executive table.
Among the most alarming attack vectors that cybercriminals can target are the hardware and software used in industrial settings to monitor and control billions of devices, processes and critical infrastructure. These include control sensors, power generation management, oil & gas refining management, cameras, switches, machinery, and fire systems to cite a few examples. These operational technology (OT) instances are mainly designed to interact with specific equipment, and they don't always come with sufficient security or update mechanisms built-in to withstand concerted attacks.Our guest on this episode of the Tech Means Business podcast, Nigel Tan, works for Delinea, a leading Privileged Access Management (PAM) solutions provider that can protect this layer of infrastructure, whether new or legacy.While endpoint protection is often not viable and network-layer security unsuitable, it's zero-trust and careful PAM that can make the difference between safe OT and an open door for hackers.Nigel is Delinea's Technical Director of Sales Engineering at Delinea for the Asia-Pacific, a battle-hardened professional who's been active in cybersecurity for many years. Together, we discuss the present situation, the potential for damage to critical national infrastructure and worse, the possibility that a cyber incursion can easily damage human lives, physicallyThere are ways and means, of course, to ameliorate the situation, which Nigel helps us discover as we check out Delinea's OT protection methods.Check out the Delinea website here:https://delinea.comRead the company's blog on security, starting here:https://delinea.com/blog/privileged-access-management-for-industrial-iot-securityNigel Tan of Delinea is here:https://www.linkedin.com/in/nigel-t-bb4bba7/Joe Green's LinkedIn profile lives here:https://www.linkedin.com/in/josephedwardgreen/
EPISODE 1666: In this KEEN ON show, Andrew talks to Tom Kemp, the author of CONTAINING BIG TECH, about the existential political and economic dangers of Google, Facebook, Amazon and Apple Named as one of the "100 most connected men" by GQ magazine, Andrew Keen is amongst the world's best known broadcasters and commentators. In addition to presenting KEEN ON, he is the host of the long-running How To Fix Democracy show. He is also the author of four prescient books about digital technology: CULT OF THE AMATEUR, DIGITAL VERTIGO, THE INTERNET IS NOT THE ANSWER and HOW TO FIX THE FUTURE. Andrew lives in San Francisco, is married to Cassandra Knight, Google's VP of Litigation & Discovery, and has two grown children. Tom Kemp is a Silicon Valley–based CEO, entrepreneur, and investor. Tom was the founder and CEO of Centrify (renamed Delinea in 2022), a leading cybersecurity cloud provider that amassed over two thousand enterprise customers, including over 60 percent of the Fortune 50. For his leadership, Tom was named by Ernst & Young as a finalist for Entrepreneur of the Year in Northern California. Tom is also an active Silicon Valley angel investor, with seed investments in over a dozen tech start-ups. In addition, Tom has served as a technology policy advisor for political campaigns and advocacy groups, including leading the campaign marketing efforts in 2020 to pass California Proposition 24―the California Privacy Rights Act (CPRA)―and co-drafting bills such as the California Delete Act of 2023. Tom writes extensively on technology policy on his blog (tomkemp.ai) and has been interviewed by the Guardian, Politico, the Washington Post, CNBC, Fox News, and others. Tom holds a bachelor of science degree in computer science and in history from the University of Michigan. You can follow Tom on Twitter at @TomKemp00. Learn more about your ad choices. Visit megaphone.fm/adchoices
Tom Kemp is a Silicon Valley-based entrepreneur, investor, author, and policy advisor. Tom is the author of the book Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy (August 2023). Tom was the founder and CEO of Centrify (renamed Delinea in 2022), a leading cybersecurity cloud provider that amassed over two thousand enterprise customers, including over 60 percent of the Fortune 50. For his leadership, Tom was named by Ernst & Young as Finalist for Entrepreneur of the Year in Northern California. Tom is also an active Silicon Valley angel investor, with seed investments in over a dozen tech start-ups. In addition, Tom has served as a technology policy advisor for political campaigns and advocacy groups, including leading the campaign marketing efforts in 2020 to pass California Proposition 24—the California Privacy Rights Act (CPRA)—and co-authoring the California Delete Act of 2023. ContainingBigTech.com - link to "Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy" --- Send in a voice message: https://podcasters.spotify.com/pod/show/virtual-ciso-moment/message
