POPULARITY
Hosts Julienne Ryan and Jerome Deroy sit down with Anil Singhal, CEO and Co-founder of NETSCOUT and author of The 5% Rule of Leadership. With 40 years at the helm of a company that has grown from a startup to a billion-dollar enterprise, Anil brings a wealth of wisdom grounded in experience, fairness, and deeply held values.Anil shares the story behind his book and the powerful leadership framework it introduces: focus early effort on the most impactful decisions—the crucial 5% that drive 95% of outcomes. What begins as a principle becomes a company-wide approach that promotes empathy, trust, retention, and transparency across a global organization.You'll Hear:The Story Behind the 5% Rule – How Anil developed this concept over decades and why he uses it to mentor the next generation of leaders.Fairness as a Leadership Strategy – How fairness leads to better transparency, stronger culture, and better business results.The Power of Listening – Why defining problems clearly—before proposing solutions—builds alignment, trust, and efficiency.Human-Centered Succession Planning – How NETSCOUT is building its future through policies, alumni networks, and long-term values.Storytelling as a Leadership Tool – How shared stories and lived values are the key to knowledge transfer, employee engagement, and long-term success.Key Takeaways:Start with Values – Whether you're founding a company or leading through change, define and stick to your values—especially in tough times.Focus on the First 5% – Strategic preparation early on reduces wasted effort and improves long-term outcomes.Trust Multiplies Over Time – Invest in relationships early and avoid transactional behavior (like earn-outs) that can erode long-term commitment.Institutionalize What Works – Codify successful practices so they're scalable and repeatable, even after leadership transitions.Prioritize People – Start with happy employees. They create happy customers, which leads to happy shareholders.This episode is essential listening for any leader—whether you're building a startup or guiding a legacy company into the future.Resources:
Cyber breaches – like the recent DDOS attacks on archive.org and 23&Me – are making headlines more frequently, and the way they are handled in comms terms can have a lasting impact on corporate reputation. In this episode of the PRovoke podcast, Maja Pawinska Sims is joined by Flora Haslam, European technology practice leader at Finn Partners, Richard Hummel, director of threat intelligence at cybersecurity firm Netscout, and Kevin Curren, professor of cyber security at Ulster University, to explore how companies can navigate cybersecurity breaches and incidents to minimise their impact on corporate reputation and trust.
Hacktivists Escalate Sophisticated, Multi-Vector Assaults on Banking and Financial Services, Government, and Utilities In this podcast episode, we will explore the evolving threat of distributed denial-of-service (DDoS) attacks targeting telecom carriers, as revealed in NETSCOUT's latest DDoS Threat Intelligence Report. With 5G connectivity rapidly expanding—from 12.6 million subscriptions in 2019 to an anticipated 2.8 billion by the end of 2024—cybercriminals are exploiting the increased attack surface presented by 5G-connected devices. Join us as we dive into the report's findings and discuss the implications of this alarming trend with Richard Hummel, NETSCOUT's director of threat intelligence. About NETSCOUT NETSCOUT is a leading provider of performance management, cybersecurity, and DDoS attack protection solutions. The company helps organizations monitor, analyze, and protect their digital infrastructure. Focusing on safeguarding critical networks, NETSCOUT's solutions are widely used across industries, including telecom, finance, and government, to ensure the reliability and security of their operations. Learn more at www.netscout.com or follow @NETSCOUT on LinkedIn, X, or Facebook.
In this special episode of Will 5G Change the World, presented in partnership with NETSCOUT, we continue our exploration of telco AI. Beyond the technological challenges to adoption, there are a number of key considerations around organizations and operating models. As operators reinvent as platform providers, this has major implications for the workforce. And following this platform approach, the foundation of a horizontal model is infrastructure, where AI has an important role to play in broader automation efforts. And, looking ahead, investments today in cloud-native and AI will set the stage for the evolution on to 6G. This episode features expert commentary from technologists with ABI Research, Orange, Red Hat and VIAVI Solutions.
In this special episode of Will 5G Change the World, presented in partnership with NETSCOUT, we dive into the world of telco AI. As operators develop and implement long-term AI strategies, supporting it all are foundation models, specifically large language models. This episode, featuring telco AI experts from AWS, Dell Technologies, e& and Rakuten Mobile, examines how operators can align outcomes with the underlying foundation models, and whether they can fine tune existing models or whether it's necessary to develop LLMs specific to the telecoms sector.
In this episode, Alex Blair discusses concerns around the protection of voter data in the upcoming UK elections with three cybersecurity experts. On hand with their thoughts and analysis are Richard Hummel (Lead Threat Analyst at NETSCOUT), Mark Ruchie (Chief Information Security Officer at Entrust), and Rob Dartnall (CEO and Director of Intelligence at SecAlliance). Find us on LinkedIn: https://www.linkedin.com/company/globaldatathematicintelligence/mycompany/ Host: Alex Blair Guests: Richard Hummel, Mark Ruchie, Rob Dartnall
In this Tech Talks Daily Podcast episode, I sit down with Richard Hummel from NETSCOUT to delve into the ever-evolving DDoS threat landscape. Why has there been an explosion in hacktivist groups and DDoS attack activity this year, and what does this mean for organizations across all sectors? With over 1,200 hacktivist groups active in 2023 alone, the threat landscape is more challenging than ever. We explore how geopolitical tensions are directly influencing attack strategies and targets, resulting in a continuous onslaught of sophisticated attacks that challenge traditional defense mechanisms. Critical infrastructure, particularly DNS servers, is being targeted with unprecedented frequency, posing significant risks to the stability of the internet itself. Richard provides valuable insights into how attackers are employing more advanced tactics, including leveraging public cloud hosting to evade defenses and utilizing AI to generate potent attacks. He also highlights how global conflicts, elections, and political unrest directly trigger hacktivist activity, with adversaries often striking both sides of a conflict. To help organizations defend themselves, Richard shares the importance of adopting a predictive defense strategy based on real-time threat intelligence, stressing that visibility into network traffic is critical. With proactive blocking of known adversary infrastructure and AI chatbots identifying new attack vectors, Richard outlines practical recommendations for staying ahead of the curve. Tune in to understand the risks, challenges, and the strategies organizations can implement to bolster their defenses. Do you feel adequately prepared for this evolving threat landscape, or is your organization vulnerable to these increasingly sophisticated attacks? Listen and share your thoughts!
