POPULARITY
Most orgs have a major blind spot: the browser.This week on Defender Fridays, we're joined by Cody Pierce, Co-Founder and CEO at Neon Cyber, to discuss why browser security remains a critical gap, from sophisticated phishing campaigns that bypass traditional controls to shadow AI tools operating outside your security perimeter.Cody began his career in the computer security industry twenty-five years ago. The first half of his journey was rooted in deep R&D for offensive security, and he had the privilege of leading great teams working on elite problems. Over the last decade, Cody have moved into product and leadership roles that allowed him to focus on developing and delivering innovative and differentiated capabilities through product incubation, development, and GTM activities. Cody says he gets the most joy from building and delivering products that bring order to the chaos of cyber security while giving defenders the upper hand.About This SessionThis office hours format brings together the LimaCharlie team to share practical experiences with AI-powered security operations. Rather than theoretical discussions, we demonstrate working tools and invite the community to share their own AI security experiments. The session highlights the rapid evolution of AI capabilities in cybersecurity and explores the changing relationship between security practitioners and automation.Register for Live SessionsJoin us every Friday at 10:30am PT for live, interactive discussions with industry experts. Whether you're a seasoned professional or just curious about the field, these sessions offer an engaging dialogue between our guests, hosts, and you – our audience.Register here: https://limacharlie.io/defender-fridaysSubscribe to our YouTube channel and hit the notification bell to never miss a live session or catch up on past episodes!Sponsored by LimaCharlieThis episode is brought to you by LimaCharlie, a cloud-native SecOps platform where AI agents operate security infrastructure directly. Founded in 2018, LimaCharlie provides complete API coverage across detection, response, automation, and telemetry, with multi-tenant architecture designed for MSSPs and MDR providers managing thousands of unique client environments.Why LimaCharlie?Transparency: Complete visibility into every action and decision. No black boxes, no vendor lock-in.Scalability: Security operations that scale like infrastructure, not like procurement cycles. Move at cloud speed.Unopinionated Design: Integrate the tools you need, not just those contracts allow. Build security on your terms.Agentic SecOps Workspace (ASW): AI agents that operate alongside your team with observable, auditable actions through the same APIs human analysts use.Security Primitives: Composable building blocks that endure as tools come and go. Build once, evolve continuously.Try the Agentic SecOps Workspace free: https://limacharlie.ioLearn more: https://docs.limacharlie.ioFollow LimaCharlieSign up for free: https://limacharlie.ioLinkedIn: / limacharlieio X: https://x.com/limacharlieioCommunity Discourse: https://community.limacharlie.com/Host: Maxime Lamothe-Brassard - CEO / Co-founder at LimaCharlie
Join us for a special Defender Fridays Office Hours session where the LimaCharlie team demonstrates the new Agentic SecOps Workspace (ASW) and explores what's possible when AI agents operate security infrastructure directly.At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.What We'll DiscussIn this hands-on session, we showcase real working implementations of AI in cybersecurity operations. From reverse engineering malware to automated rule tuning and infrastructure management, we demonstrate how AI agents are transforming security workflows from concept to production-ready tools in hours instead of days.Key TopicsAutomated malware analysis and decompilation without traditional manual reverse engineering workflowsRule tuning at scale: Investigating noisy detections, writing false positive rules, and deploying them autonomouslyInfrastructure automation: Setting up data sources, configuring tenants, and managing security operations through AI agentsThe permission model: Balancing AI capability with human oversight and approval workflowsReal-world applications: Custom reporting, detection coverage analysis, and operational time savingsAbout This SessionThis office hours format brings together the LimaCharlie team to share practical experiences with AI-powered security operations. Rather than theoretical discussions, we demonstrate working tools and invite the community to share their own AI security experiments. The session highlights the rapid evolution of AI capabilities in cybersecurity and explores the changing relationship between security practitioners and automation.Register for Live SessionsJoin us every Friday at 10:30am PT for live, interactive discussions with industry experts. Whether you're a seasoned professional or just curious about the field, these sessions offer an engaging dialogue between our guests, hosts, and you – our audience.Register here: https://limacharlie.io/defender-fridaysSubscribe to our YouTube channel and hit the notification bell to never miss a live session or catch up on past episodes!Sponsored by LimaCharlieThis episode is brought to you by LimaCharlie, a cloud-native SecOps platform where AI agents operate security infrastructure directly. Founded in 2018, LimaCharlie provides complete API coverage across detection, response, automation, and telemetry, with multi-tenant architecture designed for MSSPs and MDR providers managing thousands of unique client environments.Why LimaCharlie?Transparency: Complete visibility into every action and decision. No black boxes, no vendor lock-in.Scalability: Security operations that scale like infrastructure, not like procurement cycles. Move at cloud speed.Unopinionated Design: Integrate the tools you need, not just those contracts allow. Build security on your terms.Agentic SecOps Workspace (ASW): AI agents that operate alongside your team with observable, auditable actions through the same APIs human analysts use.Security Primitives: Composable building blocks that endure as tools come and go. Build once, evolve continuously.Try the Agentic SecOps Workspace free: https://limacharlie.ioLearn more: https://docs.limacharlie.ioFollow LimaCharlieSign up for free: https://limacharlie.ioLinkedIn: / limacharlieio X: https://x.com/limacharlieioCommunity Discourse: https://community.limacharlie.com/Host: Maxime Lamothe-Brassard - CEO / Co-founder at LimaCharlie
Multi‑stage AiTM phishing and BEC campaign abusing SharePoint SmarterMail auth bypass flaw now exploited despite patch The problem of AI agents emerges at Davos Huge thanks to our sponsor, Dropzone AI All week we've talked about alert fatigue, MTTR, and the math that's breaking your SOC. Here's the proof. Dropzone AI is trusted by over 300 global enterprises and MSSPs. Named a Gartner Cool Vendor. Recognized in the Fortune Cyber 60. And backed by $37 million in Series B funding. But they're not stopping at a single agent. They're building toward fully agentic SOC teams where human engineers are augmented with specialized AI agents for threat hunting, detection engineering, and forensics. Your team deserves a backup that never sleeps. Book a demo at dropzone.ai. Find the stories behind the headlines at CISOseries.com.
First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segment is AI (picard face palm.png). I think 2026 will be THE defining year for GenAI. Three years after the release of ChatGPT, I think we've hit peak GenAI hype and folks are ready for it to put up or shut up. We'll see winners grow and get acquired and losers pivot to something else. More than anything, I want to interview folks who have actually seen it work at scale, rather than just in a cool demo in a vendor sandbox. Also on the agenda for this year: The battle against infostealers and session hijacking: we didn't have a good answer in 2025. When is it coming? Will it include Macs, despite them not having a traditional TPM? The state of trust in outsourcing and third party use (Cloud, MSSPs, SaaS, contractors): 2025 was not a good year for third parties. Lots of them got breached and caused their customers a lot of pain. Also, there's the state of balkanization between the US and... the rest of the entire world. Everyone outside the US seems to be trying to derisk their companies and systems from the Cloud Act right now. Vulnerability management market disruption: there are half a dozen startups already plotting to disrupt the market, likely to come out of stealth in 2026 Future of the SOC: if it's not AI, what is it? What else??? What am I missing? What would you like to see us discuss? Please drop me a line and let me know: adrian.sanabria@cyberriskalliance.com Topic 2: The state of cybersecurity hiring This topic has been in the works for a while! Ayman had a whole podcast and book focused on all the paths people take to get into security. Jackie worked with WiSys on outlining pathways into a cybersecurity career. Whether you're already in cyber or looking for a way in, this segment crams a lot of great advice into just 15-20 minutes. Segment resources: Ayman's personal guide for getting into security https://www.wicys.org/wp-content/uploads/2025/10/WiCyS-Pathways-in-Cyber-PDF-9.24.25.pdf News Finally, in the enterprise security news, Fundings and acquisitions still strong in 2026! Santa might be done delivering gifts, but not protecting Macs! ClickFix attacks Weaponized Raspberry Pis MongoDB incidents for Christmas Top 10 Cyber attacks of 2025 US gets tough on nation state hackers? Brute force attacks on Banks An AI Vending Machine All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-441
First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segment is AI (picard face palm.png). I think 2026 will be THE defining year for GenAI. Three years after the release of ChatGPT, I think we've hit peak GenAI hype and folks are ready for it to put up or shut up. We'll see winners grow and get acquired and losers pivot to something else. More than anything, I want to interview folks who have actually seen it work at scale, rather than just in a cool demo in a vendor sandbox. Also on the agenda for this year: The battle against infostealers and session hijacking: we didn't have a good answer in 2025. When is it coming? Will it include Macs, despite them not having a traditional TPM? The state of trust in outsourcing and third party use (Cloud, MSSPs, SaaS, contractors): 2025 was not a good year for third parties. Lots of them got breached and caused their customers a lot of pain. Also, there's the state of balkanization between the US and... the rest of the entire world. Everyone outside the US seems to be trying to derisk their companies and systems from the Cloud Act right now. Vulnerability management market disruption: there are half a dozen startups already plotting to disrupt the market, likely to come out of stealth in 2026 Future of the SOC: if it's not AI, what is it? What else??? What am I missing? What would you like to see us discuss? Please drop me a line and let me know: adrian.sanabria@cyberriskalliance.com Topic 2: The state of cybersecurity hiring This topic has been in the works for a while! Ayman had a whole podcast and book focused on all the paths people take to get into security. Jackie worked with WiSys on outlining pathways into a cybersecurity career. Whether you're already in cyber or looking for a way in, this segment crams a lot of great advice into just 15-20 minutes. Segment resources: Ayman's personal guide for getting into security https://www.wicys.org/wp-content/uploads/2025/10/WiCyS-Pathways-in-Cyber-PDF-9.24.25.pdf News Finally, in the enterprise security news, Fundings and acquisitions still strong in 2026! Santa might be done delivering gifts, but not protecting Macs! ClickFix attacks Weaponized Raspberry Pis MongoDB incidents for Christmas Top 10 Cyber attacks of 2025 US gets tough on nation state hackers? Brute force attacks on Banks An AI Vending Machine All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-441
First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segment is AI (picard face palm.png). I think 2026 will be THE defining year for GenAI. Three years after the release of ChatGPT, I think we've hit peak GenAI hype and folks are ready for it to put up or shut up. We'll see winners grow and get acquired and losers pivot to something else. More than anything, I want to interview folks who have actually seen it work at scale, rather than just in a cool demo in a vendor sandbox. Also on the agenda for this year: The battle against infostealers and session hijacking: we didn't have a good answer in 2025. When is it coming? Will it include Macs, despite them not having a traditional TPM? The state of trust in outsourcing and third party use (Cloud, MSSPs, SaaS, contractors): 2025 was not a good year for third parties. Lots of them got breached and caused their customers a lot of pain. Also, there's the state of balkanization between the US and... the rest of the entire world. Everyone outside the US seems to be trying to derisk their companies and systems from the Cloud Act right now. Vulnerability management market disruption: there are half a dozen startups already plotting to disrupt the market, likely to come out of stealth in 2026 Future of the SOC: if it's not AI, what is it? What else??? What am I missing? What would you like to see us discuss? Please drop me a line and let me know: adrian.sanabria@cyberriskalliance.com Topic 2: The state of cybersecurity hiring This topic has been in the works for a while! Ayman had a whole podcast and book focused on all the paths people take to get into security. Jackie worked with WiSys on outlining pathways into a cybersecurity career. Whether you're already in cyber or looking for a way in, this segment crams a lot of great advice into just 15-20 minutes. Segment resources: Ayman's personal guide for getting into security https://www.wicys.org/wp-content/uploads/2025/10/WiCyS-Pathways-in-Cyber-PDF-9.24.25.pdf News Finally, in the enterprise security news, Fundings and acquisitions still strong in 2026! Santa might be done delivering gifts, but not protecting Macs! ClickFix attacks Weaponized Raspberry Pis MongoDB incidents for Christmas Top 10 Cyber attacks of 2025 US gets tough on nation state hackers? Brute force attacks on Banks An AI Vending Machine All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-441
