Podcasts about Endpoint

  • 356PODCASTS
  • 711EPISODES
  • 37mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Dec 10, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Endpoint

Latest podcast episodes about Endpoint

The New Warehouse Podcast
Amazon FBA Prep Services: A High-Velocity Approach from ZonPrep

The New Warehouse Podcast

Play Episode Listen Later Dec 10, 2025 30:54


In this episode of The New Warehouse Podcast, Kevin chats with Kayvon Nazarian, CEO and Founder of ZonPrep. Together, they explore how Amazon FBA Prep Services are evolving, and why sellers need specialized partners. Nazarian began as a seller, giving him a firsthand view of Amazon's rapid operational shifts. ZonPrep now supports brands with kitting, bundling, labeling, and inbound consolidation tailored to Amazon's strict requirements. As Amazon phases out internal prep options, sellers must rethink how they manage compliance, routing, and speed. This conversation shows how ZonPrep's high-velocity model helps brands adapt and why infrastructure built for fast processing is becoming essential for modern growth.Learn more about Brecham Group here. Learn more about Endpoint and give Gary a break here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
Warehouse Fulfillment Strategy for a Changing Consumer Landscape

The New Warehouse Podcast

Play Episode Listen Later Dec 8, 2025 43:40


Kevin chats with John McClymont, Founder of Operational Innovations, about how shifting consumer expectations and delivery realities are reshaping warehouse fulfillment strategy today. John brings deep experience across e-commerce, DTC, and final-mile logistics, giving listeners a practical look at where warehouse operations need to evolve and why. He explains how fulfillment success increasingly depends on reliability, density, carrier mix, and the experience customers have from checkout to doorstep. Throughout the conversation, John breaks down how inconsistent carriers, messy data, and rising expectations influence every operational decision. His insights help operators rethink the role their warehouses play in brand experience and customer retention, especially as fast delivery is expected rather than exceptional.Learn more about Brecham Group here. Learn more about Endpoint and give Gary a break here. Follow us on LinkedIn and YouTube.Support the show

Microsoft Cloud IT Pro Podcast
Episode 416 – Microsoft Sentinel, Security, and Ignite with Henrik Wojcik

Microsoft Cloud IT Pro Podcast

Play Episode Listen Later Dec 4, 2025 32:38 Transcription Available


Welcome to Episode 416 of the Microsoft Cloud IT Pro Podcast. In this week’s episode, Ben finally has a chance to sit down with Henrik Wojcik. Henrik has been a long-time listener as well as a fellow Microsoft MVP in Security and we finally had the chance to sit down and record an episode together, something we’ve talked about doing for years. As they sit down and enjoy a sunny afternoon in at Microsoft Ignite in San Francisco they discuss security in the financial sector, EU regulations (N2 and DORA), integrating Data Lake with Sentinel, optimizing log analytics, and the latest on Security Copilot and E5 licensing. They also spend some time chatting about some of their conference highlights, assisting as proctors in the hands-on labs, and the unique experience of Ignite in San Francisco. Your support makes this show possible! Please consider becoming a premium member for access to live shows and more. Check out our membership options. Show Notes Microsoft Ignite (with sessions on demand) Microsoft Ignite Book of News Catch up on Microsoft Security sessions and announcements from Ignite 2025 Microsoft Sentinel benefit for Microsoft 365 E5, A5, F5, and G5 customers Learn about Security Copilot inclusion in Microsoft 365 E5 subscription Microsoft Sentinel data lake: Unify signals, cut costs, and power agentic AI What is Microsoft Sentinel data lake? KQL and the Microsoft Sentinel data lake Henrik F. Wojcik Henrik has worked in the IT industry since 2003. He’s always had a passion for learning new technologies and expanding his knowledge through various means such as online courses, webinars, and reading up on the latest developments in the industry. Throughout his career, he’s gained experience in various areas of IT, making him a true jack of all trades. However, his latest interests lie in the security space, modern workplace and management in Azure, with a particular focus on cyber security. He has experience working with products such as Defender for Endpoint, Defender for Identity, Defender for Cloud Apps, Defender for Office 365, Conditional Access, Microsoft Sentinel, and Microsof t Entra ID. His primary focus is on security on Azure workloads and identity (Entra ID). He prioritizes security awareness and believe that learning never stops, which is why He’s always eager to expand my knowledge and skillset. In the past, He’s also worked with various tools and technologies such as Cisco, Citrix, Dynamics AX, Exchange, ITIL, Azure, SCCM & SCOM, Scrum & Kanban, VMware, Windows Servers, and Windows Desktops. About the sponsors Would you like to become the irreplaceable Microsoft 365 resource for your organization? Let us know!

The New Warehouse Podcast
Navigating Legal Risks in Warehousing

The New Warehouse Podcast

Play Episode Listen Later Dec 3, 2025 38:17


Kevin chats with attorneys Faith Miros and Mark Wendaur of Offit Kurman to break down the legal realities shaping warehouse and logistics operations today. Offit Kurman is a national full-service law firm with more than 300 attorneys advising business owners across the full lifecycle of their organizations. In the warehouse sector, Faith focuses on real estate, zoning, environmental compliance, and industrial leasing. Meanwhile, Mark concentrates on transactional work, contracts, financing, and governance. Together, they unpack how operators can protect themselves from legal risks in warehousing. Their insights reveal how legal strategy increasingly influences location decisions, customer relationships, and the long-term stability of warehousing operations.Learn more about Brecham Group here. Learn more about Endpoint and give Gary a break here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
Modernizing Warehouse SOP Execution with Smart Access

The New Warehouse Podcast

Play Episode Listen Later Dec 1, 2025 40:10


Is your warehouse SOP doing what you need it to? Kevin chats with Tim Regnier, CEO and Founder of Smart Access, about how warehouses can revive their SOPs. Oftentimes, standard operating procedures get written, approved, stored, and then forgotten or remain misunderstood. In this episode, Tim explains how Smart Access turns warehouse SOP into a living system. The platform guides training, boosts accuracy, and improves productivity. It uses AI-driven observations, automated skill-building, and the new Ops Navigator intelligence layer. The conversation shows how operations can finally align leadership expectations with real work on the floor.Learn more about Brecham Group here. Learn more about Endpoint and give Gary a break here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
Warehouse Talent Recruitment and the Rise of Human-Centered Leadership

The New Warehouse Podcast

Play Episode Listen Later Nov 26, 2025 37:56


When it comes to warehouse talent recruitment, few understand the shifting dynamics better than Charlie Saffro, CEO and Founder of CS Recruiting. In this episode of The New Warehouse Podcast, Kevin chats with Charlie about warehouse hiring trends, logistics recruiting, and how culture-driven leadership shapes retention. With 15 years of experience matching supply chain talent to employers across North America, Charlie shares her perspective on the changing labor landscape. Her insights reveal that the future of supply chain talent acquisition depends as much on human connection as it does on technology.Learn more about Brecham Group here. Learn more about Endpoint and give Gary a break here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
Warehouse Improvement Through Smarter Project Management

The New Warehouse Podcast

Play Episode Listen Later Nov 24, 2025 45:29


In this episode of The New Warehouse Podcast, Kevin chats with Paul Lukehart, Managing Principal of PL Programs, a consultancy specializing in warehouse startup project management and operational improvement. Paul draws from his background in the military, as well as his experience at Target, Amazon, and XPO Logistics. He shares how his hands-on experience shaped his approach to warehouse improvement—especially when launching new facilities, integrating technology, or navigating complex site moves. From startup lessons to leadership insights, Paul offers a grounded perspective on what it takes to make warehouse operations run more efficiently.Learn more about Brecham Group here. Learn more about Endpoint and give Gary a break here. Follow us on LinkedIn and YouTube.Support the show

The Tech Blog Writer Podcast
3494: The Fastest Way to Recover Endpoint Devices During an IT Outage