NETSCOUT SYSTEMS, INC. has released findings from its 2H2023 DDoS Threat Intelligence Report that dissects trends and attack methodologies adversaries use against service providers, enterprises, and end-users. The information cited in the report is gathered from NETSCOUT's unparalleled internet visibility at a global scale, collecting, analysing, prioritising, and disseminating data on DDoS attacks from 214 countries and territories, 456 vertical industries, and more than 13,000 Autonomous System Numbers (ASNs). Driven by tech-savvy and politically motivated hacktivist groups and an increase in DNS water torture attacks, NETSCOUT observed more than 7 million DDoS attacks in the second half of 2023, representing a 15% increase from the first half of the year. Hacktivism Increases Ten-Fold Distributed denial-of-service (DDoS) hacktivism transcended geographic borders during the past year, exemplifying a shift in the global security landscape. Groups like NoName057(016) and Anonymous Sudan, as well as lone hackers and small collectives, are increasingly using DDoS to target those ideologically opposed to them, for example: Peru experienced a 30% increase in attacks tied to protests of former Peruvian President Fujimori's release from prison on 6th December Poland experienced a surge in attacks at the end of 2023 associated with a regime change and statements reaffirming Poland's support of Ukraine in the Russia-Ukraine conflict Anonymous Sudan attacked X (formerly Twitter) to influence Elon Musk regarding Starlink service in Sudan, and it attacked Telegram for suspending its main channel NoName057(016), Anonymous Sudan, and Killnet have taken credit for DDoS attacks in Ukraine, Russia, Israel, and Palestine targeting communications infrastructure, hospitals, and banks. Daily attacks from hacktivists increased more than ten-fold between the first and second halves of 2023. NoName057(016) topped the list of DDoS adversaries in 2023, targeting 780 websites across 35 countries. Water Torture Attacks Rise Targeting critical systems at the heart of the Internet's control plane, DNS (Domain Name System) water torture attacks have been on the rise since the end of 2019. DNS query floods designed to overwhelm authoritative DNS servers experienced a massive 553% increase from 1H2020 to 2H2023. Rather than targeting one website or server, adversaries go after entire systems, resulting in even more damage. Gaming and Gambling Targeted NETSCOUT findings point to gaming - and the gambling associated with gaming - as a primary target for DDoS attacks. Threat actors are drawn to the sector's substantial financial value and the goal of disrupting competitors, especially during online esports tournaments. Historically, 80-90% of all DDoS attacks are related to gaming and gambling. NETSCOUT assessed attacks on enterprises in these sectors, determining that more than 100,000 DDoS attacks were deployed against those in gaming, and over 20,500 were made against those tied to gambling in 2023. In addition, based on NETSCOUT's observations of the DDoS threat landscape, approximately 1% of DDoS attacks are suppressed from originating networks. "Global adversaries have become more sophisticated in the past year attacking websites and overloading servers to lockout customers and inflict digital chaos to influence geopolitical issues," stated Richard Hummel, senior threat intelligence lead, NETSCOUT. "The relentless barrage of DDoS threats drives up costs and creates security fatigue for network operators. They cannot safeguard their digital assets without the proper advanced DDoS protection leveraging predictive, real-time threat intelligence." Multiple decades of experience working with the world's largest service providers and enterprises give NETSCOUT far-reaching visibility into the global internet to discern the pulse of the digital world. Our capacity to monitor and respond to DDoS attacks is powered by our ATLAS platform, which enables us to anal...
In this episode of Will 5G Change the World? NETSCOUT's Greg Mayo, senior director of engineering, looks at where 5G is (in terms of successes and areas for improvement) after five years in what is typically a 10-year generational cycle. He discusses what the next half of the 5G cycle has in store with a focus on delivering new enterprise services against exacting SLAs. And, drawing on decades of experience with artificial intelligence, Mayo looks at how AI can help operators realize new degrees of process automation and optimization.
Network slicing can be a game changer for communications service providers (CSPs), allowing them to offer new services to their customers and generating new revenue. Heather Broughton, AVP Marketing Service Provider Solutions, NETSCOUT, discusses the current state of 5G network slicing and where she sees this technology going both for CSPs and their subscribers.
A Joint Advisory warns of Beijing's "BlackTech" threat activity. ShadowSyndicate is a new ransomware as a service operation. A Smishing Triad in the UAE. Openfire flaw actively exploited against servers. AtlasCross is technically capable and, above all, "cautious." Xenomorph malware in the wild. DDoS and API attacks hit the financial sector. In our Industry Voices segment, Joe DePlato from Bluestone Analytics demystified dark net drug markets. Our guest is Richard Hummel from Netscout with the latest trending DDoS vectors. And the FCC chair announces plans to restore net neutrality. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/12/185 Selected reading. CISA, NSA, FBI and Japan Release Advisory Warning of BlackTech, PRC-Linked Cyber Activity (Cybersecurity and Infrastructure Security Agency) Dusting for fingerprints: ShadowSyndicate, a new RaaS player? (Group-IB) Smishing Triad Stretches Its Tentacles into the United Arab Emirates (Security Affairs) Hackers actively exploiting Openfire flaw to encrypt servers (BleepingComputer) Vulnerability in Openfire messaging software allows unauthorized access to compromised servers (Dr.Web) Suspicious New Ransomware Group Claims Sony Hack (Dark Reading) Sony investigates cyberattack as hackers fight over who's responsible (BleepingComputer) Sony Investigating After Hackers Offer to Sell Stolen Data (SecurityWeek) Xenomorph Malware Strikes Again: Over 30+ US Banks Now Targeted (Threat Fabric) The High Stakes of Innovation: Attack Trends in Financial Services (Akamai) FACT SHEET: FCC Chairwoman Rosenworcel Proposes to Restore Net Neutrality Rules (Federal Communications Commission) Ukraine: Russian hackers infiltrating software supply chains (Computing) Russian hacking operations target Ukrainian law enforcement (CyberScoop) Ukraine accuses Russian spies of hacking law enforcement (Register) Russian hackers target Ukrainian government systems involved in war crimes investigations (Record) Ukraine Cyber Defenders Prepare for Winter (Bank Info Security) Learn more about your ad choices. Visit megaphone.fm/adchoices
The expected explosion in the Internet of Medical Things (IoMT) represents both an opportunity and a challenge for healthcare IT departments. Connected medical devices hold the promise of improved workflows and data gathering which can lead to improve patient outcomes. However, more connected devices also means more cybersecurity risk and maintenance efforts. It is important to start IoMT planning now so that you don't have a large technical debt to pay in the future. Healthcare IT Today sat down with Sameer Khanna, Chief Architect and Security Strategist at NETSCOUT to discuss IoMT and what concrete steps healthcare IT departments can take to handle the increasing number of connected medical devices they manage. Learn more about NETSCOUT at https://www.netscout.com/solutions/healthcare Find more great health IT content: https://www.healthcareittoday.com/ NETSCOUT is a supporter of Healthcare Scene
In this episode of Tech Talks Daily, I sit down with cybersecurity expert Richard Hummel from NETSCOUT to explore the alarming rise of Distributed Denial of Service (DDoS) attacks in the digital landscape. Richard unveils the key findings from NETSCOUT's 5th Anniversary DDoS Threat Intelligence Report, which provides a comprehensive overview of the new threat landscape. With an average visibility of a staggering 401 Tbps of internet traffic and over two decades of data from more than 500 internet service providers (ISPs), NETSCOUT's ATLAS platform presents crucial insights into the evolving tactics of adversaries. From the emergence of direct-path bot attacks dominating the attack toolkit to the increasing complexity and motivations behind DDoS attacks, Neil and Richard delve into the growing challenges faced by enterprises and service providers alike. Learn about the dangerous trends observed in the second half of 2022, such as the surge in bandwidth and throughput, the prevalence of multi-vector attacks, and the evolving techniques like carpet-bombing and application-layer attacks. Discover how these attacks are affecting various industries, from national security and government to manufacturing, wireless telecommunications, and more. Neil and Richard discuss the critical importance of global visibility in assessing the DDoS threat landscape, enabling organizations to identify trends, prepare for attacks, and implement effective defense strategies. They emphasize the need for adaptive DDoS solutions to combat both short-lived and long-lived attacks, showcasing real-world scenarios where enterprises and service providers can benefit from this approach. Tune in to this informative episode to gain insights into the ever-changing world of DDoS attacks and how NETSCOUT's Threat Intelligence Report offers valuable knowledge to enhance cybersecurity practices. Stay ahead of the evolving threat landscape and protect your organization against the rising tides of DDoS attacks.
