Podcasts about Endpoint

  • 356PODCASTS
  • 703EPISODES
  • 37mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Nov 19, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Endpoint

Latest podcast episodes about Endpoint

The Tech Blog Writer Podcast
3492: How Mammoth Enterprise AI Browser Redefines Security at the Endpoint

The Tech Blog Writer Podcast

Play Episode Listen Later Nov 19, 2025 26:41


Have you ever wondered what happens when the browser stops being a simple window to the web and starts becoming the control point for how AI touches every part of enterprise life? That was the starting point for my conversation with Michael Shieh, founder and CEO of Mammoth Cyber. What followed was a detailed look at why the browser is turning into the foundation of enterprise AI and why the shift is arriving faster than many expect. Michael shared why employees already spend most of their working lives inside a browser and how this makes it the natural place for AI to support decisions, speed up routine work, and act as the interface between people, applications, and data. But we also spoke about the uncomfortable reality behind that convenience.  When consumer AI browsers rush ahead with features that harvest data or request wide-reaching permissions, the trade off between speed and governance becomes harder to ignore. Michael explained how this gap leaves security teams unable to see where sensitive data is being sent or how shadow AI creeps into daily workflows without oversight. During our conversation he broke down what makes an enterprise AI browser different. We talked about policy controlled access, device trust, identity federation, and the safeguards that protect AI from hazards like indirect prompt injection. Michael also described how the Mammoth team built a multi layer security model that monitors what the AI can view, what it cannot view, and how data moves across applications in real time. His examples of DLP at the point of use, low friction controls for workers, and granular visibility for security teams showed how the browser is becoming the new enforcement boundary for zero trust. We also covered the growing tension between traditional access models like VPNs or VDI and the faster, lightweight deployment Mammoth is offering to large enterprises. Hearing Michael explain how some customers replaced heavy remote access stacks in weeks made it clear that this is more than a new product category. It hints at an early move toward AI shaped workflows running directly at the endpoint rather than through centralised infrastructure. As he looked ahead to the next few years, Michael shared why he expects the browser to operate as a kind of operating system for enterprise AI, blending native AI agents, web apps, and policy controls into a single environment. This episode raises an important question. If the browser becomes the place where AI reads, writes, and interprets information, how should enterprises think about identity, trust, and control when the pace of AI adoption accelerates again next year? I would love to hear your thoughts.

The New Warehouse Podcast
Connecting Warehouse Systems With Trackstar

The New Warehouse Podcast

Play Episode Listen Later Nov 19, 2025 34:56


When it comes to connecting warehouse systems, few companies are tackling the challenge as directly as TrackStar. In this episode of The New Warehouse Podcast, Kevin chats with Jeremy Schneck and Daniel Langer, Co-Founders of TrackStar, about how they're simplifying integrations across the fragmented WMS landscape. The discussion explores TrackStar's journey from a startup pivot to a Y Combinator-backed company, the growing role of APIs in supply chain connectivity, and how universal APIs are driving the next wave of warehouse innovation.Learn more about Endpoint and give Gary a break here. Get your free ID Label sample right here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
Warehouse Network Optimization: A Holistic Approach with The Beacon Group

The New Warehouse Podcast

Play Episode Listen Later Nov 17, 2025 37:03


When it comes to optimizing warehouse operations, few companies offer a truly end-to-end solution. In this episode of The New Warehouse Podcast, Kevin chats with Bob Hutson, Senior Vice President of Supply Chain and Real Estate at The Beacon Group, about how his team guides clients through the process from concept to implementation. The discussion highlights how The Beacon Group integrates real estate, technology, and financial modeling to help companies make smarter, faster decisions. As Hutson explains, warehouse network optimization requires foresight and alignment between operations and finance.Learn more about Endpoint and give Gary a break here. Get your free ID Label sample right here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
How Does 3PL Pricing Work?

The New Warehouse Podcast

Play Episode Listen Later Nov 14, 2025 65:29


What really goes into a 3PL quote? Does it ever feel like the final number comes out of thin air?For e-commerce brands and 3PL providers alike, fulfillment pricing can be a complex web. With no industry-wide standard and costs broken into multiple categories, understanding how a proposal is built is critical for a successful partnership.In this previously live session, Kevin was joined by a multi-disciplinary team from Barrett Distribution Centers to pull back the curtain. They went beyond a simple sales pitch to show you how multiple parts of a 3PL organization collaborate to develop pricing that creates a win-win for both the client and the provider.This is a rare opportunity to see how a price is constructed from the ground up and to understand the "why" behind every line item.Learn more about Endpoint and give Gary a break here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
Warehouse Digital Transformation: Bridging ERP and the Warehouse Floor

The New Warehouse Podcast

Play Episode Listen Later Nov 12, 2025 44:56


In this episode of The New Warehouse Podcast, Kevin chats with Kurt Heusner, CEO of Endpoint Automation Solutions, about how mid-market warehouses can modernize through digital transformation. Endpoint Automation Solutions helps companies bridge the gap between their ERP systems and the realities of warehouse operations. Kurt explains how modular, human-centered automation empowers smaller operators to stay competitive, improve visibility, and scale intelligently without overwhelming their teams or budgets. Together, they explore warehouse digital transformation for mid-market companies—balancing technology with people, outcomes, and agility.Learn more about Endpoint and give Gary a break here. Follow us on LinkedIn and YouTube.Support the show

The Tech Blog Writer Podcast
3482: IGEL CEO Klaus Oestermann on Why the Endpoint Is the Forgotten Link in Cybersecurity

The Tech Blog Writer Podcast

Play Episode Listen Later Nov 11, 2025 28:02


What if the real weakness in enterprise cybersecurity isn't the cloud or the network, but the endpoint sitting on every desk? In this episode, Klaus Oestermann, CEO of IGEL Technology, joins me at the Now and Next event in Frankfurt to discuss why he calls the endpoint the forgotten link in digital transformation. Klaus explains how decades of detect and mitigate thinking have left enterprises vulnerable, and why it is time to move toward a prevention-first security model that stops attacks before they start. He shares how IGEL's dual boot architecture allows organizations to recover thousands of devices in minutes, and why prevention-first design can deliver measurable ROI with an average 62 percent reduction in endpoint IT costs and more than 900,000 dollars in annual savings. During our conversation, Klaus also reflects on the surge in ransomware across critical sectors and why governments and enterprises alike are rethinking their endpoint strategies. He talks about how IGEL has become an essential part of modern Zero Trust frameworks, protecting sectors like healthcare, manufacturing, and public services, while partnering with leading technology providers to build stronger, integrated defenses. We also explore how those savings can be reinvested into Zero Trust, AI innovation, and new layers of defense, as well as how IGEL is helping secure critical national sectors from healthcare to manufacturing. From Audi's factory floors to government agencies, Klaus outlines a future where resilience begins at the endpoint, not the data center. Do you think enterprises are ready to make that shift? I would love to hear your thoughts after the episode. Useful Links Connect with Klaus Oestermann on LinkedIn Learn more about IGEL Follow on LinkedIn, Twitter and YouTube Tech Talks Daily is Sponsored by NordLayer: Get the exclusive Black Friday offer: 28% off NordLayer yearly plans with the coupon code: techdaily-28. Valid until December 10th, 2025. Try it risk-free with a 14-day money-back guarantee.

The New Warehouse Podcast
Operational Turnarounds in Warehousing: Making Operations Suck Less

The New Warehouse Podcast

Play Episode Listen Later Nov 10, 2025 37:35


When it comes to improving warehouse performance, Chris Hamley, Managing Partner of The Brecham Group, believes in keeping things simple: make operations suck less. In this episode of The New Warehouse Podcast, Kevin chats with both Chris Hamley and Pete Allen, a returning guest and now one of the newest members of The Brecham Group. Together, they explore what that mantra truly means and how it shapes the firm's approach to operational turnarounds in warehousing. This episode blends real-world lessons, cultural insight, and practical advice from two leaders who have spent their careers on the warehouse floor.Learn more about Endpoint and give Gary a break here. Learn more about The Brecham Group here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
Warehouse Technology Trends for 2026

The New Warehouse Podcast

Play Episode Listen Later Nov 7, 2025 65:49


The warehouse of today is already transforming, but what will it truly look like in 2026? We are moving beyond isolated automation to a fully integrated, intelligent ecosystem. This is where AI-driven robotics, augmented-reality workflows, and hyper-flexible software converge to create a warehouse that is not just faster, but more predictive, accurate, and resilient than ever before.Tune in for a panel discussion with leaders from Addverb, Snapfulfil, Centric Packaging, and Vuzix. We'll cut through the hype to reveal the practical technologies shaping the next wave of warehouse efficiency. See them all at the upcoming Element Logic Tradeshow in NJ on 11/13!Learn more about Endpoint and give Gary a break here. Learn more about The Brecham Group here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
Cartonization and the Rise of the Packing Control System