The threat that puts you out of business probably won't look like a movie hack, it'll look like a normal email from your CEO. In this episode of the Registered Investment Advisor Podcast, Seth Greene interviews Scott Alldridge, CEO of IP Services and bestselling author of the VisibleOps series, who explains how modern cybercrime actually works and why most small and mid-sized companies are far more vulnerable than they think. Scott shares real breach stories, including how something as simple as leaving a printer password as “1234” led to a $187,000 theft and forced a firm into a merger. He breaks down why cybersecurity is now a board-level issue, how AI is being weaponized by attackers, and what leaders need to be doing right now to protect their data, their money, and their survival. Key Takeaways: → Most companies think “we're too small to be a target,” but attackers actively go after businesses with as few as 100 employees — and even under $1M in revenue. → Only about 1 in 7 cybersecurity breaches ever gets reported, so what you read in the news is a tiny fraction of what's actually happening. → A single weak password (like “1234” on a networked printer) can give a threat actor a doorway into your entire system. → Attackers don't smash and grab; they sit quietly for weeks or months, watch how you communicate, then imitate leadership to trigger wire transfers that look totally normal. → The “human layer” is still the biggest risk: phishing, social engineering, and reused or weak credentials are where most compromises begin. Scott Alldridge has spent three decades on the frontlines of cyber warfare—turning escalating threats into competitive advantage for business leaders. As co-founder of the IT Process Institute and creator of the globally adopted VisibleOps framework (400,000+ copies sold), he shaped how enterprises worldwide secure and scale technology. His Amazon bestseller, VisibleOps Cybersecurity, is the definitive roadmap for integrating Zero Trust principles into real business results. Today, as CEO of IP Services, one of America's most trusted MSSPs, Scott helps executives verify—not just trust—their cybersecurity posture. Driven by both expertise and altruism, Scott's mission is to ensure businesses of all sizes are resilient and protected—not only to safeguard revenue, but to prevent the devastating personal and professional fallout of cyberattacks. A globally recognized thought leader with 618K+ social media followers, he leverages his platform to raise awareness, share real-world breach stories, and arm leaders with actionable strategies that save companies before it's too late. Connect With Scott: Website: https://ipservices.com/ Instagram: https://www.instagram.com/scottalldridge1/ LinkedIn: https://www.linkedin.com/in/scott-alldridge-1a976/ FREE OFFERSText "Secure25" to 1-541-359-1269 to receive your free Visible Ops Executive Companion book and a free Penetration Scan Test (first 3 listeners only) Learn more about your ad choices. Visit megaphone.fm/adchoices
Discover how industry veteran Larry Meador, Cavelo's new Channel Chief, is transforming the MSP channel. Cavelo empowers Managed Service Providers with a unified Attack Surface Management and Data Security Posture Management platform—offering automated data discovery, classification, vulnerability management, and compliance-ready solutions. Built for MSPs and MSSPs, Cavelo helps partners reduce cyber risk, streamline operations, and deliver scalable, data-first security services that boost profitability and client trust. Full Video Podcast Link: https://youtu.be/D6xFmrlUXDY --------------------------------------------------- Connect with us! --------------------------------------------------- MSP Unplugged https://mspunplugged.com/ Paco Lebron from ProdigyTeks:Powered by MSP Owners Group Email: paco@mspunplugged.com Rick Smith from Renactus Technology Email: rick@mspnplugged.com Justin Gilliam from Bacheler Technologies https://www.linkedin.com/in/justin-gilliam-96288a56
Building a cyber security team isn't optional anymore; it's the difference between recovering from ransomware and going out of business. In this episode, Curtis and Prasanna explain why hardening your backup infrastructure is only half the battle. You need professionals who know how to configure XDR systems without drowning you in false positives, blue teams to defend your environment, and red teams to test whether your defenses actually work. They cover the role of MSSPs, incident response planning, cyber insurance requirements, and why attempting ransomware response on your own is like those old TV warnings: "Don't try this at home." If you've been following their series on backup basics and system hardening, this episode ties it all together with the human element that makes or breaks your recovery plan.
All links and images can be found on CISO Series. Check out this post by Christofer Hoff of Truist for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Caleb Sima, builder, WhiteRabbit. Joining them is Crystal Chatam, vp of cybersecurity, Speedcast. In this episode: Understanding the fundamentals The grift of superficial expertise Hands-on experience matters A vulnerability at the leadership level Huge thanks to our sponsor, Stellar Cyber By shining a bright light on the darkest corners of security operations, Stellar Cyber empowers organizations to see incoming attacks, know how to fight them, and act decisively – protecting what matters most. Stellar Cyber's award-winning open security operations platform includes AI-driven SIEM, NDR, ITDR, Open XDR, and Multi-Layer AI™ under one unified platform with a single license. With ⅓ of the global top 250 MSSPs and over 14,000 customers worldwide, Stellar Cyber is one of the most trusted leaders in security operations. Learn more at https://stellarcyber.ai/.
Jim McDonald and Jeff Steadman sit down with Mike Reiring of RSM at InfoSec World 2025 to explore how managed service providers are reshaping IT and identity operations. They dig into the differences between MSPs and MSSPs, how to choose the right partner, and how AI is transforming help desks, problem management, and security monitoring. The conversation closes with a fun dive into Mike's passion for photography and how creativity ties into continuous learning in tech.Connect with Mike: https://www.linkedin.com/in/mreiring/Connect with us on LinkedIn:Jim McDonald: https://www.linkedin.com/in/jimmcdonaldpmp/Jeff Steadman: https://www.linkedin.com/in/jeffsteadman/Visit the show on the web at http://idacpodcast.comChapters00:00 Intro – Live from InfoSec World 202502:00 Meet Mike Reiring of RSM04:30 Evolution of Managed Service Providers06:30 Shared Accounts, Identity, and Security Maturity09:00 Vendor Gaps and Federated Access Challenges11:30 What Makes a Good MSP Partner13:00 The Cost and Effort of Changing Providers16:30 MSP vs MSSP – Key Differences18:30 Coordination Between Managed Providers21:30 Top 3 Questions to Ask Your MSP25:00 Identity Ownership: IT or Security?27:30 Licensing, Active Directory, and Hidden Accounts30:00 RFP Challenges and Procurement Pitfalls32:00 Measuring Risk and Reducing Identity Exposure34:30 Vendor Management and Shadow IT Risks35:00 How AI Is Transforming MSP and MSSP Operations38:30 AI, Problem Management, and the Future of Help Desks42:30 Photography, Creativity, and Continuous Learning48:00 Closing Thoughts and IDAC OutroKeywordsIDAC, Identity at the Center, Jeff Steadman, Jim McDonald, Mike Reiring, RSM, InfoSec World 2025, Managed Service Provider, MSP, MSSP, AI in Cybersecurity, Help Desk, Identity Management, Managed Identity, Partner Transparency, IT Outsourcing, Risk Reduction, Problem Management, Active Directory, DaVinci Resolve, Photography in Tech, Identity Governance, Cybersecurity Podcast
We weigh the promise and peril of the AI agent economy, pressing into how overprovisioned non-human identities, shadow AI, and SaaS integrations expand risk while go-to-market teams push for speed. A CMO and a CFO align on governance-first pilots, PLG trials, buyer groups, and the adoption metrics that sustain value beyond the sale.• AI adoption surge matched by adversary AI• Overprovisioned agents and shadow AI in SaaS• Governance thresholds before budget scale• PLG trials, sandbox, and POV sequencing• Visualization to reach the aha moment• Buying groups, ICP, and economic buyer alignment• Post‑sales usage, QBRs, NRR and churn signals• Zero trust limits and non-human identities• Breach disclosures as industry standards• Co-sourcing MSSP with in-house oversightSecurity isn't slowing AI down; it's the unlock that makes enterprise AI valuable. We dive into the AI agent economy with a CMO and a CFO who meet in the messy middle. The result is a practical blueprint for moving from hype to governed production without killing momentum.We start by mapping where controls fail: once users pass SSO and MFA, agents often operate beyond traditional identity and network guardrails. That's how prompts pull sensitive deal data across Salesforce and Gmail, and how third‑party API links expand the attack surface. From there, we lay out an adoption sequence that balances trust and speed. Think frictionless free trials and sandboxes that reach an immediate “aha” visualization of shadow AI and permissions, then progress to a scoped POV inside the customer's environment with clear policies and measurable outcomes. Along the way, we detail the buying group: economic buyers who sign and practitioners who live in the UI, plus the finance lens that sets pilot capital, milestones, and time-to-value expectations.We also challenge sacred cows. Zero trust is essential, but attackers increasingly log in with valid credentials and pivot through integrations, so verification must include non-human identities and agent-to-agent controls. Breach disclosures, far from being a greater threat than breaches, are foundational to ecosystem trust and faster remediation. And while MSSPs add critical scale, co-sourcing—retaining strategic oversight and compliance ownership—keeps accountability inside. If you care about ICP, PLG motions, PQLs, NRR, or simply reducing AI risk while driving growth, this conversation turns buzzwords into a playbook you can run.Vamshi Sriperumbudur: https://www.linkedin.com/in/vamsriVamshi Sriperumbudur was recently the CMO for Prisma SASE at Palo Alto Networks, where he led a complete marketing transformation, driving an impact of $1.3 billion in ARR in 2025 (up 35%) and establishing it as the platform leader. Chithra Rajagopalan - https://www.linkedin.com/in/chithra-rajagopalan-mba/Chithra Rajagopalan is the Head of Finance at Obsidian Security and former Head of Finance at Glue, and she is recognized as a leader in scaling businesses. Chithra is also an Investor and Advisory Board member for Campfire, serving as the President and Treasurer of Blossom Projects.Website: https://www.position2.com/podcast/Rajiv Parikh: https://www.linkedin.com/in/rajivparikh/Sandeep Parikh: https://www.instagram.com/sandeepparikh/Email us with any feedback for the show: sparkofages.podcast@position2.com
In this episode of Partnerships Unraveled, we sit down with Miguel Carrero, VP of Global Partner Ecosystem Growth at WatchGuard, a seasoned leader with a rare blend of experience across startups, private equity-backed firms, and large enterprises. Miguel shares his channel philosophy shaped by decades of working across partner models, market segments, and organizational structures.We unpack what it means to “meet partners where they are” moving beyond legacy segmentation models to frameworks that prioritize partner business models, motivations, and operational needs. Miguel outlines how WatchGuard reimagines partner tiering through training engagement and value alignment, ensuring programs resonate with everyone from boutique MSSPs to high-volume VARs. For channel professionals looking for practical tactics to better segment, enable, and motivate partners across the spectrum, this one's a must-listen.Tune in to gain proven perspectives on sustainable partner profitability, modern channel marketing, and how true partner-centric DNA, backed by executive sponsorship and organizational design, can drive scalable success._________________________Learn more about Channext
The threat that puts you out of business probably won't look like a movie hack, it'll look like a normal email from your CEO. In this episode of Sharkpreneur, Seth Greene interviews Scott Alldridge, CEO of IP Services and bestselling author of the Visible Ops series, who explains how modern cybercrime actually works and why most small and mid-sized companies are far more vulnerable than they think. Scott shares real breach stories, including how something as simple as leaving a printer password as “1234” led to a $187,000 theft and forced a firm into a merger. He breaks down why cybersecurity is now a board-level issue, how AI is being weaponized by attackers, and what leaders need to be doing right now to protect their data, their money, and their survival. Key Takeaways: → Most companies think “we're too small to be a target,” but attackers actively go after businesses with as few as 100 employees — and even under $1M in revenue. → Only about 1 in 7 cybersecurity breaches ever gets reported, so what you read in the news is a tiny fraction of what's actually happening. → A single weak password (like “1234” on a networked printer) can give a threat actor a doorway into your entire system. → Attackers don't smash and grab; they sit quietly for weeks or months, watch how you communicate, then imitate leadership to trigger wire transfers that look totally normal. → The “human layer” is still the biggest risk: phishing, social engineering, and reused or weak credentials are where most compromises begin. Scott Alldridge has spent three decades on the frontlines of cyber warfare—turning escalating threats intocompetitive advantage for business leaders. As co-founder of the IT Process Institute and creator of the globally adopted VisibleOps framework (400,000+ copies sold), he shaped how enterprises worldwide secure and scale technology. His Amazon bestseller, VisibleOps Cybersecurity, is the definitive roadmap for integrating Zero Trust principles into real business results. Today, as CEO of IP Services, one of America's most trusted MSSPs, Scott helps executives verify—not just trust—their cybersecurity posture. Driven by both expertise and altruism, Scott's mission is to ensure businesses of all sizes are resilient and protected—not only to safeguard revenue, but to prevent the devastating personal and professional fallout of cyberattacks. A globally recognized thought leader with 618K+ social media followers, he leverages his platform to raise awareness, share real-world breach stories, and arm leaders with actionable strategies that save companies before it's too late. Connect With Scott Aldridge: Website: https://ipservices.com/ Instagram: https://www.instagram.com/scottalldridge1/?hl=en LinkedIn: https://www.linkedin.com/in/scott-alldridge-1a976/ Learn more about your ad choices. Visit megaphone.fm/adchoices