The Tech Blog Writer Podcast

Play Episode Listen Later Nov 21, 2025 26:58


Why do entire organisations invest millions building resilient data centres yet leave their endpoints exposed to outages that can last days? That question kept coming back to me during my conversation with James Millington of IGEL at the Now and Next event, because it highlights a gap that most IT leaders still underestimate. James walked me through the reality he sees every day. Companies have high availability strategies for their servers, cloud platforms, and networks, yet the devices workers rely on remain the weakest point. When ransomware or system failure hits, the response often involves scrambling for spare laptops, calling suppliers, and hoping inventory exists. As James pointed out in our chat, many firms quietly rely on a handful of unused machines sitting in a cupboard. That approach might have worked a decade ago, but today's threat landscape exposes every delay. Our discussion centred on IGEL's dual boot approach, a fresh way to recover access within minutes by placing IGEL OS alongside Windows on the same device. Instead of waiting hours or even weeks to rebuild machines, organisations can simply switch to a secure environment that restores access to cloud apps, collaboration tools, and virtual desktops. James shared stories of analysts admitting no comparable solution exists, and of customers having light bulb moments as they calculated the true cost of endpoint recovery. The theme running underneath it all was simple. You cannot coordinate your crisis response unless your people have a working device in their hands. Everything else depends on that. This episode also reflects a wider shift in how organisations think about resilience. Leaders are beginning to question old assumptions about failover, preparation, and what it takes to keep people productive when attacks or outages strike. The conversations I heard throughout Now and Next showed that businesses are realising the endpoint is no longer a peripheral concern. It is the gateway to every service that keeps a company running. When that gateway fails, everything slows. James also shared lighter moments from his journey. His career began as a DJ, something he has circled back to at IGEL events, and it was fascinating hearing how skills from that era still show up in his approach to communication and timing. It reminded me how varied experiences shape the leaders driving today's conversations around security, SaaS evolution, Zero Trust, and the growing overlap between IT and operational technology. So here is my question for you. As cyber risks rise and downtime becomes harder to tolerate, how ready do you feel for the disruption that begins at the endpoint? I would love to hear your thoughts. Tech Talks Daily is Sponsored by NordLayer: Get the exclusive Black Friday offer: 28% off NordLayer yearly plans with the coupon code: techdaily-28. Valid until December 10th, 2025. Try it risk-free with a 14-day money-back guarantee.

The Tech Blog Writer Podcast
3492: How Mammoth Enterprise AI Browser Redefines Security at the Endpoint

The Tech Blog Writer Podcast

Play Episode Listen Later Nov 19, 2025 26:41


Have you ever wondered what happens when the browser stops being a simple window to the web and starts becoming the control point for how AI touches every part of enterprise life? That was the starting point for my conversation with Michael Shieh, founder and CEO of Mammoth Cyber. What followed was a detailed look at why the browser is turning into the foundation of enterprise AI and why the shift is arriving faster than many expect. Michael shared why employees already spend most of their working lives inside a browser and how this makes it the natural place for AI to support decisions, speed up routine work, and act as the interface between people, applications, and data. But we also spoke about the uncomfortable reality behind that convenience.  When consumer AI browsers rush ahead with features that harvest data or request wide-reaching permissions, the trade off between speed and governance becomes harder to ignore. Michael explained how this gap leaves security teams unable to see where sensitive data is being sent or how shadow AI creeps into daily workflows without oversight. During our conversation he broke down what makes an enterprise AI browser different. We talked about policy controlled access, device trust, identity federation, and the safeguards that protect AI from hazards like indirect prompt injection. Michael also described how the Mammoth team built a multi layer security model that monitors what the AI can view, what it cannot view, and how data moves across applications in real time. His examples of DLP at the point of use, low friction controls for workers, and granular visibility for security teams showed how the browser is becoming the new enforcement boundary for zero trust. We also covered the growing tension between traditional access models like VPNs or VDI and the faster, lightweight deployment Mammoth is offering to large enterprises. Hearing Michael explain how some customers replaced heavy remote access stacks in weeks made it clear that this is more than a new product category. It hints at an early move toward AI shaped workflows running directly at the endpoint rather than through centralised infrastructure. As he looked ahead to the next few years, Michael shared why he expects the browser to operate as a kind of operating system for enterprise AI, blending native AI agents, web apps, and policy controls into a single environment. This episode raises an important question. If the browser becomes the place where AI reads, writes, and interprets information, how should enterprises think about identity, trust, and control when the pace of AI adoption accelerates again next year? I would love to hear your thoughts.

The New Warehouse Podcast
Connecting Warehouse Systems With Trackstar

The New Warehouse Podcast

Play Episode Listen Later Nov 19, 2025 34:56


When it comes to connecting warehouse systems, few companies are tackling the challenge as directly as TrackStar. In this episode of The New Warehouse Podcast, Kevin chats with Jeremy Schneck and Daniel Langer, Co-Founders of TrackStar, about how they're simplifying integrations across the fragmented WMS landscape. The discussion explores TrackStar's journey from a startup pivot to a Y Combinator-backed company, the growing role of APIs in supply chain connectivity, and how universal APIs are driving the next wave of warehouse innovation.Learn more about Endpoint and give Gary a break here. Get your free ID Label sample right here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
Warehouse Network Optimization: A Holistic Approach with The Beacon Group

The New Warehouse Podcast

Play Episode Listen Later Nov 17, 2025 37:03


When it comes to optimizing warehouse operations, few companies offer a truly end-to-end solution. In this episode of The New Warehouse Podcast, Kevin chats with Bob Hutson, Senior Vice President of Supply Chain and Real Estate at The Beacon Group, about how his team guides clients through the process from concept to implementation. The discussion highlights how The Beacon Group integrates real estate, technology, and financial modeling to help companies make smarter, faster decisions. As Hutson explains, warehouse network optimization requires foresight and alignment between operations and finance.Learn more about Endpoint and give Gary a break here. Get your free ID Label sample right here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
How Does 3PL Pricing Work?

The New Warehouse Podcast

Play Episode Listen Later Nov 14, 2025 65:29


What really goes into a 3PL quote? Does it ever feel like the final number comes out of thin air?For e-commerce brands and 3PL providers alike, fulfillment pricing can be a complex web. With no industry-wide standard and costs broken into multiple categories, understanding how a proposal is built is critical for a successful partnership.In this previously live session, Kevin was joined by a multi-disciplinary team from Barrett Distribution Centers to pull back the curtain. They went beyond a simple sales pitch to show you how multiple parts of a 3PL organization collaborate to develop pricing that creates a win-win for both the client and the provider.This is a rare opportunity to see how a price is constructed from the ground up and to understand the "why" behind every line item.Learn more about Endpoint and give Gary a break here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
Warehouse Digital Transformation: Bridging ERP and the Warehouse Floor

The New Warehouse Podcast

Play Episode Listen Later Nov 12, 2025 44:56


In this episode of The New Warehouse Podcast, Kevin chats with Kurt Heusner, CEO of Endpoint Automation Solutions, about how mid-market warehouses can modernize through digital transformation. Endpoint Automation Solutions helps companies bridge the gap between their ERP systems and the realities of warehouse operations. Kurt explains how modular, human-centered automation empowers smaller operators to stay competitive, improve visibility, and scale intelligently without overwhelming their teams or budgets. Together, they explore warehouse digital transformation for mid-market companies—balancing technology with people, outcomes, and agility.Learn more about Endpoint and give Gary a break here. Follow us on LinkedIn and YouTube.Support the show

The Tech Blog Writer Podcast
3482: IGEL CEO Klaus Oestermann on Why the Endpoint Is the Forgotten Link in Cybersecurity

The Tech Blog Writer Podcast

Play Episode Listen Later Nov 11, 2025 28:02


What if the real weakness in enterprise cybersecurity isn't the cloud or the network, but the endpoint sitting on every desk? In this episode, Klaus Oestermann, CEO of IGEL Technology, joins me at the Now and Next event in Frankfurt to discuss why he calls the endpoint the forgotten link in digital transformation. Klaus explains how decades of detect and mitigate thinking have left enterprises vulnerable, and why it is time to move toward a prevention-first security model that stops attacks before they start. He shares how IGEL's dual boot architecture allows organizations to recover thousands of devices in minutes, and why prevention-first design can deliver measurable ROI with an average 62 percent reduction in endpoint IT costs and more than 900,000 dollars in annual savings. During our conversation, Klaus also reflects on the surge in ransomware across critical sectors and why governments and enterprises alike are rethinking their endpoint strategies. He talks about how IGEL has become an essential part of modern Zero Trust frameworks, protecting sectors like healthcare, manufacturing, and public services, while partnering with leading technology providers to build stronger, integrated defenses. We also explore how those savings can be reinvested into Zero Trust, AI innovation, and new layers of defense, as well as how IGEL is helping secure critical national sectors from healthcare to manufacturing. From Audi's factory floors to government agencies, Klaus outlines a future where resilience begins at the endpoint, not the data center. Do you think enterprises are ready to make that shift? I would love to hear your thoughts after the episode. Useful Links Connect with Klaus Oestermann on LinkedIn Learn more about IGEL Follow on LinkedIn, Twitter and YouTube Tech Talks Daily is Sponsored by NordLayer: Get the exclusive Black Friday offer: 28% off NordLayer yearly plans with the coupon code: techdaily-28. Valid until December 10th, 2025. Try it risk-free with a 14-day money-back guarantee.

