The protection of computer systems from theft or damage
POPULARITY
Categories
Moin aus Osnabrück und herzlich willkommen zur 37. Folge vom Update. Der Deutsche IT-Security Kongress steht vor der Tür. In diesem Jahr geht das Event bereits in die sechste Runde. Im Gespräch mit Ulf geben Anne-Marie Böwer und Jana Plogmann spannende Einblicke zum 6. Deutschen IT-Security Kongress. Um welche Top-Themen dreht sich der #DITSK in diesem Jahr? Welche Speaker sind an Bord? Was gibt es Neues?
Hallo da draußen an den Empfangsgeräten und herzlich willkommen zu einer neuen Podcast-Folge. In Folge #112 begrüßen Julius und Marcel heute Annika Wägenbauer, die Gründerin von Cybersecurity Redefined. Julius, Marcel und Annika sprechen darüber, warum Vielfalt in der IT-Security kein „Nice-to-have“ ist, sondern über Erfolg oder Stillstand entscheidet.
We're asking the hard question: is technology the problem… to technology? If cybercrime only exists because the internet does, maybe the real solution is to unplug it all, toss the Wi-Fi router into the river, and go back to quills, scrolls, and smoke signals. In this episode, Darnley takes a tongue-in-cheek look at the rise of tech in cybersecurity, why every “solution” creates new problems, and whether we should just burn it all down.Grab a coffee, sit back, and laugh(or cry) while we wrestle with the paradox of fighting technology with technology, and what you actually need to do to stay safe online.Click here to send future episode recommendationSupport the showSubscribe now to Darnley's Cyber Cafe and stay informed on the latest developments in the ever-evolving digital landscape.
Thank You To Our Partners The Institute, AutoFlow, Shop Dog Marketing, In-Bound, ExpressWatch Full Video EpisodeIn our episode today- I welcome to the podcast my friend Helen Fradette, the newly elected Club President for Grand Rapids Toastmasters, club 404.As listeners know - one of my favorite things about my weekly participation in club 404 -is that the club is NOT composed of automotive professionals, just a great group of professionals from all walks of life.This means they have wide and varied perspectives and opinions that I regularly have an opportunity to listen to - and today you will get to listen to one of those voices!Helen is an IT Security expert, but today she will be sharing a story about a very challenging time in her life - when she was a single mom - couldn't afford a vehicle… and how things felt when the one that was graciously gifted to her wound up needing repairs.As I listened to Helen - it was clear to me that most people walking in our shops that need help - may never voice it - and creating the right kind of environment where people feel safe to communicate real needs might be better considered as a proactive approach vs a reactive one. There is an opportunity for our industry to improve the way we can serve - and communicate our desire to do so.Another Story Helen shared was more common - a circumstance where a shop didn't provide clear details on a repair that was needed - and resulted in inquiries not to the shop, but to trusted friends, which resulted in no authorized repair. These types of scenarios play out daily across the country. I too often- and you might hear this in my conversation with Helen - become very curious about the car in the story.You may also notice that Helen, in our conversation, was less focused about the details related to the car.This was an enjoyable and meaningful conversation - If I can encourage one thing from this chat - it would be to encourage shops to see themselves as partners in life circumstances, not just vehicle mechanics.The WOTD was fitting for this:- “Solicitude” (noun)Meaning: care or concern for someone's well-being.Thank You To Our Partners The Institute, AutoFlow, AutoLeap, Shop Dog Marketing, In-Bound, Express:The Institute at WeAreTheInstitute.com. "Stop stressing over your business, you deserve a good night's sleep. The Institute's coaching helps you achieve success and financial peace.AutoFlow at AutoFlow.com. Your partner in technology, Autoflow consolidates your client interactions - before, during and after the visit to a single thread. Learn more at Autoflow.comShop Dog Marketing at Shop Dog Marketing.com. "Want to see your auto repair shop thrive? Let Shop Dog Marketing be your guide. Our customer-first approach, combined with AI-driven creative content, ensures top rankings. In-Bound at CallInBound.com. Cover your communication needs and revolutionize your auto repair business with AI-driven call analytics from InBound. Express by Facepay myexpress.io. Keep your existing merchant processor and software at your service counter. Express is integrated into your workflow to make the experience better....