The threat that puts you out of business probably won't look like a movie hack, it'll look like a normal email from your CEO. In this episode of Sharkpreneur, Seth Greene interviews Scott Alldridge, CEO of IP Services and bestselling author of the Visible Ops series, who explains how modern cybercrime actually works and why most small and mid-sized companies are far more vulnerable than they think. Scott shares real breach stories, including how something as simple as leaving a printer password as “1234” led to a $187,000 theft and forced a firm into a merger. He breaks down why cybersecurity is now a board-level issue, how AI is being weaponized by attackers, and what leaders need to be doing right now to protect their data, their money, and their survival. Key Takeaways: → Most companies think “we're too small to be a target,” but attackers actively go after businesses with as few as 100 employees — and even under $1M in revenue. → Only about 1 in 7 cybersecurity breaches ever gets reported, so what you read in the news is a tiny fraction of what's actually happening. → A single weak password (like “1234” on a networked printer) can give a threat actor a doorway into your entire system. → Attackers don't smash and grab; they sit quietly for weeks or months, watch how you communicate, then imitate leadership to trigger wire transfers that look totally normal. → The “human layer” is still the biggest risk: phishing, social engineering, and reused or weak credentials are where most compromises begin. Scott Alldridge has spent three decades on the frontlines of cyber warfare—turning escalating threats intocompetitive advantage for business leaders. As co-founder of the IT Process Institute and creator of the globally adopted VisibleOps framework (400,000+ copies sold), he shaped how enterprises worldwide secure and scale technology. His Amazon bestseller, VisibleOps Cybersecurity, is the definitive roadmap for integrating Zero Trust principles into real business results. Today, as CEO of IP Services, one of America's most trusted MSSPs, Scott helps executives verify—not just trust—their cybersecurity posture. Driven by both expertise and altruism, Scott's mission is to ensure businesses of all sizes are resilient and protected—not only to safeguard revenue, but to prevent the devastating personal and professional fallout of cyberattacks. A globally recognized thought leader with 618K+ social media followers, he leverages his platform to raise awareness, share real-world breach stories, and arm leaders with actionable strategies that save companies before it's too late. Connect With Scott Aldridge: Website: https://ipservices.com/ Instagram: https://www.instagram.com/scottalldridge1/?hl=en LinkedIn: https://www.linkedin.com/in/scott-alldridge-1a976/ Learn more about your ad choices. Visit megaphone.fm/adchoices
I used to think "Always Be Closing" was outdated, sleazy sales advice, but I've completely changed my mind. In this video, I break down why ABC is actually the foundation of consultative selling for MSSPs and B2B sales. The truth is, every single step in your sales process—from discovery calls to assessments to proposals—should be designed with one goal: moving the deal forward and closing the sale. I'll show you the simple framework I use to redesign sales processes, explain why most salespeople are treating discovery and assessments like information gathering instead of closing opportunities, and reveal the biggest mistake I see during proposals that kills deals. If you're in MSP sales or any B2B selling, this reframe will change how you approach every interaction with prospects.//Welcome to Repeatable Revenue, hosted by strategic growth advisor , Ray J. Green.About Ray:→ Former Managing Director of National Small & Midsize Business at the U.S. Chamber of Commerce, where he doubled revenue per sale in fundraising, led the first increase in SMB membership, co-built a national Mid-Market sales channel, and more.→ Former CEO operator for several investor groups where he led turnarounds of recently acquired small businesses.→ Current founder of MSP Sales Partners, where we currently help IT companies scale sales: www.MSPSalesPartners.com→ Current Sales & Sales Management Expert in Residence at the world's largest IT business mastermind.→ Current Managing Partner of Repeatable Revenue Ventures, where we scale B2B companies we have equity in: www.RayJGreen.com//Follow Ray on:YouTube | LinkedIn | Facebook | Twitter | Instagram
Send us a textIn this episode of Joey Pinz Discipline Conversations, Joey sits down with Scott Fuhriman, cybersecurity veteran and leader at Inveri, live from the MSP Summit in Orlando.Scott shares his 25+ years of cybersecurity experience, explaining how Inveri's runtime integrity technology, born from NSA research, helps MSPs and MSSPs detect hidden in-memory attacks, rootkits, and advanced threats that traditional tools miss. He highlights why protecting this overlooked layer is crucial to preserving revenue, preventing churn, and maintaining customer trust.The conversation also touches on Scott's personal discipline journey — from starting as a young PC tech overwhelmed by information to building a career through self-study, mentorship, and consistency. He and Joey discuss how MSPs can choose the right vendors, strengthen their security stacks, and enable long-term resilience in a competitive market.
Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: Bridging Military and Civilian Cybersecurity: Leadership, Skills, and Lifelong Learning with Christopher RossPub date: 2025-09-15Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode, host Aaron Crow sits down with cybersecurity leader and National Guard threat hunt team lead Christopher Ross, diving into the real-world experiences that shape careers in the intersecting worlds of IT and OT security. Chris shares his 18-year journey from joining the military with a passion for computers to leading critical infrastructure cybersecurity efforts - both in uniform and in the private sector. Together, Aaron and Chris break down myths about gatekeeping, discuss the unique challenges of military versus civilian roles, and highlight lessons learned along the way. From imposter syndrome to servant leadership, the conversation unpacks how effective communication, continuous training, and the willingness to learn from failure fuel professional growth. Chris also reflects on how military training instills risk mitigation and teamwork, and how those skills can translate - and sometimes clash - with civilian cybersecurity cultures. They talk certifications, hands-on learning, the importance of meaningful tabletop exercises, and the evolving landscape as AI powers both attackers and defenders. Whether you're a veteran, a fresh analyst, or just passionate about cybersecurity, this honest and energetic exchange will leave you motivated to keep learning, keep growing, and keep protecting it all. So grab your energy drink and tune in for a conversation that proves everyone in cyber, no matter their path, has wisdom worth sharing. Key Moments: 05:30 Military Adventures Surpass Civilian Opportunities 07:28 Military vs. Civilian Leadership Dynamics 10:42 Clarifying Civilian vs Military Missions 12:22 Leadership: Addressing Miscommunication & Misalignment 15:45 Toxic Leadership and Military Transition 20:01 Reliance on Tools vs. Core Skills 22:29 "Forgotten Skills Fade Over Time" 25:13 Boosting Confidence in New Roles 29:42 Interactive Training and Environmental Protection 32:37 Purple Teaming Strategy Insights 36:15 Persistence in Skill Development 39:04 Soft Skills Matter for Career Growth 42:44 "Technical & Business Acumen Fusion" 44:41 Military: Career Value and Benefits 48:09 "Cyber Education for K-12" Resources Mentioned : https://www.ransomware.live/ comprehensive resource that tracks and monitors ransomware groups and their activities. https://ransomwhe.re/ tracks ransomware payments by collecting and analyzing cryptocurrency addresses associated with ransomware attacks. https://www.ransom-db.com/ real-time ransomware tracking platform that collects, indexes, and centralizes information on ransomware groups and their victims. About the Guest : Christopher Ross is a veteran and cybersecurity leader with over 15 years of experience in Security Operations, Incident Response, and threat hunting across defense and fintech. A Chief Warrant Officer in the Army National Guard's Cyber Brigade, he has led blue and purple team operations, translating military discipline and teamwork into enterprise cyber defense strategies. In his civilian career, Christopher has built and led SOC teams, integrated MSSPs, and driven automation to strengthen detection and response capabilities at organizations including MACOM, CFGI, Draper, and Abiomed. He holds a Master of Science in Information Security Engineering from the SANS Technology Institute and more than a dozen GIAC certifications. An Order of Thor recipient from the Military Cyber Professional Association. Christopher is passionate about developing playbooks, advancing training pipelines, and mentoring the next generation of defenders. Sharing lessons from his veteran-to-cyber journey, practical insights on certification paths and ROI, and real-world stories from blue-team operations and purple-team collaboration. Visit https://public.milcyber.org/ The Military Cyber Professionals Association is the only U.S. military professional association with cyber at its core. It connects, supports, and elevates those who serve in or support the military cyber domain, while investing in future generations through education and mentorship. Connect Christopher : https://www.linkedin.com/in/christopheraross-ma/ Connect With Aaron Crow: Website: www.corvosec.com LinkedIn: https://www.linkedin.com/in/aaronccrow Learn more about PrOTect IT All: Email: info@protectitall.co Website: https://protectitall.co/ X: https://twitter.com/protectitall YouTube: https://www.youtube.com/@PrOTectITAll FaceBook: https://facebook.com/protectitallpodcast To be a guest or suggest a guest/episode, please email us at info@protectitall.co Please leave us a review on Apple/Spotify Podcasts: Apple - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Cybersecurity & Compliance w/ Paige Hanson of Secure Labs - AZ TRT S06 EP15 (277) 8-17-2025 What We Learned This Week: A cybersecurity breach can cost more than just data—it can damage infrastructure and destroy client confidence. Even smaller companies (50–100 employees) need structured safeguards, compliance, and often outside MSSPs to stay secure. Secure Labs provides a roadmap for companies to meet regulatory standards like HIPAA, ISO 27001, and SOC 2, helping them win bigger clients. AI-driven threats like voice cloning and deepfakes make personal and business digital security more important than ever. Compliance isn't cheap—outside audits can run $5,000–$50,000 annually, while Big Four audits may exceed $100,000. Guest: Paige Hanson, Co-Founder of Secure Labs LinkedIn: https://www.linkedin.com/in/hello-paige-hanson Founder of SecureLabs | Helping businesses meet their security compliance standards | Fractional GRC |
Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platform at Black Hat 2025 A Stellar Cyber Event Coverage of Black Hat USA 2025 Las VegasAn ITSPmagazine Brand Story with Subo Guha, Senior Vice President Product, Stellar Cyber____________________________Security operations centers face an unprecedented challenge: thousands of daily alerts overwhelming analyst teams while sophisticated threats demand immediate response. At Black Hat USA 2025 in Las Vegas, Stellar Cyber presented a revolutionary approach that fundamentally reimagines how SOCs operate in the age of AI-driven threats.Speaking with ITSPmagazine's Sean Martin, Subo Guha, Senior Vice President of Products at Stellar Cyber, outlined the company's vision for transforming security operations through their human-augmented autonomous SOC platform. Unlike traditional approaches that simply pile on more automation, Stellar Cyber recognizes that effective security requires intelligent collaboration between AI and human expertise.The platform's three-layer architecture ingests data from any source – network devices, applications, identities, and endpoints – while maintaining vendor neutrality through open EDR integration. Organizations can seamlessly work with CrowdStrike, SentinelOne, Sophos, or other preferred solutions without vendor lock-in. This flexibility proves crucial for enterprises navigating complex security ecosystems where different departments may have invested in various endpoint protection solutions.What sets Stellar Cyber apart is their autonomous SOC concept, which dramatically reduces alert volume from hundreds of thousands to manageable numbers within days rather than weeks. The platform's AI-driven auto-triage capability identifies true positives among thousands of false alarms, presenting analysts with prioritized "verdicts" that demand attention. This transformation addresses one of security operations' most persistent challenges: alert fatigue that leads to missed threats and burned-out analysts.The revolutionary AI Investigator copilot enables natural language interaction, allowing analysts to query the system conversationally. An analyst can simply ask, "Show me all impossible travel incidents between midnight and 4 AM," and receive actionable intelligence immediately. This democratization of security operations means junior analysts can perform at senior levels without extensive coding knowledge or years of experience navigating complex query languages.Identity threat detection and response (ITDR) emerged as another critical focus area during the Black Hat presentation. With identity becoming the new perimeter, Stellar Cyber integrated sophisticated user and entity behavior analytics (UEBA) directly into the platform. The system detects impossible travel scenarios, credential attacks, and lateral movement patterns that indicate compromise. For instance, when a user logs in from Portland at 11 PM and then appears in Moscow 30 minutes later, the platform immediately flags this physical impossibility.The identity protection extends beyond human users to encompass non-human identities, addressing the growing threat of automated attacks powered by large language models. Hackers now leverage generative AI to create credential attacks at unprecedented scale and sophistication, making robust identity security more critical than ever.Guha emphasized that AI augmentation doesn't displace security professionals but elevates them. By automating mundane tasks, analysts focus on strategic decision-making and complex threat hunting. MSSPs report dramatic efficiency gains, scaling operations without proportionally increasing headcount. Where previously a hundred thousand alerts might take weeks to process, requiring extensive junior analyst teams, the platform now delivers actionable insights within days with smaller, more focused teams.The platform's unified approach eliminates tool sprawl, providing CISOs with real-time visualization of their security posture. Executive reporting becomes instantaneous, with high-priority verdicts clearly displayed for rapid decision-making. This visualization capability transforms how security teams communicate with leadership, replacing lengthy reports with dynamic dashboards that convey risk and response status at a glance.Real-world deployments demonstrate significant operational improvements. Organizations report faster mean time to detection and response, reduced false positive rates, and improved analyst satisfaction. The platform's learning capabilities mean it becomes more intelligent over time, adapting to each organization's unique threat landscape and operational patterns.As organizations face increasingly sophisticated threats powered by generative AI, Stellar Cyber's human-augmented approach represents a paradigm shift. By combining AI intelligence with human intuition, the platform delivers faster threat detection, reduced false positives, and empowered security teams ready for tomorrow's challenges. The company's commitment to continuous innovation, evidenced by rapid feature releases between RSA and Black Hat, positions them at the forefront of next-generation security operations. Learn more about Stellar Cyber: https://itspm.ag/stellar-cyber--inc--357947Note: This story contains promotional content. Learn more.Guest: Subo Guha, Senior Vice President Product, Stellar Cyber | https://www.linkedin.com/in/suboguha/ResourcesLearn more and catch more stories from Stellar Cyber: https://www.itspmagazine.com/directory/stellarcyberLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
"The whole is far greater than the sum of the parts—especially when telcos and satellite operators work together." — Gareth Kentish, Alvatross In this episode of Technology Reseller News, Publisher Doug Green speaks with Gareth Kentish of Alvatross about how the company is enabling global connectivity through the convergence of terrestrial and satellite communications—powered by open standards, modular software, and strategic industry collaboration. Alvatross, a five-year-old startup backed by Spanish systems integrator Satec, blends the agility of a tech disruptor with the resources and telecom experience of an established player. Kentish explains that Alvatross' “Lego block” approach to operational support systems allows telcos and satellite operators to add, modify, and scale services without costly, monolithic system overhauls. A key focus is enabling hybrid terrestrial-satellite models to ensure continuity of communications—even in disaster scenarios—through projects such as TM Forum's “Tech for Good” Catalyst, which demonstrated how first responders could rapidly activate connectivity via a user-friendly marketplace. Kentish highlights several industry drivers: The growing importance of LEO satellite constellations and seamless integration with terrestrial networks Open digital architectures to reduce cost-to-serve and accelerate service innovation The role of AI in enhancing operations—provided operators first address data quality The need for collaboration to unlock opportunities across telecom and satellite ecosystems Looking ahead, Kentish sees major opportunities for MSPs, MSSPs, and service providers who embrace convergence, modularity, and partnerships. He emphasizes that success will depend not just on technology, but also on cultivating the right culture, collaboration, and consensus—both within companies and across the industry. To learn more, visit www.alvatross.io.
Why Exclusive Networks says modern cybersecurity requires more than “pick, pack, and ship” “We're not just a distributor. We're a channel services aggregator — an extension of our partners' businesses.” — Jason Beal, President, Americas, Exclusive Networks In this episode of Technology Reseller News, publisher Doug Green sits down with Jason Beal, President, Americas, and Andrew Warren, VP of Sales and Marketing, North America, to explore how Exclusive Networks is rewriting the rules of cybersecurity distribution in North America. More than just moving product, Exclusive Networks delivers white-glove service, certified expertise, and true channel partnership — simplifying cybersecurity sales and delivery for MSPs, MSSPs, and solution providers. With over 45 country operations and reach into 170 markets, the company now brings its global playbook to North America with fresh investments, expanded services, and a unique partner-first approach. Key Highlights from the Conversation: Partner Empathy as Philosophy Exclusive Networks builds programs around the real-world needs of partners — from helping an MSP with student-powered hiring programs to assisting with complex financing, logistics, and field deployment. From MSP to MSSP, Cyber Expertise at Every Step Whether you're a security-focused MSP or a fully-fledged MSSP, Exclusive offers domain expertise, hands-on technical support, and services like SASE implementation, firewall deployment, and SOC augmentation through its CloudRise acquisition. Training & Certification Simplified With global training centers and relationships with top vendors like Fortinet and Palo Alto Networks, Exclusive lowers the barrier for entry but offers high benefits for those who commit to deep certification and specialization. Demand Generation for End Users and Partners Exclusive not only helps vendors reach the market — it also helps partners generate demand directly from end users, creating new revenue opportunities across the lifecycle. A New Kind of Distributor Exclusive Networks calls itself a “channel services aggregator”, offering a full lifecycle of services — from sales support and technology enablement to post-sales adoption and renewals — redefining what a modern cybersecurity distributor should be. What's Next? Expect new vendor partnerships, expanded services, and continued investment in dedicated local support across the U.S. and Canada — all backed by the belief that “people still do business with people.” Learn more at: www.exclusive-networks.com
"Internet connectivity is no longer a nice-to-have—it's a have-to-have. Without it, your business stops." — Jake Jacoby, TELCLOUD In the latest episode of the POTS and Shots podcast series from TELCLOUD, Technology Reseller News Publisher Doug Green is joined by Jake Jacoby of TELCLOUD and Christian Hernandez, Customer Success Manager at ATEL, for a conversation that goes beyond POTS replacement—it's about next-generation connectivity and opportunity for resellers. As legacy copper lines continue to disappear, the pressure is on for MSPs, MSSPs, and telecom resellers to find reliable, scalable, and forward-looking solutions. According to Hernandez, that's exactly what ATEL is delivering. A U.S.-based OEM with a global backbone, ATEL has developed rugged 5G routers like the PW550, designed to meet the growing demands of modern connectivity—including the ability to move antennas up to 250 feet away from the telco room to achieve higher signal quality. Jacoby underscored why TELCLOUD partnered with ATEL: “We're done with LTE. 5G is the future. And it's not just about replacing a phone line—it's about building in redundancy and giving businesses the internet resilience they need to operate.” This podcast highlights why 2025 is shaping up to be the year of POTS replacement. TELCLOUD and ATEL are helping resellers modernize customer environments while keeping costs down and reliability up. And with TELCLOUD's full commitment to 5G and flexible outdoor/indoor router deployments, resellers have a real shot at transforming POTS into a growth engine. To celebrate, the crew closed out the episode with a taste of ATEL's own 20-year anniversary aged tequila—a smooth extra añejo with hints of bourbon, coffee, and chocolate. As Jacoby joked, “You can't buy this one on the street… you've got to come visit.” Learn more: ATEL TELCLOUD | 844-900-2270
"We're not just enabling secure outcomes — we're simplifying how partners deliver them." — Brian Feeney, VP of Global Partner Security Sales, Cisco At Cisco Live 2025 in San Diego, Technology Reseller News publisher Doug Green sat down with Brian Feeney, Vice President of Global Partner Security Sales at Cisco, to explore how the company is aligning security innovation with real-world partner needs in an era dominated by AI and complexity. Feeney, whose two-year-old role was created to consolidate and scale Cisco's global partner strategy for security, leads a team of over 260 professionals dedicated to helping Cisco's VARs, MSPs, MSSPs, cloud providers, and global partners navigate a rapidly evolving cybersecurity landscape. Cisco's Three-Pillar Security Strategy: Hybrid Mesh Firewall Universal ZTNA (Zero Trust Network Access) The SOC of the Future (with Splunk Integration) All three areas are now AI-infused by design, not bolted on — a shift exemplified by Cisco's autonomous firewall assistant, which reduces human effort while improving policy execution. Key Cisco Live Announcements: Free Splunk ingestion for Cisco firewall customers, addressing cost concerns and earning applause during the keynote. Streamlined portfolio: Cisco has consolidated 30+ point products into 3 strategic solution sets — user, breach, and cloud — dramatically simplifying the sales and adoption process for partners. Enhanced partner support tools like a “concierge deal registration desk” — offering one-click access to technical, sales, and promotional resources. “This isn't about selling more SKUs,” Feeney said. “It's about helping partners win with less complexity, more margin, and stronger customer outcomes.” Feeney emphasized Cisco's commitment to AI enablement, noting that while only 4% of enterprises are “AI-ready,” partner demand for both securing AI infrastructure and leveraging AI for defense is surging. Cisco is delivering: Expert-led deep dives for top AI-focused partners Scalable enablement through Talos threat intel, learning platforms, and continuous updates AI integrated throughout the security stack — from SOC automation to endpoint visibility The interview concluded with Feeney highlighting Cisco's investment in making security more accessible, operationally efficient, and partner-friendly, even for small or emerging partners. “We want to be the voice and the resource our security partners trust — not just with technology, but with outcomes.” To learn more, visit cisco.com/security.
In episode 135 of Cybersecurity Where You Are, Sean Atkinson is joined live at RSAC Conference 2025 by five attendees, including two Center for Internet Security® (CIS®) employees. He conducts a lightning chat with each attendee to get their thoughts about the conference, how it reflects the changing cybersecurity industry, and the role CIS plays in this ongoing evolution. Here are some highlights from our episode:00:40. Stephanie Gass, Sr. Director of Information Security at CISHow to start creating a policy and make it effective through implementation processesA transition to an approach integrating mappings for CIS security best practicesThe use of GenAI and security champions to make this transition04:08. Brad Bock, Director of Product Management at ChainguardBuilding and compiling security from the ground up in open-source container imagesTrusting pre-packaged software in an increasingly complex worldSupport of customer compliance with attestation, SBOMs, and vulnerability remediation07:43. Stephane Auger, Vice President Technologies and CISO at Équipe MicrofixCustomer awareness and other top challenges for MSPs and MSSPsThe use of case studies and referrals to communicate the importance of cybersecurityA growing emphasis on cyber risk insurance as media attention around breaches grows11:36. Brent Holt, Director of Cybersecurity Technology at Edge Solutions LLCHow the CIS Critical Security Controls facilitates a consultative approach to customersThe importance of knowing where each company is in their use of GenAIMapping elements of a portfolio to CIS security best practices17:23. Mishal Makshood, Sr. Cloud Security Account Executive at CISThe use of learning and research to investigate GenAI's utility for CISAn aspiration to scale efficiency and drive improvements with GenAI trainingA reminder to augment human thought, not replace it, with GenAIResourcesEpisode 63: Building Capability and Integration with SBOMsMapping and ComplianceCybersecurity for MSPs, MSSPs, & ConsultantsEpisode 130: The Story and Future of CIS Thought LeadershipIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.