The New Warehouse Podcast
Operational Turnarounds in Warehousing: Making Operations Suck Less

The New Warehouse Podcast

Play Episode Listen Later Nov 10, 2025 37:35


When it comes to improving warehouse performance, Chris Hamley, Managing Partner of The Brecham Group, believes in keeping things simple: make operations suck less. In this episode of The New Warehouse Podcast, Kevin chats with both Chris Hamley and Pete Allen, a returning guest and now one of the newest members of The Brecham Group. Together, they explore what that mantra truly means and how it shapes the firm's approach to operational turnarounds in warehousing. This episode blends real-world lessons, cultural insight, and practical advice from two leaders who have spent their careers on the warehouse floor.Learn more about Endpoint and give Gary a break here. Learn more about The Brecham Group here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
Warehouse Technology Trends for 2026

The New Warehouse Podcast

Play Episode Listen Later Nov 7, 2025 65:49


The warehouse of today is already transforming, but what will it truly look like in 2026? We are moving beyond isolated automation to a fully integrated, intelligent ecosystem. This is where AI-driven robotics, augmented-reality workflows, and hyper-flexible software converge to create a warehouse that is not just faster, but more predictive, accurate, and resilient than ever before.Tune in for a panel discussion with leaders from Addverb, Snapfulfil, Centric Packaging, and Vuzix. We'll cut through the hype to reveal the practical technologies shaping the next wave of warehouse efficiency. See them all at the upcoming Element Logic Tradeshow in NJ on 11/13!Learn more about Endpoint and give Gary a break here. Learn more about The Brecham Group here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
Cartonization and the Rise of the Packing Control System

The New Warehouse Podcast

Play Episode Listen Later Nov 5, 2025 36:08


When most people think about warehouse efficiency, they picture automation, robotics, or faster picking speeds. But for James Malley, Co-founder and CEO of Paccurate, the real opportunity lies in something far less flashy—how we pack boxes. In this episode, Kevin chats with James about Paccurate's milestone of processing one billion packs and how the company is redefining packaging optimization through cartonization.What began as a side project tackling dimensional weight challenges has evolved into a new layer of warehouse intelligence: the Packing Control System (PCS). As James explains, sometimes the smallest adjustments have the biggest ripple effects.Learn more about Endpoint and give Gary a break here. Learn more about The Brecham Group here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
EP 639: Expert Supply Chain Advice from “Legend” Rick McDonald

The New Warehouse Podcast

Play Episode Listen Later Nov 3, 2025 42:23


Kevin chats with Rick McDonald, CEO and Founder of Rick McDonald Supply Chain Advisory, who spent over three decades at Clorox, including four years as Chief Supply Chain Officer. Drawing from his deep experience leading transformation across manufacturing, procurement, and logistics, Rick shares supply chain advice on how the industry evolved from grease pencils and overhead projectors to digital roadmaps, AI-driven planning, and consumer-obsessed supply chains. The conversation touches on leadership, change management, and what the future of warehousing will look like as technology and people continue to adapt.Learn more about Endpoint and give Gary a break here. Learn more about The Brecham Group here. Follow us on LinkedIn and YouTube.Support the show

The New Warehouse Podcast
The Peak Season Countdown: Making Sure You're All Systems Go

The New Warehouse Podcast

Play Episode Listen Later Oct 31, 2025 56:37


With Black Friday just weeks away, the window for final peak season preparation is closing. Are your operations and your systems truly ready for the surge?Join your host, Kevin, for a crucial live discussion with Brian Kirst of Snapfulfil. Drawing on his unique dual experience as both a WMS expert and a former 3PL owner, Brian offers battle-tested strategies from both sides of the operation.In this session, you will discover:The Operator's Playbook: Go beyond theory with practical, on-the-floor tips Brian used to navigate high-volume seasons in his own 3PL.The Pre-Peak Systems Audit: Uncover the critical checks you need to run on your system now to prevent crashes and costly "hiccups" on your busiest days.Fortifying Your Fulfillment Engine: Learn how to align your people, processes, and technology to ensure your operation can handle the pressure without breaking.This is a must-attend event for 3PL owners, warehouse managers, and operations leaders. Bring your questions for a live Q&A!Learn more about Snapfulfil here: https://snapfulfil.com/Learn more about Endpoint and give Gary a break here. Learn more about The Brecham Group here. Follow us on LinkedIn and YouTube.Support the show

The Cybersecurity Defenders Podcast
#259 - Defender Fridays: Breaking Down Microsoft Defender for Endpoint with Ken Westin from LimaCharlie

The Cybersecurity Defenders Podcast

Play Episode Listen Later Oct 24, 2025 33:46


Ken, Senior Solutions Engineer at LimaCharlie, dives into the incredibly confusing licensing tiers, pricing models and feature sets for Microsoft Defender for Endpoint. Today we discuss: The difference between tiersWays to solve Defender visibility issues and increase operational transparencyHow its capabilities can be customized and expanded for better flexibility and scalability for service providersJoin the Defender Fridays community, live every Friday, to discuss the dynamic world of information security in a collaborative space with seasoned professionals.A big picture thinker, Ken ferrets out trends, seeking to understand what happens when businesses are breached and the methods behind the attacks. Then he figures out how to protect customers before they're hit.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastruture for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.

Conversations in Drug Development
Navigating the FDA Landscape: More Changes, and What's Next?

Conversations in Drug Development

Play Episode Listen Later Oct 23, 2025 26:40 Transcription Available


In this episode, Eric Hardter and guest Kelsey Lenoch discuss recent US FDA developments, including leadership changes at CBER and CDER, staffing impacts on orphan product reviews, and the new Rare Disease Evidence Principles aimed at accelerating approvals for rare and ultra-rare conditions. They also explore evolving trial endpoints in oncology (including surrogate measures and ctDNA), transparency moves such as the public release of Complete Response Letters and the industry's reactions, updates on the National Priority Voucher Program, and the FDA Pre-Check initiative to boost domestic drug manufacturing. Tune in for an in-depth discussion offering timely updates and expert perspectives on what may be ahead for drug development stakeholders.

XenTegra - IGEL Weekly
Closing the Endpoint Gap: Business Continuity and IGEL's Dual-Boot Solution

XenTegra - IGEL Weekly

Play Episode Listen Later Oct 15, 2025 31:14 Transcription Available


In this episode of IGEL Weekly, Andy Whiteside sits down with Chris Feeney from IGEL's Office of the CTO to explore a critical, often overlooked element of disaster recovery—endpoint resilience. They unpack how IGEL is addressing business continuity challenges with innovative solutions like IGEL Dual Boot and USB Recovery, enabling organizations to recover in minutes rather than days.Chris shares insights into the growing importance of securing endpoints amid rising ransomware threats and operational disruptions like the recent CrowdStrike incident. The conversation dives into:Why most organizations fail to plan for endpoint-level recoveryHow IGEL's dual-boot architecture bridges the gap between prevention and recoveryReal-world examples of minimizing downtime during breaches and outagesThe future of endpoint strategy as SaaS, browsers, and cloud PCs reshape IT infrastructureTune in to learn how IGEL is redefining endpoint continuity and setting a new standard for security and business resilience.

Embedded Executive
Embedded Executive: AI At the Endpoint | EMASS

Embedded Executive

Play Episode Listen Later Oct 8, 2025 11:56


AI at the endpoint gets yet another boost from EMASS, a fabless semiconductor company that recently emerged from stealth mode. Having your processing at the endpoint presents a few significant challenges, namely the amount of processing that can be made available and the ability to run from a battery. EMASS has come up with a way to do this a little differently from what's been done previously. They can attach their RISC-V processing element to any sensor, making the device an AI accelerator. It's a little difficult for me to put into words here, so check out this week's Embedded Executives podcast, where I spent some time with Mark Goranson, EMASS's CEO, who explains it in detail.

Sports & The World
Napheesa Collier On Point, QBs To Anoint, and Teams Who Are At An Endpoint

Sports & The World

Play Episode Listen Later Oct 3, 2025 45:22


In this week's episode, LaDarius recaps Week Four of the NFL and looks ahead to Week Five. Next, Minnesota Lynx star Napheesa Collier's comments on WNBA Commissioner Cathy Engelbert. Lastly, Brown's Big Bets, MLB Playoffs, and more! Follow LaDarius on Social Media:Twitter (X): ⁠⁠⁠⁠⁠⁠⁠@ladarius_brown⁠⁠⁠⁠⁠ ⁠⁠⁠⁠Instagram: ⁠⁠⁠⁠⁠⁠⁠@ladarius__brown⁠⁠⁠⁠⁠ ⁠⁠TikTok: ⁠⁠⁠⁠⁠⁠⁠@ladarius_brown

PolySécure Podcast
PME - Petit quiz PME ou que ce que vous avez toujours voulu savoir - Parce que... c'est l'épisode 0x637!