Digital privacy and protecting our personal data online is incredibly important, now more than ever. Big Tech companies collecting more and more sensitive information and using it in ways we might not even be aware of. Tom Kemp is here today to talk about what the large corporations are doing with our information, and what we can do to better protect ourselves and future generations as we move into Web3. This week, episode 166 of the Tech Intersect™ Podcast is about containing Big Tech and digital privacy!POWERED BY ADVANTAGE EVANS™ ACADEMY Fast-track your journey from cash to crypto with the Digital Money DEMYSTIFIED Quick Start Bundle now at DigitalMoneyDemystified.com. The bundle includes the Future of Wealth FUNdamentals Mini Online Mini Course, From Cash to Crypto™️ FastTrack Toolkit and a special info-rich BONUS Resource Bank. Visit DigitalMoneyDemystified.com and get started today.Tom Kemp is a Silicon Valley-based author of the forthcoming book Containing Big Tech: How to Protect Our Civil Rights, Economy, and Democracy, as well as an entrepreneur, investor, and policy advisor. Tom was the Founder and CEO of Centrify, renamed Delinea 2020, a leading cybersecurity cloud provider that amassed over 2000 enterprise customers, including over 60% of the Fortune 50.Some of the talking points Tom and I go over in this episode include:How data collection by Big Tech companies could be used to affect the future of work via discrimination.What everyday citizens can do to help protect their personal data online.Big Tech's dominant position stifles entrepreneurship, innovation, and competition.How Big Tech is ‘too big to care' - instead of ‘too big to fail'Thank you for listening! If you enjoyed this episode, take a screenshot of the episode to post in your stories and tag me! And don't forget to follow, rate, and review the podcast and tell me your key takeaways!CONNECT WITH TOM KEMP:LinkedInWebsiteTwitterCONNECT WITH DR. TONYA M. EVANS:Questions and requests: hello@techintersectpodcast.com Follow: Twitter @AtTechIntersect | Instagram @TechIntersect Web: Tech Intersect Podcast Connect for exclusive content: https://advantageevans.activehosted.com/f/6 Regulate & The Rabbit Hole by Notty Prod licensed via Creative Commons Attribution-NoDerivatives 4.0 International License. Produced by Tonya M. Evans for Advantage Evans, LLC
Oklo going public through SPAC merger, JPMorgan hires Silicon Valley Bank veteran for startup focus, Morgan Stanley recruits JPMorgan banker for M&A division, Jamie Dimon's ambitious goals for JPMorgan's new headquarters, US startup Venus developing high-speed plane engine, Spotify CEO raises $60M for healthcare startup, Google's augmented reality team faces changes, GlobalFoundries' incoming CFO departs, Delinea recognized as leader in Privileged Access Management market.
Although the motives of cyber attackers may be slightly different from the point of view of security experts in the public sector, their methods tend not to be. But there are particular ways that organizations can protect themselves more thoroughly, and our guest on this episode of the Tech Means Business podcast knows most of them.Nigel Tan, the APAC Director of Systems Engineering at Delinea has had a long and distinguished career in cybersecurity, and talks to us today about zero-trust and PAM (privileged access management) in the enterprise.It's becoming increasingly necessary to ensure a constant check is made on access to information and software, whether that's in the cloud or on-premise. Additionally, "identities" are a concept applicable to both machines and people. A complicated situation, that many in cybersecurity teams are struggling to contend with.Nigel guides us through the technical side of the issues in play, and we discuss best practice, current trends in hacker behavior, and the differences that need to be considered when protecting large, public sector organizations from bad actors.You can learn more about Delinea here:https://delinea.com/Nigel Tan is on LinkedIn, here:https://www.linkedin.com/in/nigel-t-bb4bba7/And Joe Green, your host, is here:https://www.linkedin.com/in/josephedwardgreen/
In this episode, Dan connects with Wall Street Journal bestselling author Steven Mark Kahan to discuss his latest book, High-Velocity Digital Marketing. An all-around digital marketing legend, during his career as CMO of several Silicon Valley startups, Steve helped engineer seven successful exits that generated an astounding $5 billion in shareholder value. He and Dan talk about how he managed to make it all happen - and it turns out, it's all about having the right plan. Of course, the right plan is very, very thorough. Luckily, Steve (and his book) deliver exactly that. Over the course of their discussion, Dan and Steve take a deep dive into the elements of marketing, the importance of content, and just how critical it is to identify your audience correctly and speak to them in a way that resonates. Listen in and... Discover powerful digital marketing techniques to skyrocket your online presence. Uncover the significance of grasping buyer personas for targeted campaigns. Explore the crucial role of consistent content creation in engaging customers. Learn the importance of data-driven marketing and evaluating success. Gain insights on choosing the best partners and agencies to boost your marketing efforts. Notable Quotes: “I found that the traditional path from school to climbing the corporate ladder at least for me, could not only be high-risk for my career, it could almost feel like a death trap.” – (2:59) - Steve “I asked myself a really important question and that question was, how can I earn a great living doing what I