DORA, Risk, and Resilience: What Carriers, MSPs, and MSSPs Need to Know Now, "DORA, Risk, and Resilience: What Carriers, MSPs, and MSSPs Need to Know Now" “You can outsource the function — but you can never outsource the risk.” That's the stark reminder from Jenna Wells of Supply Wisdom, who joins Technology Reseller News Publisher Doug Green for a timely and wide-ranging conversation on the Digital Operational Resilience Act (DORA). Though it's an EU regulation, DORA's scope reaches far beyond Europe, impacting financial institutions, carriers, MSPs, MSSPs, and enterprises worldwide. Now in effect since January 2025, DORA requires firms to actively monitor and manage their third-party information and communications technology (ICT) providers — vendors that store, create, or share data. That's a tall order in a hyper-connected world where cloud services, telecom carriers, and AI infrastructure are interwoven into every business process. Wells explains that DORA compliance begins with full visibility into your outsourced ecosystem. Organizations must first identify their entire vendor population, then drill down to understand which of those suppliers are truly critical. From there, they must implement continuous monitoring — not just annual risk reviews — and prepare robust backup plans to ensure operational continuity if a vendor falters. The implications for carriers and MSPs are particularly acute. These organizations are linchpins of global communications and critical infrastructure — and often rely on their own layers of third-party vendors. Wells stresses that identifying service concentration risks, establishing redundancies, and planning for hot rollovers are essential steps to avoid costly downtime and regulatory exposure. Drawing on her experience managing third-party risk at Iron Mountain, Wells underscores how tools like Supply Wisdom can simplify the path to compliance. By automating risk monitoring and surfacing early warning signs of disruption, organizations not only stay ahead of regulation — they gain a powerful competitive edge. With enforcement timelines progressing, Wells offers a clear message: DORA compliance is no longer a future issue. It's here. And those who act now will be better protected, more resilient, and more trusted by their customers and partners. Learn more: https://www.supplywisdom.com
In this episode, Subo Guha, Vice President of Product Management at Stellar Cyber, shares how the company is reshaping cybersecurity operations for managed service providers (MSPs) and their customers. Stellar Cyber's mission is to simplify security without compromising depth—making advanced cybersecurity capabilities accessible to organizations without enterprise-level resources.Subo walks through the foundations of their open XDR platform, which allows customers to retain the endpoint and network tools they already use—such as CrowdStrike or SentinelOne—without being locked into a single ecosystem. This flexibility proves especially valuable to MSSPs managing dozens or hundreds of customers with diverse toolsets, including those that have grown through acquisitions. The platform's modular sensor technology supports IT, OT, and hybrid environments, offering deep packet inspection, network detection, and even user behavior analytics to flag potential lateral movement or anomalous activity.One of the most compelling updates from the conversation is the introduction of their autonomous SOC capability. Subo emphasizes this is not about replacing humans but amplifying their efforts. The platform groups alerts into actionable cases, reducing noise and allowing analysts to respond faster. Built-in machine learning and threat intelligence feeds enrich data as it enters the system, helping determine if something is benign or a real threat.The episode also highlights new program launches like Infinity, which enhances business development and peer collaboration for MSSP partners, and their Cybersecurity Alliance, which deepens integration across a wide variety of security tools. These efforts reflect Stellar Cyber's strong commitment to ecosystem support and customer-centric growth.Subo closes by reinforcing the importance of scalability and affordability. Stellar Cyber offers a single platform with unified licensing to help MSSPs grow without adding complexity or cost. It's a clear statement: powerful security doesn't need to be out of reach for smaller teams or companies.This episode offers a practical view into what it takes to operationalize cybersecurity across diverse environments—and why automation with human collaboration is the path forward.Learn more about Stellar Cyber: https://itspm.ag/stellar-cyber--inc--357947Note: This story contains promotional content. Learn more.Guest: Subo Guha, Senior Vice President Product, Stellar Cyber | https://www.linkedin.com/in/suboguha/ResourcesLearn more and catch more stories from Stellar Cyber: https://www.itspmagazine.com/directory/stellarcyberLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, subo guha, xdr, mssp, cybersecurity, automation, soc, ai, ot, threat detection, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
“We're turning a mandate into an operational advantage.” — Barbara Sharnak, SVP of Business Development, Relay In a wide-ranging conversation with Technology Reseller News publisher Doug Green, Barbara Sharnak, Senior Vice President of Business Development at Relay, outlines how the company is transforming frontline communication for industries that have traditionally relied on walkie-talkies and two-way radios. Relay replaces legacy radio systems with a cloud-connected platform designed for high-noise, high-mobility environments such as manufacturing, hospitality, education, healthcare, and logistics. “The legacy radio has been around for a reason,” says Sharnak, “but it hasn't evolved to meet the productivity and safety needs of today's frontline workers.” Unlike traditional devices, Relay's system unifies real-time voice, location tracking, text communication, and AI-powered features like Team Translate, which enables seamless multilingual communication across teams. Relay devices integrate cellular and Wi-Fi connectivity to deliver nationwide coverage without costly infrastructure upgrades. The hardware itself is rugged, waterproof, and designed for extended battery life — delivering up to 24 hours of uptime in even the most demanding environments. Sharnak highlights how Relay's panic alert system and precise indoor GPS capabilities have helped customers in hospitality and facilities management not only meet safety mandates but also improve operations. “We support over 5,000 properties,” she notes, “and for many of them, replacing radios with Relay has added value beyond compliance — driving analytics, workforce visibility, and improved morale.” With mobile apps, dashboards, and seamless integration across devices, Relay enables centralized control while keeping frontline teams hands-free and heads-up. The platform also opens doors for MSPs, MSSPs, and channel partners seeking new revenue streams through communication modernization. For more information, visit relaypro.com.
This podcast is a part of a collection of podcasts recorded at ISC West 2025 and previously shared on social media. “Show me unattended cash. Show me wet floors. Show me signs still on display after the promo ends.” — Jac Ondaye, March Networks, introducing AI Smart Search at ISC West 2025 At ISC West 2025, Technology Reseller News publisher Doug Green sat down with Jac Ondaye of March Networks to explore how generative AI is revolutionizing video surveillance and business intelligence. March Networks' new solution, AI Smart Search, brings the power of natural language and large language models to video data. With AI Smart Search, users can ask questions like “show me unattended cash” or “show me empty shelves”—and the system instantly scans millions of image snapshots across multiple cameras and locations to deliver actionable results. “This isn't just about security,” said Ondaye. “It's about improving operations, compliance, marketing execution, and risk management. Whether you're a QSR, a retailer, or a bank, AI Smart Search helps you detect issues before they escalate.” Key features include: Generative AI and Natural Language Interface: Ask questions via text or voice-to-text for instant results. Multi-Site, Multi-Camera Search: Analyze image snapshots across a vast camera network. Use Cases Beyond Security: Identify safety risks (e.g. wet floors), operational inefficiencies (e.g. empty shelves), marketing compliance (e.g. outdated signs), and camera malfunctions. Cloud-Based and Remote-Accessible: No need to review live footage or send staff on-site—monitor and manage everything remotely. March Networks supports global sales through an extensive channel partner network, offering the solution to MSPs, MSSPs, and enterprise customers worldwide. To learn more, visit marchnetworks.com and explore the AI Smart Search video demo and brochure.
This podcast is a part of a collection of podcasts recorded at ISC West 2025 and previously shared on social media. At ISC West 2025, BluebirdSales.io, an outsourced sales and marketing firm dedicated to the technology sector, showcased its deepening partnership with floLIVE, a global cellular MVNO (mobile virtual network operator) known for simplifying and scaling connectivity in security and IoT applications. Tom Dever, president and self-described “strategy guy” at BluebirdSales.io, explained the company's mission: “We're not just about sales—we're about helping technology companies build strategic paths to market. That means understanding the technical problems and delivering the right solutions to the right partners.” At ISC West, Dever and his team were onsite supporting floLIVE's booth, helping introduce the company's carrier-agnostic connectivity to a range of security-focused exhibitors and attendees. floLIVE enables OEMs and integrators to embed global, multi-carrier eSIMs into their products, providing automatic access to networks like AT&T, Verizon, T-Mobile, and U.S. Cellular—with no need for separate SKUs or carrier contracts. “It's a game-changer for manufacturers,” said Dever. “One SIM, one integration, and you're connected nearly anywhere.” floLIVE's technology is especially useful for security and monitoring devices—such as IP cameras and smart sensors—that need to transmit critical data from remote or variable locations. Their local IMSI capabilities ensure compliance with global data sovereignty rules, converting devices into local nodes on the cellular network and avoiding roaming restrictions in regions like Brazil and Turkey. Dever also spotlighted floLIVE's channel-friendly approach. MSPs and MSSPs can white-label floLIVE's platform or refer it as a connectivity solution, offering new revenue streams while enhancing customer deployments. “Partners can resell the service or embed it in their offerings—either way, it's a win-win,” he said. In addition to floLIVE, BluebirdSales.io is also engaged with global tech brands like Arduino and Grin. The latter showcased an M.2 module at ISC West featuring floLIVE-enabled connectivity with both cellular and Skylo satellite support—ideal for rugged deployments in agriculture, energy, or isolated security locations. BluebirdSales.io continues to bridge the gap between innovative products and effective go-to-market execution. As connectivity becomes increasingly central to physical security solutions, partnerships like the one between BluebirdSales and floLIVE are helping integrators, manufacturers, and MSPs meet the moment—with confidence and scale. Learn more at: www.floLIVE.net and www.bluebirdsales.io.
In the enterprise security news, new startup funding what happened to the cybersecurity skills shortage? tools for playing with local GenAI models CVE assignment drama a SIEM-agnostic approach to detection engineering pitch for charity a lost dog that doesn't want to be found All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-402
In the enterprise security news, new startup funding what happened to the cybersecurity skills shortage? tools for playing with local GenAI models CVE assignment drama a SIEM-agnostic approach to detection engineering pitch for charity a lost dog that doesn't want to be found All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-402
At Enterprise Connect 2025, Microsoft's announcement of Microsoft Teams Phone Extensibility marked a significant leap in the evolution of Teams-integrated communications. Among the first to harness this new capability is Luware, whose Teams-native contact center solution, Luware Nimbus Power, was front and center at the event. In a podcast recorded live from the show, John Wright of Luware joined Technology Reseller News publisher Doug Green to discuss the implications of this breakthrough. “Luware Nimbus Power leverages Microsoft's Azure Communication Services (ACS) to enable what we call ‘dual persona' functionality,” Wright explained. “This means agents can manage and receive audio calls through either the contact center console or the Microsoft Teams client—seamlessly.” Wright emphasized that while many competitors took the fastest route to market by simply connecting existing solutions to Teams, Luware made a bold move: they rebuilt their contact center platform natively within the Teams environment using the Extend model. Now, with Power certification, Luware adds advanced capabilities that integrate fully with Microsoft 365 tools like Power Automate, SharePoint, and Dynamics, and allow real-time AI enhancements via Microsoft Copilot Studio. This cloud-native, Teams-embedded architecture not only enables secure handling of calls without rerouting media through third-party infrastructure but also offers deep flexibility for integrations with CRMs, ticketing systems, and third-party platforms. “The call stays within the Teams tenant,” Wright noted. “That's a major advantage for organizations with strict compliance and security requirements.” For multi-vendor enterprise environments or long-standing organizations with diverse tech stacks, Wright sees the Luware approach as a powerful unifier: “You might have different departments working with different systems—Salesforce, Freshdesk, you name it. Luware can centralize communications across those platforms while keeping the user experience rooted in Teams.” Luware's robust partner program also makes this a compelling opportunity for MSPs and MSSPs. “We built a rewarding, intuitive partner program around Nimbus,” Wright said. “You can deploy a full-featured, omni-channel, AI-powered contact center in under 40 minutes.” Luware's commitment to native Teams integration and close collaboration with Microsoft positions it as a top-tier option for modern, scalable, secure contact center deployments. Learn more at www.luware.com
MSSPs in the Healthcare vertical face many challenges and opportunities. I sat down with Russell Teague of Fortified Health Security to discuss providing Cybersecurity services in the healthcare space and how it stands out from other verticals. If you are an MSP or MSSP, this is a great opportunity to further explore unique service offerings.