The New Warehouse Podcast

Play Episode Listen Later Nov 5, 2025 36:08


When most people think about warehouse efficiency, they picture automation, robotics, or faster picking speeds. But for James Malley, Co-founder and CEO of Paccurate, the real opportunity lies in something far less flashy—how we pack boxes. In this episode, Kevin chats with James about Paccurate's milestone of processing one billion packs and how the company is redefining packaging optimization through cartonization.What began as a side project tackling dimensional weight challenges has evolved into a new layer of warehouse intelligence: the Packing Control System (PCS). As James explains, sometimes the smallest adjustments have the biggest ripple effects.Learn more about Endpoint and give Gary a break here. Learn more about The Brecham Group here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
EP 639: Expert Supply Chain Advice from “Legend” Rick McDonald

The New Warehouse Podcast

Play Episode Listen Later Nov 3, 2025 42:23


Kevin chats with Rick McDonald, CEO and Founder of Rick McDonald Supply Chain Advisory, who spent over three decades at Clorox, including four years as Chief Supply Chain Officer. Drawing from his deep experience leading transformation across manufacturing, procurement, and logistics, Rick shares supply chain advice on how the industry evolved from grease pencils and overhead projectors to digital roadmaps, AI-driven planning, and consumer-obsessed supply chains. The conversation touches on leadership, change management, and what the future of warehousing will look like as technology and people continue to adapt.Learn more about Endpoint and give Gary a break here. Learn more about The Brecham Group here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
The Peak Season Countdown: Making Sure You're All Systems Go

The New Warehouse Podcast

Play Episode Listen Later Oct 31, 2025 56:37


With Black Friday just weeks away, the window for final peak season preparation is closing. Are your operations and your systems truly ready for the surge?Join your host, Kevin, for a crucial live discussion with Brian Kirst of Snapfulfil. Drawing on his unique dual experience as both a WMS expert and a former 3PL owner, Brian offers battle-tested strategies from both sides of the operation.In this session, you will discover:The Operator's Playbook: Go beyond theory with practical, on-the-floor tips Brian used to navigate high-volume seasons in his own 3PL.The Pre-Peak Systems Audit: Uncover the critical checks you need to run on your system now to prevent crashes and costly "hiccups" on your busiest days.Fortifying Your Fulfillment Engine: Learn how to align your people, processes, and technology to ensure your operation can handle the pressure without breaking.This is a must-attend event for 3PL owners, warehouse managers, and operations leaders. Bring your questions for a live Q&A!Learn more about Snapfulfil here: https://snapfulfil.com/Learn more about Endpoint and give Gary a break here. Learn more about The Brecham Group here. Follow us on LinkedIn and YouTube.Support the show

The Cybersecurity Defenders Podcast
#259 - Defender Fridays: Breaking Down Microsoft Defender for Endpoint with Ken Westin from LimaCharlie

The Cybersecurity Defenders Podcast

Play Episode Listen Later Oct 24, 2025 33:46


Ken, Senior Solutions Engineer at LimaCharlie, dives into the incredibly confusing licensing tiers, pricing models and feature sets for Microsoft Defender for Endpoint. Today we discuss: The difference between tiersWays to solve Defender visibility issues and increase operational transparencyHow its capabilities can be customized and expanded for better flexibility and scalability for service providersJoin the Defender Fridays community, live every Friday, to discuss the dynamic world of information security in a collaborative space with seasoned professionals.A big picture thinker, Ken ferrets out trends, seeking to understand what happens when businesses are breached and the methods behind the attacks. Then he figures out how to protect customers before they're hit.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastruture for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.

Conversations in Drug Development
Navigating the FDA Landscape: More Changes, and What's Next?

Conversations in Drug Development

Play Episode Listen Later Oct 23, 2025 26:40 Transcription Available


In this episode, Eric Hardter and guest Kelsey Lenoch discuss recent US FDA developments, including leadership changes at CBER and CDER, staffing impacts on orphan product reviews, and the new Rare Disease Evidence Principles aimed at accelerating approvals for rare and ultra-rare conditions. They also explore evolving trial endpoints in oncology (including surrogate measures and ctDNA), transparency moves such as the public release of Complete Response Letters and the industry's reactions, updates on the National Priority Voucher Program, and the FDA Pre-Check initiative to boost domestic drug manufacturing. Tune in for an in-depth discussion offering timely updates and expert perspectives on what may be ahead for drug development stakeholders.

XenTegra - IGEL Weekly
Closing the Endpoint Gap: Business Continuity and IGEL's Dual-Boot Solution

XenTegra - IGEL Weekly

Play Episode Listen Later Oct 15, 2025 31:14 Transcription Available


In this episode of IGEL Weekly, Andy Whiteside sits down with Chris Feeney from IGEL's Office of the CTO to explore a critical, often overlooked element of disaster recovery—endpoint resilience. They unpack how IGEL is addressing business continuity challenges with innovative solutions like IGEL Dual Boot and USB Recovery, enabling organizations to recover in minutes rather than days.Chris shares insights into the growing importance of securing endpoints amid rising ransomware threats and operational disruptions like the recent CrowdStrike incident. The conversation dives into:Why most organizations fail to plan for endpoint-level recoveryHow IGEL's dual-boot architecture bridges the gap between prevention and recoveryReal-world examples of minimizing downtime during breaches and outagesThe future of endpoint strategy as SaaS, browsers, and cloud PCs reshape IT infrastructureTune in to learn how IGEL is redefining endpoint continuity and setting a new standard for security and business resilience.

Embedded Executive
Embedded Executive: AI At the Endpoint | EMASS

Embedded Executive

Play Episode Listen Later Oct 8, 2025 11:56


AI at the endpoint gets yet another boost from EMASS, a fabless semiconductor company that recently emerged from stealth mode. Having your processing at the endpoint presents a few significant challenges, namely the amount of processing that can be made available and the ability to run from a battery. EMASS has come up with a way to do this a little differently from what's been done previously. They can attach their RISC-V processing element to any sensor, making the device an AI accelerator. It's a little difficult for me to put into words here, so check out this week's Embedded Executives podcast, where I spent some time with Mark Goranson, EMASS's CEO, who explains it in detail.

Sports & The World
Napheesa Collier On Point, QBs To Anoint, and Teams Who Are At An Endpoint

Sports & The World

Play Episode Listen Later Oct 3, 2025 45:22


In this week's episode, LaDarius recaps Week Four of the NFL and looks ahead to Week Five. Next, Minnesota Lynx star Napheesa Collier's comments on WNBA Commissioner Cathy Engelbert. Lastly, Brown's Big Bets, MLB Playoffs, and more! Follow LaDarius on Social Media:Twitter (X): ⁠⁠⁠⁠⁠⁠⁠@ladarius_brown⁠⁠⁠⁠⁠ ⁠⁠⁠⁠Instagram: ⁠⁠⁠⁠⁠⁠⁠@ladarius__brown⁠⁠⁠⁠⁠ ⁠⁠TikTok: ⁠⁠⁠⁠⁠⁠⁠@ladarius_brown

PolySécure Podcast
PME - Petit quiz PME ou que ce que vous avez toujours voulu savoir - Parce que... c'est l'épisode 0x637!