love?” – (4:14) – Steve “I've learned how to spot a startup that has a good chance for success versus one that doesn't.” – (6:47) – Steve ”I'm never concerned when I see that there's big competition in the market. I'm always concerned when I see that there's next to no competition in the market.” – (9:26) – Steve “You want to go to work everyday with a passion for the products the company creates as well as your role in creating it.” – (9:56) – Steve “I wouldn't want to take a job if I didn't align with the values of the company.” – (11:33) – Dan “You don't often lose business to a competitor as much as you lose it to the status quo.” – (25:33) - Steve “Never assume that the benefits a customer expresses, equates to impact.” – (31:28) – Steve “So many organizations don't train their sales or their partners on every single piece of content that they have.” - (42:54) – Steve “You need to turn your website into a lead magnet.” – (54:40) – Steve “If you get that content right and that is a big chunk of the battle.” – (1:11:00) – Steve Key Moments: 00:00:00 - Introduction, 00:05:05 - Choosing a Startup, 00:12:33 - Importance of Stock Options, 00:17:23 - Digital Marketing Strategies, 00:28:50 - Importance of Agility, 00:15:57 - Lessons from a Failed Startup, 00:18:05 - Evaluating Startup Concepts, 00:22:30 - Understanding the Customer, 00:25:43 - Building Strong Value Propositions, 00:29:24 - Understanding Benefits vs. Impacts, 00:33:22 - Cybersecurity and Content Creation, 00:35:55 - Sincerity and Content Value, 00:45:03 - Content Stories and Sales Velocity, 00:48:12 - Managing Multifunctional Disarray, 00:51:37 - Importance of Metrics, 00:52:09 - The Martech Stack and Metrics, 00:54:08 - Practical Tips for Improving Lead Conversion Rates, 00:57:53 - The Importance of SEO and Google, 01:04:24 - Agency Selection and Scoring, 01:08:38 - Building Great Content, 01:10:56 - The Importance of Getting Content Right, 01:11:29 - The Future of Marketing, 01:14:16 - Recommendation for High-Velocity Digital Marketing, About Steve Kahan Bestselling author Steven Mark Kahan has a formidable track record, successfully navigating seven startups to acquisition or IPO, amassing a total value exceeding $5 billion. A powerhouse in the world of startups, Steve is revered for his innovative digital marketing strategies that resulted in rapid revenue growth, market expansion, and robust returns for shareholders. In his most recent stint as CMO and Chief of Staff at Thycotic (now Delinea), he propelled the company to a remarkable $1.4B exit. His impact extends to other ventures like KnowledgeWare, PentaSafe, Postini, Quest Software, and The Planet. A past board member of Target Hunger, Steve channels his passion into philanthropic pursuits. Steven Mark Kahan on LinkedIn Steve Kahan on Instagram Steve Kahan on Facebook Learn all about High-Velocity Digital Marketing - Be a Startup Superstar High-Velocity Digital Marketing: Silicon Valley Secrets to Create Breakthrough Revenue in Record Time on Amazon.com Dan Nestle Links The Dan Nestle Show (libsyn.com) Daniel Nestle | LinkedIn The Dan Nestle Show | Facebook Dan Nestle (@dsnestle) / Twitter Timestamped summary of this episode (Generated by Capsho - and presented here unedited) 00:00:00 - Introduction, Dan Nestle welcomes Steve Kahan, former CMO of cybersecurity firm, Thycotic and author of "High Velocity Digital Marketing" to discuss his journey in the startup world and important factors to consider before choosing a startup. 00:05:05 - Choosing a Startup, Kahan shares four important attributes to look for when choosing a startup: quality people who share your values, a concept that fills a big market need, a great product you can get behind, and the startup being well-funded. 00:12:33 - Importance of Stock Options, Kahan explains how stock options can be a game-changer for those looking to separate themselves financially. Working for a successful startup and seeing the value of those stock options grow can lead to significant financial gain. 00:17:23 - Digital Marketing Strategies, Kahan discusses the importance of digital marketing strategies in building a successful startup, noting that they can be a cost-effective way to reach a large target audience. He breaks down some key strategies outlined in his book, "High Velocity Digital Marketing." 00:28:50 - Importance of Agility, Kahan emphasizes the importance of agility in the startup world, noting that companies need to be able to pivot quickly and adapt to changing circumstances. He cites examples from his own experience helping startups navigate unexpected challenges. 00:15:57 - Lessons from a Failed Startup, Steve shares his experience working for a startup in Japan that lacked differentiation in the market and eventually failed. He discusses the importance of identifying a unique product and positioning it effectively to stand out from competitors. 00:18:05 - Evaluating Startup Concepts, Steve and Dan discuss evaluating startup concepts and identifying a must-solve problem for a specific audience. Steve shares his experience at Psychotic, where understanding the customer and crafting value propositions based on their needs led to significant growth and success. 