PolySécure Podcast

Play Episode Listen Later Oct 1, 2025 29:11


Parce que… c'est l'épisode 0x637! Shameless plug 12 au 17 octobre 2025 - Objective by the sea v8 14 et 15 octobre 2025 - ATT&CKcon 6.0 14 et 15 octobre 2025 - Forum inCyber Canada Code rabais de 30% - CA25KDUX92 4 et 5 novembre 2025 - FAIRCON 2025 8 et 9 novembre 2025 - DEATHcon 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2026 Description Ce troisième épisode d'une série consacrée aux PME prend la forme d'un quiz interactif entre Nicolas-Loïc Fortin et son invité Claude. L'objectif est d'aborder des questions fréquemment posées sur la cybersécurité et la protection des données, couvrant ainsi les angles qui n'ont peut-être pas été suffisamment explorés dans les épisodes précédents. Le retour sur investissement en cybersécurité La question du retour sur investissement en cybersécurité pour les PME n'appelle pas de réponse simple par oui ou non. La difficulté réside dans la mesure de ce retour, qui doit être proportionnel aux actifs à protéger. Les PME font face à des contraintes budgétaires importantes et doivent évaluer la menace réelle qui pèse sur elles. L'intervenant illustre cette problématique par une anecdote d'une compagnie de transport qui devait protéger ses remorques contre les vols utilisant de l'azote liquide pour briser les cadenas. De la même façon, en informatique, les attaquants cherchent à « faire éclater le cadenas » pour voler le contenu. Actuellement, la plus grande menace pour les PME provient des rançongiciels, qui visent toutes les organisations, du cabinet dentaire aux entreprises de toutes tailles. La stratégie de protection doit s'adapter au niveau d'information sensible détenue. Pour les entreprises sans données sensibles, de bonnes sauvegardes suffisent pour redémarrer après une attaque. Pour celles qui manipulent des informations personnelles, des mesures plus sophistiquées s'imposent. Heureusement, des solutions peu coûteuses existent, fournies par des spécialistes en PME. L'important est d'éviter les consultants de grande entreprise qui proposent des solutions disproportionnées et effrayantes, décourageant ainsi l'investissement en cybersécurité. Solutions à petit budget Contrairement aux idées reçues, la cybersécurité à petit budget est non seulement possible, mais peut être très efficace si elle est bien choisie. L'open source offre des solutions simples et accessibles. Avec l'accompagnement d'un expert, les PME peuvent trouver des solutions gratuites ou peu coûteuses adaptées à leurs besoins réels. La clé consiste à définir ce qui est précieux pour l'entreprise, que cette valeur soit intrinsèque ou imposée par la loi. Les informations personnelles doivent être protégées par obligation légale, tout comme les numéros de cartes de crédit pour les commerçants, en vertu d'obligations contractuelles. De nombreuses solutions de qualité professionnelle peuvent être déployées par des passionnés de cybersécurité qui connaissent bien les besoins des PME. Loi 25 versus cybersécurité La question de la priorité entre la conformité à la Loi 25 et la cybersécurité suscite des débats. L'intervenant privilégie la conformité légale, car les obligations contractuelles et réglementaires ont préséance dans tous les cas. Cependant, se conformer à la Loi 25 apporte des bénéfices directs pour la cybersécurité, notamment l'obligation de créer un inventaire des données, qui constitue un avantage considérable pour la protection des informations. L'ingénierie sociale : le maillon faible Concernant les attaques par ingénierie sociale, le contexte représente un facteur plus déterminant que l'humain lui-même. Tous les humains peuvent être victimes d'hameçonnage, indépendamment de leur niveau de compétence. Lorsque le contexte nous prédispose à répondre automatiquement, nos défenses naturelles s'abaissent et nous agissons comme des « zombies », suivant le processus attendu sans questionnement. L'intervenant partage son expérience personnelle d'avoir cliqué sur un lien d'hameçonnage de son propre employeur, soulignant l'importance du timing et du contexte. Des recherches montrent que les gens sont plus susceptibles de cliquer sur des liens malveillants en fin de journée. La vigilance doit être maintenue même dans des situations apparemment normales, bien que la fragilité humaine face au contexte rende cette tâche difficile. L'authentification multifacteur : un minimum évolutif L'authentification multifacteur (MFA) constitue désormais un standard minimum, popularisé par le télétravail pendant le confinement. Cependant, cette barrière de sécurité est déjà en train d'être dépassée par des attaquants créatifs. Le MFA par SMS, qui représentait un minimum viable pendant le confinement, n'est plus suffisant aujourd'hui. Le MFA par application ou par clé physique représente maintenant le minimum requis pour tous les services, particulièrement ceux liés à l'argent. L'intervenant raconte comment, pendant son jogging matinal, il a reçu une alerte de sa banque concernant une tentative d'accès. Bien que le SMS ne soit pas la meilleure forme de MFA, cette deuxième barrière l'a alerté que son mot de passe avait été compromis. Il a immédiatement changé ses identifiants et activé une clé physique pour renforcer la sécurité. Cette expérience souligne l'importance d'activer le MFA sur tous les services critiques : courriel, systèmes comptables comme Quickbooks, et tous les systèmes au cœur du fonctionnement de l'entreprise. Gestionnaires de mots de passe La question des voûtes de mots de passe suscite beaucoup d'émotions dans la communauté cybersécurité. Les puristes recommandent les gestionnaires de mots de passe, mais une analyse pragmatique s'impose. Un carnet de mots de passe dans le tiroir du bureau vaut mieux qu'une absence de protection ou qu'une voûte mal configurée que personne n'utilisera. L'important reste d'avoir des mots de passe différents partout et d'activer le MFA, car le mot de passe seul ne constitue plus une barrière suffisante. Les voûtes modernes facilitent grandement la gestion des mots de passe et intègrent les nouvelles tendances comme l'authentification sans mot de passe. Le modèle de menace doit être considéré : si les attaquants sont en Chine ou en Russie, le carnet dans le tiroir est relativement sûr. Si la menace provient d'employés internes, d'autres solutions s'imposent. Un mot de passe simple comme « soleil123 », même avec MFA, reste problématique car la première barrière est trop facilement franchissable. Antivirus et protection moderne Les antivirus classiques ne suffisent plus à protéger adéquatement contre les cyberattaques. Les solutions modernes, appelées antivirus de nouvelle génération ou EDR (détection et réponse sur les points terminaux), offrent des protections supplémentaires en détectant les comportements suspects plutôt que simplement les signatures de fichiers. Pour les PME, des solutions intégrées comme Microsoft Defender for Endpoint constituent un bon compromis. Il faut éviter les antivirus gratuits, mais utiliser plutôt les outils de sécurité inclus dans les licences existantes de Microsoft 365 ou Google Workspace. WiFi public : l'évolution de la sécurité La sécurité des réseaux WiFi publics a considérablement évolué. Contrairement aux anciennes pratiques, utiliser un WiFi public n'est plus dangereux pour la majorité des utilisateurs. Depuis environ cinq ans, Google n'indexe plus les sites sans chiffrement de base, forçant les entreprises à améliorer leur sécurité. Les services modernes comme Microsoft 365, Outlook et les banques chiffrent toutes les communications. Tant que l'appareil est à jour et qu'aucun message d'avertissement de certificat invalide n'apparaît, il n'y a aucun danger à utiliser un WiFi public pour des usages standard avec des services légitimes de grandes compagnies. Infections par simple visite de site Il est possible de s'infecter en visitant un site web sans cliquer sur quoi que ce soit. Les attaquants, qui travaillent sur ces méthodes à temps plein, sont très imaginatifs. La meilleure protection consiste à maintenir son navigateur constamment à jour. Les navigateurs comme Chrome, Edge et Brave se mettent à jour automatiquement à chaque redémarrage. Les attaquants ont évolué au-delà des sites louches en infectant des publicités sur des sites légitimes. Les antivirus de nouvelle génération peuvent bloquer certaines de ces menaces, mais la mise à jour régulière du navigateur reste la meilleure défense. Le rôle des dirigeants Les dirigeants de PME portent la responsabilité ultime de la protection des renseignements personnels selon la loi. Dans toute organisation, les décisions de cybersécurité doivent venir du sommet. Sans l'engagement du plus haut dirigeant, aucune énergie réelle ne sera investie dans la cybersécurité. Les dirigeants doivent porter le message de cybersécurité, allouer les ressources financières et humaines nécessaires, et favoriser une culture de protection des informations. Ils sont les seuls capables d'identifier ce qui est précieux dans l'entreprise : liste de clients, procédés de fabrication, propriété intellectuelle, ou tout autre avantage concurrentiel. Cette responsabilité s'étend au-delà des obligations légales pour protéger ce qui fait vraiment la différence de l'entreprise. Conclusion Ce podcast souligne l'importance de sensibiliser les PME à la cybersécurité, car elles constituent le tissu économique du Québec, du Canada et du monde entier. Chaque PME qui tombe sous une cyberattaque affecte l'ensemble de l'écosystème économique et social. La cybersécurité pour les PME doit être accessible, pragmatique et adaptée aux réalités budgétaires de ces organisations. Collaborateurs Nicolas-Loïc Fortin Claude Mercier Crédits Montage par Intrasecure inc Locaux réels par Intrasecure inc

Embedded Executive
Embedded Executive: Move AI to the Endpoint | Ambiq

Embedded Executive

Play Episode Listen Later Sep 24, 2025 13:37


AI is a technology that generally requires a significant amount of power and high compute performance. Hence, it's typically relegated to the Cloud or to an Edge-based computer.Performing AI at the endpoint has not been feasible for those reasons. With ambiq's Sub-threshold Power Optimized technology (SPOT), performing AI at the endpoint is a reality. And the doors/applications that it opens are extremely cool. Hear more about it in this week's Embedded Executives podcast, where I spoke to Ambiq's Vice President of AI, Carlos Morales. Note that Ambiq just recently released the latest version of neuralSPOT, which now includes key performance enhancements specific to the company's Apollo5 family, amongst other features, some of which are specific to AI development.