PolySécure Podcast

Play Episode Listen Later Oct 1, 2025 29:11


Parce que… c'est l'épisode 0x637! Shameless plug 12 au 17 octobre 2025 - Objective by the sea v8 14 et 15 octobre 2025 - ATT&CKcon 6.0 14 et 15 octobre 2025 - Forum inCyber Canada Code rabais de 30% - CA25KDUX92 4 et 5 novembre 2025 - FAIRCON 2025 8 et 9 novembre 2025 - DEATHcon 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2026 Description Ce troisième épisode d'une série consacrée aux PME prend la forme d'un quiz interactif entre Nicolas-Loïc Fortin et son invité Claude. L'objectif est d'aborder des questions fréquemment posées sur la cybersécurité et la protection des données, couvrant ainsi les angles qui n'ont peut-être pas été suffisamment explorés dans les épisodes précédents. Le retour sur investissement en cybersécurité La question du retour sur investissement en cybersécurité pour les PME n'appelle pas de réponse simple par oui ou non. La difficulté réside dans la mesure de ce retour, qui doit être proportionnel aux actifs à protéger. Les PME font face à des contraintes budgétaires importantes et doivent évaluer la menace réelle qui pèse sur elles. L'intervenant illustre cette problématique par une anecdote d'une compagnie de transport qui devait protéger ses remorques contre les vols utilisant de l'azote liquide pour briser les cadenas. De la même façon, en informatique, les attaquants cherchent à « faire éclater le cadenas » pour voler le contenu. Actuellement, la plus grande menace pour les PME provient des rançongiciels, qui visent toutes les organisations, du cabinet dentaire aux entreprises de toutes tailles. La stratégie de protection doit s'adapter au niveau d'information sensible détenue. Pour les entreprises sans données sensibles, de bonnes sauvegardes suffisent pour redémarrer après une attaque. Pour celles qui manipulent des informations personnelles, des mesures plus sophistiquées s'imposent. Heureusement, des solutions peu coûteuses existent, fournies par des spécialistes en PME. L'important est d'éviter les consultants de grande entreprise qui proposent des solutions disproportionnées et effrayantes, décourageant ainsi l'investissement en cybersécurité. Solutions à petit budget Contrairement aux idées reçues, la cybersécurité à petit budget est non seulement possible, mais peut être très efficace si elle est bien choisie. L'open source offre des solutions simples et accessibles. Avec l'accompagnement d'un expert, les PME peuvent trouver des solutions gratuites ou peu coûteuses adaptées à leurs besoins réels. La clé consiste à définir ce qui est précieux pour l'entreprise, que cette valeur soit intrinsèque ou imposée par la loi. Les informations personnelles doivent être protégées par obligation légale, tout comme les numéros de cartes de crédit pour les commerçants, en vertu d'obligations contractuelles. De nombreuses solutions de qualité professionnelle peuvent être déployées par des passionnés de cybersécurité qui connaissent bien les besoins des PME. Loi 25 versus cybersécurité La question de la priorité entre la conformité à la Loi 25 et la cybersécurité suscite des débats. L'intervenant privilégie la conformité légale, car les obligations contractuelles et réglementaires ont préséance dans tous les cas. Cependant, se conformer à la Loi 25 apporte des bénéfices directs pour la cybersécurité, notamment l'obligation de créer un inventaire des données, qui constitue un avantage considérable pour la protection des informations. L'ingénierie sociale : le maillon faible Concernant les attaques par ingénierie sociale, le contexte représente un facteur plus déterminant que l'humain lui-même. Tous les humains peuvent être victimes d'hameçonnage, indépendamment de leur niveau de compétence. Lorsque le contexte nous prédispose à répondre automatiquement, nos défenses naturelles s'abaissent et nous agissons comme des « zombies », suivant le processus attendu sans questionnement. L'intervenant partage son expérience personnelle d'avoir cliqué sur un lien d'hameçonnage de son propre employeur, soulignant l'importance du timing et du contexte. Des recherches montrent que les gens sont plus susceptibles de cliquer sur des liens malveillants en fin de journée. La vigilance doit être maintenue même dans des situations apparemment normales, bien que la fragilité humaine face au contexte rende cette tâche difficile. L'authentification multifacteur : un minimum évolutif L'authentification multifacteur (MFA) constitue désormais un standard minimum, popularisé par le télétravail pendant le confinement. Cependant, cette barrière de sécurité est déjà en train d'être dépassée par des attaquants créatifs. Le MFA par SMS, qui représentait un minimum viable pendant le confinement, n'est plus suffisant aujourd'hui. Le MFA par application ou par clé physique représente maintenant le minimum requis pour tous les services, particulièrement ceux liés à l'argent. L'intervenant raconte comment, pendant son jogging matinal, il a reçu une alerte de sa banque concernant une tentative d'accès. Bien que le SMS ne soit pas la meilleure forme de MFA, cette deuxième barrière l'a alerté que son mot de passe avait été compromis. Il a immédiatement changé ses identifiants et activé une clé physique pour renforcer la sécurité. Cette expérience souligne l'importance d'activer le MFA sur tous les services critiques : courriel, systèmes comptables comme Quickbooks, et tous les systèmes au cœur du fonctionnement de l'entreprise. Gestionnaires de mots de passe La question des voûtes de mots de passe suscite beaucoup d'émotions dans la communauté cybersécurité. Les puristes recommandent les gestionnaires de mots de passe, mais une analyse pragmatique s'impose. Un carnet de mots de passe dans le tiroir du bureau vaut mieux qu'une absence de protection ou qu'une voûte mal configurée que personne n'utilisera. L'important reste d'avoir des mots de passe différents partout et d'activer le MFA, car le mot de passe seul ne constitue plus une barrière suffisante. Les voûtes modernes facilitent grandement la gestion des mots de passe et intègrent les nouvelles tendances comme l'authentification sans mot de passe. Le modèle de menace doit être considéré : si les attaquants sont en Chine ou en Russie, le carnet dans le tiroir est relativement sûr. Si la menace provient d'employés internes, d'autres solutions s'imposent. Un mot de passe simple comme « soleil123 », même avec MFA, reste problématique car la première barrière est trop facilement franchissable. Antivirus et protection moderne Les antivirus classiques ne suffisent plus à protéger adéquatement contre les cyberattaques. Les solutions modernes, appelées antivirus de nouvelle génération ou EDR (détection et réponse sur les points terminaux), offrent des protections supplémentaires en détectant les comportements suspects plutôt que simplement les signatures de fichiers. Pour les PME, des solutions intégrées comme Microsoft Defender for Endpoint constituent un bon compromis. Il faut éviter les antivirus gratuits, mais utiliser plutôt les outils de sécurité inclus dans les licences existantes de Microsoft 365 ou Google Workspace. WiFi public : l'évolution de la sécurité La sécurité des réseaux WiFi publics a considérablement évolué. Contrairement aux anciennes pratiques, utiliser un WiFi public n'est plus dangereux pour la majorité des utilisateurs. Depuis environ cinq ans, Google n'indexe plus les sites sans chiffrement de base, forçant les entreprises à améliorer leur sécurité. Les services modernes comme Microsoft 365, Outlook et les banques chiffrent toutes les communications. Tant que l'appareil est à jour et qu'aucun message d'avertissement de certificat invalide n'apparaît, il n'y a aucun danger à utiliser un WiFi public pour des usages standard avec des services légitimes de grandes compagnies. Infections par simple visite de site Il est possible de s'infecter en visitant un site web sans cliquer sur quoi que ce soit. Les attaquants, qui travaillent sur ces méthodes à temps plein, sont très imaginatifs. La meilleure protection consiste à maintenir son navigateur constamment à jour. Les navigateurs comme Chrome, Edge et Brave se mettent à jour automatiquement à chaque redémarrage. Les attaquants ont évolué au-delà des sites louches en infectant des publicités sur des sites légitimes. Les antivirus de nouvelle génération peuvent bloquer certaines de ces menaces, mais la mise à jour régulière du navigateur reste la meilleure défense. Le rôle des dirigeants Les dirigeants de PME portent la responsabilité ultime de la protection des renseignements personnels selon la loi. Dans toute organisation, les décisions de cybersécurité doivent venir du sommet. Sans l'engagement du plus haut dirigeant, aucune énergie réelle ne sera investie dans la cybersécurité. Les dirigeants doivent porter le message de cybersécurité, allouer les ressources financières et humaines nécessaires, et favoriser une culture de protection des informations. Ils sont les seuls capables d'identifier ce qui est précieux dans l'entreprise : liste de clients, procédés de fabrication, propriété intellectuelle, ou tout autre avantage concurrentiel. Cette responsabilité s'étend au-delà des obligations légales pour protéger ce qui fait vraiment la différence de l'entreprise. Conclusion Ce podcast souligne l'importance de sensibiliser les PME à la cybersécurité, car elles constituent le tissu économique du Québec, du Canada et du monde entier. Chaque PME qui tombe sous une cyberattaque affecte l'ensemble de l'écosystème économique et social. La cybersécurité pour les PME doit être accessible, pragmatique et adaptée aux réalités budgétaires de ces organisations. Collaborateurs Nicolas-Loïc Fortin Claude Mercier Crédits Montage par Intrasecure inc Locaux réels par Intrasecure inc

Don't Miss a Beat
Debating Oral Diuretic Intensification as an Endpoint in Heart Failure Trials