Die richtige Story zur richtigen Zeit – und es kann auch DICH treffen! Im diesem Podcast spricht Sandro Müller mit Carlo Canova, langjähriger Security Consultant bei goSecurity AG. Carlo erzählt von einem Phishing, das ihn persönlich erreicht hat – und das im schlimmsten Fall der ganzen Firma erheblichen Schaden hätte zufügen können. Zum Glück wurde der Incident sofort richtig behandelt. Eine spannende und lehrreiche Episode für alle, die verstehen wollen, wie schnell jeder zum Ziel werden kann – und warum es so wichtig ist, vorbereitet zu sein.
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Lessons From 34 Years in OT Cybersecurity: Growth, Challenges, and Leading Change with Scott RosenbergerPub date: 2025-08-25Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow sits down with longtime friend and colleague Scott Rosenberger, the cybersecurity leader for Vistra Corporation's generation fleet. Together, they take a deep dive into Scott's fascinating journey from an engineering background in nuclear power to overseeing cybersecurity across a sprawling, nationwide utility portfolio. You'll hear insightful stories from the early days of OT cybersecurity - before most of today's tools even existed - and how foundational principles like alignment, engagement, and standardization have driven years of progress. Scott and Aaron reflect on the importance of building cross-disciplinary teams, developing strong communication strategies, and embracing the reality that real security is about continuous improvement, collaboration, and sometimes learning from mistakes. From tales of rolling out firewalls at power plants and negotiating with skeptical vendors, to lessons in leadership, trust-building, and the ever-evolving challenges of protecting critical infrastructure, this episode is packed with practical wisdom, industry anecdotes, and a look at what's coming over the cybersecurity horizon. Whether you're just entering the field or a seasoned pro, grab your headphones - you won't want to miss this candid, insightful conversation. Key Moments: 04:37 Bridging IT and Cybersecurity 08:40 Revolutionizing Program Development Together 10:08 Building Consensus Through Communication 12:33 "Business Insights and NERC SIP Evolution" 17:18 Utility's Major Implementation Challenge 20:08 Corporate Cybersecurity Challenges Uncovered 21:58 "Automated Inventory and Cybersecurity Insight" 27:21 Optimizing Cybersecurity and Metrics 30:56 Essential Infrastructure Basics Lacking 34:17 "Identifying and Resolving Hidden Issues" 37:21 Encouraging Change in Industrial Practices 42:11 "Finding the Right Team Mindset" 46:11 "Importance of Pre-Job Briefs" About the guest: Scott Rosenberger is currently the manager of Operational Technology for Luminant. He developed the Luminant program to address the reliability, security and ongoing maintenance of Operational Technology for Luminant's Fossil Generation Fleet. He has a Bachelor of Engineering from Stevens Institute of Technology and is a registered professional Engineer in Texas. In his 23+ years with Luminant he has worked in nuclear and fossil plants, many corporate roles and for 3 years as Director of IT Security and Compliance. Scott also spent 3 years as a member of the NERC CIP drafting team. Links to connect Scott: https://www.linkedin.com/in/scottrosenberger/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
In der heutigen Folge von MSP Insights spricht Franz Obermayer, Gründer der Fox Group, über sein Verständnis von enkelfähigem Unternehmertum. Er beschreibt, wie Unternehmen langfristig erfolgreich bleiben können – durch nachhaltige Strategien, generationenübergreifende Verantwortung und den Mut zum Wandel. Mit spannenden Einblicken in die Fox Group, ihre Schwerpunkte in IT-Security und AI, sowie seine persönliche Unternehmergeschichte liefert Franz sehr spannende Impulse für MSPs, die ihre Zukunft sichern wollen. Einige Aussagen von Franz sind: „Nur ein wirtschaftlich erfolgreiches Unternehmen kann nachhaltig sein – alles andere ist Illusion.“ „Ich liebe den Wandel – alle sieben Jahre stellen wir unser Systemhaus neu auf, um zukunftsfähig zu bleiben.“ „Alles, was wider die Natur ist, hat auf Dauer keinen Bestand – das gilt für Böden ebenso wie für Unternehmenskultur.“ ----------------------- Und hier einige Links, wenn Ihr mehr über Franz wissen möchtet: https://foxgroup.de https://www.linkedin.com/in/franz-obermayer-a784349b/ https://www.linkedin.com/company/fox-group-de/ ----------------------- Und mehr von Olaf Kaiser: www.linkedin.com/in/olafkaiser/ www.olaf-kaiser.coach/ www.ubega.de Direkt einen kostenfreien Termin mit Olaf buchen https://bit.ly/allgemeinen-termin-buchen
As dental practitioners, you surely put your blood, sweat, tears and years into growing your practice. But do you invest enough capital into protecting your practice with robust IT and security systems? The latest episode of The Dental Economist Show uncovers the reality of dental security today and why 70% of dental practices are at risk of a security breach. Tune in to hear host Mike Huffaker and Tom Barberio, Chief Information Officer at Thinc Forward, chat about the evolving landscape of dental technology and IT security - from how practices can avoid common technology pitfalls and effectively plan for infrastructure updates to how they can leverage the shift to cloud-based solutions. This conversation highlights that dental technology is shifting from being a cost center to becoming a true business enabler.