The New Scene
Repost - Episode 154: Rob Pennington of By The Grace of God / Jupiter Hearts

The New Scene

Play Episode Listen Later Aug 29, 2025 85:30


I'm reposting episodes that were taken down from Spotify. Keith sits down with Rob Pennington to discuss growing up and going to shows in Louisville, the history of Endpoint and By The Grace of God, touring the world, Rob's PhD and the work he does in Behavioral Science, Black Widows/Black Cross, Rob's latest band Jupiter Hearts and more.

MPR Weekly Dose
MPR Weekly Dose Podcast #247 — AAP Release Pediatric Immunization Schedule; Blood Pressure MGMT Guideline; Wegovy Approved for Noncirrhotic MASH; New Fibromyalgia Tx; Investigational Sickle Cell Tx Fails to Meet Endpoint

MPR Weekly Dose

Play Episode Listen Later Aug 21, 2025 18:12


The American Academy of Pediatrics release their own immunization schedule; The American Heart Association update 2017 guidelines for the prevention of high blood pressure; weight loss drug gains indication to treat noncirrhotic MASH; FDA approve a new fibromyalgia treatment; investigational SCD Tx to meet trial endpoint.

ITSPmagazine | Technology. Cybersecurity. Society
Event Recap: Kieran Human at Black Hat USA 2025 — ThreatLocker Unveils Configuration Defense, Achieves FedRAMP Status & More | Brand Story with ThreatLocker from Black Hat USA 2025

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 15, 2025 8:07


Event Recap: Kieran Human at Black Hat USA 2025 — ThreatLocker Unveils Configuration Defense, Achieves FedRAMP Status & MoreThreatLocker introduced DAC configuration monitoring and achieved FedRAMP certification at Black Hat 2025, strengthening zero trust capabilities while expanding government market access through practical security solutions.Zero trust security continues evolving beyond theoretical frameworks into practical business solutions, as demonstrated by ThreatLocker's latest announcements at Black Hat USA 2025. The company introduced Defense Against Configuration (DAC), a monitoring tool addressing a critical gap in zero trust implementations.Kieran Human, Special Projects Engineer at ThreatLocker, explained the challenge driving DAC's development. Organizations implementing zero trust often struggle with configuration management, potentially leaving systems vulnerable despite security investments. DAC monitors configurations continuously, alerting administrators to potential security issues and mapping findings to compliance frameworks including Essential 8.The tool addresses human factors in security implementation. Technical staff sometimes create overly permissive rules to minimize user complaints, compromising security posture. DAC provides weekly reports to executives, ensuring oversight of configuration decisions and maintaining security standards across the organization.ThreatLocker's approach distinguishes itself through "denied by default, allowed by exception" methodology, contrasting with traditional endpoint detection and response solutions that permit by default and block threats reactively. This fundamental difference requires careful implementation to avoid business disruption.The company's learning mode capabilities address deployment concerns. With over 10,000 built-in application profiles, ThreatLocker automates policy creation while learning organizational workflows. This reduces manual configuration requirements that previously made zero trust implementations tedious and time-intensive.FedRAMP certification represents another significant milestone, opening government sector opportunities. Federal compliance requirements previously excluded ThreatLocker from certain contracts, despite strong customer demand for their zero trust capabilities. This certification enables expansion into highly regulated environments requiring stringent security controls.Customer testimonials continue validating the approach. One user reported preventing three breaches after implementing ThreatLocker's zero trust solution, demonstrating measurable security improvements. Such feedback reinforces the practical value of properly implemented zero trust architecture.The balance between security and business functionality remains crucial. Organizations need security solutions that protect assets without hampering productivity. ThreatLocker's principle of least privilege implementation focuses on enabling business requirements with minimal necessary permissions rather than creating restrictive environments that impede operations.Human described working closely with CEO Danny Jenkins, emphasizing the collaborative environment that drives product innovation. His engineering perspective provides valuable insights into customer needs while maintaining focus on practical security solutions that work in real-world environments.As zero trust adoption accelerates across industries, tools like DAC become essential for maintaining security posture while meeting business demands. The combination of automated learning, configuration monitoring, and compliance mapping addresses practical implementation challenges facing security teams today.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Kieran Human, Special Project Engineer at ThreatLocker | On LinkedIn | https://www.linkedin.com/in/kieran-human-5495ab170/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

XenTegra - IGEL Weekly
Rethinking Endpoint Strategy: Inside IGEL's Preventive Security Model

XenTegra - IGEL Weekly

Play Episode Listen Later Aug 12, 2025 38:02 Transcription Available


In Episode 103 of IGEL Weekly, host Andy Whiteside and Chris Feeney dive deep into what it means to truly rethink endpoint strategy in 2025. Using James Millington's recent blog as a guide, they explore IGEL's Preventive Security Model — a lightweight, adaptive, and policy-aligned approach that moves beyond the bloated, reactive stacks of the past.From Zero Trust architecture and business continuity planning to repurposing hardware for sustainability and simplifying mergers and acquisitions, Andy and Chris share how IGEL unifies hardware, applications, and security into a failsafe foundation for any organization. Whether you're managing thousands of endpoints or just a few dozen, this conversation reveals why it's time to break from the status quo and design for a secure, flexible, and future-ready digital workspace.

ITSPmagazine | Technology. Cybersecurity. Society
Simplifying Security Without Sacrificing Control | A ThreatLocker Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Danny Jenkins

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 11, 2025 19:25


At Black Hat USA 2025, Danny Jenkins, CEO of ThreatLocker, shares how his team is proving that effective cybersecurity doesn't have to be overly complex. The conversation centers on a straightforward yet powerful principle: security should be simple enough to implement quickly and consistently, while still addressing the evolving needs of diverse organizations.Jenkins emphasizes that the industry has moved beyond selling “magic” solutions that promise to find every threat. Instead, customers are demanding tangible results—tools that block threats by default, simplify approvals, and make exceptions easy to manage. ThreatLocker's platform is built on this premise, enabling over 54,000 organizations worldwide to maintain a secure environment without slowing business operations.A highlight from the event is ThreatLocker's Defense Against Configurations (DAC) module. This feature performs 170 daily checks on every endpoint, aligning them with compliance frameworks like NIST and FedRAMP. It not only detects misconfigurations but also explains why they matter and how to fix them. Jenkins admits the tool even revealed gaps in ThreatLocker's own environment—issues that were resolved in minutes—proving its practical value.The discussion also touches on the company's recent FedRAMP authorization process, a rigorous journey that validates both the product's and the company's security maturity. For federal agencies and contractors, this means faster compliance with CMMC and NIST requirements. For commercial clients, it's an assurance that they're working with a partner whose internal security practices meet some of the highest standards in the industry.As ThreatLocker expands its integrations and modules, Jenkins stresses that simplicity remains the guiding principle. This is achieved through constant engagement with customers—at trade shows, in the field, and within the company's own managed services operations. By actively using their own products at scale, the team identifies friction points and smooths them out before customers encounter them.In short, the message from the booth at Black Hat is clear: effective security comes from strong fundamentals, simplified management, and a relentless focus on the user experience.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Danny Jenkins, CEO of ThreatLocker | On LinkedIn | https://www.linkedin.com/in/dannyjenkinscyber/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Cyber Security Weekly Podcast
Episode 452 - STATE OF CYBER (Part 1)