Podcast with Chandra Pandey, Founder & CEO, Seceon – recorded at MSP Summit, Channel Partners 2025 At the 2025 MSP Summit in Las Vegas, Seceon founder and CEO Chandra Pandey shared how his company is reshaping cybersecurity delivery for MSPs and MSSPs. Speaking with Doug Green, publisher of Technology Reseller News, Pandey outlined a powerful vision: giving MSPs the tools to provide better-than-enterprise-grade security at a price point even the smallest customers can afford. “Threat actors don't care which vendor you use—they know how to get around siloed tools. You need a platform that works in real time, across all telemetry, with built-in remediation.” Founded over a decade ago, Seceon was built from the ground up as a cybersecurity platform, not a patchwork of point solutions. The result is a fully integrated stack that ingests application, network, and endpoint telemetry in real time, correlates context with global threat intelligence, and automatically neutralizes threats—through auto-remediation or actionable, guided response. Pandey emphasized Seceon's multi-tenant, multi-tiered architecture, designed specifically to empower MSPs to deliver advanced protection with minimal overhead. For MSPs, that means onboarding hundreds of customers quickly and cost-effectively, while building long-term stickiness and recurring revenue. A featured case study discussed during the podcast tells the story of a mid-sized MSP that suffered a significant breach while using conventional SIEM and EDR tools. After transitioning to Seceon, the company not only secured its infrastructure, but transformed its business—growing revenue by triple digits and achieving 60%+ margins by reselling advanced cyber services through Seceon's platform. “It's not just margin for profit—it's margin to invest in people, deliver better service, and grow. That's the power of platform-based cybersecurity.” Pandey's message to the channel at MSP Summit was clear: cybersecurity is no longer a luxury reserved for the enterprise. With Seceon, MSPs can deliver superior protection to SMBs and SMEs—and thrive doing it. Learn more: www.seceon.com
At Enterprise Connect 2025, David Sundstrom, Regional Sales Manager at LogiSense, highlighted how usage-based billing is transforming the way companies monetize software, AI, and connectivity services. Moving Beyond Seat-Based Pricing Traditionally, software and communications platforms relied on seat-based licensing, where businesses would buy a fixed number of user licenses. But as finance teams scrutinize renewals, questioning unused licenses and looking for cost efficiencies, enterprises are shifting to pay-as-you-go models. “A much more elegant way to monetize your product is what we call a usage-based or consumption-based model, where companies pay for what they use,” Sundstrom explained. LogiSense provides the billing infrastructure that enables businesses to move from static pricing to dynamic, real-time billing models. The shift comes with complexity—from tracking usage data to implementing flexible pricing structures—but LogiSense simplifies the process, making it easier for enterprises to roll out consumption-based services. Flexible Pricing Models Drive Growth A key advantage of LogiSense's platform is its ability to support diverse pricing models, including: Pay-per-use – Customers pay a fixed rate per event or interaction. Tiered pricing – Volume discounts reduce per-unit costs as usage increases. Pooled usage – Shared usage across an organization without individual licenses. Wallet-based billing – Prepaid drawdown models, commonly used in IoT and AI, where businesses commit to a spend level and use credits as needed. The AI Monetization Opportunity AI is reshaping industries, and LogiSense is positioned at the intersection of AI and monetization. According to Sundstrom, there are three primary ways companies are integrating AI into their revenue models: Enhancing existing services – AI is being used to automate processes and improve efficiency within existing platforms. Monetizing AI-driven tasks – Businesses are charging per AI-generated action, such as automated customer responses or data processing. Outcome-based billing – AI is delivering measurable results, and companies are shifting from activity-based billing to billing for successful outcomes. A leading example of outcome-based billing is Salesforce, which is monetizing AI-assisted tasks based on results rather than usage. LogiSense's billing platform supports this shift, allowing companies to charge based on the tangible value AI delivers. Why MSPs, MSSPs, and Carriers Should Pay Attention Managed service providers (MSPs), managed security service providers (MSSPs), and carrier service providers are also prime candidates for usage-based billing models. MSPs and MSSPs can bill clients based on service consumption, reducing waste and improving cost alignment. Carrier service providers can bill on behalf of their partners, allowing them to adopt flexible models without building custom billing solutions in-house. Where to Learn More For those interested in learning more about usage-based billing and LogiSense's solutions, the company's website, logisense.com, offers additional resources. Additionally, LogiSense will host the second annual Usage Economy Summit on November 5, 2025, in San Francisco. Following a successful inaugural event, this conference will bring together industry leaders to discuss the future of monetization, AI-driven billing models, and the impact of flexible pricing strategies. As enterprises rethink how they charge for their services, LogiSense is helping businesses adapt, scale, and grow with smarter, usage-based billing solutions. #EnterpriseConnect #LogiSense #UsageBasedBilling #SubscriptionEconomy #AI #Monetization #MSP #IoT
“We're here at every stage of the M&A journey,” says Charlene Ignacio of Fornix. Recorded at the ITEXPO Conference, in this podcast, Charlene discusses how her company helps companies through the M&A process. In a rapidly evolving industry, Managed Service Providers (MSPs) and MSSPs are facing critical decisions about their future growth, security posture, and potential mergers or acquisitions. Charlene discusses how MSPs can successfully transition to MSSPs, build a strong channel presence, and navigate the complexities of mergers and acquisitions (M&A). Fornix: A 3-Fold Approach to MSP Growth Fornix Marketing and PR Agency provides strategic growth and M&A support to MSPs, MSSPs, and channel-focused businesses with a unique three-part approach: MSP to MSSP Transformation – Helping MSPs expand into cybersecurity services, align with top vendors, and build infrastructure for MSSP success. Full-Service Marketing & PR – From thought leadership and public speaking to podcast creation and brand visibility, Fornix ensures companies stand out in a competitive market. Channel Development – Assisting vendors and service providers in building and scaling channel programs both domestically and internationally. M&A Support: The Journey to a Successful Exit Charlene also highlights Fornix's role in M&A strategy through MergerWorld.News, a new educational hub for MSPs considering buying, selling, or merging their businesses. Key Considerations Before Selling Your MSP: What is your EBITDA? How strong is your customer retention? What's your go-to-market strategy post-acquisition? Are your financials and branding aligned for a smooth transition? “We support MSPs at every stage of the M&A process—from evaluating opportunities and increasing valuation to navigating brand integration after a sale,” says Charlene. Why Marketing is Critical to M&A Success Charlene emphasizes that M&A marketing is a unique specialty at Fornix. Brand Integration – Merging companies need to align their brands, positioning, and messaging. Market Visibility – Buyers want a company that has a strong brand presence and clear differentiation. Revenue Growth – A successful acquisition should accelerate sales, not disrupt them. “If you're selling or acquiring a company, you need a marketing strategy to maximize its value and ensure a seamless transition,” adds Charlene. MSPAA: A New Resource for MSPs Charlene is also a key leader in the Managed Service Provider Association of America (MSPAA), a collective group created by MSPs for MSPs. MSPAA works with vetted partners to ensure MSPs have access to the best tools, vendors, and growth strategies available. Where to Learn More fornixmarketing.com Charlene on LinkedIn #MSP #MSSP #Mergers #Acquisitions #MSSPTransition #ChannelMarketing #BusinessGrowth #Cybersecurity #ITExpo #CloudCommunications
Topic 1: CISA Under the Microscope CISA was called out in the Project 2025 document as a left-wing organization inside the government due to their warning about election interference. It is now subject to cuts and scrutiny. In the mass firings at DHS on February 14th, 130 employees at CISA were fired as they were “probationary” employees. Many MSPs and MSSPs subscribe to CISA.gov alerts. It is unclear how this will be affected. Wherever you stand on politics or related topics, small business needs a good source of security alerts we can rely on. What's your take? Topic 2 (AI, of course): Was DeepSeek revolutionary or just the next obvious step in the evolution of AI? From Geekwire: Satya Nadella's response was, "Jevons paradox strikes again! . . . As AI gets more efficient and accessible, we will see its use skyrocket, turning it into a commodity we just can't get enough of." What do you think. Just another step in the evolution of AI? Or is there news here? See: - https://www.geekwire.com/2025/microsoft-ceo-says-ai-use-will-skyrocket-with-more-efficiency-amid-craze-over-deepseek/ - Wikipedia on Jevon's Paradox: https://en.wikipedia.org/wiki/Jevons_paradox - ChatGPT now has 300 million users (https://backlinko.com/chatgpt-stats) - Google Search has 1 billion regular users, and now includes Gemini results at the top of every search - Microsoft CoPilot has about 30 million users (https://www.businessofapps.com/data/microsoft-copilot-statistics/) - Adobe Creative Cloud has about 30 million users and includes AI in all products (https://photutorial.com/adobe-statistics/) Topic 3: Will Microsoft compete with you - or your SOC? Now available: Microsoft Defender Experts for XDR Says Microsoft: "Our expertise is now your expertise. Augment your teams across security, compliance, identity, management, and privacy with Microsoft Security Experts." See https://www.microsoft.com/en-us/security/business/services Is this service worth considering, or should Microsoft put those resources into fixing security problems in their deployed software? The pages makes it sound like this will have a major human-led component, but that's exactly what they are NOT doing. Will you jump on board or wait to see if this is real first? And will this help Microsoft cut payroll, or just require more hiring? We welcome your feedback! :-)
On this episode of The Cybersecurity Defenders Podcast we speak with Garret Grajek, CEO of YouAttest, about how MSSPs help clients meet regulatory requirements and what it means for the MSSP.Garret is a certified security leader with nearly 30 years of experience in information security. Garret is widely recognized as a visionary in identity, access, and authentication, holding 13 patents in areas such as x.509, mobile security, single sign-on (SSO), federation, and multi-factor technologies. Over the course of his career, he has contributed to major security projects for prominent commercial clients like Dish Networks, Office Depot, TicketMaster, and E*Trade, as well as public sector organizations including the U.S. Navy and the EPA.Garret began his career as a security programmer at Texas Instruments, IBM, and Tandem Computers, later advancing to key roles at RSA, Netegrity, and Cisco. He is also the founder and creator of SecureAuth IdP, a two-factor authentication and SSO platform. Known for his expertise in security architecture, product development, and leadership, Garret is a thought leader in modern IT architecture, including mobile deployments, cloud, hybrid environments, and advanced authentication technologies.