Manchmal liest man irgendwo: Damit sind Sie sicher. / Wir können Sie vor allen möglichen Cyberattacken schützen. / Mit unserem Produkt kann Ihnen nichts mehr passieren. – Das ist Quatsch. Alle, die sich schon seriös mit dem Thema Risikomanagement auseinandergesetzt haben wissen, dass es keine 100% Sicherheit gibt. Wenn jemand im Umfeld der Cyberkriminalität behauptet, mit seiner Lösung sei man absolut sicher, ist das unseriös. Es heisst aber auch nicht, dass dieses Produkt auf jeden Fall schlecht ist. Aber es deutet darauf hin, dass die Idee von Risikomanagement nicht verstanden wurde. Eine Beratung durch solche Akteure ist deshalb mit Vorsicht zu geniessen.
Hier eine wissenswerte Buchempfehlung von SIUS Consulting mit dem Titel „Hacking und IT-Security für Einsteiger“.
Cosmic Building, a construction technology company, uses AI-driven end-to-end software to run mobile robotic microfactories. At the heart of its newest microfactory in Pacific Palisades are ABB's IRB 6710 robots and RobotStudio digital twin software. Both of which are integrated into Cosmic's Workstation Cell and AI-driven Building Information Model (BIM). #ai #california #wildfire #losangeles #robot #fire
As all of you know, there are no silver bullets when it comes to cybersecurity success in the industrial sector. Every enterprise has its own unique characteristics, each plant floor its different connectivity elements, and each business is comprised of diverse human dynamics that fuel its culture. However, regardless of the environment, there continues to be a handful of best practices that can be universally applied. As I journey across the cybersecurity realm, one of these reoccurring themes is avoiding that urge to “eat the elephant” or “drink the ocean” when implementing cybersecurity strategies. Rather, the thought process is to set priorities and check things off as you go. Our guest for this episode mentioned this numerous times, whether it comes to responding to an increasingly complex collection of threat actors, or tackling the right uses of artificial intelligence.Watch/listen as we discuss a number of topics with Casey Ellis, Founder and Chief Strategy Officer of BugCrowd, including:The very real threat of IABs (initial access brokers) and state-sponsored hackers.How his organization works to reinforce why it's cool to be a White Hat.How thinking like a criminal helps improve defenses through penetration testing and other exercises.Developing strategies that prioritize resilience over perfection.Integrating new technologies with patching in mind.Using AI to develop faster response times and focusing on "which part of the elephant to eat first," instead of doing "stupid stuff" because of the pressure to implement it.As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com.
W najnowszym odcinku podcastu „BSS bez tajemnic” rozmawiamy o jednym z najważniejszych i najbardziej aktualnych tematów dla biznesu – dyrektywie NIS2 i jej wpływie na polskie przedsiębiorstwa. Moim gościem jest Tomasz Janas, Prezes Zarządu Advisory w PKF Polska, który dzieli się wiedzą na temat cyberbezpieczeństwa, compliance oraz praktycznego przygotowania firm do nowych regulacji.NIS2 to unijna dyrektywa, której celem jest podniesienie poziomu cyberbezpieczeństwa w krajach członkowskich. W rozmowie poznasz m.in. różnice między dyrektywą a rozporządzeniem, zasady samoidentyfikacji i samorejestracji, a także