POPULARITY
In this episode, James Maude chats with cyber threat intel pro Brian Kime, whose journey from the Army's infamous “chemical guy” to security expert was partly inspired by Starship Troopers. Brian dishes on his legendary Dell SecureWorks phishing op that hit a wild 50% click rate—by predicting an IPO years ahead of time. He also unpacks why vulnerability management can stall business and how design thinking can reshape threat intel.
In this episode, Richard talks to Stuart Ashenbrenner and Wes Hutcherson of Huntress. They share their advice on managing Macs for clients to prevent and manage hacks.Stuard is a staff macOS researcher, focusing on macOS security and development, with a ton of experience working as a macOS detections engineer and software engineer.He's spoken at various conferences about macOS security, and he is the coauthor and core developer of the open source macOS incident response tool called Aftermath. Wes is the director of product marketing for Huntress, where he oversees market intelligence and go-to-marketing strategies. His multifaceted technology and cybersecurity experience spans over a decade.He's worked with market leaders such as Bishop Fox, eSentire, Hewlett Packard, and Dell SecureWorks covering managed detection and response, governance, risk and compliance, continuous threat exposure management, offensive security and other topics. Richard asks them to explain how Huntress help MSPs, how to deploy the tool and their typical partners, before digging in to threats specifically targeting Macs. Wes explains the Huntress MacOS support and why they decided to put it together. Stuart talks about the most common attack vectors on macOS and security best practice that MSPs should follow. Wes explains a number of acronyms that MSPs might come across when dealing with Macs and what they mean to users.Richard, Stuart and Wes look at Mac-specific attacks, third-party breaches and how to protect clients, particularly those who believe that Macs are more secure than PCs.They explore tools and resources, touch management, staying ahead of the curve and how MSPs can take advantage of the threats to Macs to find a business opportunity.Mentioned in This EpisodeOpen source macOS incident response tool: AftermathPodcast: Interview with Dray AghaMalware: Atomic macOS Stealer (AMOS)Trojan: Info StealerShell programme: BashScripting language: AppleScriptKnowledge base: MITRE ATT&CK macOS threat: CuckooXM Cyber study into breach and attack simulationsSlack community: MacAdminsBlog series: Ask the Mac Guy: macOS Security Mythsbunch of resources you can find on our website. It's very easy to find on, under resourcesOn-demand webinar: Dealing with Mac threatsMSP...
Host Karl Palachuk interviews Wes Hutcherson and Stuart Ashenbrenner from Huntress on the challenges and (and victories) of securing macOS endpoints. As you know, MacOS represents a growing percentage of the business device operating system market, outperforming both Linux and ChromeOS. Since this is going to be a growing portion of the endpoints you support, it's good to know how you're doing to do that. And with so many "home" and personal devices now being used for company purposes, quick response is important as well. The panel addresses the challenges of the MacOS users - including their persistent reluctance to believe that their devices need protection at all! There is a false sense of security around MacOS, driven by old-school understandings of Mac security and the realities of well-funded adversaries on the dark web. MacOS malware now accounts for 6.2% of all endpoint OS malware. Half of all MacOS users have been affected by malware, hacking, or scams. You can expect that to grow as well. ----- Thanks to Huntress for sponsoring the SMB Community Podcast. Partners can learn more at https://www.huntress.com/karl Wes Hutcherson is the Director of Product Marketing for Huntress where he oversees market intelligence and go-to-market strategies. His multi-faceted technology and cyber security experience spans over a decade with market leaders such as Bishop Fox, eSentire, Hewlett-Packard, and Dell SecureWorks, covering Managed Detection and Response, Governance, Risk, and Compliance, Continuous Threat Exposure Management, Offensive Security, and other topics. Stuart Ashenbrenner works at Huntress as a Staff macOS Researcher, focusing on macOS security and development. He has spoken at various conferences about macOS security, including Objective by the Sea. He is co-author and core developer on the open source, macOS incident response tool called Aftermath. He has perviously worked as a macOS detections engineer and a software engineer. :-) — Our upcoming events and more: Register for James's class at ITSPU! 