Don't Miss a Beat

Play Episode Listen Later Sep 28, 2025 18:12


At the Heart Failure Society of America (HFSA) Annual Scientific Meeting 2025, hosts Muthiah Vaduganathan, MD, MPH, a cardiologist and codirector of the Center for Cardiometabolic Implementation Science at Brigham and Women's Hospital, and Stephen Greene, MD, an advanced heart failure specialist at Duke University School of Medicine, discussed the evolving role of oral diuretic intensification as a potential endpoint in heart failure clinical trials. Historically, endpoints progressed from all-cause mortality to cardiovascular mortality, then to composites that included heart failure hospitalization and urgent outpatient visits. Recent trials have gone further, considering changes in oral loop diuretic therapy as signals of worsening disease. The rationale for including oral diuretic intensification is its frequency, prognostic value, and potential to increase event capture in trials. Data from real-world cohorts and secondary analyses demonstrate that escalation of oral diuretics is associated with increased risks of hospitalization and death, suggesting it is not a benign event. Incorporating these events could enhance trial efficiency by substantially increasing the number of captured endpoints, allowing for smaller and shorter studies while maintaining clinical relevance. However, challenges remain. Definitions vary across studies, raising questions about what constitutes a meaningful intensification—dose doubling, drug class switching, or short-term use of additional diuretics. Distinguishing heart failure–related changes from adjustments for comorbid conditions such as kidney disease or obesity further complicates endpoint validity. Concerns also exist that clinician-driven medication changes may introduce variability or bias unless standardized symptom-based criteria are applied. Despite these complexities, retrospective analyses suggest consistent findings across different statistical approaches, reinforcing the prognostic importance of oral diuretic changes. Broader adoption would require consensus definitions, regulatory acceptance, and frameworks to account for overlapping events, such as escalation followed by IV diuretics or hospitalization. The speakers concluded that oral diuretic intensification represents an important step toward more inclusive and globally applicable trial endpoints that better capture the continuum of worsening heart failure. Relevant disclosures for Vaduganathan include Amgen, AstraZeneca, Bayer AG, Boehringer Ingelheim Pharmaceuticals, Cytokinetics, Lexicon, and others. Relevant disclosures for Greene include Amgen, AstraZeneca, Bayer Healthcare Pharmaceuticals, Boehringer Ingelheim Pharmaceuticals, Cytokinetics, and others. References: Greene SJ, Butler J. Expanding the Definition of Worsening Heart Failure and Recognizing the Importance of Outpatient Escalation of Oral Diuretics. Circulation. 2023;148(22):1746-1749. doi:10.1161/CIRCULATIONAHA.123.066915 Packer M, Zile MR, Kramer CM, et al. Tirzepatide for Heart Failure with Preserved Ejection Fraction and Obesity. N Engl J Med. 2025;392(5):427-437. doi:10.1056/NEJMoa2410027 Chapters 00:00 - Introduction and Evolution of Heart Failure Endpoints  03:02 - The Case for Oral Diuretic Intensification as an Endpoint 07:06 - Challenges in Adoption and Standardization 14:45 - Broader Implications and Summary

Embedded Executive
Embedded Executive: Move AI to the Endpoint | Ambiq

Embedded Executive

Play Episode Listen Later Sep 24, 2025 13:37


AI is a technology that generally requires a significant amount of power and high compute performance. Hence, it's typically relegated to the Cloud or to an Edge-based computer.Performing AI at the endpoint has not been feasible for those reasons. With ambiq's Sub-threshold Power Optimized technology (SPOT), performing AI at the endpoint is a reality. And the doors/applications that it opens are extremely cool. Hear more about it in this week's Embedded Executives podcast, where I spoke to Ambiq's Vice President of AI, Carlos Morales. Note that Ambiq just recently released the latest version of neuralSPOT, which now includes key performance enhancements specific to the company's Apollo5 family, amongst other features, some of which are specific to AI development.

The New Scene
Repost - Episode 154: Rob Pennington of By The Grace of God / Jupiter Hearts

The New Scene

Play Episode Listen Later Aug 29, 2025 85:30


I'm reposting episodes that were taken down from Spotify. Keith sits down with Rob Pennington to discuss growing up and going to shows in Louisville, the history of Endpoint and By The Grace of God, touring the world, Rob's PhD and the work he does in Behavioral Science, Black Widows/Black Cross, Rob's latest band Jupiter Hearts and more.

MPR Weekly Dose
MPR Weekly Dose Podcast #247 — AAP Release Pediatric Immunization Schedule; Blood Pressure MGMT Guideline; Wegovy Approved for Noncirrhotic MASH; New Fibromyalgia Tx; Investigational Sickle Cell Tx Fails to Meet Endpoint

MPR Weekly Dose

Play Episode Listen Later Aug 21, 2025 18:12


The American Academy of Pediatrics release their own immunization schedule; The American Heart Association update 2017 guidelines for the prevention of high blood pressure; weight loss drug gains indication to treat noncirrhotic MASH; FDA approve a new fibromyalgia treatment; investigational SCD Tx to meet trial endpoint.

ITSPmagazine | Technology. Cybersecurity. Society
Event Recap: Kieran Human at Black Hat USA 2025 — ThreatLocker Unveils Configuration Defense, Achieves FedRAMP Status & More | Brand Story with ThreatLocker from Black Hat USA 2025

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 15, 2025 8:07


Event Recap: Kieran Human at Black Hat USA 2025 — ThreatLocker Unveils Configuration Defense, Achieves FedRAMP Status & MoreThreatLocker introduced DAC configuration monitoring and achieved FedRAMP certification at Black Hat 2025, strengthening zero trust capabilities while expanding government market access through practical security solutions.Zero trust security continues evolving beyond theoretical frameworks into practical business solutions, as demonstrated by ThreatLocker's latest announcements at Black Hat USA 2025. The company introduced Defense Against Configuration (DAC), a monitoring tool addressing a critical gap in zero trust implementations.Kieran Human, Special Projects Engineer at ThreatLocker, explained the challenge driving DAC's development. Organizations implementing zero trust often struggle with configuration management, potentially leaving systems vulnerable despite security investments. DAC monitors configurations continuously, alerting administrators to potential security issues and mapping findings to compliance frameworks including Essential 8.The tool addresses human factors in security implementation. Technical staff sometimes create overly permissive rules to minimize user complaints, compromising security posture. DAC provides weekly reports to executives, ensuring oversight of configuration decisions and maintaining security standards across the organization.ThreatLocker's approach distinguishes itself through "denied by default, allowed by exception" methodology, contrasting with traditional endpoint detection and response solutions that permit by default and block threats reactively. This fundamental difference requires careful implementation to avoid business disruption.The company's learning mode capabilities address deployment concerns. With over 10,000 built-in application profiles, ThreatLocker automates policy creation while learning organizational workflows. This reduces manual configuration requirements that previously made zero trust implementations tedious and time-intensive.FedRAMP certification represents another significant milestone, opening government sector opportunities. Federal compliance requirements previously excluded ThreatLocker from certain contracts, despite strong customer demand for their zero trust capabilities. This certification enables expansion into highly regulated environments requiring stringent security controls.Customer testimonials continue validating the approach. One user reported preventing three breaches after implementing ThreatLocker's zero trust solution, demonstrating measurable security improvements. Such feedback reinforces the practical value of properly implemented zero trust architecture.The balance between security and business functionality remains crucial. Organizations need security solutions that protect assets without hampering productivity. ThreatLocker's principle of least privilege implementation focuses on enabling business requirements with minimal necessary permissions rather than creating restrictive environments that impede operations.Human described working closely with CEO Danny Jenkins, emphasizing the collaborative environment that drives product innovation. His engineering perspective provides valuable insights into customer needs while maintaining focus on practical security solutions that work in real-world environments.As zero trust adoption accelerates across industries, tools like DAC become essential for maintaining security posture while meeting business demands. The combination of automated learning, configuration monitoring, and compliance mapping addresses practical implementation challenges facing security teams today.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Kieran Human, Special Project Engineer at ThreatLocker | On LinkedIn | https://www.linkedin.com/in/kieran-human-5495ab170/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

XenTegra - IGEL Weekly
Rethinking Endpoint Strategy: Inside IGEL's Preventive Security Model

XenTegra - IGEL Weekly

Play Episode Listen Later Aug 12, 2025 38:02 Transcription Available


In Episode 103 of IGEL Weekly, host Andy Whiteside and Chris Feeney dive deep into what it means to truly rethink endpoint strategy in 2025. Using James Millington's recent blog as a guide, they explore IGEL's Preventive Security Model — a lightweight, adaptive, and policy-aligned approach that moves beyond the bloated, reactive stacks of the past.From Zero Trust architecture and business continuity planning to repurposing hardware for sustainability and simplifying mergers and acquisitions, Andy and Chris share how IGEL unifies hardware, applications, and security into a failsafe foundation for any organization. Whether you're managing thousands of endpoints or just a few dozen, this conversation reveals why it's time to break from the status quo and design for a secure, flexible, and future-ready digital workspace.