Host Dave Sobel engages in a lively discussion with seasoned technology journalist Jessica Davis and veteran industry writer Howard Cohen. The conversation kicks off with an exploration of the recent trend of CEO changes in the tech industry, particularly focusing on notable shifts at companies like Kaseya and ConnectWise. The trio delves into the implications of these leadership changes and speculates on the potential reasons behind them, including possible mergers and acquisitions, as well as the evolving landscape of managed services.A significant portion of the episode is dedicated to the MSSP (Managed Security Service Provider) benchmark pricing report, which Jessica recently published. She highlights key findings, such as the opportunity for MSSPs to offer Virtual Chief Security Officer (vCSO) services, which are currently underutilized. The report reveals that while 100% of MSSPs provide security operations center services, only 57% offer backup and disaster recovery services, raising questions about the foundational services that should be included in security offerings. The discussion emphasizes the need for MSSPs to better define their services and explore pricing strategies to remain competitive in a rapidly evolving market.The conversation shifts to the growing trend of mergers and acquisitions (M&A) in the managed services sector. Jessica notes that while the M&A market for MSPs surged in 2021 and 2022, it has since slowed due to rising interest rates and a limited supply of quality MSPs available for acquisition. This has led investment firms and organizations like Evergreen and The 20 to create their own events to build a pipeline of potential acquisitions. Howard adds that many MSPs are wary of selling to private equity firms due to concerns about employee retention and company culture, which has prompted alternative acquisition strategies focused on preserving the existing workforce.As the episode wraps up, the panelists share their predictions for the first half of the year. Howard emphasizes the importance of professionalism in the industry, advocating for a shift from viewing managed services as a trade to recognizing it as a profession. Jessica highlights the increasing relevance of artificial intelligence (AI) in managed services, noting that MSPs are beginning to explore its applications for both customer use cases and internal operations. The discussion concludes with a call for the industry to embrace these changes and leverage new technologies to drive growth and innovation. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
MSSPs and other security service providers comprise the backbone of the cybersecurity industry. They are the organizations on the front line that keep the world running in the face of ever more sophisticated adversaries. In this special series we are going to be exploring a variety of topics with seasoned experts around the ways they have learned to improve the effectiveness of their organizations.Our guest today is Nick Gipson - the founder and CEO of Gipson Cyber. Nick founded Gipson Cyber in February 2023 to provide affordable, subscription-based cybersecurity services to small businesses. With nearly a decade of experience as a digital forensics investigator for the Department of Defense and Fortune 100 companies, Nick recognized a gap in cybersecurity solutions for smaller organizations. Determined to address this, he built Gipson Cyber to deliver proffesional-grade protection to industries like accounting, finance, legal, and healthcare.Nick's company focuses on equipping small businesses with the tools to prevent cyber threats before they happen, backed by a team with over 20 years of expertise in the field. Today, we'll explore not only the challenges small businesses face in cybersecurity but also the lessons Nick has learned in building a managed security service provider from the ground up. Nick Gipson, the founder of Gipson Cyber, a company he launched in February 2023 to provide affordable, subscription-based cybersecurity services to small businesses. With nearly a decade of experience as a digital forensics investigator for the Department of Defense and Fortune 100 companies, Nick recognized a gap in cybersecurity solutions for smaller organizations. Determined to address this, he built Gipson Cyber to deliver proffesional-grade protection to industries like accounting, finance, legal, and healthcare.Nick's company focuses on equipping small businesses with the tools to prevent cyber threats before they happen, backed by a team with over 20 years of expertise in the field. Today, we'll explore not only the challenges small businesses face in cybersecurity but also the lessons Nick has learned in building a managed security service provider from the ground up.
I had the opportunity to sit down with Jeff McCullough and Brad Reinboldt of NetAlly to find out what is new. Having spent many years with my trusty Link Sprinter, I was keen to hear what evolutions of products and services they might offer to help MSPs and MSSPs in troubleshooting networks, scanning for vulnerabilities, mapping to common frameworks, and documenting and tracking their findings are part of the new reality. I truly enjoyed the discussion around what it is that NetAlly does today and how far they have come over their 30-year journey.
The challenges of cyber attacks and threat actors place immense pressure on Managed Service Providers, who serve as the guardians of countless businesses. But MSPs don't have to face these battles alone. Aaron Torres, Cisco's Business Development Leader for MSSPs shares insights on building strategic security partnerships that empower MSPs & MSSPs to create robust defenses. Highlights include: Being driven for personal growth and organization success. Leveraging partnerships to tackle modern cybersecurity challenges. Cisco MSSP Program & Ecosystem partners. What in addition to profitability should be considered when choosing partnerships. Why MSPs & MSSPs should invest more into their clients. Leading a Panel Discussion at IT Nation Connect. Follow Aaron on LinkedIn, visit Cisco.com to learn more about their Partner program, and grab your favorite snack or candy. --- more --- If you are looking to learn the art of audience engagement while listening for methods to conquer speaking anxiety, deliver persuasive presentations, and close more deals, then this is the podcast for you. Twins Talk it Up is a podcast where identical twin brothers Danny Suk Brown and David Suk Brown discuss leadership communication strategies to support professionals who believe in the power of their own authentic voice. Together, we will explore tips and tools to increase both your influence and value. Along the way, let's crush some goals, deliver winning sales pitches, and enjoy some laughs. Danny Suk Brown and David Suk Brown train on speaking and presentation skills. They also share from their keynote entitled, “Identically Opposite: the Pursuit of Identity”. Support and Follow us: YouTube: youtube.com/channel/UCL18KYXdzVdzEwMH8uwLf6g Instagram: @twinstalkitup Instagram: @dsbleadershipgroup Twitter: @dsbleadership LinkedIn: linkedin.com/company/twins-talk-it-up/ LinkedIn: linkedin.com/company/dsbleadershipgroup/ Facebook: facebook.com/TwinsTalkitUp Facebook: facebook.com/dsbleadership/ Website: dsbleadershipgroup.com/TwinsTalkitUp
How2Exit: Mergers and Acquisitions of Small to Middle Market Businesses
Watch Here: https://youtu.be/IjlhXzO9QIoAbout the Guest(s): Jamie Simpson is a co-founder of Monopoly Capital, known for his distinctive journey from working in various jobs, like door-to-door sales and configuring holiday packages, to becoming a pivotal player in the mergers and acquisitions (M&A) sector. With extensive experience across private equity, business turnarounds, and a creative approach to consulting for equity, Jamie has demonstrated a unique ability to transform underperforming companies into successful ventures. His hands-on experience in acquiring and rolling up businesses into profitable entities reflects his commitment and expertise in driving shareholder value. Jamie leverages his skills through Monopoly Capital to assist small to medium-sized enterprises (SMEs) in enhancing their operations and preparing for acquisitions or successful exits.Summary: Jamie Simpson, co-founder of Monopoly Capital, joins Ronald Skelton to discuss strategic growth through M&A and consulting for equity. Jamie shares his journey from a young entrepreneur inspired by "The Thomas Crown Affair" to a seasoned business owner. He emphasizes the importance of building strong foundational systems before pursuing acquisitions, and how his company helps small businesses achieve significant growth through a hands-on approach.Key Takeaways:Transition Story: Jamie Simpson's non-traditional journey from sales to M&A illustrates the power of inspiration and resilience in career development.Consulting for Equity: Monopoly Capital's innovative model prioritizes performance-based equity acquisition over upfront capital injection.Importance of Systems: Foundational systems and processes are crucial for business growth and preparedness for mergers and acquisitions.Industry Focus: Jamie targets service-based industries, especially those with recurring revenue models, to maximize long-term business valuation.Learning from Mistakes: Jamie's initial failed attempt in acquiring a care home emphasizes the necessity of due diligence and adaptability in the business acquisition process.--------------------------------------------------Contact Jamie onLinkedin: www.linkedin.com/in/jamiemonopoliWebsite: https://monopolicapital.com/--------------------------------------------------How2Exit Joins IT ExchangeNet's Channel Partner Network!-Why IT ExchangeNet?Since 1998, IT ExchangeNet has created $5 billion in value by selling more than 225 IT businesses in 20 countries. IT ExchangeNet works exclusively with IT-enabled businesses generating between $5M and $30M who are ready to be sold, and M&A decision-makers who are ready to buy. For over 25 years IT ExchangeNet has developed industry knowledge that helps them determine whether a seller is a good fit for their buyers before making a match."Out of all of the brokers I've met, this team has the most experience and I believe the best ability to get IT service businesses sold at the best price" - Ron SkeltonThe IT ExchangeNet M&A Marketplace we partnered with has a proprietary database of 50,000+ global buyers seeking IT Services firms, MSPs, MSSPs, Software-as-a-Service platforms, and channel partners in the Microsoft, Oracle, ServiceNow, and Salesforce space.If you are interested in learning more about the process and current market valuations, complete the contact form and we'll respond within one business day. Everything is kept confidential.Are you interested in what your business may be worth? Unlock the value of your IT Services firm, visit https://www.itexchangenet.com/marketplace-how2exit and complete the contact form.Our partnership with IT ExchangeNet focuses on deals above $5M in value.If you are looking to buy or sell a tech business below the $5M mark, we recommend Flippa.--------------------------------------------------
How2Exit: Mergers and Acquisitions of Small to Middle Market Businesses
Watch Here: https://youtu.be/zuaUASJPx5UAbout the Guest(s): Matt Duckworth is the CEO and founder of Rhapsodi, a financial services firm based in Little Rock, Arkansas. Duckworth has an extensive background in finance, starting from an unexpected entry into the field from music composition. His career transitioned into investment banking and fractional CFO services, where he developed significant expertise in mergers and acquisitions, particularly roll-ups. His unique journey through the world of finance, academia as an adjunct professor, and his practical experience in Wall Street make him a seasoned expert in assisting early to mid-career CEOs in executing roll-ups. Summary: Join Ronald Skelton as he interviews Matt Duckworth, the CEO of Rhapsodi. Discover how Duckworth leveraged his unique background in music and finance to master the art of roll-ups. In this episode, you'll learn about the strategies private equity firms use to rapidly grow companies through acquisitions. Duckworth will share insights into the advantages and risks of roll-ups, as well as practical tips on how to implement them successfully.Key Takeaways:Roll-ups serve as a potent strategy for rapid company growth, often offering a de-risked investment decision that private equity firms leverage.Integrating talent and aligning interests across multiple acquisitions magnifies operational efficiencies, improving prospectives for valuation bumps.Financial institutions, through methods like industrial revenue bonds and mezzanine loans, present existing CEOs and potential entrepreneurs with creative funding structures to support roll-ups.Developing a compelling roll-up narrative to assure investors on return potentials is key, whether one is a seasoned CEO or a novice operator.Exploring ESOPs strategically can help safeguard employee interests and extend the longevity and stability of rural businesses in America.--------------------------------------------------Contact Matt onLinkedin: https://www.linkedin.com/in/matt-duckworth1/Website: https://www.rhapsodi.net/Simple Illustrated Guide to Roll-up Equity for CEOs: https://bit.ly/roll-upequity--------------------------------------------------How2Exit Joins IT ExchangeNet's Channel Partner Network!-Why IT ExchangeNet?Since 1998, IT ExchangeNet has created $5 billion in value by selling more than 225 IT businesses in 20 countries. IT ExchangeNet works exclusively with IT-enabled businesses generating between $5M and $30M who are ready to be sold, and M&A decision-makers who are ready to buy. For over 25 years IT ExchangeNet has developed industry knowledge that helps them determine whether a seller is a good fit for their buyers before making a match."Out of all of the brokers I've met, this team has the most experience and I believe the best ability to get IT service businesses sold at the best price" - Ron SkeltonThe IT ExchangeNet M&A Marketplace we partnered with has a proprietary database of 50,000+ global buyers seeking IT Services firms, MSPs, MSSPs, Software-as-a-Service platforms, and channel partners in the Microsoft, Oracle, ServiceNow, and Salesforce space.If you are interested in learning more about the process and current market valuations, complete the contact form and we'll respond within one business day. Everything is kept confidential.Are you interested in what your business may be worth? Unlock the value of your IT Services firm, visit https://www.itexchangenet.com/marketplace-how2exit and complete the contact form.Our partnership with IT ExchangeNet focuses on deals above $5M in value.If you are looking to buy or sell a tech business below the $5M mark, we recommend Flippa.--------------------------------------------------