Cyber Security Weekly Podcast

Play Episode Listen Later Jul 23, 2025 59:01


Special Virtual Episodes with ISACA Leaders: State of Cyber (Part 1) - Maintaining readiness in a complex threat environmentSpeakers:Jamie Norton - ISACA Board Member Chirag Joshi - Sydney Chapter Board Member Abby Zhang - Auckland Chapter Board Member Jason Wood - Auckland Chapter former PresidentBharat Bajaj - ISACA Melbourne Board DirectorFor the full series visit: https://mysecuritymarketplace.com/security-amp-risk-professional-insight-series-2025/#mysecuritytv #isaca #cybersecurity OVERVIEWAccording to ISACA research, almost half of companies exclude cybersecurity teams when developing, onboarding, and implementing AI solutions.Only around a quarter (26%) of cybersecurity professionals or teams in Oceania are involved in developing policy governing the use of AI technology in their enterprise, and nearly half (45%) report no involvement in the development, onboarding, or implementation of AI solutions, according to the recently released 2024 State of Cybersecurity survey report from global IT professional association ISACA.Key Report Findings Security teams in Oceania noted they are primarily using AI for: Automating threat detection/response (36% vs 28% globally); Endpoint security (33% vs 27% globally); Automating routine security tasks (22% vs 24% globally); and Fraud detection (6% vs 13% globally).Additional AI resources to help cybersecurity and other digital trust professionalso EU AI Act white papero Examining Authentication in the Deepfake EraSYNOPSISISACA's 2024 State of Cybersecurity report reveals that stress levels are on the rise for cybersecurity professionals, largely due to an increasingly challenging threat landscape. The annual ISACA research also identifies key skills gaps in cybersecurity, how artificial intelligence is impacting the field, the role of risk assessments and cyber insurance in enterprises' security programs, and more.The demand for cybersecurity talent has been consistently high, yet efforts to increase supply are not reflected in the global ISACA IS/IT-community workforce. The current cybersecurity practitioners are aging, and the efforts to increase staffing with younger professionals are making little progress. Left unchecked, this situation will create business continuity issues in the future. Shrinking budgets and employee compensation carry the potential to adversely affect cybersecurity readiness much sooner than the aging workforce, when the Big Stay passes. Declines in vacant positions across all reporting categories may lead some enterprises to believe that the pendulum of power will swing back to employers, but the increasingly complex threat environment is greatly increasing stress in cybersecurity teams; therefore, the concern is not if, but when, employees will reach their tipping point to vacate current positions.

The Cybersecurity Defenders Podcast
#225 - Defender Fridays: EDR, DFIR & endpoint triage with Brian Carrier, CEO of Sleauth Kit Labs

The Cybersecurity Defenders Podcast

Play Episode Listen Later Jun 27, 2025 31:00


Join us every Friday as we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.Each week, we bring you a different expert guest who will share their invaluable insights on topics ranging from threat hunting and incident response to security operations and detection engineering. What makes these sessions special is their informal and interactive nature, allowing for an engaging dialogue between our guests, hosts, and the audience.You can sign up to join us for the live sessions at limacharlie.io/defender-fridays

JACC Speciality Journals
Preserving Trial Endpoint Specificity and Cause of Death Attribution in Cardiovascular Trials: Insights From MARINER | JACC: Advances

JACC Speciality Journals

Play Episode Listen Later Jun 25, 2025 2:51


Darshan H. Brahmbhatt, Podcast Editor of JACC: Advances, discusses a recently published original research paper on Preserving Trial Endpoint Specificity and Cause of Death Attribution in Cardiovascular Trials: Insights From MARINE.

Tcast
Endpoint Automation in 2025: 7 Upgrades That Will Shock IT Leaders

Tcast

Play Episode Listen Later Jun 20, 2025 23:26


In this episode of TCAST, host Alexander McCaig welcomes Shirish Nimgaonkar, founder of EBLISS AI, to unpack how endpoint automation is redefining enterprise IT. With devices multiplying across industries, traditional support models—manual, reactive, and costly—no longer scale. EBLISS AI addresses this gap through an AI-powered platform that dynamically learns, predicts, and resolves endpoint issues with precision. Shirish explains how the platform integrates classic machine learning and proprietary small language models to build agentic AI—intelligent agents capable of real-time remediation and proactive diagnostics. They delve into the importance of synthetic data, human-in-the-loop safety mechanisms, and why productivity and risk management must co-evolve. The conversation also touches on the ethical implications of automation and the need for vision-led tech adoption that enhances quality of life, not just profits. Whether you're a data strategist, IT leader, or AI ethicist, this episode delivers actionable insights on how to future-proof your digital infrastructure. Timestamps [00:03] – Introduction: Shirish Nimgaonkar joins to talk AI-powered endpoint automation. [00:47] – Device Explosion: Why legacy IT support can't scale with modern device fleets. [03:11] – Enter EBLISS AI: A platform for prediction, remediation, and self-healing. [04:28] – Personalized Intelligence: How EBLISS tailors responses based on personas and use cases. [06:05] – Hybrid AI Models: Mixing ML, LLMs, and synthetic data for scalable solutions. [10:22] – Risk vs. Efficacy: Managing synthetic data and human oversight. [12:18] – Scaling Insight: Monitoring drift across millions of endpoints. [17:00] – Ethics of Adoption: Why vision, governance, and user empowerment matter. Quotes “You're not just shifting the risk—you're minimizing it.” – Shirish Nimgaonkar “Autonomy must be in service of human quality of life.” – Shirish Nimgaonkar “The ratio of productivity to risk defines solution effectiveness.” – Shirish Nimgaonkar Resources

ITSPmagazine | Technology. Cybersecurity. Society
What Helps You Sleep Better at Night: A Practical Take on Zero Trust | A Brand Story with Rob Allen from ThreatLocker | An Infosecurity Europe 2025 Pre-Event Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 22, 2025 23:03


As InfoSecurity Europe prepares to welcome cybersecurity professionals from across the globe, Rob Allen, Chief Product Officer at ThreatLocker, shares why this moment—and this location—matters. Allen doesn't frame the conversation around hype or headlines. Instead, he focuses on a universal truth: organizations want to sleep better at night knowing their environments are secure.ThreatLocker's mission is grounded in achieving Zero Trust in a simple, operationally feasible way. But more than that, Allen emphasizes their value as enablers of peace of mind. Whether helping customers prevent ransomware attacks or meet regional regulatory requirements like GDPR or Australia's Essential Eight, the company is working toward real-world solutions that reduce complexity without sacrificing security. Their presence at events like InfoSecurity Europe is key—not just for outreach, but to hear directly from customers and partners about what's working and where they need help.Why Being There MattersDifferent regions have different pressures. In Australia, adoption surged without any local team initially on the ground—driven purely by alignment with the Essential Eight framework. In the UK, it's conversations about Cyber Essentials that shape booth discussions. Regulations aren't just compliance checklists; they're also conversation starters that change how organizations prioritize security.The ThreatLocker team doesn't rely on generic demos or vague promises. They bring targeted examples to the booth—like asking attendees if they know what software can be run on their machines without alerting anyone. If tools like remote desktop applications or archive utilities can be freely executed, attackers can use them too. This is where ThreatLocker steps in: controlling what runs, identifying what's necessary, and blocking what isn't.Booth D90 and BeyondRob Allen invites anyone—whether they're new to ThreatLocker or longtime users—to visit booth D90. The team, built with a mix of technical skill and humor (ask about the “second-best beard” in the company), is there to listen and help. It's not just about showcasing technology; it's about building relationships and reinforcing a shared goal: practical, proactive cybersecurity that makes a measurable difference.If you're at InfoSecurity Europe, stop by. If you're not, this episode offers a meaningful glimpse into why showing up—both physically and philosophically—matters in cybersecurity.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Rob Allen, Chief Product Officer, ThreatLocker | https://www.linkedin.com/in/threatlockerrob/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerCyber Essentials Guide: https://threatlocker.kb.help/threatlocker-and-cyber-essentials-compliance/?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interview_rob&utm_term=podcastAustralia's Essential Eight Guide: https://www.threatlocker.com/whitepaper/australia-essential-eight?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interviLearn more and catch more event coverage stories from Infosecurity Europe 2025 in London: https://www.itspmagazine.com/infosec25 ______________________Keywords:sean martin, marco ciappelli, rob allen, cybersecurity, zero trust, infosec, compliance, ransomware, endpoint, regulation, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

Autonomous IT
Hands-On IT – 3 Tips to Make Your Endpoint Data Work for You, E18

Autonomous IT

Play Episode Listen Later May 22, 2025 5:42


In this episode of Hands-On IT, Landon Miles shares 3 tactical tips to help you make smarter decisions with your endpoint data. Learn how to cut through alert fatigue, streamline your reporting, and use historical insights to predict and prevent future issues. Whether you're managing a few hundred devices or thousands across mixed OS environments, these strategies will help you reduce noise, boost visibility, and run a more secure, efficient operation.