ITSPmagazine | Technology. Cybersecurity. Society
Simplifying Security Without Sacrificing Control | A ThreatLocker Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Danny Jenkins

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 11, 2025 19:25


At Black Hat USA 2025, Danny Jenkins, CEO of ThreatLocker, shares how his team is proving that effective cybersecurity doesn't have to be overly complex. The conversation centers on a straightforward yet powerful principle: security should be simple enough to implement quickly and consistently, while still addressing the evolving needs of diverse organizations.Jenkins emphasizes that the industry has moved beyond selling “magic” solutions that promise to find every threat. Instead, customers are demanding tangible results—tools that block threats by default, simplify approvals, and make exceptions easy to manage. ThreatLocker's platform is built on this premise, enabling over 54,000 organizations worldwide to maintain a secure environment without slowing business operations.A highlight from the event is ThreatLocker's Defense Against Configurations (DAC) module. This feature performs 170 daily checks on every endpoint, aligning them with compliance frameworks like NIST and FedRAMP. It not only detects misconfigurations but also explains why they matter and how to fix them. Jenkins admits the tool even revealed gaps in ThreatLocker's own environment—issues that were resolved in minutes—proving its practical value.The discussion also touches on the company's recent FedRAMP authorization process, a rigorous journey that validates both the product's and the company's security maturity. For federal agencies and contractors, this means faster compliance with CMMC and NIST requirements. For commercial clients, it's an assurance that they're working with a partner whose internal security practices meet some of the highest standards in the industry.As ThreatLocker expands its integrations and modules, Jenkins stresses that simplicity remains the guiding principle. This is achieved through constant engagement with customers—at trade shows, in the field, and within the company's own managed services operations. By actively using their own products at scale, the team identifies friction points and smooths them out before customers encounter them.In short, the message from the booth at Black Hat is clear: effective security comes from strong fundamentals, simplified management, and a relentless focus on the user experience.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Danny Jenkins, CEO of ThreatLocker | On LinkedIn | https://www.linkedin.com/in/dannyjenkinscyber/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cyber Security Weekly Podcast
Episode 452 - STATE OF CYBER (Part 1)

Cyber Security Weekly Podcast

Play Episode Listen Later Jul 23, 2025 59:01


Special Virtual Episodes with ISACA Leaders: State of Cyber (Part 1) - Maintaining readiness in a complex threat environmentSpeakers:Jamie Norton - ISACA Board Member Chirag Joshi - Sydney Chapter Board Member Abby Zhang - Auckland Chapter Board Member Jason Wood - Auckland Chapter former PresidentBharat Bajaj - ISACA Melbourne Board DirectorFor the full series visit: https://mysecuritymarketplace.com/security-amp-risk-professional-insight-series-2025/#mysecuritytv #isaca #cybersecurity OVERVIEWAccording to ISACA research, almost half of companies exclude cybersecurity teams when developing, onboarding, and implementing AI solutions.Only around a quarter (26%) of cybersecurity professionals or teams in Oceania are involved in developing policy governing the use of AI technology in their enterprise, and nearly half (45%) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from global IT professional association ISACA.Key Report Findings Security teams in Oceania noted they are primarily using AI for: Automating threat detection/response (36% vs 28% globally); Endpoint security (33% vs 27% globally); Automating routine security tasks (22% vs 24% globally); and Fraud detection (6% vs 13% globally).Additional AI resources to help cybersecurity and other digital trust professionalso EU AI Act white papero Examining Authentication in the Deepfake EraSYNOPSISISACA's 2024 State of Cybersecurity report reveals that stress levels are on the rise for cybersecurity professionals, largely due to an increasingly challenging threat landscape. The annual ISACA research also identifies key skills gaps in cybersecurity, how artificial intelligence is impacting the field, the role of risk assessments and cyber insurance in enterprises' security programs, and more.The demand for cybersecurity talent has been consistently high, yet efforts to increase supply are not reflected in the global ISACA IS/IT-community workforce. The current cybersecurity practitioners are aging, and the efforts to increase staffing with younger professionals are making little progress. Left unchecked, this situation will create business continuity issues in the future. Shrinking budgets and employee compensation carry the potential to adversely affect cybersecurity readiness much sooner than the aging workforce, when the Big Stay passes. Declines in vacant positions across all reporting categories may lead some enterprises to believe that the pendulum of power will swing back to employers, but the increasingly complex threat environment is greatly increasing stress in cybersecurity teams; therefore, the concern is not if, but when, employees will reach their tipping point to vacate current positions.

The Cybersecurity Defenders Podcast
#225 - Defender Fridays: EDR, DFIR & endpoint triage with Brian Carrier, CEO of Sleauth Kit Labs

The Cybersecurity Defenders Podcast

Play Episode Listen Later Jun 27, 2025 31:00


Join us every Friday as we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.Each week, we bring you a different expert guest who will share their invaluable insights on topics ranging from threat hunting and incident response to security operations and detection engineering. What makes these sessions special is their informal and interactive nature, allowing for an engaging dialogue between our guests, hosts, and the audience.You can sign up to join us for the live sessions at limacharlie.io/defender-fridays

JACC Speciality Journals
Preserving Trial Endpoint Specificity and Cause of Death Attribution in Cardiovascular Trials: Insights From MARINER | JACC: Advances

JACC Speciality Journals

Play Episode Listen Later Jun 25, 2025 2:51


Darshan H. Brahmbhatt, Podcast Editor of JACC: Advances, discusses a recently published original research paper on Preserving Trial Endpoint Specificity and Cause of Death Attribution in Cardiovascular Trials: Insights From MARINE.

Tcast
Endpoint Automation in 2025: 7 Upgrades That Will Shock IT Leaders

Tcast

Play Episode Listen Later Jun 20, 2025 23:26


In this episode of TCAST, host Alexander McCaig welcomes Shirish Nimgaonkar, founder of EBLISS AI, to unpack how endpoint automation is redefining enterprise IT. With devices multiplying across industries, traditional support models—manual, reactive, and costly—no longer scale. EBLISS AI addresses this gap through an AI-powered platform that dynamically learns, predicts, and resolves endpoint issues with precision. Shirish explains how the platform integrates classic machine learning and proprietary small language models to build agentic AI—intelligent agents capable of real-time remediation and proactive diagnostics. They delve into the importance of synthetic data, human-in-the-loop safety mechanisms, and why productivity and risk management must co-evolve. The conversation also touches on the ethical implications of automation and the need for vision-led tech adoption that enhances quality of life, not just profits. Whether you're a data strategist, IT leader, or AI ethicist, this episode delivers actionable insights on how to future-proof your digital infrastructure. Timestamps [00:03] – Introduction: Shirish Nimgaonkar joins to talk AI-powered endpoint automation. [00:47] – Device Explosion: Why legacy IT support can't scale with modern device fleets. [03:11] – Enter EBLISS AI: A platform for prediction, remediation, and self-healing. [04:28] – Personalized Intelligence: How EBLISS tailors responses based on personas and use cases. [06:05] – Hybrid AI Models: Mixing ML, LLMs, and synthetic data for scalable solutions. [10:22] – Risk vs. Efficacy: Managing synthetic data and human oversight. [12:18] – Scaling Insight: Monitoring drift across millions of endpoints. [17:00] – Ethics of Adoption: Why vision, governance, and user empowerment matter. Quotes “You're not just shifting the risk—you're minimizing it.” – Shirish Nimgaonkar “Autonomy must be in service of human quality of life.” – Shirish Nimgaonkar “The ratio of productivity to risk defines solution effectiveness.” – Shirish Nimgaonkar Resources

ITSPmagazine | Technology. Cybersecurity. Society
What Helps You Sleep Better at Night: A Practical Take on Zero Trust | A Brand Story with Rob Allen from ThreatLocker | An Infosecurity Europe 2025 Pre-Event Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 22, 2025 23:03


As InfoSecurity Europe prepares to welcome cybersecurity professionals from across the globe, Rob Allen, Chief Product Officer at ThreatLocker, shares why this moment—and this location—matters. Allen doesn't frame the conversation around hype or headlines. Instead, he focuses on a universal truth: organizations want to sleep better at night knowing their environments are secure.ThreatLocker's mission is grounded in achieving Zero Trust in a simple, operationally feasible way. But more than that, Allen emphasizes their value as enablers of peace of mind. Whether helping customers prevent ransomware attacks or meet regional regulatory requirements like GDPR or Australia's Essential Eight, the company is working toward real-world solutions that reduce complexity without sacrificing security. Their presence at events like InfoSecurity Europe is key—not just for outreach, but to hear directly from customers and partners about what's working and where they need help.Why Being There MattersDifferent regions have different pressures. In Australia, adoption surged without any local team initially on the ground—driven purely by alignment with the Essential Eight framework. In the UK, it's conversations about Cyber Essentials that shape booth discussions. Regulations aren't just compliance checklists; they're also conversation starters that change how organizations prioritize security.The ThreatLocker team doesn't rely on generic demos or vague promises. They bring targeted examples to the booth—like asking attendees if they know what software can be run on their machines without alerting anyone. If tools like remote desktop applications or archive utilities can be freely executed, attackers can use them too. This is where ThreatLocker steps in: controlling what runs, identifying what's necessary, and blocking what isn't.Booth D90 and BeyondRob Allen invites anyone—whether they're new to ThreatLocker or longtime users—to visit booth D90. The team, built with a mix of technical skill and humor (ask about the “second-best beard” in the company), is there to listen and help. It's not just about showcasing technology; it's about building relationships and reinforcing a shared goal: practical, proactive cybersecurity that makes a measurable difference.If you're at InfoSecurity Europe, stop by. If you're not, this episode offers a meaningful glimpse into why showing up—both physically and philosophically—matters in cybersecurity.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Rob Allen, Chief Product Officer, ThreatLocker | https://www.linkedin.com/in/threatlockerrob/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerCyber Essentials Guide: https://threatlocker.kb.help/threatlocker-and-cyber-essentials-compliance/?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interview_rob&utm_term=podcastAustralia's Essential Eight Guide: https://www.threatlocker.com/whitepaper/australia-essential-eight?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interviLearn more and catch more event coverage stories from Infosecurity Europe 2025 in London: https://www.itspmagazine.com/infosec25 ______________________Keywords:sean martin, marco ciappelli, rob allen, cybersecurity, zero trust, infosec, compliance, ransomware, endpoint, regulation, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