Women who step up to mentor other women in their careers have a direct and lasting impact on diversity and representation in their industry. This week's episode 52 of How Women Inspire Podcast is about the importance of networking and mentoring women of color in leadership roles! In this episode of How Women Inspire Podcast, Julie Castro Abrams and Shannon Nash share the importance of dreaming big and networking in the tech industry and actionable steps you can take to help other women pursue new career opportunities. Shannon Nash is the CFO of Wing, a subsidiary of Alphabet. She sits on the boards of several companies, including Netscout, Lazy Dog restaurants, and SoFi bank.Shannon is also an executive board member of How Women Lead, a board advisor for Black Women on Boards, and mentors others on their board journey.Some of the talking points Julie and Shannon go over in this episode include:The importance of getting women, especially black women, on boards.Why diversity on the boards of tech companies looks different in different parts of the country.Advice for young women working in tech who want to pursue C suite and board opportunities.How storytelling through film and digital media will help move the diversity needle forward. Thank you for listening! If you enjoyed this episode, take a screenshot of the episode to post in your stories and tag me! And don't forget to follow, rate, and review the podcast and tell me your key takeaways!CONNECT WITH SHANNON:LinkedInTwitterCONNECT WITH JULIE CASTRO ABRAMS:LinkedIn - JulieHow Women LeadHow Women InvestHow Women GiveInstagram - HWLLinkedIn - HWLFacebook - HWLOnly 2.1% of venture capital went to women-founded companies in 2022. We are done waiting or fighting for a seat at the table—today, we are committing to build The New Table; women-funded, women-run. I invite you to invest in your power, don't wait—join The New Table today.
Interest in machine language and artificial intelligence has been growing and growing since around 2015. It was a perfect storm where storage prices decreased, and virtualization became standard. Like most maturing industries, challenges appeared. It was found that the conclusions provided by artificial intelligence were dependent on the quality of the data it collected. This finding became so common that in 2020 the federal government responded with Executive Order 13960 promoting the use of trustworthy intelligence in the federal government. This is an interview with a focus on applying that guidance across many federal areas, including cybersecurity. Technology leaders from the National Science Foundation have formulated the National Artificial Intelligence Research Resource Task Force (NAIRR) https://www.nsf.gov/cise/national-ai.jsp to give guidance on using data more effectively. Recommendations include the categories of security privacy, civil rights, and sustaining the resource. The goal was to help get control of the unwieldy and expanding IT environments. Wayne LeRiche, Palo Alto Networks, gives an example of applied AI with some of the security concerns relating to Domain Name Servers (DNS). Attacking a DNS server is a classic approach malicious actors have used for years. The traditional method of defense is rule-based. If “x” occurred, then react with “Y.” Attackers can ratchet up the attack with something unknown that the rules-based system can't handle it. AI can handle drastic increases in speed that a rules-based system can't. Further, artificial intelligence can understand unknown methods of denying service to the DNS. Rather than focusing on one aspect of prevention, experts on the panel suggest that Rule-Based and Machine-Learning DNS security services be used in parallel. Finally, Tony Walker, NetScout, presents a scenario where one part of the team is proficient in network management while another part of the team has a sophisticated knowledge of data management. The solution that is provided by AI must be tempered with careful consideration of data sources and the ability to use that knowledge in an environment full of people with different skill sets.
The best laugh is an unexpected one. With everyone so serious at work, many people enjoy someone who can lighten the mood. It gives people a chance to breathe, and it builds rapport. How can you weave humor and comedic timing into your work? Your very own Sales Maven, Nikki Rausch, is here to offer tips, techniques, and strategies to master your sales conversations. Discover methods to place yourself in the position to thrive in business and produce true value for your audience. Today, learn how to bring humor into your work in this Mastering Excellence Series conversation on this episode of the Sales Maven Show. As the CEO of her own company, Hot Red Carpet, Erin Brown works as a speaker, host, facilitator, and confidence coach helping individuals and groups step into their spotlight. With 20 years of comedy experience paired with her time working in the corporate world, Erin understands the need for people to connect, feel valued, play, and be uplifted. That's why Erin's work centers on increasing the levity of any occasion by adding value that feels good. Now, clients on her roster include UNITED AIRLINES, PFIZER, IFF, MURAD, HOULIHAN LOKEY, NETSCOUT, FOUNDATION MEDICINE, and TACALA. In today's episode, Nikki and Erin talk about finding humor in work. Erin reveals a trade secret: comedic timing has a lot to do with being present. She shares why it's important to be fully aware in the moment while also knowing how to read the room. As Erin speaks, she gives examples of how she remains present in daily life and adds emotional intelligence to humor. Listen as Nikki and Erin discuss building rapport with humor, being funny more than offensive, and taking your cues from the environment or current situation. Nikki invites you to join the Sales Maven Society, don't miss this opportunity for you and Nikki to work together. Bring your questions, concerns, sales challenges, and she provides answers and guidance to boost your confidence. Join the Sales Maven Society here, click add to cart, and then checkout and use coupon code: 47trial to get your first month for $47.00! In This Episode: [00:29] - Welcome, and thank you for listening! [02:19] - Erin Brown has great comedic timing. [04:18] - Erin shares where her humor comes from, and how it impacted her comedic background. [05:50] - Why did Erin start interviewing random strangers for a red carpet concept? [08:37] - How did Erin's concept lead to an interview with Tom Hanks and Rita Wilson? [10:11] - Erin talks about how she kept her business momentum going before it even became a business. [12:35] - “Be where your feet are.” [14:55] - How does Erin stay present in her everyday life? [17:44] - You can turn situations you're nervous about into a game. [19:47] - Give your all in the moment, or you might miss the experience you could have. [21:28] - What can be fun in this moment? [23:30] - You can always reset your day if it starts to feel off, no matter what time of day it is. [26:00] - What is the link between humor and trust? [28:50] - Be true to your message. There's no need to force or rush your expression. [31:17] - The best laugh is an unexpected one. [34:12] - How can Erin make fun of someone without offending them? [36:50] - Erin speaks about building rapport in her humor. [38:34] - What does Erin think of self-deprecating humor? [40:19] - Trust your instincts. [43:10] - Erin enjoys quality time with her nieces and nephews. [45:55] - What's Erin up to lately? PART 1 [48:05] - What's Erin up to lately? PART 2 [49:46] - Thank you for listening. Nikki is so grateful you are here! Find Nikki: Nikki Rausch nikki@yoursalesmaven.com @yoursalesmaven Facebook | Twitter | LinkedIn | Instagram Sales Maven Society To download free Resources from Nikki: www.yoursalesmaven.com/maven Recession Proof Your Business Symposium: www.yoursalesmaven.com/6questions Find Erin: Erin Brown www.hotredcarpet.com Facebook | Twitter | LinkedIn | Instagram | YouTube
A tecnologia não para de avançar, e os criminosos também vão apostando em novas formas de ciberataques contra empresas, instituições públicas e público em geral. Segundo a Netscout, o Brasil é o segundo país no mundo com mais ataques cibernéticos registrados, atrás somente dos Estados Unidos. Para falar melhor sobre quais são os tipos mais comuns das ofensivas lançadas pelos hackers e como se proteger na internet, o Direto ao Ponto entrevista os executivos de contas da Cirion Technologies Daniel Marques e Thiago Sanches. A apresentação é de Lucas Eliel.
In this episode of Will 5G Change the World? Telecom Infra Project Chief Marketing Officer Eugina Jordan discusses how TIP's community-driven approach to test and validation of deployment-ready disaggregating network solutions is driving innovation in the telecoms area. Jordan touches on TIP's approach to enabling Industry 4.0 use cases, as well as the evolution of the wireless workforce as networks become increasingly cloud-native and software-oriented. This podcast is presented in partnership with Netscout.