How2Exit: Mergers and Acquisitions of Small to Middle Market Businesses
Watch Here: https://youtu.be/7RGrazKlnloAbout the Guest(s): Jordan Wagner is the CEO and founder of the Exit Group, a firm specializing in assisting private equity firms and large corporations in acquiring businesses. With a career grounded in experience gained from working at a competitor straight out of college, Jordan has established himself as a seasoned professional in the mergers and acquisitions sector. The Exit Group, which he started over a decade ago, has grown to closing 35 to 40 multifaceted deals each year, averaging $40 to $50 million. His expertise lies in savvy deal-making, industry analysis, and curating strategic business acquisitions.Episode Summary: Join host Ronald Skelton as he interviews Jordan Wagner, CEO of the Exit Group. Discover the intricacies of buying, selling, and exiting businesses, from the early days of entrepreneurship to closing high-value deals. Learn how youthful optimism and resilience can overcome early challenges, the importance of recurring revenue and market growth in securing premium payouts, and the diverse ways companies can achieve success, even in niche markets.Key Takeaways:Youthful Advantage: Starting a business young comes with the benefit of fewer risks and the ability to endure early failures.Deal Variety: Majority buyouts are common, with business owners having the opportunity to retain equity and benefit from future growth.Unique Businesses: Successful companies often thrive on fulfilling everyday needs in niche markets, unnoticed by the average consumer.Consistent Growth: Premium valuations in company sales hinge on predictable revenue and growth, amid a booming market.Entrepreneurial Risk: Founders begin businesses with uncertain outcomes, taking chances many would avoid.--------------------------------------------------Contact Jordan onLinkedin: https://www.linkedin.com/in/jordan-wagner-b9249135/Website: https://www.exitgroup.com/--------------------------------------------------How2Exit Joins IT ExchangeNet's Channel Partner Network!-Why IT ExchangeNet?Since 1998, IT ExchangeNet has created $5 billion in value by selling more than 225 IT businesses in 20 countries. IT ExchangeNet works exclusively with IT-enabled businesses generating between $5M and $30M who are ready to be sold, and M&A decision-makers who are ready to buy. For over 25 years IT ExchangeNet has developed industry knowledge that helps them determine whether a seller is a good fit for their buyers before making a match."Out of all of the brokers I've met, this team has the most experience and I believe the best ability to get IT service businesses sold at the best price" - Ron SkeltonThe IT ExchangeNet M&A Marketplace we partnered with has a proprietary database of 50,000+ global buyers seeking IT Services firms, MSPs, MSSPs, Software-as-a-Service platforms, and channel partners in the Microsoft, Oracle, ServiceNow, and Salesforce space.If you are interested in learning more about the process and current market valuations, complete the contact form and we'll respond within one business day. Everything is kept confidential.Are you interested in what your business may be worth? Unlock the value of your IT Services firm, visit https://www.itexchangenet.com/marketplace-how2exit and complete the contact form.Our partnership with IT ExchangeNet focuses on deals above $5M in value.If you are looking to buy or sell a tech business below the $5M mark, we recommend Flippa.--------------------------------------------------
How2Exit: Mergers and Acquisitions of Small to Middle Market Businesses
Watch Here: https://youtu.be/WoGbc3tqQFsAbout the Guest(s): Adam Coffey is a renowned CEO specializing in running private equity companies, a best-selling author, and a veteran in the business industry. He has led three national and international companies, resulting in over $2.5 billion in exits. With a robust background including engineering and military service, Adam Coffey is known for his buy-and-build expertise, having acquired 58 companies. Currently, Adam advises private equity firms and coaches CEOs globally, sharing his extensive knowledge through consulting and writing, with all royalties donated to charity.Summary: In this engaging episode of How2Exit, Ronald Skelton talks with private equity expert and best-selling author Adam Coffey. They explore key buy-and-build strategies, showcased in Coffey's updated *Private Equity Playbook*, and the evolving landscape of private equity. Coffey shares career insights—from military service and working under GE's Jack Welch to his role as a consultant for top private equity firms—highlighting topics like market volatility, debt coverage ratios, and the appeal of service businesses with recurring revenue. His insights offer valuable guidance for acquisition entrepreneurs navigating private equity for successful growth and exit strategies.Key Takeaways:Understanding private equity is crucial for entrepreneurs to leverage capital and achieve successful exits.The private equity industry has significantly grown, controlling a substantial portion of the global market for company acquisitions.Strategic buy-and-build methods can substantially increase a company's value and attract private equity buyers.It's essential to maintain a healthy debt service coverage ratio, especially in uncertain economic climates.The importance of choosing industries with recurring revenue and high fragmentation for buy-and-build strategies.--------------------------------------------------Contact Adam onLinkedin: https://www.linkedin.com/in/adamecoffey/--------------------------------------------------How2Exit Joins IT ExchangeNet's Channel Partner Network!-Why IT ExchangeNet?Since 1998, IT ExchangeNet has created $5 billion in value by selling more than 225 IT businesses in 20 countries. IT ExchangeNet works exclusively with IT-enabled businesses generating between $5M and $30M who are ready to be sold, and M&A decision-makers who are ready to buy. For over 25 years IT ExchangeNet has developed industry knowledge that helps them determine whether a seller is a good fit for their buyers before making a match."Out of all of the brokers I've met, this team has the most experience and I believe the best ability to get IT service businesses sold at the best price" - Ron SkeltonThe IT ExchangeNet M&A Marketplace we partnered with has a proprietary database of 50,000+ global buyers seeking IT Services firms, MSPs, MSSPs, Software-as-a-Service platforms, and channel partners in the Microsoft, Oracle, ServiceNow, and Salesforce space.If you are interested in learning more about the process and current market valuations, complete the contact form and we'll respond within one business day. Everything is kept confidential.Are you interested in what your business may be worth? Unlock the value of your IT Services firm, visit https://www.itexchangenet.com/marketplace-how2exit and complete the contact form.Our partnership with IT ExchangeNet focuses on deals above $5M in value.If you are looking to buy or sell a tech business below the $5M mark, we recommend Flippa.--------------------------------------------------
How2Exit: Mergers and Acquisitions of Small to Middle Market Businesses
Watch Here: https://youtu.be/KmN6M2salZwAbout the Guest(s): Charlie Panayi is an accomplished international speaker and entrepreneur hailing from a Greek Cypriot family, who made his mark in the real estate and private equity sectors. Growing up in North London, Charlie aspired to financial independence from a young age. He achieved millionaire status early in life and has since become renowned for his investment acumen and motivational speaking. Charlie splits his time between England, Dubai, and Europe, while managing a private equity firm that specializes in a diverse array of sectors, including real estate, SaaS, and professional services.Summary: Join Ronald Skelton on this episode of the How2Exit podcast with guest Charlie Panayi, a real estate and private equity investor whose journey spans from North London to global ventures. Charlie shares his strategies for achieving freedom through investing, his passion for travel, and his unique approach to networking and strategic scaling. Discover his insights on building a successful portfolio, harnessing relationships, and spotting untapped opportunities in tech and professional services.Key Takeaways:Building successful investments requires a focus on education and strategic action rather than continuous learning without execution.Personal relationships and networking are crucial in both real estate and business acquisitions.Investing time in building rapport and understanding people can often yield more success than focusing solely on financial metrics.Entrepreneurial success might lead to changes in personal relationships; being prepared for this evolution is essential.Identifying synergy and scalability in business acquisitions is key to sustainable growth.--------------------------------------------------Contact Charlie onLinkedin: https://www.linkedin.com/in/charlie-panayi-2579642b/Email: charliepanayi@hotmail.co.uk--------------------------------------------------How2Exit Joins IT ExchangeNet's Channel Partner Network!-Why IT ExchangeNet?Since 1998, IT ExchangeNet has created $5 billion in value by selling more than 225 IT businesses in 20 countries. IT ExchangeNet works exclusively with IT-enabled businesses generating between $5M and $30M who are ready to be sold, and M&A decision-makers who are ready to buy. For over 25 years IT ExchangeNet has developed industry knowledge that helps them determine whether a seller is a good fit for their buyers before making a match."Out of all of the brokers I've met, this team has the most experience and I believe the best ability to get IT service businesses sold at the best price" - Ron SkeltonThe IT ExchangeNet M&A Marketplace we partnered with has a proprietary database of 50,000+ global buyers seeking IT Services firms, MSPs, MSSPs, Software-as-a-Service platforms, and channel partners in the Microsoft, Oracle, ServiceNow, and Salesforce space.If you are interested in learning more about the process and current market valuations, complete the contact form and we'll respond within one business day. Everything is kept confidential.Are you interested in what your business may be worth? Unlock the value of your IT Services firm, visit https://www.itexchangenet.com/marketplace-how2exit and complete the contact form.Our partnership with IT ExchangeNet focuses on deals above $5M in value.If you are looking to buy or sell a tech business below the $5M mark, we recommend Flippa.--------------------------------------------------
Host Dave Sobel engages in a thought-provoking conversation with Steven Cook, the owner of Strategic IT Services, a managed service provider (MSP) specializing in cybersecurity. Steven shares insights into the diverse range of services his organization offers, from general technical support to cybersecurity and disaster recovery. With a focus on co-managed IT, Steven explains how his company assists businesses of varying sizes, from solopreneurs to larger organizations in regulated sectors like finance and energy.The discussion delves into the impact of regulations on customer needs, particularly in the energy sector, where recent political changes have significantly affected income streams. Steven highlights the challenges faced by small businesses in maintaining IT services, often opting for minimal or no support, which raises concerns about cybersecurity risks. He emphasizes the importance of having a baseline level of security measures in place, such as endpoint detection and response, to protect sensitive information and maintain operational continuity.As the conversation progresses, the topic shifts to the evolving landscape of cybersecurity regulations, including the rollout of CMMC 2.0 and the implications of FedRAMP certification for software vendors. Steven expresses his expectation that demand for compliance with these standards will increase, particularly as more MSPs and MSSPs serve defense-related industries. He notes that while some vendors have yet to prioritize FedRAMP certification, there is a growing need for businesses to adopt security measures that meet regulatory requirements.Finally, Steven shares his perspective on the liability of software providers in the context of cybersecurity incidents. He argues that while vendors like CrowdStrike bear some responsibility for their products, the onus also falls on businesses and IT implementers to follow best practices in deploying technology. This includes implementing phased rollouts and testing updates in controlled environments. The episode concludes with a call for clearer regulations and standards to protect businesses and their customers from the increasing threat of cyberattacks. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social
Can cybercriminals paralyze a healthcare system with just a few keystrokes? Find out in this compelling episode of the Common Bridge, where Rich Helppie sits down with Dan Dodson, CEO of Fortified Health Security. We go beyond the headlines to explore the motivations driving cybercriminals to target healthcare institutions. With digital records and interconnected systems at the heart of modern healthcare, even a minor security breach can have devastating consequences. Dan sheds light on the urgent need for robust cybersecurity measures to ensure the integrity of patient care and protect sensitive data.Discover the pivotal role Managed Security Services Providers (MSSPs) play in defending healthcare organizations from relentless cyber threats. Through comprehensive risk analysis and 24/7 monitoring, MSSPs like Fortified Health Security develop customized strategies to mitigate risks and fortify defenses. Our conversation with Dan highlights the importance of deploying advanced technologies such as multi-factor authentication and air-gapped backups. The stakes couldn't be higher, and the complexity of maintaining strong cybersecurity is a challenge that healthcare providers must prioritize to safeguard patient information effectively.Join us as we tackle the shared responsibility of cybersecurity in the healthcare sector. Collaboration between health systems and technology providers like Epic Systems and Oracle's Cerner is crucial. Dan and I discuss the necessity for cybersecurity professionals to have a voice at the executive level and secure adequate funding. With cyber threats evolving daily, vigilance and ongoing education are paramount. From educating C-suite leaders to integrating cybersecurity into overall risk management, this episode offers practical advice for minimizing risks in an increasingly digital world. Tune in and stay informed about the latest trends and advancements in healthcare cybersecurity.Support the Show.Engage the conversation on Substack at The Common Bridge!