Autonomous IT
Hands-On IT – 3 Tips to Make Your Endpoint Data Work for You, E18

Autonomous IT

Play Episode Listen Later May 22, 2025 5:42


In this episode of Hands-On IT, Landon Miles shares 3 tactical tips to help you make smarter decisions with your endpoint data. Learn how to cut through alert fatigue, streamline your reporting, and use historical insights to predict and prevent future issues. Whether you're managing a few hundred devices or thousands across mixed OS environments, these strategies will help you reduce noise, boost visibility, and run a more secure, efficient operation.

SCRIPTease
093 | SentinelOne – Marek Potočiar, Director of SW Engineering & Martin Tošovský, Senior Staff Software Engineer

SCRIPTease

Play Episode Listen Later May 22, 2025 71:52


Kalifornská firma SentinelOne stojí za platformou, která si klade za cíl kompletně zajistit firemní kybernetickou bezpečnost. Spoléhá z velké části na vlastní umělou inteligenci Purple AI a používají ji tři z deseti největších firem světa

Autonomous IT
Automox Insiders – Data Trivia and Endpoint Truths, E17

Autonomous IT

Play Episode Listen Later May 20, 2025 22:15


In this episode of Automox Insiders, host Maddie Regis sits down with Peter Pflaster and Kelly Carlson from Automox's product marketing team to explore how data transforms endpoint management. From mean time to remediate (MTTR) to device compliance and unexpected user activity trends, they break down the metrics IT pros should watch — and why clear, actionable reporting is critical for both security and executive buy-in. Plus, the trio wraps up with a round of data trivia to prove that yes, data can be fun.

Und dann kam Punk
206: Bolle (SPIT ACID, PEACE OF MIND, KÜCHENMESSER NR. 8, KATZENSTREIK, HERCULINES, INNOCENT BLISS, WASABI RIOT,...) - Und dann kam Punk

Und dann kam Punk

Play Episode Listen Later May 20, 2025 218:36


Christopher & Jobst im Gespräch mit Bolle. Wir reden über Bovenden, Zen & Dojos, Bundeswehr & Opium, veganes Essen aufm Oktoberfest, japanische Kloster und deutsche Bundeswehrzeit, AC/DC und New York Hardcore, "Rise" von Bad Brains, materiell war immer alles da, mit Nobelpreisträgern abhängen, was Krieg mit Menschen macht, stundenlang um Katzen kümmern, eine verstimmte Akkustik-Gitarre im Keller, Quatsch mit Tante Tina, sich gegenseitig auffangen, einschließen und nur noch Rhabarbar essen, mal die Kirche abchecken, kicken in Geismar, Flamenco is voll der Punkrock, der schöne Jon Bon Jovi, die Anfänge von Spit Acid, Madde im blöden Schottenrock, Yuppicide im Juzi, bei Leeway in Immenhausen, "Hardcore wird mich gesund machen", HC-Kids sind keine Punks, Endpoint & Split Lip, Katharisis auf der Bühne, das Mysterium Bovenden, Benni im orangen XXL-Battery-Shirt, krass durchs Juzi sozialisiert, zugekifft veganen Käse wegessen, der Typ von Conquer The World Records kommt extra nach Göttingen, unglaublich viel klauen & containern, wegen bewaffnetem Raubüberfall vor Gericht, alternativ leben auf dem Wagenplatz, keine Veränderung mögen, aber sich an alles gewöhnen, Eltern versuchen über die Katzenklappe Kontakt zu kriegen, Emo-Punk mit Fokus auf Anti-Pat, das Macker-Ding in Frage stellen, die langlebige Band Katzenstreik, raus aus dem Punk, Zen-Meditation, unglaublich viele Gefühle mit denen man nicht umgehen konnte, als richtiger Autonomer alles kacke finden, nie versuchen die Prozesse zu manipulieren, ein Level von Konfrontation mit sich selbst, den Kopf rasieren und die Kesa nähen, in Gotha gibt´s ne Kneipe, von Artischocke bis Zucchini, aufm Wochenmarkt beschimpft werden, Umstieg auf Solawi, Klimawandel war 2018, Beziehungen auf Eis legen, Bock auf Wasabi Riot, uvm.Drei Songs für die Playlist1) Ein Lieblingssong vom 20-jährigen Bolle: SICK OF IT ALL - We Want The Truth2) Ein Song den Bolle gern auflegt: PANJABI MC - Mundian To Bach Ke3) Ein Lied, das Bolle über seine Tochter kennengelernt hat: SASHA - Die Schule der Magischen Tiere

Foundation Fighting Blindness
J&J's XLRP Gene Therapy Didn't Meet Primary Endpoint in Phase 3 Clinical Trial

Foundation Fighting Blindness

Play Episode Listen Later May 15, 2025 2:35


Despite missing the primary endpoint, the treatment improved vision for some patients.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Wednesday, May 14th: Microsoft Patch Tuesday; 0-Days patched for Ivanti Endpoint Manager and Fortinet Products

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later May 14, 2025 6:38


Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%3A%20May%202025/31946 Security Advisory Ivanti Endpoint Manager Mobile (EPMM) May 2025 (CVE-2025-4427 and CVE-2025-4428) Ivanti patched an authentication bypass vulnerability and a remote code execution vulnerability. The authentication bypass can exploit the remote code execution vulnerability without authenticating first. https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM?language=en_US Fortinet Patches Exploited Vulnerability in API (CVE-2025-32756) Fortinet patched an already exploited stack-based buffer overflow vulnerability in the API of multiple Fortinet products. The vulnerability is exploited via crafted HTTP requests. https://fortiguard.fortinet.com/psirt/FG-IR-25-254

Paul's Security Weekly
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405

Paul's Security Weekly

Play Episode Listen Later May 5, 2025 102:43


Now in its 18th year, the Verizon Business DBIR is one of the industry's longest standing and leading reports on the current cybersecurity landscape. This year's report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among many other findings. Segment Resources: - https://www.verizon.com/about/news/2025-data-breach-investigations-report - https://www.verizon.com/business/resources/reports/dbir This segment is sponsored by Verizon Business! To read the full Verizon Business 2025 Data Breach Investigations Report, please visit https://securityweekly.com/verizonrsac. Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint. Yet, despite the exponential growth of browser-native attacks, traditional security solutions continue to focus on endpoint and network, leaving a large gaping hole when it comes to browser security. SquareX has started the Year of Browser Bugs (YOBB), a yearlong initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors - the browser. Learn more about SquareX's Browser Detection and Response solution at https://securityweekly.com/squarexrsac Last Mile Reassembly Attacks: https://www.sqrx.com/lastmilereassemblyattacks Polymorphic Extensions technical blog: https://labs.sqrx.com/polymorphic-extensions-dd2310006e04 There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management, and other advanced security tools tailored to bridge the gap between endpoint and cloud protection. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them! Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with Detecteam's autonomic detection lifecycle platform to continuously validate and improve detection capabilities based on real-world attack scenarios. Solution demo: https://www.devo.com/interactive-demos/devo-detecteam-engineering-confidence-in-threat-detection/ This segment is sponsored by Devo . Visit https://securityweekly.com/devorsac to learn more about them! While the value of identity security remains largely untapped, SailPoint's latest Horizons of Identity Security report reveals that organizations with mature identity programs can bend their identity security-to-value curve and recognize disproportionately higher returns. These programs unlock new value pools and can help address emerging challenges, such as securing machine and AI agent identities. The 2024-25 Horizons of Identity Security report: https://www.sailpoint.com/identity-library/horizons-identity-security-3 Take the identity security maturity assessment: https://www.sailpoint.com/identity-security-adoption Learn more about SailPoint's Customer Experience Portfolio: https://www.sailpoint.com/customer-success/customer-experience-portfolio This segment is sponsored by SailPoint. Visit https://securityweekly.com/sailpointrsac to learn more about them! Identity has long been the soft underbelly of cybersecurity—but with AI, non-human identities (NHIs), and autonomous agents on the rise, it's now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren't just hacking systems anymore—they're hijacking identities to slip through the cracks and move undetected in systems. For too long, identity security was treated as interchangeable with IAM—but that mindset is exactly what left critical gaps exposed. Listen to our interview with Hed Kovetz as he unpacks why identity has become today's most urgent battleground in cyber. He'll what you can do about it with an identity security playbook that gives you the upper hand. https://resources.silverfort.com/identity-security-playbook/home https://www.silverfort.com/blog/shining-the-spotlight-on-the-rising-risks-of-non-human-identities/ This segment is sponsored by Silverfort. Visit https://securityweekly.com/silverfortrsac to learn more about Silverfort's IDEAL approach to identity security! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-405