NETSCOUT recently announced findings from its DDoS Threat Intelligence Report. The findings demonstrate how sophisticated cybercriminals have become at bypassing defences with new DDoS attack vectors and successful methodologies. "By constantly innovating and adapting, attackers are designing new, more effective DDoS attack vectors or doubling down on existing effective methodologies," said Richard Hummel, threat intelligence lead at NETSCOUT. "In the first half of 2022, attackers conducted more pre-attack reconnaissance, exercised a new attack vector called TP240 PhoneHome, created a tsunami of TCP flooding attacks, and rapidly expanded high-powered botnets to plague network-connected resources. In addition, bad actors have openly embraced online aggression with high-profile DDoS attack campaigns related to geopolitical unrest, which have had global implications." NETSCOUT's Active Level Threat Analysis System (ATLAS™) compiles DDoS attack statistics from most of the world's ISPs, large data centres, and government and enterprise networks. This data represents intelligence on attacks occurring in over 190 countries, 550 industries, and 50,000 autonomous system numbers (ASNs). NETSCOUT's ATLAS Security Engineering and Response Team (ASERT) analyses and curates this data to provide unique insights in its biannual report. When I hear phrases such as DNS water-torture attacks and carpet-bombing attacks on the rise combined with a new Netscout Threat Intelligence report, I immediately reached out to my go-to guy for cybersecurity threats. Richard Hummel rejoins me on Tech TAlks Daily to discuss the news in more detail and demystify some of the terminologies around the threat landscape.
Despite a slight decrease in distributed denial-of-service (DDoS) attack frequency in the UK and Ireland (UK&I) last year, threat actors have ramped up their nefarious activities in 1H2022 – according to NETSCOUT's latest Threat Intelligence Report. Ireland experienced an increase of 200 per cent in DDoS attacks during the first half of the year. Attack sophistication is also increasing, as NETSCOUT threat researchers observed powerful DDoS-capable botnets being used to launch TCP-based direct path attacks, often in tandem with major global events across politics, religion, and sports. This, of course, includes the conflict between Russia and Ukraine. As EMEA saw a seven per cent increase in DDoS attacks, the report's key UK&I findings include: Ireland experienced roughly 284 attacks per day, representing an increase of 118 per cent from the last six months of 2021 The surge in attack activity against Ireland is likely attributable to Ukrainian resources that shifted out of their original location and into cloud-based systems located in Ireland The UK – which almost always tops the charts in attack volume for the EMEA region – saw a little respite, with the average daily attack count decreasing to 743 attacks per day (19 per cent) from the second half of 2021. In fact, attack frequency, as well as both maximum attack size and maximum throughput fell Telecommunications, eCommerce and data processing and hosting services are among the most targeted sectors in 1H 2022 by number of attacks Richard Hummel, threat intelligence lead for NETSCOUT, has made the following comments about how organisations in both the UK and Ireland can defend themselves from DDoS attacks: “Firstly, it is vital for organisations to implement strong and effective cybersecurity tools. Those tools should include threat intelligence to assist in blocking known adversary infrastructure. Threat intelligence alone can block nearly 90 per cent of DDoS attacks. By utilising several simple yet effective mitigation tactics – including restricting inbound traffic and preventing IP address spoofing – organisations can further reduce the impact of emerging DDoS threats. “It's also crucial that businesses test their online infrastructure on a regular basis. This ensures that any changes or adjustments made to applications, services and servers are incorporated into the DDoS defence strategy. This ensures vital online business infrastructural features will be largely unaffected should they be on the receiving end of a DDoS attack. “Organisations should also consider enlisting the help of an on-demand DDoS attack specialist when navigating this unfamiliar landscape. Expert advice and insight can greatly benefit individual teams, organisations and their stakeholders when faced with emerging DDoS attacks. By correctly implementing these strategies, organisations in the UK, Ireland and indeed worldwide, can significantly decrease the impact of DDoS attacks on their online infrastructure.” For more information about regional attack trends in 2022, visit www.netscout.com/threatreport More about Irish Tech News Irish Tech News are Ireland's No. 1 Online Tech Publication and often Ireland's No.1 Tech Podcast too. You can find hundreds of fantastic previous episodes and subscribe using whatever platform you like via our Anchor.fm page here: If you'd like to be featured in an upcoming Podcast email us at Simon@IrishTechNews.ie now to discuss. Irish Tech News have a range of services available to help promote your business. Why not drop us a line at Info@IrishTechNews.ie now to find out more about how we can help you reach our audience. You can also find and follow us on Twitter, LinkedIn, Facebook, Instagram, TikTok and Snapchat.
独立行政法人情報処理推進機構(IPA)および一般社団法人JPCERT コーディネーションセンター(JPCERT/CC)は9月5日、NETSCOUT nGeniusONE における複数の脆弱性について「JVN iPedia」で発表した。影響を受けるシステムは以下の通り。
In this episode, host John Laurito talks with the CEO of Blumira, Jim Simpson, all about success and taking advantage of the opportunities they have in their life. Jim shares how he stepped outside his comfort zone, figuring out who he was and what shaped him to become the leader he is today.Jim Simpson joined Blumira in January as vice president of products. Over the past year, Simpson was responsible for guiding the company's strategic product roadmap to deliver the fastest time to security, with a focus on accessible, easy-to-use detection and response technology. With over two decades of experience growing successful security startups, Simpson previously led product management for the access security provider Duo Security, acquired by Cisco in 2018 for $2.35 billion. Before joining Duo, he led engineering and UX at the network security company Arbor Networks, acquired by NETSCOUT in 2015.Simpson's user-centric approach to solving customer problems is unique in an industry long known for overly complex, legacy solutions that often fail to protect organizations.Jim likes to look for the mystery in the world, and that comes in many forms: traveling, both locally on a bicycle and by planes, trains, and automobiles; creating, appreciating, and supporting art; and finally, sharing what he's learned via mentorship and coaching.Connect with Jim at:Website: https://www.blumira.com/LinkedIn: https://www.linkedin.com/in/gngrwsbi/Show notes:[1:59] Looking back on his life, what shaped who Jim is as a leader?[5:31] On stepping out of his comfort zone[11:45] Did he get to a point where he figured out who he really is as a leader?[16:28] Learning from his mistakes[19:24] Is there a time when a leader should display anger in an organization?[24:43] Good communication within the organization[29:14] What they do in Blumira[31:22] Where to find Jim[32:13] OutroGet a copy of Tomorrow's Leader on Amazon https://tinyurl.com/huseae9hText LEADER to 617-393-5383 to receive The Top 10 Things That The Best Leaders Are Doing Right NowFor questions, suggestions, or speaker inquiries, contact me at john@lauritogroup.com
System availability not uptime is critical for patient care. Cyberattacks have a significant negative impact on availability. No single security solution will prevent attacks, so a layered approach is needed. One tool that is overlooked is packet monitoring which can be used to detect attacks early, find infrastructure vulnerabilities, and improve availability. Healthcare IT Today sat down with Ken Czekaj from NETSCOUT to talk about the latest cybersecurity trends, including extortion attacks, and how packet monitoring can help. Learn more about NETSCOUT: https://www.netscout.com/ Find more great health IT content: https://www.healthcareittoday.com/
The industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cyber criminals looking to either steal information or hold your data, manufacturing capabilities, or intellectual property for ransom. Just as you continue to develop new strategies to respond to hacks and protect you digital presence, these bad actors are continuing to update and enhance their schemes in order to improve the success rate of their attacks. In an effort to help counter these bad actors and stay a step ahead, NETSCOUT Systems recently unveiled their bi-annual Threat Intelligence Report. It offers insight on the continued threats presented by Distributed Denial of Service and ransomware attacks. To help walk us through the report and offer additional insight on some of the new tactics being utilized to carry out these legacy cybersecurity attacks is NETSCOUT's Threat Intelligence Lead, Richard Hummel.For more information on the work NETSCOUT does, you can go to netscout.com. And to get a look at their recent report, you can go to https://www.netscout.com/threatreportTo download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