Autonomous IT
Automox Insiders – Data Trivia and Endpoint Truths, E17

Autonomous IT

Play Episode Listen Later May 20, 2025 22:15


In this episode of Automox Insiders, host Maddie Regis sits down with Peter Pflaster and Kelly Carlson from Automox's product marketing team to explore how data transforms endpoint management. From mean time to remediate (MTTR) to device compliance and unexpected user activity trends, they break down the metrics IT pros should watch — and why clear, actionable reporting is critical for both security and executive buy-in. Plus, the trio wraps up with a round of data trivia to prove that yes, data can be fun.

Foundation Fighting Blindness
J&J's XLRP Gene Therapy Didn't Meet Primary Endpoint in Phase 3 Clinical Trial

Foundation Fighting Blindness

Play Episode Listen Later May 15, 2025 2:35


Despite missing the primary endpoint, the treatment improved vision for some patients.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Wednesday, May 14th: Microsoft Patch Tuesday; 0-Days patched for Ivanti Endpoint Manager and Fortinet Products

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later May 14, 2025 6:38


Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%3A%20May%202025/31946 Security Advisory Ivanti Endpoint Manager Mobile (EPMM) May 2025 (CVE-2025-4427 and CVE-2025-4428) Ivanti patched an authentication bypass vulnerability and a remote code execution vulnerability. The authentication bypass can exploit the remote code execution vulnerability without authenticating first. https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM?language=en_US Fortinet Patches Exploited Vulnerability in API (CVE-2025-32756) Fortinet patched an already exploited stack-based buffer overflow vulnerability in the API of multiple Fortinet products. The vulnerability is exploited via crafted HTTP requests. https://fortiguard.fortinet.com/psirt/FG-IR-25-254

Paul's Security Weekly
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405

Paul's Security Weekly

Play Episode Listen Later May 5, 2025 102:43


Now in its 18th year, the Verizon Business DBIR is one of the industry's longest standing and leading reports on the current cybersecurity landscape. This year's report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among many other findings. Segment Resources: - https://www.verizon.com/about/news/2025-data-breach-investigations-report - https://www.verizon.com/business/resources/reports/dbir This segment is sponsored by Verizon Business! To read the full Verizon Business 2025 Data Breach Investigations Report, please visit https://securityweekly.com/verizonrsac. Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint. Yet, despite the exponential growth of browser-native attacks, traditional security solutions continue to focus on endpoint and network, leaving a large gaping hole when it comes to browser security. SquareX has started the Year of Browser Bugs (YOBB), a yearlong initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors - the browser. Learn more about SquareX's Browser Detection and Response solution at https://securityweekly.com/squarexrsac Last Mile Reassembly Attacks: https://www.sqrx.com/lastmilereassemblyattacks Polymorphic Extensions technical blog: https://labs.sqrx.com/polymorphic-extensions-dd2310006e04 There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management, and other advanced security tools tailored to bridge the gap between endpoint and cloud protection. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them! Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with Detecteam's autonomic detection lifecycle platform to continuously validate and improve detection capabilities based on real-world attack scenarios. Solution demo: https://www.devo.com/interactive-demos/devo-detecteam-engineering-confidence-in-threat-detection/ This segment is sponsored by Devo . Visit https://securityweekly.com/devorsac to learn more about them! While the value of identity security remains largely untapped, SailPoint's latest Horizons of Identity Security report reveals that organizations with mature identity programs can bend their identity security-to-value curve and recognize disproportionately higher returns. These programs unlock new value pools and can help address emerging challenges, such as securing machine and AI agent identities. The 2024-25 Horizons of Identity Security report: https://www.sailpoint.com/identity-library/horizons-identity-security-3 Take the identity security maturity assessment: https://www.sailpoint.com/identity-security-adoption Learn more about SailPoint's Customer Experience Portfolio: https://www.sailpoint.com/customer-success/customer-experience-portfolio This segment is sponsored by SailPoint. Visit https://securityweekly.com/sailpointrsac to learn more about them! Identity has long been the soft underbelly of cybersecurity—but with AI, non-human identities (NHIs), and autonomous agents on the rise, it's now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren't just hacking systems anymore—they're hijacking identities to slip through the cracks and move undetected in systems. For too long, identity security was treated as interchangeable with IAM—but that mindset is exactly what left critical gaps exposed. Listen to our interview with Hed Kovetz as he unpacks why identity has become today's most urgent battleground in cyber. He'll what you can do about it with an identity security playbook that gives you the upper hand. https://resources.silverfort.com/identity-security-playbook/home https://www.silverfort.com/blog/shining-the-spotlight-on-the-rising-risks-of-non-human-identities/ This segment is sponsored by Silverfort. Visit https://securityweekly.com/silverfortrsac to learn more about Silverfort's IDEAL approach to identity security! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-405

Enterprise Security Weekly (Audio)
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405

Enterprise Security Weekly (Audio)

Play Episode Listen Later May 5, 2025 102:43


Now in its 18th year, the Verizon Business DBIR is one of the industry's longest standing and leading reports on the current cybersecurity landscape. This year's report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among many other findings. Segment Resources: - https://www.verizon.com/about/news/2025-data-breach-investigations-report - https://www.verizon.com/business/resources/reports/dbir This segment is sponsored by Verizon Business! To read the full Verizon Business 2025 Data Breach Investigations Report, please visit https://securityweekly.com/verizonrsac. Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint. Yet, despite the exponential growth of browser-native attacks, traditional security solutions continue to focus on endpoint and network, leaving a large gaping hole when it comes to browser security. SquareX has started the Year of Browser Bugs (YOBB), a yearlong initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors - the browser. Learn more about SquareX's Browser Detection and Response solution at https://securityweekly.com/squarexrsac Last Mile Reassembly Attacks: https://www.sqrx.com/lastmilereassemblyattacks Polymorphic Extensions technical blog: https://labs.sqrx.com/polymorphic-extensions-dd2310006e04 There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management, and other advanced security tools tailored to bridge the gap between endpoint and cloud protection. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them! Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with Detecteam's autonomic detection lifecycle platform to continuously validate and improve detection capabilities based on real-world attack scenarios. Solution demo: https://www.devo.com/interactive-demos/devo-detecteam-engineering-confidence-in-threat-detection/ This segment is sponsored by Devo . Visit https://securityweekly.com/devorsac to learn more about them! While the value of identity security remains largely untapped, SailPoint's latest Horizons of Identity Security report reveals that organizations with mature identity programs can bend their identity security-to-value curve and recognize disproportionately higher returns. These programs unlock new value pools and can help address emerging challenges, such as securing machine and AI agent identities. The 2024-25 Horizons of Identity Security report: https://www.sailpoint.com/identity-library/horizons-identity-security-3 Take the identity security maturity assessment: https://www.sailpoint.com/identity-security-adoption Learn more about SailPoint's Customer Experience Portfolio: https://www.sailpoint.com/customer-success/customer-experience-portfolio This segment is sponsored by SailPoint. Visit https://securityweekly.com/sailpointrsac to learn more about them! Identity has long been the soft underbelly of cybersecurity—but with AI, non-human identities (NHIs), and autonomous agents on the rise, it's now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren't just hacking systems anymore—they're hijacking identities to slip through the cracks and move undetected in systems. For too long, identity security was treated as interchangeable with IAM—but that mindset is exactly what left critical gaps exposed. Listen to our interview with Hed Kovetz as he unpacks why identity has become today's most urgent battleground in cyber. He'll what you can do about it with an identity security playbook that gives you the upper hand. https://resources.silverfort.com/identity-security-playbook/home https://www.silverfort.com/blog/shining-the-spotlight-on-the-rising-risks-of-non-human-identities/ This segment is sponsored by Silverfort. Visit https://securityweekly.com/silverfortrsac to learn more about Silverfort's IDEAL approach to identity security! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-405

Paul's Security Weekly TV
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Hed Kovetz, Vivek Ramachandran, Rob Allen, Jason Mical, Alex Pinto, Lori Robinson - ESW #405