00:22:30 - Understanding the Customer, Steve emphasizes the importance of understanding the full context of the ideal target buyer's world and paying attention to their specific language. He shares his process of asking questions to customers and crafting value propositions that address the benefits and impacts that buyers want to make on their company. 00:25:43 - Building Strong Value Propositions, Steve discusses the mistake many organizations make in building value propositions that align well with what they do, rather than what the seller cares about. He emphasizes the importance of crafting value propositions based on a full understanding of customers that address their specific needs and challenges. 00:29:24 - Understanding Benefits vs. Impacts, Steve differentiates between benefits and impacts, with impacts being closer to the meaning that customers want to achieve in their lives. He emphasizes the importance of addressing both benefits and impacts in crafting value propositions that resonate with customers. 00:33:22 - Cybersecurity and Content Creation, Steve Kahan discusses how weak or stolen privileged passwords are responsible for 80% of cyberattacks, and how his company created content stories to educate and provide value to their customers. He emphasizes the importance of tailoring content to the buyer's journey and creating incredible content that engages the buyer at every stage of the funnel. 00:35:55 - Sincerity and Content Value, Kahan explains how being sincere and providing real value in content creation is crucial for engaging potential buyers. He shares examples of his company's free tools and risk assessments, which offered real value to the target market and helped to accelerate revenue growth at reasonable costs. 00:45:03 - Content Stories and Sales Velocity, Kahan emphasizes the importance of content stories that tie together and support all stages of the funnel to maintain sales velocity. He highlights the need for ongoing partnerships and collaboration between functions to prevent breakdowns in the buyer's journey. Kahan stresses the importance of metrics and numbers to manage and optimize the sales and marketing process. 00:48:12 - Managing Multifunctional Disarray, Kahan emphasizes the importance of managing metrics and numbers to identify and resolve breakdowns in the buyer's journey. He encourages organizations to instrument their sales and marketing processes in detail and manage them rigorously to maintain sales velocity. Kahan stresses the need for ongoing collaboration between functions to prevent breakdowns and optimize the buyer's journey. 00:51:37 - Importance of Metrics, The importance of metrics and data analytics is discussed, with Steve Kahan emphasizing the need for ongoing refinement of data to improve marketing strategies. 00:52:09 - The Martech Stack and Metrics, The Martech section of the book is discussed, with Steve Kahan providing a blueprint for building a successful marketing stack. He emphasizes the importance of measuring KPIs and setting revenue goals. 00:54:08 - Practical Tips for Improving Lead Conversion Rates, Steve Kahan provides practical tips for improving lead conversion rates, including adding a "get a quote" button, minimizing friction in forms, using calls to action in every blog post, and catering to mobile users. 00:57:53 - The Importance of SEO and Google, Steve Kahan emphasizes the importance of SEO and Google for businesses today, noting that companies should focus on both great content and SEO optimization to increase their visibility in search results. 01:04:24 - Agency Selection and Scoring, Steve Kahan provides a scoring system for selecting digital agencies, emphasizing the need to choose partners who are all about the numbers and can provide expert analysis. He notes that selecting the right agency is crucial to a company's success. 01:08:38 - Building Great Content, Steve shares his approach to building great content by having meetings twice a year with cross-functional teams to generate ideas. He prioritizes the best ideas and relies on his team's expertise to create high-quality content that resonates with the target audience. 01:10:56 - The Importance of Getting Content Right, Steve emphasizes the importance of getting content right and making sure it resonates with the right buyer. He suggests that many companies struggle with the fundamentals of marketing, and focusing on these basics can make a significant difference. 01:11:29 - The Future of Marketing, Dan asks Steve about the trends that marketers should be aware of. Steve responds that the focus should be on mastering the fundamentals of marketing rather than looking for a silver bullet. He also mentions that he is currently writing a murder mystery with James Patterson's co-authors. 01:14:16 - Recommendation for High Velocity Digital Marketing, Dan highly recommends Steve's book, "High Velocity Digital Marketing," which offers practical advice on understanding the target audience, creating compelling content, measuring results, and improving marketing efforts. He also notes that David Meerman Scott wrote the book's foreword. 01:16:55 - Wrapping Up, Dan thanks Steve for sharing his insights and experiences on the show. Steve expresses his pleasure in being a guest and shares his website and LinkedIn profile as the best places to find him.