The industrial sector knows all too well about the need to innovate product offerings and production strategies in order to stay ahead of the competition. Unfortunately, the same can be said for cyber criminals looking to either steal information or hold your data, manufacturing capabilities, or intellectual property for ransom. Just as you continue to develop new strategies to respond to hacks and protect you digital presence, these bad actors are continuing to update and enhance their schemes in order to improve the success rate of their attacks. In an effort to help counter these bad actors and stay a step ahead, NETSCOUT Systems recently unveiled their bi-annual Threat Intelligence Report. It offers insight on the continued threats presented by Distributed Denial of Service and ransomware attacks. To help walk us through the report and offer additional insight on some of the new tactics being utilized to carry out these legacy cybersecurity attacks is NETSCOUT's Threat Intelligence Lead, Richard Hummel.For more information on the work NETSCOUT does, you can go to netscout.com. And to get a look at their recent report, you can go to https://www.netscout.com/threatreportTo download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
The war in Ukraine has highlighted the role that cyber plays in modern warfare. Some of these tactics are poised to impact the oil and gas industry. Get ready. Duration: 11m 45s Register to attend the June 2nd virtual panel discussion–hosted by Geoffrey Cann–to learn how to proactively protect industrial organizations and critical infrastructure from cyber threats. Hear from leading OT (industrial) Cybersecurity experts– from OTORIO, ACSI and Netscout–on risk management strategies for industrial organizations as they discuss: --risks of convergence: OT & IT --how to talk to the Board --the importance of cyber hygiene --risk management best practices Who should attend: Cybersecurity decision-makers (IT and OT) who want to proactively protect their industrial organizations and critical infrastructure from cyber threats. Register today: https://us02web.zoom.us/webinar/register/9616503154908/WN_GPZT_zuaRc6D0BncLhgaiw
Florian Söllner, leitender Redakteur bei DER AKTIONÄR, blickt jede Woche auf die spannendsten Entwicklungen im Tech-Sektor.
Oral Arguments for the Court of Appeals for the Federal Circuit
Implicit, LLC v. NetScout Systems, Inc.
Oral Arguments for the Court of Appeals for the Federal Circuit
Implicit, LLC v. NetScout Systems, Inc.
Heard on the Baltimore waterfront. Privateering against Western brands. An update on sanctions and counter sanctions. Stonefly, straight outta Pyongyang. Lazarus is also back (and not in the good way). Richard Hummel from NETSCOUT discusses their bi-annual Threat Intel Report. Jon DiMaggio from Analyst1 joins us to discuss his new book, “The Art of Cyberwarfare - An Investigator's Guide to Espionage, Ransomware, and Organized Cybercrime.” And the US Department of State has added six Russian GRU officers to its Rewards for Justice program. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/81 Selected reading. Britain says Ukraine controls majority of its airspace (Reuters) Latest strikes on Russia hint daring Ukraine is not intimidated by the Kremlin (The Telegraph) West gearing up to help Ukraine for ‘long haul', says US defence secretary (the Guardian) U.S., allies promise to keep backing Ukraine in its war with Russia (Washington Post) Russia-linked hackers claim to have breached Coca-Cola Company (CyberNews) Stormous ransomware gang claims to have hacked Coca-Cola (Security Affairs) Chinese drone-maker DJI quits Russia and Ukraine (Register) Russia to Cut Gas to Poland and Bulgaria, Making Energy a Weapon (Bloomberg) Russia cuts off gas to Poland, Bulgaria, stoking tensions with E.U. over Ukraine (Washington Post) Why Russia's Economy Is Holding On (Foreign Policy) Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets (Symantec) A "Naver"-ending game of Lazarus APT (Zscaler) U.S. offers $10 mln reward for information on Russian intelligence officers -State Dept (Reuters) US offering $10 million for info on Russian military hackers accused of NotPetya attacks (The Record by Recorded Future) Rewards for Justice – Reward Offer for Information on Russian Military Intelligence Officers Conducting Malicious Activity Against U.S. Critical Infrastructure - United States Department of State (United States Department of State)
Florian Söllner, leitender Redakteur bei DER AKTIONÄR, blickt jede Woche auf die spannendsten Entwicklungen im Tech-Sektor.
NETSCOUT, one of the leading cybersecurity and network diagnostics firms globally, recently revealed the findings of its bi-annual Threat Intelligence Report. The report provided insight and analysis into distributed-denial-of-service (DDoS) attack trends in 2021. I invited Richard Hummel, ASERT Threat Intelligence Lead for NETSCOUT, to join me on Tech Talks Daily to discuss the big takeaways from the report. Richard shares how DDoS-for-hire services are now more accessible to the public and the significant increase in computer manufacturers and computer storage manufacturing attacks. We also discuss the different types of attacks used and who the suspected attackers are. Finally, I learn more about which industries have been most targeted and what business leaders need to be aware of when it comes to DDoS attacks.
Around the In-house episode 4 Hosts Alex Aferiat, Managing Legal Counsel at BCG and Ruchi Sisodia Shah, Senior Counsel, Boston Scientific sits down with Stephanie Lambert, Chief Compliance Officer, NETSCOUT. Stephanie shares what she has learned during her in-house career, some of her best advice and key lessons she has learned.
As we celebrate International Women's Day, we need to address the urgent and pressing job and skills gaps in the cyber and STEM corporate cultures that must be addressed swiftly in order to bring about true change and progress. Issues like diversity, inclusion, solving the cybersecurity skills gap of today by both getting kids interested and encouraged as soon as possible, but also addressing the urgency by upskilling and promoting career path shifts to cyber using the vast untapped talent pool of candidates who are interested in shifting career paths into cyber but don't know where to begin. This is a complex topic but the solutions could be relatively simple. Join me and special guests Candice Dixon, Coalition Development Director at NPower, Karen McCloskey, Director Internal Communications and Corporate Giving at NETSCOUT and Michael Hopson, Sr. Manager of Social Media at NETSCOUT to explore the current and emerging landscape of our corporate cyber lives and find out how we can address these issues head on, and in ways that are beneficial to us all now and in the future.
In this episode I had a chance to talk with Brian Philips about 5G security. Brian is the Chief Solutions Architect for NetScout. We had a chance to dive into various parts of 5G and what does it mean for the future of the 'Mobile Office'. We also talked about future use cases that are not as far as away as you think.How is 5G going to impact security?5G Internet to home isn't 'private' yetCellular security is wider than it needs to be right nowHow companies like Amazon could utilize 5G for both a private network and a 'near me' cloud serviceEpisode Sponsor:This episode is sponsored by NetScout. NetScout is a Security and Communication Service Provider based out of Westford, Massachusetts. Proceeds from this sponsorship will be going towards a youth mental health progream here in West Michigan.
As we celebrate International Women's Day, we need to address the urgent and pressing job and skills gaps in the cyber and STEM corporate cultures that must be addressed swiftly in order to bring about true change and progress. Issues like diversity, inclusion, solving the cybersecurity skills gap of today by both getting kids interested and encouraged as soon as possible, but also addressing the urgency by upskilling and promoting career path shifts to cyber using the vast untapped talent pool of candidates who are interested in shifting career paths into cyber but don't know where to begin. This is a complex topic but the solutions could be relatively simple. Join me and special guests Candice Dixon, Coalition Development Director at NPower, Karen McCloskey, Director Internal Communications and Corporate Giving at NETSCOUT and Michael Hopson, Sr. Manager of Social Media at NETSCOUT to explore the current and emerging landscape of our corporate cyber lives and find out how we can address these issues head on, and in ways that are beneficial to us all now and in the future.