5W22 – MSP Professional Sales is live. Enroll today: https://www.itspu.com/all-classes/classes/msp-professional-sales-program/ MASTERMIND LIVE – Tampa, FL – June 27-28th http://bit.ly/kernanmastermind Use “EARLYBIRD” as the coupon code to save $200! Check out Amy's weekly newsletter! Sign up now: https://mailchi.mp/thirdtier/small-business-tech-news Kernan Consulting “Weekly Tips”! Sign up now: https://kernanconsulting.com/ Our Social Links: https://www.linkedin.com/in/james-kernan-varcoach/ https://www.facebook.com/james.kernan https://www.facebook.com/karlpalachuk/ https://www.linkedin.com/in/karlpalachuk/ https://www.linkedin.com/in/amybabinchak/ https://www.facebook.com/amy.babinchak/ https://thirdtier.net https://www.youtube.com/@ThirdTierIT --- Sponsor Memo: Huntress Today's SMB Community Podcast is brought to you by Huntress Managed Security. Cybersecurity is more than software—it's also the expertise needed to effectively fight against today's evolving threat landscape. Huntress Managed Security is custom-built to provide human expertise and save your clients from cyber threats. Huntress' suite of fully managed cybersecurity solutions is powered by a 24/7, human-led SOC dedicated to around-the-clock monitoring, expert investigation, and rapid response. While you focus on growing your business, we provide first response to hackers. Huntress has the #1 rated EDR for SMBs on G2 and a partner support Satisfaction score average of 99%. To start a trial today, visit https://huntress.com/karl
Are you ready to dive into the future of privacy, AI, and data risk management?We have Russell Sherman CTO and co-founder of VISO TRUST, an AI-powered solution for third-party risk management. We discuss:Why AI is more than just a buzzword and why Privacy Pros need to adopt and adapt to stay ahead of the game How to leverage AI in third-party risk management to stay competitive The secrets to successfully transition into Privacy and specialise in AI If you want to be ahead of the curve and dominate in this space, this episode is a must listen.Russell Sherman is the CTO and co-founder of VISO TRUST, an AI-powered SaaS solution that scales and automates third-party risk management. He is an accomplished technology executive, security leader, and security product innovator, previously working at highly regulated technology companies, including ASAPP, Varo Money, LendingClub and Dell SecureWorks, with extensive experience in third-party cyber.If you're ready to transform your career and become the go-to GDPR expert, get your copy of 'The Easy Peasy Guide to GDPR' here: https://www.bestgdprbook.com/Follow Jamal on LinkedIn: https://www.linkedin.com/in/kmjahmed/Follow Russ on LinkedIn: https://www.linkedin.com/in/neverenoughinfo/Get Exclusive Insights, Secret Expert Tips & Actionable Resources For A Thriving Privacy Career That We Only Share With Email Subscribers► https://newsletter.privacypros.academy/sign-upSubscribe to the Privacy Pros Academy YouTube Channel► https://www.youtube.com/c/PrivacyProsJoin the Privacy Pros Academy Private Facebook Group for:Free LIVE TrainingFree Easy Peasy Data Privacy GuidesData Protection Updates and so much moreApply to join here whilst it's still free: https://www.facebook.com/groups/privacypro
Ardath is CEO & B2B Marketing Strategist at Marketing Interactions. She is a titan in the B2B marketing world with over 30 years of experience in business management and marketing as well the author of two books. It's a journey that took her from starting as a consultant for her sister's marketing tech platform to now working with enterprise tech companies like Gong, Cisco Meraki and Dell Secureworks. Ardath helps them with the thorny issue of content marketing, specifically with the goal of creating something that resonates. She argues that technology has wrestled back the power of buyers to customers in the way they buy. You need to create deeper connections with customers and generate higher demand from qualified, sales-ready prospects thanks to highly targeted, hard-hitting, personalised communications. In this episode, we dive into the world of content and specifically what makes it good. We discuss how multiple pieces of it weave together to form a narrative that engages people and helps to drive momentum. Listen as we also discuss: How to break down internal silos and get different marketing teams all pulling in the same direction Why we need to "get out of our own way" and create content that truly solves buyers' problems The art of connecting a specific problem to part of the buying process How selling tech is different from selling services – a more contextual relationship The challenges at enterprise level of layers and approvals for marketing Why you're giving your customers "whiplash" by separating out brand and demand-gen content Follow Ardath on LinkedIn: https://www.linkedin.com/in/ardathalbee/ (https://www.linkedin.com/in/ardathalbee/) Check out her Marketing Interactions blog: https://marketinginteractions.com/blog/ (https://marketinginteractions.com/blog/) And lastly don't forget to subscribe or follow our Changemaker podcast for new episodes. If you're interested in being a guest on our Changemaker podcast, contact our host dave.corlett@shaped-by.com.