Siamo in onda, grande momento di libertà. Parenzo contro la Zuppa di Porro, "Vergogna". Steve Rogers, Capitan America, ha perso la voce. Per colpa di David. Franco da Nettuno, fascista, non festeggia. Barbara, la moglie, è anch'essa fascista e non si vergogna a dirlo. Francesco Toscano di VisioneTv all'attacco. Naf da Padova e la Teoria della teoria del sole come corpo pensante. Michela Morellato e la liberazione. Jon Bambalau sta meglio ed è stato fuori Roma. Delinea il futuro governo rom.
Il 2021 è stato un anno di record negativi per la ristorazione italiana, con il numero più basso di attività iscritte alle Camere di Commercio, il saldo tra iscrizioni e cessazioni più cospicuo degli ultimi dieci anni, 8 locali su 100 chiusi a Roma, l'assenza di personale nel settore complicata dal -47% di iscritti alle scuole alberghiere negli ultimi 6 anni.
La ristorazione scolastica rappresenta uno strumento fondamentale attraverso cui promuovere buone abitudini, comportamenti alimentari corretti e scelte consapevoli tra i bambini, in una fascia di età in cui le consuetudini alimentari sono ancora in fase di acquisizione e strutturazione e possono contribuire a determinare un buono stato di salute. In questo contesto, il momento del pasto a scuola ricopre un duplice ruolo per la crescita dei bambini, diventando un elemento imprescindibile per uno sviluppo psico-fisico ottimale, da un lato, e una occasione di educazione al gusto e di scoperta di nuovi prodotti e culture, dall'altro.
"Si sta delineando uno scenario inquietante. Salvini e Berlusconi sono contro il tetto massimo al prezzo del gas proposto da Impegno civico e fanno un favore a Putin. La Meloni è contraria alla commissione d'inchiesta sui rapporti della politica italiana con la Russia". Lo dice il ministro degli Esteri e leader di Impegno civico, Luigi Di Maio, in un video sui social.mgg/gsl
A cura di Daniele Biacchessi Siamo nel pieno di una campagna elettorale tesa e non priva di sorprese e si delinea lo scontro tra centrodestra e centrosinistra alle elezioni del 25 settembre. Lega, Fratelli d'Italia e Forza Italia correranno con tre liste e solo quella che otterrà più voti avrà il diritto di scegliere il premier. Così almeno pare la strategia imposta da Giorgia Meloni, convinta dai sondaggi di essere il primo partito. La stessa Meloni parla di un macchina del fango messain moto dsi giornali internazionali. Ma la Lega perderebbe voti a vantaggio di Fratelli d'Italia e Forza Italia è alle prese con una emorragia interna con la possibile fuoriuscita di altri dieci parlamentari, oltre a Gelmini, Carfagna e Brunetta. Quindi anche il centrodestra è solo apparentemente unito, ma pronto ad una gara interna senza esclusione di colpi. Enrico Letta lavora ad una lista del Pd aperta ai progressisti, in primis a Roberto Speranza e a Articolo 1. Aperture verso Carlo Calenda, Matteo Renzi, Luigi Di Maio, e perfino ai ministri di Forza Italia che hanno sbattuto la porta in faccia a Silvio Berlusconi, ma la cosiddetta "Agenda Draghi" non sarà il programma politico del Pd, assicura Letta. E il M5s è alle prese con un forte calo di consensi e una mancanza di prospettive politiche. Grillo torna a chiedere una legge sui due mandati e Conte tenta la strada dei due forni: la ripresa del dialogo con il Pd e il rilancio di un piano B con le forze che non hanno sostenuto Draghi. Letta sostiene che alla fine lo scontro si terrà tra lui e la Meloni, dice che le idee faranno la differenza, ma non ammette che le alleanze non si preparano in pochi giorni. Credits: Agenzia Fotogramma