Paul's Security Weekly TV

Play Episode Listen Later May 4, 2025 102:44


Now in its 18th year, the Verizon Business DBIR is one of the industry's longest standing and leading reports on the current cybersecurity landscape. This year's report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and examines the average amounts paid and amount of time to patch vulnerabilities, among many other findings. Segment Resources: - https://www.verizon.com/about/news/2025-data-breach-investigations-report - https://www.verizon.com/business/resources/reports/dbir This segment is sponsored by Verizon Business! To read the full Verizon Business 2025 Data Breach Investigations Report, please visit https://securityweekly.com/verizonrsac. Over the past two decades, the browser has evolved from a simple web rendering engine to the primary gateway through which users interact with the internet, be it for work, leisure or transactions. In other words, browsers are becoming the new endpoint. Yet, despite the exponential growth of browser-native attacks, traditional security solutions continue to focus on endpoint and network, leaving a large gaping hole when it comes to browser security. SquareX has started the Year of Browser Bugs (YOBB), a yearlong initiative to draw attention to the lack of security research and rigor in what remains one of the most understudied attack vectors - the browser. Learn more about SquareX's Browser Detection and Response solution at https://securityweekly.com/squarexrsac Last Mile Reassembly Attacks: https://www.sqrx.com/lastmilereassemblyattacks Polymorphic Extensions technical blog: https://labs.sqrx.com/polymorphic-extensions-dd2310006e04 There is a growing overlap between endpoint and cloud environments, creating new security challenges. ThreatLocker has recently released innovative solutions designed to protect organizations operating in this space. These include Cloud Control, Cloud Detect, Patch Management, and other advanced security tools tailored to bridge the gap between endpoint and cloud protection. This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlockerrsac to learn more about them! Jason Mical, Field CTO, discusses Devo and Detecteam's integrated solution, which proactively improves security posture by identifying and closing detection gaps. The integration combines Devo's comprehensive threat detection, investigation, and response capabilities with Detecteam's autonomic detection lifecycle platform to continuously validate and improve detection capabilities based on real-world attack scenarios. Solution demo: https://www.devo.com/interactive-demos/devo-detecteam-engineering-confidence-in-threat-detection/ This segment is sponsored by Devo . Visit https://securityweekly.com/devorsac to learn more about them! While the value of identity security remains largely untapped, SailPoint's latest Horizons of Identity Security report reveals that organizations with mature identity programs can bend their identity security-to-value curve and recognize disproportionately higher returns. These programs unlock new value pools and can help address emerging challenges, such as securing machine and AI agent identities. The 2024-25 Horizons of Identity Security report: https://www.sailpoint.com/identity-library/horizons-identity-security-3 Take the identity security maturity assessment: https://www.sailpoint.com/identity-security-adoption Learn more about SailPoint's Customer Experience Portfolio: https://www.sailpoint.com/customer-success/customer-experience-portfolio This segment is sponsored by SailPoint. Visit https://securityweekly.com/sailpointrsac to learn more about them! Identity has long been the soft underbelly of cybersecurity—but with AI, non-human identities (NHIs), and autonomous agents on the rise, it's now front and center for security teams, the C-suite, and boardrooms alike. Adversaries aren't just hacking systems anymore—they're hijacking identities to slip through the cracks and move undetected in systems. For too long, identity security was treated as interchangeable with IAM—but that mindset is exactly what left critical gaps exposed. Listen to our interview with Hed Kovetz as he unpacks why identity has become today's most urgent battleground in cyber. He'll what you can do about it with an identity security playbook that gives you the upper hand. https://resources.silverfort.com/identity-security-playbook/home https://www.silverfort.com/blog/shining-the-spotlight-on-the-rising-risks-of-non-human-identities/ This segment is sponsored by Silverfort. Visit https://securityweekly.com/silverfortrsac to learn more about Silverfort's IDEAL approach to identity security! Show Notes: https://securityweekly.com/esw-405

Packet Pushers - Full Podcast Feed
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Apr 28, 2025 24:10


Take a Network Break! We start with a Red Alert for SAP NetWeaver's Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »

Packet Pushers - Network Break
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs

Packet Pushers - Network Break

Play Episode Listen Later Apr 28, 2025 24:10


Take a Network Break! We start with a Red Alert for SAP NetWeaver's Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »

Packet Pushers - Fat Pipe
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs

Packet Pushers - Fat Pipe

Play Episode Listen Later Apr 28, 2025 24:10


Take a Network Break! We start with a Red Alert for SAP NetWeaver's Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »

Check Point CheckMates Cyber Security Podcast
S07E05: Harmony Endpoint E88.70

Check Point CheckMates Cyber Security Podcast

Play Episode Listen Later Apr 18, 2025 13:28


Product Manager Bar Yassure discusses what we did to improve performance and stability in the E88.70 release of Harmony Endpoint.

Paul's Security Weekly
What is old is new again: default deny on the endpoint - Colby DeRodeff, Danny Jenkins - ESW #402

Paul's Security Weekly

Play Episode Listen Later Apr 14, 2025 123:21


Default deny is an old, and very recognizable term in security. Most folks that have been in the industry for a long time will associate the concept with firewall rules. The old network firewalls, positioned between the public Internet and private data centers, however, were relatively uncomplicated and static. Most businesses had a few hundred firewall rules at most. The idea of implementing default deny principles elsewhere were attempted, but without much success. Internal networks (NAC), and endpoints (application control 1.0) were too dynamic for the default deny approach to be feasible. Vendors built solutions, and enterprises tried to implement them, but most gave up. Default deny is still an ideal approach to protecting assets and data against attacks - what it needed was a better approach. An approach that could be implemented at scale, with less overhead. This is what we'll be talking to Threatlocker's CEO and co-founder, Danny Jenkins, about on this episode. They seemed to have cracked the code here and are eager to share how they did it. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! We wanted security data? We got it! Now, what the heck do we DO with all of it? The core challenge of security operations, incident response, and even compliance is still a data management and analysis problem. Which is why we're seeing companies like Abstract Security pop up to address some of these challenges. Abstract just released a comprehensive eBook on security data strategy, linked below, and you don't even need to give up an email address to read it! In this interview, we'll talk through some of the highlights: Challenges Myths Pillars of a data security strategy Understanding the tools available Segment Resources A Leader's Guide to Security Data Strategy eBook In the enterprise security news, new startup funding what happened to the cybersecurity skills shortage? tools for playing with local GenAI models CVE assignment drama a SIEM-agnostic approach to detection engineering pitch for charity a lost dog that doesn't want to be found All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-402

The Tech Blog Writer Podcast
3222: IGEL CEO Klaus Oestermann on Rewriting the Rules of Endpoint Computing

The Tech Blog Writer Podcast

Play Episode Listen Later Mar 27, 2025 23:55


What does it really take to reimagine the future of endpoint computing? In this special episode recorded live from IGEL's Now and Next 2025 event in Miami, I sit down with Klaus Oestermann, CEO of IGEL, to explore how cybersecurity, digital workspaces, and user experience are being transformed at the edge. Klaus is no stranger to innovation, having spent decades in high-assurance security across critical industries, and now leading IGEL's mission to simplify, secure, and modernize how enterprises manage endpoints. Our conversation starts by unpacking the shift from traditional perimeter-based security models to a new way of thinking rooted in prevention. Klaus explains how IGEL's Preventative Security Model addresses modern threats by dramatically reducing the attack surface at the endpoint and flipping the conversation from detection and response to control and containment. With more organizations relying on hybrid work and SaaS-based applications, the endpoint has never been more critical—or more vulnerable. Klaus also outlines how IGEL OS is supporting everything from virtual desktop infrastructure to secure browsing, while enabling consistent user experiences across cloud, on-prem, and edge environments. But this episode isn't just about technology. It's about strategy. Klaus shares how IGEL is creating meaningful impact by extending device life cycles, cutting hardware replacement costs, and supporting sustainability goals. With Windows 11 upgrades looming and endpoint refresh cycles under pressure, IGEL presents a compelling alternative that balances performance with responsibility. We also dive into the role of AI, how it's reshaping device requirements, and what it means for endpoint security moving forward. And as IGEL expands its ecosystem and reveals over 20 new announcements at this year's event, Klaus offers a candid look into what's resonating with customers—and where the industry is headed next. So what will define your endpoint strategy in 2025? And is your organization ready to lead from the edge?

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday Feb 21st: Kibana Queries; Mongoose Injection; U-Boot Flaws; Unifi Protect Camera Vulnerabilities; Protecting Network Devices as Endpoint (Austin Clark @sans_edu)

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Feb 21, 2025 12:29


Using ES|QL In Kibana to Query DShield Honeypot Logs Using the "Elastic Search Piped Query Language" to query DShield honeypot logs https://isc.sans.edu/diary/Using%20ES%7CQL%20in%20Kibana%20to%20Queries%20DShield%20Honeypot%20Logs/31704 Mongoose Flaws Put MongoDB at risk The Object Direct Mapping library Mongoose suffers from an injection vulnerability leading to the potenitial of remote code exeuction in MongoDB https://www.theregister.com/2025/02/20/mongoose_flaws_mongodb/ U-Boot Vulnerabilities The open source boot loader U-Boot does suffer from a number of issues allowing the bypass of its integrity checks. This may lead to the execution of malicious code on boot. https://www.openwall.com/lists/oss-security/2025/02/17/2 Unifi Protect Camera Update https://community.ui.com/releases/Security-Advisory-Bulletin-046-046/9649ea8f-93db-4713-a875-c3fd7614943f