It's a Digital Transformers takeover of the Supply Chain Buzz for November 15, produced in partnership with TNS - and with good reason! According to cybersecurity firm Kaspersky, DDoS attacks have increased by 24% in the past year, while smart DDoS attacks increased by 31%. That's a big problem for supply chains big and small, particularly as digital transformation efforts widen the network of third-party providers and IoT endpoints (that double nicely as attack vectors). In this livestream, co-hosts Scott and Kevin tackle the topic of cybersecurity with a little help from featured guest Richard Hummel, Manager of Threat Intelligence at NETSCOUT. Join this dynamic trio as they break down the increasing speed and bandwidth of DDos attacks, new, more targeted ransomware strategies, the intricate web of entities impacted by supply chain vulnerabilities - and the shift to manufacturing firms as the latest target of cyber attacks. You'll learn new terms like "honeypot," get actionable strategies for safeguarding your network - and find out how you can get timely updates on the threat landscape from NETSCOUT. Additional Links & Resources: Learn more about Supply Chain Now: https://supplychainnow.com/program/supply-chain-now Learn more about Digital Transformers: https://supplychainnow.com/program/digital-transformers/ (https://supplychainnow.com/program/digital-transformers/) Subscribe to Supply Chain Now and all other Supply Chain Now programs: https://supplychainnow.com/subscribe (https://supplychainnow.com/subscribe) Learn more about TNS: https://www.totalnetworkservices.io/ (https://www.totalnetworkservices.io/) WEBINAR- Accelerating Innovation Through Collaboration: https://bit.ly/3CQhFRX (https://bit.ly/3CQhFRX) 2021 State of Supplier Diversity Report: https://info.cvmsolutions.com/download-the-2021-state-of-supplier-diversity-reports-2 (https://info.cvmsolutions.com/download-the-2021-state-of-supplier-diversity-reports-2) 2021 U.S. Bank Q3 Freight Payment Index: https://bit.ly/3pwmWKC (https://bit.ly/3pwmWKC) This episode was hosted by Scott Luton and Kevin L. Jackson. For additional information, please visit our dedicated show page at: https://supplychainnow.com/richard-hummel-with-netscout-772
It's a Digital Transformers takeover of the Supply Chain Buzz for November 15, produced in partnership with TNS - and with good reason! According to cybersecurity firm Kaspersky, DDoS attacks have increased by 24% in the past year, while smart DDoS attacks increased by 31%. That's a big problem for supply chains big and small, particularly as digital transformation efforts widen the network of third-party providers and IoT endpoints (that double nicely as attack vectors). In this livestream, co-hosts Scott and Kevin tackle the topic of cybersecurity with a little help from featured guest Richard Hummel, Manager of Threat Intelligence at NETSCOUT. Join this dynamic trio as they break down the increasing speed and bandwidth of DDos attacks, new, more targeted ransomware strategies, the intricate web of entities impacted by supply chain vulnerabilities - and the shift to manufacturing firms as the latest target of cyber attacks. You'll learn new terms like "honeypot," get actionable strategies for safeguarding your network - and find out how you can get timely updates on the threat landscape from NETSCOUT. Additional Links & Resources: Learn more about Supply Chain Now:https://supplychainnow.com/program/supply-chain-now ( https://supplychainnow.com/program/supply-chain-now) Learn more about Digital Transformers: https://supplychainnow.com/program/digital-transformers/ (https://supplychainnow.com/program/digital-transformers/) Subscribe to Supply Chain Now and all other Supply Chain Now programs: https://supplychainnow.com/subscribe (https://supplychainnow.com/subscribe) Learn more about TNS: https://www.totalnetworkservices.io/ (https://www.totalnetworkservices.io/) WEBINAR- Accelerating Innovation Through Collaboration: https://bit.ly/3CQhFRX (https://bit.ly/3CQhFRX) 2021 State of Supplier Diversity Report: https://info.cvmsolutions.com/download-the-2021-state-of-supplier-diversity-reports-2 (https://info.cvmsolutions.com/download-the-2021-state-of-supplier-diversity-reports-2) 2021 U.S. Bank Q3 Freight Payment Index: https://bit.ly/3pwmWKC (https://bit.ly/3pwmWKC) This episode was hosted by Scott Luton and Kevin L. Jackson. For additional information, please visit our dedicated show page at: https://supplychainnow.com/richard-hummel-with-netscout-772
TrickBot, is a financial Trojan first detected in 2016, has been traditionally a Windows-based crimeware solution, employing different modules to perform a wide range of malicious activities on target networks, including credential theft and perpetrating ransomware attacks. Trickbot Still Infecting Despite Government And Microsoft’s Best Efforts Every day Big Tech and Mass Media make it hard to find out what is going on with the internet. The suppression of information is a danger to all of us. Social media attempts to shape news and information by over-amplification of disinformation. This podcast hope to give information and provide insights from Join our community!! Subscribe to the Insecurity Brief podcast now on every platform we can find Follow me on Twitter @trip_elix Links Our Website: https://www.tripelix.com/insecurity/trickbot-still-infecting-despite-government-and-microsofts-best-efforts/ Youtube: https://youtu.be/A-qoZDCD9f8 Rumble: rumblelink iTunes: ituneslink Spotify: spotifylink Trip’s books https://www.tripelix.com/merch #trickbot #malware #windows #microsoft #ransomware 2021-03-29 BazaCall (BazarCall) Example “BazaCall” or “BazarCall” is a support scam that entices victims to download and run a malicious Excel spreadsheet that infects a vulnerable Windows computer with BazaLoader (also called BazarLoader) malware. This infection process involves a fake support center and support person who guides you through the process. This video shows an example of how someone might get infected. Trickbot Rising — Gang Doubles Down on Infection Efforts to Amass Network Footholds IBM X-Force has been tracking the activity of ITG23, a prominent cybercrime gang also known as the TrickBot Gang and Wizard Spider. Researchers are seeing an aggressive expansion of the gang’s malware distribution channels, infecting enterprise users with Trickbot and BazarLoader. This move is leading to more ransomware attacks — particularly ones using the Conti ransomware. https://securityintelligence.com/posts/trickbot-gang-doubles-down-enterprise-infection/ TrickBot Linux Variants Active in the Wild Despite Recent Takedown Efforts to disrupt TrickBot may have shut down most of its critical infrastructure, but the operators behind the notorious malware aren’t sitting idle. According to new findings shared by cybersecurity firm Netscout, TrickBot’s authors have moved portions of their code to Linux in an attempt to widen the scope of victims that could be targeted
Richard Hummel, threat intelligence lead at NETSCOUT, joins the podcast to talk about the company's Threat Intelligence Report and escalating DDoS attacks.
Richard Hummel, ASERT Threat Intelligence Lead, NETSCOUTNETSCOUT recently published its latest Threat Intelligence Report. Among its findings, threat actors launched approximately 5.4 million DDoS (distributed denial of service) attacks in the first half of 2021, setting the world on track to see a new record for calendar 2021. The global connectivity supply chain is increasingly under attack from both DDoS and ransomware events. Is there a silver lining to this cloud? Robin Amlôt of IBS Intelligence speaks to Richard Hummel, ASERT Threat Intelligence Lead at NETSCOUT.