A cura di Daniele Biacchessi Siamo nel pieno di una campagna elettorale tesa e non priva di sorprese e si delinea lo scontro tra centrodestra e centrosinistra alle elezioni del 25 settembre. Lega, Fratelli d'Italia e Forza Italia correranno con tre liste e solo quella che otterrà più voti avrà il diritto di scegliere il premier. Così almeno pare la strategia imposta da Giorgia Meloni, convinta dai sondaggi di essere il primo partito. La stessa Meloni parla di un macchina del fango messain moto dsi giornali internazionali. Ma la Lega perderebbe voti a vantaggio di Fratelli d'Italia e Forza Italia è alle prese con una emorragia interna con la possibile fuoriuscita di altri dieci parlamentari, oltre a Gelmini, Carfagna e Brunetta. Quindi anche il centrodestra è solo apparentemente unito, ma pronto ad una gara interna senza esclusione di colpi. Enrico Letta lavora ad una lista del Pd aperta ai progressisti, in primis a Roberto Speranza e a Articolo 1. Aperture verso Carlo Calenda, Matteo Renzi, Luigi Di Maio, e perfino ai ministri di Forza Italia che hanno sbattuto la porta in faccia a Silvio Berlusconi, ma la cosiddetta "Agenda Draghi" non sarà il programma politico del Pd, assicura Letta. E il M5s è alle prese con un forte calo di consensi e una mancanza di prospettive politiche. Grillo torna a chiedere una legge sui due mandati e Conte tenta la strada dei due forni: la ripresa del dialogo con il Pd e il rilancio di un piano B con le forze che non hanno sostenuto Draghi. Letta sostiene che alla fine lo scontro si terrà tra lui e la Meloni, dice che le idee faranno la differenza, ma non ammette che le alleanze non si preparano in pochi giorni. Credits: Agenzia Fotogramma
A cura di Daniele Biacchessi Siamo nel pieno di una campagna elettorale tesa e non priva di sorprese e si delinea lo scontro tra centrodestra e centrosinistra alle elezioni del 25 settembre. Lega, Fratelli d'Italia e Forza Italia correranno con tre liste e solo quella che otterrà più voti avrà il diritto di scegliere il premier. Così almeno pare la strategia imposta da Giorgia Meloni, convinta dai sondaggi di essere il primo partito. La stessa Meloni parla di un macchina del fango messain moto dsi giornali internazionali. Ma la Lega perderebbe voti a vantaggio di Fratelli d'Italia e Forza Italia è alle prese con una emorragia interna con la possibile fuoriuscita di altri dieci parlamentari, oltre a Gelmini, Carfagna e Brunetta. Quindi anche il centrodestra è solo apparentemente unito, ma pronto ad una gara interna senza esclusione di colpi. Enrico Letta lavora ad una lista del Pd aperta ai progressisti, in primis a Roberto Speranza e a Articolo 1. Aperture verso Carlo Calenda, Matteo Renzi, Luigi Di Maio, e perfino ai ministri di Forza Italia che hanno sbattuto la porta in faccia a Silvio Berlusconi, ma la cosiddetta "Agenda Draghi" non sarà il programma politico del Pd, assicura Letta. E il M5s è alle prese con un forte calo di consensi e una mancanza di prospettive politiche. Grillo torna a chiedere una legge sui due mandati e Conte tenta la strada dei due forni: la ripresa del dialogo con il Pd e il rilancio di un piano B con le forze che non hanno sostenuto Draghi. Letta sostiene che alla fine lo scontro si terrà tra lui e la Meloni, dice che le idee faranno la differenza, ma non ammette che le alleanze non si preparano in pochi giorni. Credits: Agenzia Fotogramma
Verizon's 2022 Data Breach Investigations Report (DBIR) is out, and Delinea is here to break down the highlights! Delinea CISO Stan Black and Cybersecurity Evangelist, Tony Goulding, discuss which findings are most surprising, actionable, and trending upward in this year's report. Get the experts' advice on how we all can develop smart, data-driven security solutions based on evolving threat actor behavior and incident analysis. Read all about it in Verizon's 2022 Data Breach Investigations Report! Follow us on Social!! ~Cybrary Twitter ~Delinea Twitter ~Instagram ~Facebook ~YouTube ~Cybrary LinkedIn ~Delinea LinkedIn
It was a great pleasure and a new experience hosting an English, remote episode on @ics cyber talks. I apologize in advance for the rusty English at the beginning. Nachshon Pincu hosts Tony Goulding, Senior Director, Cybersecurity Evangelist at @Delinea, in a conversation about one of the most critical issues in cyber defense - Privileged Access Management (PAM). What is the role PAM plays in security? Two vital moving parts of PAM – vaulting and privilege elevation. What are their respective roles? Do you need them both? What are the issues cyber experts are struggling with today, and how can PAM help them overcome these challenges? Some examples of where Delinea PAM solved such challenges for a customer. And more.