obowiązki, które czekają podmioty objęte regulacją – zarówno te „kluczowe”, jak i „ważne”. Dowiesz się także, jakie błędy popełniają firmy przy analizie ryzyka, czym grozi brak zarządzania incydentami oraz dlaczego odpowiedzialność członków zarządu za cyberbezpieczeństwo właśnie wzrosła.Tomasz Janas mówi też o praktycznej stronie audytów NIS2 – ile trwają, na czym polegają, a także dlaczego warto wdrożyć dobre praktyki cyberbezpieczeństwa nawet wtedy, gdy firma formalnie nie podlega pod NIS2.To odcinek obowiązkowy dla każdego, kto zarządza organizacją, odpowiada za IT lub bezpieczeństwo informacji – albo po prostu chce uniknąć poważnych konsekwencji finansowych i wizerunkowych. Kluczowe punkty rozmowy:· Zmieniające się regulacje prawne i najlepsze praktyki biznesowe w zakresie cyberbezpieczeństwa sprawiają, że firmy muszą być na bieżąco i dostosowywać swoje strategie ochrony danych.· Dyrektywa NIS2 znacząco rozszerza zakres podmiotów, które muszą spełniać nowe wymagania w zakresie cyberbezpieczeństwa, a obowiązek samoidentyfikacji i samorejestracji spoczywa na przedsiębiorcach.· Odpowiedzialność za zarządzanie ryzykiem IT jest teraz bezpośrednio przypisana do członków zarządu, co oznacza, że niewłaściwe zarządzanie może skutkować osobistymi karami finansowymi i zakazem pełnienia funkcji w zarządach. Linki:Tomasz Janas na Linkedin – https://www.linkedin.com/in/tomaszjanas/PKF Advisory - https://www.pkfpolska.pl/pkf-advisory-5469 Dyrektywa NIS 2 na stronach Komisji Europejskiej - https://digital-strategy.ec.europa.eu/pl/policies/nis2-directivePorozmawiaj o tym odcinku ze sztuczną inteligencją – https://bbs-bez-tajemnic.onpodcastai.com/episodes/Yd8U9q81Jg0/chat **************************** Nazywam się Wiktor Doktór i na co dzień prowadzę Klub Pro Progressio https://klub.proprogressio.pl/pl – to społeczność wielu firm prywatnych i organizacji sektora publicznego, którym zależy na rozwoju relacji biznesowych w modelu B2B. W podcaście BSS bez tajemnic poza odcinkami solowymi, zamieszczam rozmowy z ekspertami i specjalistami z różnych dziedzin przedsiębiorczości.Zapraszam do odwiedzin moich kanałów na:YouTube - https://www.youtube.com/@wiktordoktorFacebook - https://www.facebook.com/wiktor.doktorLinkedIn - https://www.linkedin.com/in/wiktordoktor/Moja strona internetowa - https://wiktordoktor.pl/Możesz też do mnie napisać. Mój adres email to - kontakt(@)wiktordoktor.pl **************************** Patronami Podcastu “BSS bez tajemnic” są:Marzena Sawicka https://www.linkedin.com/in/marzena-sawicka-a9644a23/ Przemysław Sławiński https://www.linkedin.com/in/przemys%C5%82aw-s%C5%82awi%C5%84ski-155a4426/Damian Ruciński - https://www.linkedin.com/in/damian-rucinski/Szymon Kryczka https://www.linkedin.com/in/szymonkryczka/Grzegorz Ludwin https://www.linkedin.com/in/gludwin/Adam Furmańczuk https://www.linkedin.com/in/adam-agilino/Anna Czyż - https://www.linkedin.com/in/anna-czyz-%F0%9F%94%B5%F0%9F%94%B4%F0%9F%9F%A2-68597813/Igor Tkach - https://www.linkedin.com/in/igortkach/ Wspaniali ludzie, dzięki którym pojawiają się kolejne odcinki tego podcastu. Ty też możesz wesprzeć rozwój podcastu na:Patronite - https://patronite.pl/wiktordoktorPatreon - https://www.patreon.com/wiktordoktorBuy me a coffee - https://www.buymeacoffee.com/wiktordoktorZrzutka.pl - https://zrzutka.pl/j8kvarBecome a supporter of this podcast: https://www.spreaker.com/podcast/bss-bez-tajemnic--4069078/support.