Eddy nos habla sobre los enormes incendios que no cesan en California; Bruno D'Alleva, Director de Ring en Latinoamérica, nos habla sobre los equipos que Ring ofrece para la seguridad del hogar cómo la Floodlight Cam Wired Pro, Ring Video Doorbell 4 y Video Doorbell Wired; Jorge Tsuchchiya, Director de Netscout México, nos habla sobre el combate al cibercrimen, todo esto y más con Eddy Warman de Noche.
Tonya Hall asks Richard Hummel, manager at Netscout, about the latest cyberattack trends and why the number has skyrocketed. Learn more about your ad choices. Visit megaphone.fm/adchoices
Richard Hummel, Asert threat intelligence lead, NetScout, a cybersecurity and network diagnostics firm, talks to Joy Macknight about its recent threat intelligence report, called ‘The Long Tail of Attacker Innovation', which provides insight and analysis into the nature of distributed-denial-of-service attacks in the first half of 2021. See acast.com/privacy for privacy and opt-out information.
Its not widely that DDOS attacks also cause damage from state exhaustion in devices. A recent study why Netscout surprised me that many engineers are aware of overload bandwidth or routing devices but give less considerations to state exhaustion in application aware devices.
Its not widely that DDOS attacks also cause damage from state exhaustion in devices. A recent study why Netscout surprised me that many engineers are aware of overload bandwidth or routing devices but give less considerations to state exhaustion in application aware devices.
Its not widely that DDOS attacks also cause damage from state exhaustion in devices. A recent study why Netscout surprised me that many engineers are aware of overload bandwidth or routing devices but give less considerations to state exhaustion in application aware devices.
Its not widely that DDOS attacks also cause damage from state exhaustion in devices. A recent study why Netscout surprised me that many engineers are aware of overload bandwidth or routing devices but give less considerations to state exhaustion in application aware devices. The post Tech Bytes: DDOS and State Exhaustion With NETSCOUT – Updated appeared first on Packet Pushers.
Its not widely that DDOS attacks also cause damage from state exhaustion in devices. A recent study why Netscout surprised me that many engineers are aware of overload bandwidth or routing devices but give less considerations to state exhaustion in application aware devices. The post Tech Bytes: DDOS and State Exhaustion With NETSCOUT – Updated appeared first on Packet Pushers.
Its not widely that DDOS attacks also cause damage from state exhaustion in devices. A recent study why Netscout surprised me that many engineers are aware of overload bandwidth or routing devices but give less considerations to state exhaustion in application aware devices. The post Tech Bytes: DDOS and State Exhaustion With NETSCOUT – Updated appeared first on Packet Pushers.
Its not widely that DDOS attacks also cause damage from state exhaustion in devices. A recent study why Netscout surprised me that many engineers are aware of overload bandwidth or routing devices but give less considerations to state exhaustion in application aware devices. Firewalls, IPS and reverse proxies are subject to overload failure when the internal state is exceeded. This includes server side caches (Varnish, memcache etc) and all this elements should be part of your DDOS strategy. Roland Dobbins talks about the nature of these attacks and how to implement stateful protection while using stateless DDOS technology. The post Tech Bytes: DDOS and State Exhaustion With NETSCOUT appeared first on Packet Pushers.
Its not widely that DDOS attacks also cause damage from state exhaustion in devices. A recent study why Netscout surprised me that many engineers are aware of overload bandwidth or routing devices but give less considerations to state exhaustion in application aware devices. Firewalls, IPS and reverse proxies are subject to overload failure when the internal state is exceeded. This includes server side caches (Varnish, memcache etc) and all this elements should be part of your DDOS strategy. Roland Dobbins talks about the nature of these attacks and how to implement stateful protection while using stateless DDOS technology. The post Tech Bytes: DDOS and State Exhaustion With NETSCOUT appeared first on Packet Pushers.
Its not widely that DDOS attacks also cause damage from state exhaustion in devices. A recent study why Netscout surprised me that many engineers are aware of overload bandwidth or routing devices but give less considerations to state exhaustion in application aware devices. Firewalls, IPS and reverse proxies are subject to overload failure when the internal state is exceeded. This includes server side caches (Varnish, memcache etc) and all this elements should be part of your DDOS strategy. Roland Dobbins talks about the nature of these attacks and how to implement stateful protection while using stateless DDOS technology. The post Tech Bytes: DDOS and State Exhaustion With NETSCOUT appeared first on Packet Pushers.
PJ Pereira is an advertising and entertainment pioneer. He believes agencies have to provide return not only on the money brands are investing but also the time consumers are spending with the work. That balance is the ultimate challenge marketing faces today. In 2016, Pereira O'Dell was behind the rare participation of a brand in the prestigious “Official Selection” of the Sundance Film Festival with NetScout and Werner Herzog's “Lo and Behold, Reveries of the Connected World.” The film was named in Esquire Magazine's “Top 10 Best Non-Fiction Films” in 2016. His agency is credited with the creation of the first-ever social film (“The Inside Experience”) for Intel and Toshiba in 2011, which combined Hollywood talent content and social media participation. The film surpassed the triple Cannes Grand Prix winner “The Beauty Inside,” also for Intel and Toshiba, which is now being turned into a major feature film starring Emilia Clarke. “The Beauty Inside” was the first piece of advertising to win an Emmy against regular TV programming. With strong roots in digital and content, his milestones in the field include a feature film for Red Bull titled “Unflinching Triumph,” which in 2007 was named by Sports Illustrated as the “Most Amusing Sports Parody of the Year,” and an alternate-reality game titled “The Lost Ring” for McDonald's for the Summer Olympics in Beijing. Beyond advertising, Brazilian-born PJ Pereira is also a best-selling novelist. In 2015, his book trilogy "Gods of Both Worlds" spent a month as the #1 novel by a Brazilian author in his native country and was published in five other countries. In April 2017, in Brazil, he launched his fourth novel, "The Mother, The Daughter and The Lady Spirit" (“A mãe, a filha e o espírito da santa”). He has two kung fu black belts and is working on a karate one too. His credentials in content, digital, and advertising have made him one of the world's most influential and respected creatives. He was named the Top CCO in Adweek's Creative 100, recognized by "Creativity 50," and noted in 4A's 100 People Who Make Advertising Great. Most recently, PJ served as the President of the Cannes Lions Entertainment Jury. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app --- Send in a voice message: https://anchor.fm/latinxswhodesign/message Support this podcast: https://anchor.fm/latinxswhodesign/support
Welcome Richard Hummel, Manager, Threat Research at Arbor Networks, the security division of NETSCOUT, to Experts Only Podcast. Hear from a #cybersecurity expert as he joins host Jon Powers to discuss #cyberthreats and #cyberattack prevention in the #energy industry. Tune in for this alarming–but important–discussion.
GrayMatter emPOWERUP Podcast host Jeremy Boren talks with GE Digital's Richard Kenedi, General Manager - Manufacturing and Digital Plant, about GE Digital's latest updates to Proficy Historian, iFIX and Ops Hub, along with how GE Digital is investing in R&D and learning from customers. The interview was recorded for GrayMatter's Transform.virtual Spring event in April 2021. Learn more at graymattersystems.com/transform-virtual-2021/ About Richard Kenedi: Richard Kenedi is the General Manager of the Manufacturing | Digital Plant business segment for GE Digital. In this role, Richard is responsible for driving profitable growth for the Automation and Manufacturing Execution System product and service portfolio, serving manufacturing verticals and digital plants across the globe. Prior to joining GE Digital, Richard served as the President Core Markets within NETSCOUT, a global supplier of network service assurance products. Prior to NETSCOUT, he held the position of President Tektronix Communications, an operating company within the Danaher corporation. Prior roles within Tektronix Communications included Vice President, Products and Portfolio Management, Vice President and General Manager for the Test & Optimization and Core Test Businesses. Additionally, prior to Tektronix Communications Richard held senior roles in SOMA Networks and Nortel Networks. Richard holds a Bachelor of Applied Science in Electrical Engineering from the University of Toronto and an MBA from the University of Dallas.