A pochi giorni dalla conferenza Xbox, Microsoft racconta la sua idea per il futuro: streaming sempre più importante e cinque grosse esclusive first party entro giugno 2023. Nel frattempo parte la Summer Game Fest: trattenuto lo show di Keighley, pazzo ed esaltante quello di Devolver. In generale, sul fronte della creatività, vincono gli Indie a mani bassissime.
A través de Licencias Online, Delinea comercializara sus soluciones en ciberseguridad. De esta manera, la marca se apalanca en el ecosistema del mayorista para impulsar su negocio
ThycoticCentrify heißt nun Delinea. Was war der Grund für die Namenssänderung zwei etablierter Marken? Darüber und was Delinea auszeichnet sowie über die künftigen Pläne des Privileged-Access-Management-Spezialisten sprach Netzpalaver via Remote-Session mit Andreas Müller, Director Large Accounts bei Delinea.
The goal is to frictionlessly get security buyers to information in trusted ways so they can self-verify and make wise, educated decisions. How do we build and develop business and communications skills, foster different ideas that allow us to think about how to be more ethical and innovative, and communicate better with our audience? How do we get cybersecurity to be a cool industry that people want to be in? These are questions that Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, asks himself regularly. In this episode, I had a brutally honest conversation with Joseph on what motivates him, what his challenges are, what vendors do that piss him off, and the alternatives. Join Audience 1st Today Join 300+ cybersecurity marketers and sellers mastering security buyer research to better understand their audience and turn them into loyal customers: https://www.audience1st.fm/
Digital security and risks are some of the most significant concerns companies face. And they look for various ways to mitigate those risks and establish a safe environment for their core business operations, even implementing security solutions that merely put a band-aid on vulnerabilities.But what companies don't know is that the key to augmented security lies in asking the right questions. And changing the mindset that it's not security first, it's business first, it's people first, it's risk. And security is a supporting pillar in that.In this episode of Dr. Dark Web, Chris Roberts welcomes Joseph Carson, the Chief Security Scientist (CSS) and Advisory CISO at Delinea. They get into the role of threat intelligence in strengthening security, the importance of knowing where the threats come from, how to translate intelligence and risk to the board, and why people should always come first.
O que levou o PIB a contrair no terceiro trimestre e fez a economia entrar em recessão técnica? Entenda no Flash! E mais: O Produto Interno Bruto (PIB) do Brasil registrou retração de 0,1% no terceiro trimestre na comparação com os três meses anteriores, segundo informou o Instituto Brasileiro de Geografia e Estatística (IBGE) nesta quinta-feira (2). No segundo trimestre, a economia brasileira havia registrado queda de 0,4% na mesma base de comparação. Com isso, o país entrou em recessão técnica, caracterizada por dois trimestres consecutivos de contração. Entenda o que puxou a queda do PIB. E mais: Novonor avalia vender ações da Braskem (BRKM5) em oferta; subsidiária da Ser Educacional (SEER3) compra a edtech Delinea e Braskem (BRKM5), Taesa (TAEE11) e MRV (MRVE3) anunciam pagamento de proventos. As principais notícias para quem acompanha o mercado financeiro, no Flash InvestNews, com Fabiana Ortega. Os destaques da bolsa nesta manhã, a cotação do Ibovespa e dólar, além de outras informações da economia brasileira que podem influenciar seus investimentos e rentabilidade.