During this special edition of CISO vs CISO, Jerich and Amanda Fennell , Relativity CSO & CIO, discuss the White House Cyber Summit that took place in August. During this candid discussion, they provide their perspectives on the outcomes of the summit and the impact businesses can expect. They also took a look at what promises from industry giants such as Amazon, Microsoft, and IBM mean for the future of the cybersecurity industry.BioAmanda joined the Relativity team in 2018 as CSO and her responsibilities expanded to include the role of CIO in 2021. In her role, Amanda is responsible for championing and directing security strategy in risk management and compliance practices as well as building and supporting Relativity's information technology. She also hosts Relativity's Security Sandbox podcast, which looks to explore and explain the unique links between non-security topics and the security realm. Relativity is passionate about its culture of security to ensure its data (and its customers' and partners' data) is secure.Prior to joining Relativity, Amanda served as the global head of cyber response and digital forensics at Zurich Insurance Company. She also held several management and consulting positions at Symantec, Dell SecureWorks, Booz Allen Hamilton, and Guidance Software. Amanda received her Master's in Forensic Science in the field of Digital Forensics: High-Technology Crime Investigation at the George Washington University.
Alan White is the Global Regions Consulting and Services Director for Dell SecureWorks, and is part of the US Army's Computer Emergency Research Team. Previously, Alan was the Director of Security and Risk Consulting for the Asia-Pacific-Japan region, responsible for managing incident response, forensics, technical testing and compliance services teams. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode503#Interview:_Alan_White.2C_Dell_SecureWorks.2FUS_Army_-_6:00PM-7:00PM Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
Alan White of Dell SecureWorks and the U.S. Army joins us, our very own Doug White delivers a tech segment on incident response and forensic reporting, and we cover the latest security news. Stay tuned!
Alan White is the Global Regions Consulting and Services Director for Dell SecureWorks, and is part of the US Army's Computer Emergency Research Team. Previously, Alan was the Director of Security and Risk Consulting for the Asia-Pacific-Japan region, responsible for managing incident response, forensics, technical testing and compliance services teams. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode503#Interview:_Alan_White.2C_Dell_SecureWorks.2FUS_Army_-_6:00PM-7:00PM Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
Alan White of Dell SecureWorks and the U.S. Army joins us, our very own Doug White delivers a tech segment on incident response and forensic reporting, and we cover the latest security news. Stay tuned!
In today's Daily Podcast we follow up on the Panama Papers' fallout. Leaker "John Doe" remains unidentified, and the scandal is roiling politics in Ukraine. Some observers think the Russian Financial Monitoring Service is behind the leaks. Dridex evolves into new lines of cyber crime. Juniper patches a suspect random number generator. GCHQ is said to have helped publishers stop the new Harry Potter book from leaking. And CyberWire editor John Petrik reviews an interesting price list from Dell SecureWorks.
032516 Stewart
What a JOY it was for me when my sister, Lisa LaRoque dropped by Booth 61 during the opening reception at the 2015 Techbridge Digital Ball. I first met Lisa at the Thursday morning Bible Study held at Dell SecureWorks. She is one of the people you learn from quickly. She has a magnificent heart […] The post Lisa LaRoque, Executive Director of the Georgia CIO Leadership Association, visited Booth 61 at the 2015 Techbridge Digital Ball appeared first on Business RadioX ®.
Kyle is an information security engineer who devotes his spare time to exploiting the ‘internet of things’. He enjoys lockpicking, CTFs, tinkering with electronics, exploit development and blogging about his findings. He is the founding member of Louisville Organization of Locksport. Walkthrough the Episode 350 Crypto Challenge puzzle with Mike Connor, a senior member of the Analysis team at Dell SecureWorks. He is a big supporter of all things Chicago, specifically THOTCON , BsidesChicago, and all of the different Burbsec groups.
On July 17th, I was honored to have my friend, Ben Hendrick, in the studio. Ben did an outstanding job of articulating the value proposition of the new Dell. I have learned a great deal about Dell since Ben joined the company 5 years ago but I learned a lot more during our time together […] The post Ben Hendrick, Regional Director for Dell Services, 7/17/2013 appeared first on Business RadioX ®.