Enterprise Security Weekly (Audio)
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405

Enterprise Security Weekly (Audio)

Play Episode Listen Later May 5, 2025 102:43


Now in its 18th year, the Verizon Business DBIR is one of the industry's longest standing and leading reports on the current cybersecurity landscape. This year's report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among many other findings. Segment Resources: - https://www.verizon.com/about/news/2025-data-breach-investigations-report - https://www.verizon.com/business/resources/reports/dbir This segment is sponsored by Verizon Business! To read the full Verizon Business 2025 Data Breach Investigations Report, please visit https://securityweekly.com/verizonrsac. Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint. Yet, despite the exponential growth of browser-native attacks, traditional security solutions continue to focus on endpoint and network, leaving a large gaping hole when it comes to browser security. SquareX has started the Year of Browser Bugs (YOBB), a yearlong initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors - the browser. Learn more about SquareX's Browser Detection and Response solution at https://securityweekly.com/squarexrsac Last Mile Reassembly Attacks: https://www.sqrx.com/lastmilereassemblyattacks Polymorphic Extensions technical blog: https://labs.sqrx.com/polymorphic-extensions-dd2310006e04 There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management, and other advanced security tools tailored to bridge the gap between endpoint and cloud protection. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them! Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with Detecteam's autonomic detection lifecycle platform to continuously validate and improve detection capabilities based on real-world attack scenarios. Solution demo: https://www.devo.com/interactive-demos/devo-detecteam-engineering-confidence-in-threat-detection/ This segment is sponsored by Devo . Visit https://securityweekly.com/devorsac to learn more about them! While the value of identity security remains largely untapped, SailPoint's latest Horizons of Identity Security report reveals that organizations with mature identity programs can bend their identity security-to-value curve and recognize disproportionately higher returns. These programs unlock new value pools and can help address emerging challenges, such as securing machine and AI agent identities. The 2024-25 Horizons of Identity Security report: https://www.sailpoint.com/identity-library/horizons-identity-security-3 Take the identity security maturity assessment: https://www.sailpoint.com/identity-security-adoption Learn more about SailPoint's Customer Experience Portfolio: https://www.sailpoint.com/customer-success/customer-experience-portfolio This segment is sponsored by SailPoint. Visit https://securityweekly.com/sailpointrsac to learn more about them! Identity has long been the soft underbelly of cybersecurity—but with AI, non-human identities (NHIs), and autonomous agents on the rise, it's now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren't just hacking systems anymore—they're hijacking identities to slip through the cracks and move undetected in systems. For too long, identity security was treated as interchangeable with IAM—but that mindset is exactly what left critical gaps exposed. Listen to our interview with Hed Kovetz as he unpacks why identity has become today's most urgent battleground in cyber. He'll what you can do about it with an identity security playbook that gives you the upper hand. https://resources.silverfort.com/identity-security-playbook/home https://www.silverfort.com/blog/shining-the-spotlight-on-the-rising-risks-of-non-human-identities/ This segment is sponsored by Silverfort. Visit https://securityweekly.com/silverfortrsac to learn more about Silverfort's IDEAL approach to identity security! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-405

Paul's Security Weekly TV
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Hed Kovetz, Vivek Ramachandran, Rob Allen, Jason Mical, Alex Pinto, Lori Robinson - ESW #405

Paul's Security Weekly TV

Play Episode Listen Later May 4, 2025 102:44


Now in its 18th year, the Verizon Business DBIR is one of the industry's longest standing and leading reports on the current cybersecurity landscape. This year's report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among many other findings. Segment Resources: - https://www.verizon.com/about/news/2025-data-breach-investigations-report - https://www.verizon.com/business/resources/reports/dbir This segment is sponsored by Verizon Business! To read the full Verizon Business 2025 Data Breach Investigations Report, please visit https://securityweekly.com/verizonrsac. Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint. Yet, despite the exponential growth of browser-native attacks, traditional security solutions continue to focus on endpoint and network, leaving a large gaping hole when it comes to browser security. SquareX has started the Year of Browser Bugs (YOBB), a yearlong initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors - the browser. Learn more about SquareX's Browser Detection and Response solution at https://securityweekly.com/squarexrsac Last Mile Reassembly Attacks: https://www.sqrx.com/lastmilereassemblyattacks Polymorphic Extensions technical blog: https://labs.sqrx.com/polymorphic-extensions-dd2310006e04 There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management, and other advanced security tools tailored to bridge the gap between endpoint and cloud protection. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them! Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with Detecteam's autonomic detection lifecycle platform to continuously validate and improve detection capabilities based on real-world attack scenarios. Solution demo: https://www.devo.com/interactive-demos/devo-detecteam-engineering-confidence-in-threat-detection/ This segment is sponsored by Devo . Visit https://securityweekly.com/devorsac to learn more about them! While the value of identity security remains largely untapped, SailPoint's latest Horizons of Identity Security report reveals that organizations with mature identity programs can bend their identity security-to-value curve and recognize disproportionately higher returns. These programs unlock new value pools and can help address emerging challenges, such as securing machine and AI agent identities. The 2024-25 Horizons of Identity Security report: https://www.sailpoint.com/identity-library/horizons-identity-security-3 Take the identity security maturity assessment: https://www.sailpoint.com/identity-security-adoption Learn more about SailPoint's Customer Experience Portfolio: https://www.sailpoint.com/customer-success/customer-experience-portfolio This segment is sponsored by SailPoint. Visit https://securityweekly.com/sailpointrsac to learn more about them! Identity has long been the soft underbelly of cybersecurity—but with AI, non-human identities (NHIs), and autonomous agents on the rise, it's now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren't just hacking systems anymore—they're hijacking identities to slip through the cracks and move undetected in systems. For too long, identity security was treated as interchangeable with IAM—but that mindset is exactly what left critical gaps exposed. Listen to our interview with Hed Kovetz as he unpacks why identity has become today's most urgent battleground in cyber. He'll what you can do about it with an identity security playbook that gives you the upper hand. https://resources.silverfort.com/identity-security-playbook/home https://www.silverfort.com/blog/shining-the-spotlight-on-the-rising-risks-of-non-human-identities/ This segment is sponsored by Silverfort. Visit https://securityweekly.com/silverfortrsac to learn more about Silverfort's IDEAL approach to identity security! Show Notes: https://securityweekly.com/esw-405

Federal Drive with Tom Temin
Navy's unified endpoint initiative finally comes for sailors' devices

Federal Drive with Tom Temin

Play Episode Listen Later May 1, 2025 6:58


The Navy has spent the last several years standing up technical solutions and designating them as intended for use across the fleet. Officials say the next step is extending that approach to the end point devices that sailors use every day, both ashore and afloat. For more on the unified endpoint initiative, Federal News Network's Jared Serbu talked with the Navy's Justin Finelli, Brandon Weller and Matthew Rambo.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Packet Pushers - Full Podcast Feed
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Apr 28, 2025 24:10


Take a Network Break! We start with a Red Alert for SAP NetWeaver's Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »

Packet Pushers - Network Break
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs

Packet Pushers - Network Break

Play Episode Listen Later Apr 28, 2025 24:10


Take a Network Break! We start with a Red Alert for SAP NetWeaver's Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »

Packet Pushers - Fat Pipe
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs

Packet Pushers - Fat Pipe

Play Episode Listen Later Apr 28, 2025 24:10


Take a Network Break! We start with a Red Alert for SAP NetWeaver's Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »

Check Point CheckMates Cyber Security Podcast
S07E05: Harmony Endpoint E88.70

Check Point CheckMates Cyber Security Podcast

Play Episode Listen Later Apr 18, 2025 13:28


Product Manager Bar Yassure discusses what we did to improve performance and stability in the E88.70 release of Harmony Endpoint.