In the compelling finale of this three-part insurance series, host Kirsten Howe and insurance expert Dean Myers tackle the coverage that keeps business owners up at night—cyber insurance. Dean shares fascinating real-world stories, from ransomware attackers offering customer service hotlines to disgruntled employees planting digital "time bombs" in company systems. You'll discover why this isn't just another insurance policy but essential business survival protection that covers everything from system failures to deepfake fraud. Dean reveals the surprising realities about whether companies should pay ransoms, how insurers use "white hat" attacks during applications, and why Silicon Valley startups are outpacing traditional insurance giants. If you think your business is too small to be targeted or that basic IT protection is enough, this episode will be a wake-up call you can't afford to ignore. Time-stamped Show Notes: 0:00 Introduction 1:12 What is cyber insurance, and why it's the broadest coverage for such esoteric risks? 1:48 The comprehensive scope: system failure, ransomware, business email compromise, business interruption, contingent business interruption, and forensics coverage. 2:15 Why cyber claims require hiring attorneys, CPAs, forensics experts, claims adjusters, and legal counsel, unlike traditional workers' comp claims. 2:45 The two key reasons carriers provide such broad coverage: rapid system restoration at the lowest cost and mandatory industry claim reporting. 3:48 How cyber insurance provides both first-party and third-party coverage, protecting you when you accidentally send infected emails to clients. 4:37 Real-world business email compromise: When hackers send fake invoices to your clients from compromised email accounts. 5:10 Why cyber attacks almost always originate overseas in countries with lax cybersecurity laws and accountability. 5:37 Will cyber insurance pay ransoms, and when is it appropriate? 6:42 Real claim story: How a tired CPA two days before tax season fell for a phishing email with a partner's name containing just one extra letter 8:25 Why paying ransoms creates a "bull's eye on your back" and marks you as a repeat target for extortionists. 11:06 Cyber insurance qualification requirements, why multi-factor authentication is now absolutely mandatory across all carriers. 12:15 "White hat" mock attacks: How insurers test your system vulnerabilities during the application process using the "open parking spot" analogy. 14:41 Insider sabotage case study: Bay Area law firm manager discovers her job posted on LinkedIn, teams up with IT brother-in-law for revenge. 15:53 The emerging deepfake threat, how voice cloning technology is creating new fraud risks for fund transfers. 16:25 Protection strategies: Using "trip questions" with personal knowledge to verify client identity during suspicious calls. 17:12 The AI counterbalance: How artificial intelligence may help prevent cyber claims in the future.
In this special live episode of Autonomous IT, Live! we walk through a high-stakes incident response drill that mimics a disturbingly realistic threat scenario: an attacker gains access to your internal tools — not by breaking in, but by logging in.Here's the setup: a user unknowingly reuses compromised credentials with the company's SSO provider. An attacker logs in, flies under the radar, and impersonates internal IT support using Slack, email, and calendar invites. Their goal? Convince employees to install a fake remote access tool—all while avoiding anyone likely to report suspicious behavior.Join Landon Miles, Tom Bowyer, and Ryan Braunstein as they:
Troubleshoot identity issues, investigate risky users and apps, and optimize Conditional Access policies using natural language—with built-in AI from Microsoft Security Copilot in Microsoft Entra. Instead of switching between logs, PowerShell, and spreadsheets, Security Copilot centralizes insights for faster, more focused action. Resolve compromised accounts, uncover ownerless or high-risk apps, and tighten policy coverage with clear insights, actionable recommendations, and auto-generated policies. Strengthen security posture and reclaim time with a smarter, more efficient approach powered by Security Copilot. Diana Vicezar, Microsoft Entra Product Manager, shares how to streamline investigations and policy management using AI-driven insights and automation. ► QUICK LINKS: 00:00 - Microsoft Entra with Security Copilot 01:26 - Conditional Access Optimization Agent 03:35 - Investigate risky users 05:49 - Investigate risky apps 07:34 - Personalized security posture recommendations 08:20 - Wrap up ► Link References Check out https://aka.ms/SecurityCopilotAgentsinMicrosoftEntra ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
In today's episode of the Cyber Culture Café series, Andy and John speak to Tia Hopkins, Chief Cyber Resilience Officer & Field CTO. As Chief Cyber Resilience Officer & Field CTO, Tia Hopkins is focused on engaging with the cybersecurity community, providing thought leadership, supporting strategic customer and partner engagements, and working closely with the sales, marketing, product, engineering, and customer success teams to drive security outcome-focused initiatives.She has spent the past 20+ years of her career in various IT and IT Security roles and has over a decade of experience in the managed services space. Outside of her role at eSentire, Tia is also an adjunct professor of Cybersecurity at Yeshiva University and is currently pursuing her PhD in Cybersecurity Leadership.--Cybersecurity isn't just about platforms and processes—it's about people. If relationships matter in cybersecurity, this is where they begin. So, we're introducing a new, breakout series from the eSentire Cyber Talks Podcast – the Cyber Culture Café series! In this series, John Moretti and Andy Lalaguna will sit down for a candid conversation with one of the key players behind the eSentire customer experience. This series is all about pulling back the curtain and putting the spotlight on the people who power eSentire's world-class cybersecurity services.Join us for a relaxed and revealing discussion covering day-to-day challenges, personal motivation, industry observations, and the unique value each guest brings to the eSentire mission. Get to know the voices behind the protection—and why our people are at the core of everything we do.--Have a question for us? Reach out: hello@esentire.com---About Cyber TalksFrom ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges.About eSentireeSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit www.esentire.com and follow @eSentire.
June's Patch [FIX] Tuesday unpacks a lighter-than-usual Windows patch cycle — but don't get too comfortable. Join Automox cybersecurity experts as they break down high-risk vulnerabilities across macOS and Windows, including:A chained SSH vulnerability (CVE-2025-26465 & CVE-2025-26466) that allows memory exhaustion and bypasses host key verificationA WebDAV remote code execution flaw (CVE-2025-33053) actively exploited in the wildMultiple macOS threats, from sandbox escapes to keychain access and privilege escalationThe team also shares patching strategies, mitigation tips, and password hygiene advice you'll want to follow.
Send us a textIn this episode, we dive deep into the world of digital transformation and cloud-native architecture with Madoc Batters, Head of Cloud, Network and IT Security at Warner Hotels. Madoc shares his remarkable journey from washing 100 cars at age 11 to buy his first ZX81 computer to leading enterprise-scale cloud migrations. We explore the challenges of organizational culture change, the bold decision to migrate their most complex system first, and the importance of shifting left with security and FinOps practices. Madoc also shares insights on modern networking solutions like Alkira, the role of AI in transformation, and how his ultra-marathon mindset (including a 105-mile run) applies to pushing through digital transformation challenges. Whether you're starting your cloud journey or looking to accelerate your transformation efforts, this episode is packed with practical wisdom and inspiring leadership insights.Where to Find MadocLinkedIn: https://www.linkedin.com/in/madoc-batters-aws-machinelearning/Sessionize: https://sessionize.com/madoc-batters/Show LinksWarner Hotels: https://www.warnerhotels.co.uk/Alkira: https://www.alkira.com/AWS Bedrock: https://aws.amazon.com/bedrock/HashiCorp: https://www.hashicorp.com/AWS Summit: https://aws.amazon.com/events/summits/FinOpsX: https://www.finops.org/community/finopsx/ZX81 Computer: https://en.wikipedia.org/wiki/ZX81Follow, Like, and Subscribe!Podcast: https://www.thecloudgambit.com/YouTube: https://www.youtube.com/@TheCloudGambitLinkedIn: https://www.linkedin.com/company/thecloudgambitTwitter: https://twitter.com/TheCloudGambitTikTok: https://www.tiktok.com/@thecloudgambit
We're joined by Jacob Hill, founder of the GRC Academy, a leading provider of training and consulting services in governance, risk, and compliance. In this episode, Jacob dives into the new DOD regulations for CMMC, and why it's essential for contractors to get a head start in implementing these regulations. Jacob shares insights into what the new CMMC regulations entail and the implications for businesses. He discusses how the CMMC framework is designed to ensure that companies comply with cybersecurity best practices and what steps they need to take to become certified. Additionally, Jacob introduces his new course on the GRC Academy, which focuses on helping companies understand these regulations and navigate the certification process. He explains how the course can benefit companies and help them avoid costly mistakes while preparing for CMMC compliance. This podcast is a must-listen for anyone involved in government contracting or cybersecurity, looking to understand the implications of CMMC regulations. Jacob's expertise in this area and the insights he provides will prove invaluable to anyone looking to get a head start in implementing these regulations. Tune in to hear Jacob Hill's take on CMMC regulations and what companies can do to prepare for compliance. Take the course: https://grcacademy.io/courses/cmmc-overview-training-small-medium-businesses-smb/ Understand CMMC: https://grcacademy.io/cmmc/controls/ Contacts Jacob: https://www.linkedin.com/in/jacobrhill/ #CMMC #cybersecurity #governmentcontracting #compliance #GRC #podcast #training #certification #DOD #informationsecurity #smallbusiness #riskmanagement #regulations #ITsecurity #datasecurity #manufacturingunscripted #manufacturing #manufacturingcontracts
➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary
Send us a textIn this high-energy conversation, Joey Pinz chats with Joshua Liberman, a cybersecurity expert, adventurer, and polyglot with a fascinating life story. From hitchhiking across Africa and Asia to mastering martial arts and leading in cybersecurity, Joshua shares how resilience, adaptability, and quick decision-making have shaped his success.