MPR Weekly Dose
MPR Weekly Dose Podcast #233 — Pfizer ends development of weight loss drug; counterfeit Ozempic seized; daily pill demonstrates HbA1c reductions; mavacamten misses trial endpoint; smart belt to reduce fall injury

MPR Weekly Dose

Play Episode Listen Later Apr 18, 2025 12:36


Pfizer ends danuglipron clinical program for obesity; FDA warns about counterfeit Ozempic; daily pill shows promise in reducing HbA1c; mavacamten misses in nonobstructive HCM trial and the FDA clears smart belt device reduce fall injury.

Blue Security
Side-by-Side with Third-Party Products

Blue Security

Play Episode Listen Later Apr 15, 2025 40:32


SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the integration of Microsoft Security Solutions with third-party security tools. They explore how organizations can leverage Microsoft Defender for Endpoint, Defender for Office, Entra, Intune, and Cloud Access Security Broker solutions to enhance their security posture. The conversation emphasizes the importance of utilizing existing tools to gain additional insights and telemetry, ensuring a more robust security framework without conflicts or performance degradation.----------------------------------------------------YouTube Video Link: https://youtu.be/kE2cVwjPzYs----------------------------------------------------Documentation:https://learn.microsoft.com/en-us/defender-endpoint/microsoft-defender-antivirus-compatibilityhttps://learn.microsoft.com/en-us/intune/intune-service/protect/device-compliance-partners#supported-device-compliance-partnershttps://learn.microsoft.com/en-us/defender-cloud-apps/zscaler-integrationhttps://learn.microsoft.com/en-us/defender-cloud-apps/additional-integrations----------------------------------------------------Contact Us:Website: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/company/bluesecpodYouTube:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/andyjaw/Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠andy@bluesecuritypod.com⁠----------------------------------------------------Adam BrewerTwitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/ajbrewerLinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/adamjbrewer/Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠adam@bluesecuritypod.com

Paul's Security Weekly
What is old is new again: default deny on the endpoint - Colby DeRodeff, Danny Jenkins - ESW #402

Paul's Security Weekly

Play Episode Listen Later Apr 14, 2025 123:21


Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred firewall rules at most. The idea of implementing default deny principles elsewhere were attempted, but without much success. Internal networks (NAC), and endpoints (application control 1.0) were too dynamic for the default deny approach to be feasible. Vendors built solutions, and enterprises tried to implement them, but most gave up. Default deny is still an ideal approach to protecting assets and data against attacks - what it needed was a better approach. An approach that could be implemented at scale, with less overhead. This is what we'll be talking to Threatlocker's CEO and co-founder, Danny Jenkins, about on this episode. They seemed to have cracked the code here and are eager to share how they did it. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! We wanted security data? We got it! Now, what the heck do we DO with all of it? The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we're seeing companies like Abstract Security pop up to address some of these challenges. Abstract just released a comprehensive eBook on security data strategy, linked below, and you don't even need to give up an email address to read it! In this interview, we'll talk through some of the highlights: Challenges Myths Pillars of a data security strategy Understanding the tools available Segment Resources A Leader's Guide to Security Data Strategy eBook In the enterprise security news, new startup funding what happened to the cybersecurity skills shortage? tools for playing with local GenAI models CVE assignment drama a SIEM-agnostic approach to detection engineering pitch for charity a lost dog that doesn't want to be found All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-402

Enterprise Security Weekly (Audio)
What is old is new again: default deny on the endpoint - Colby DeRodeff, Danny Jenkins - ESW #402

Enterprise Security Weekly (Audio)

Play Episode Listen Later Apr 14, 2025 123:21


Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred firewall rules at most. The idea of implementing default deny principles elsewhere were attempted, but without much success. Internal networks (NAC), and endpoints (application control 1.0) were too dynamic for the default deny approach to be feasible. Vendors built solutions, and enterprises tried to implement them, but most gave up. Default deny is still an ideal approach to protecting assets and data against attacks - what it needed was a better approach. An approach that could be implemented at scale, with less overhead. This is what we'll be talking to Threatlocker's CEO and co-founder, Danny Jenkins, about on this episode. They seemed to have cracked the code here and are eager to share how they did it. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! We wanted security data? We got it! Now, what the heck do we DO with all of it? The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we're seeing companies like Abstract Security pop up to address some of these challenges. Abstract just released a comprehensive eBook on security data strategy, linked below, and you don't even need to give up an email address to read it! In this interview, we'll talk through some of the highlights: Challenges Myths Pillars of a data security strategy Understanding the tools available Segment Resources A Leader's Guide to Security Data Strategy eBook In the enterprise security news, new startup funding what happened to the cybersecurity skills shortage? tools for playing with local GenAI models CVE assignment drama a SIEM-agnostic approach to detection engineering pitch for charity a lost dog that doesn't want to be found All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-402

Paul's Security Weekly TV
What is old is new again: default deny on the endpoint - Danny Jenkins - ESW #402

Paul's Security Weekly TV

Play Episode Listen Later Apr 14, 2025 36:20


Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred firewall rules at most. The idea of implementing default deny principles elsewhere were attempted, but without much success. Internal networks (NAC), and endpoints (application control 1.0) were too dynamic for the default deny approach to be feasible. Vendors built solutions, and enterprises tried to implement them, but most gave up. Default deny is still an ideal approach to protecting assets and data against attacks - what it needed was a better approach. An approach that could be implemented at scale, with less overhead. This is what we'll be talking to Threatlocker's CEO and co-founder, Danny Jenkins, about on this episode. They seemed to have cracked the code here and are eager to share how they did it. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweekly.com/esw-402

The Tech Blog Writer Podcast
3222: IGEL CEO Klaus Oestermann on Rewriting the Rules of Endpoint Computing

The Tech Blog Writer Podcast

Play Episode Listen Later Mar 27, 2025 23:55


What does it really take to reimagine the future of endpoint computing? In this special episode recorded live from IGEL's Now and Next 2025 event in Miami, I sit down with Klaus Oestermann, CEO of IGEL, to explore how cybersecurity, digital workspaces, and user experience are being transformed at the edge. Klaus is no stranger to innovation, having spent decades in high-assurance security across critical industries, and now leading IGEL's mission to simplify, secure, and modernize how enterprises manage endpoints. Our conversation starts by unpacking the shift from traditional perimeter-based security models to a new way of thinking rooted in prevention. Klaus explains how IGEL's Preventative Security Model addresses modern threats by dramatically reducing the attack surface at the endpoint and flipping the conversation from detection and response to control and containment. With more organizations relying on hybrid work and SaaS-based applications, the endpoint has never been more critical—or more vulnerable. Klaus also outlines how IGEL OS is supporting everything from virtual desktop infrastructure to secure browsing, while enabling consistent user experiences across cloud, on-prem, and edge environments. But this episode isn't just about technology. It's about strategy. Klaus shares how IGEL is creating meaningful impact by extending device life cycles, cutting hardware replacement costs, and supporting sustainability goals. With Windows 11 upgrades looming and endpoint refresh cycles under pressure, IGEL presents a compelling alternative that balances performance with responsibility. We also dive into the role of AI, how it's reshaping device requirements, and what it means for endpoint security moving forward. And as IGEL expands its ecosystem and reveals over 20 new announcements at this year's event, Klaus offers a candid look into what's resonating with customers—and where the industry is headed next. So what will define your endpoint strategy in 2025? And is your organization ready to lead from the edge?

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday Feb 21st: Kibana Queries; Mongoose Injection; U-Boot Flaws; Unifi Protect Camera Vulnerabilities; Protecting Network Devices as Endpoint (Austin Clark @sans_edu)

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Feb 21, 2025 12:29


Using ES|QL In Kibana to Query DShield Honeypot Logs Using the "Elastic Search Piped Query Language" to query DShield honeypot logs https://isc.sans.edu/diary/Using%20ES%7CQL%20in%20Kibana%20to%20Queries%20DShield%20Honeypot%20Logs/31704 Mongoose Flaws Put MongoDB at risk The Object Direct Mapping library Mongoose suffers from an injection vulnerability leading to the potenitial of remote code exeuction in MongoDB https://www.theregister.com/2025/02/20/mongoose_flaws_mongodb/ U-Boot Vulnerabilities The open source boot loader U-Boot does suffer from a number of issues allowing the bypass of its integrity checks. This may lead to the execution of malicious code on boot. https://www.openwall.com/lists/oss-security/2025/02/17/2 Unifi Protect Camera Update https://community.ui.com/releases/Security-Advisory-Bulletin-046-046/9649ea8f-93db-4713-a875-c3fd7614943f