NETSCOUT, one of the leading cybersecurity and network diagnostics firms, recently revealed the findings of its bi-annual Threat Intelligence Report. The report provided insight and analysis into the unprecedented nature of Distributed-Denial-of-Service (DDoS) attacks in 2020. Darren Anstee, Chief Technology Officer for Security at NETSCOUT, shares insights from the report. We discuss who the suspected attackers are and how the attacks have differed over the last year. I learn how attackers focused on COVID-era lifelines such as healthcare, e-commerce, finance, and educational services with complex, high-throughput attacks designed to overwhelm and quickly take them down. We talk about what business leaders need to be aware of when it comes to a DDoS attack and its impact. Darren also shares how NETSOUT helps businesses with the challenges presented by DDoS attacks.
In this week's episode of Analytics Neat we discuss the NETSCOUT "Threat Intelligence Report" and the Cardlytics acquisition of Bridg on the Undercard. For the Main Event, we review customer centricity and how design thinking can be applied correctly in analytics. All this and more in this week's episode of Analytics Neat. Thanks for listening! iTunes: https://itunes.apple.com/us/podcast/analytics-neat/id1350608276?mt=2 Spotify: https://open.spotify.com/show/2DIz7pDt5IYA2VJ86LbaK3 Google Play: https://play.google.com/music/m/Iaeur7hjizv7s654nbcsfgtxsmq?t=Analytics_Neat Amazon: https://music.amazon.com/podcasts/3f77907d-81b7-46ff-a9cd-12c3c539a2ad/Analytics-Neat Continue the conversation on Twitter with #AnalyticsNeat https://twitter.com/BillBruno https://twitter.com/AnalyticsNeat Visit BillBruno.com
Richard Hummel, Threat Research Manager, NETSCOUT's Arbor NetworksAccording to NETSCOUT's bi-annual Threat Intelligence Report, a record-setting 10,089,687 Distributed Denial of Service (DDoS) attacks were observed during 2020. The COVID-19 pandemic was the clear catalyst for this unprecedented DDoS attack activity. Cybercriminals set multiple records in 2020, taking advantage of the shift towards remote work across the globe. As the pandemic continues, it is imperative for security professionals to remain vigilant to protect critical infrastructure. Robin Amlot of IBS Intelligence spoke to Richard Hummel, Threat Research Manager at NETSCOUT.
Beth Allphin was on a path to an accounting degree when tech comm appeared on her radar. While still in college, Beth got her first gig to do some editing work on the side. As they say, one thing led to another, and Beth found herself in a tech comm role. She has had a long inning in this career as she has worn both hats - that of an individual contributor and manager. Beth shares some amazing tips on how she acquired project and management skills while on the job to further her career.Guest BioBeth has been a technical communicator for 30 years in both the healthcare and the telecommunications industries. She currently works for NETSCOUT where she develops software and hardware documentation and online help. Beth has been married to Brian for over 25 years and they have two daughters, Olivia and Elizabeth. Beth enjoys traveling, cooking, and spending time with her family.If you have thoughts to share, please do write to me at insidetechcomm@gmail.com. I would love to hear from you.
Greg was born and raised in Beaumont, TX, went to Texas A&M University for undergrad, worked in sales for a few years then attended SMU full time for an MBA. Upon graduating from SMU, he eventually ended up in the telecom industry for nearly 20 years, where he worked for Nortel, Tektronix Communications, and Netscout. Greg’s entrepreneurial spirit was always alive but hadn’t surfaced fully until 2015 when he quit his comfortable job in Corporate America to purchase an existing company – Outhouse Tickets. However, he had toyed around with owning his own company for decades. He started a small advertising company in the early ’90s. He also created and later sold one of the first online apartment locators in Texas called FreeRentMoney.com. (Greg is still a licensed Texas Real Estate Broker) Finally, Greg took the plunge to purchase Outhouse Tickets to run full time. Outhouse Tickets is the easiest way to sell event tickets. They make buying and selling tickets easier and cheaper for any sized event. Their low convenience fees allow you to sell more tickets. Their high customer service level enables you to focus on your business rather than posting events and managing ticketing. They can ticket any size event: From 1 ticket to 100,000 tickets. You can visit them on the web at Outhousetickets.com. Greg married his lovely wife, Lori, in 1998 in his parent’s backyard in Beaumont after Hurricane Georges wrecked the Virgin Islands and their original plans for a destination wedding. After living in Dallas, Trophy Club, and Plano, they eventually landed in Fairview in 2010. Greg and Lori have two children – Emma, age 19, is attending the University of Oklahoma, and Carter, age 17, is a Senior at Lovejoy HS.
The Connected World is only as strong as the people who protect it. NETSCOUT delivers service visibility and protects the digital infrastructure that supports our connected world. Distributed Denial-of-Service (DDoS) attacks are coordinated attempts to disrupt the regular availability and performance of a targeted website or online service by flooding it with traffic, and they have been on the rise in 2020. Recently, Netscout has published data focusing on the UK since the start of the year. The data showed how attacks had changed significantly compared to previous years, with the key findings being: • Attacks destined to the United Kingdom increased by 62% year-over-year, bandwidth spiked 56% upwards, and throughput increased by 43%. • Since the global COVID-19 Pandemic in early- to mid-March, the number of observed attacks increased month-over-month. • The most common DDoS vector for attacks against the United Kingdom during this period was DNS Reflection/Amplification. In today's episode, Darren Anstee, CTO at Netscout, joins me on the Tech Talks Daily podcast. We explore the current trends around DDoS and what businesses need to be aware of in terms of risk and risk mitigation. I also learn more about Netscout's Adaptive Service Intelligence (ASI) technology continuously monitors the service delivery environment to identify performance issues and provides insight into network-based security threats, helping teams to quickly resolve problems that can cause business disruptions or impact the user experience.
Phishing through redirector domains. Content moderation, influence operations, and Section 230. A Twitter outage is due to an error, not an attack. QQAAZZ money-laundering gang members indicted. Johannes Ullrich tracks Mirai Bots going after Amanda backups. Our guest is Richard Hummel from Netscout with research on cybersecurity trends and forecasts. And some ruminations about range safety for cyber exercises. For links to all of today's stories check out our CyberWire daily news brief: https://www.thecyberwire.com/newsletters/daily-briefing/9/201
In this episode of The Cybrary Podcast we sit down with Richard Hummel, the Manager of Threat Research at Arbor Networks - the Security Division of NetScout. Speaking with Mike Gruen, the CISO of Cybrary, Richard talks about DDoS attacks in the gaming industry and how IoT devices should scare everyone.
Episode S2E1 is a fascinating interview with Hardik Modi from NETSCOUT. We talk about the IoT revolution and some interesting findings from NETSCOUT's latest industry report. --- This episode is sponsored by · Anchor: The easiest way to make a podcast. https://anchor.fm/app
This week in the Enterprise Security News segment, Paul, Jeff, and Matt cover the following news stories: Preempt Security Becomes First in Industry to do Real-Time Threat Detection for Encrypted Authentication Protocol Traffic, Wallarm announces CircleCI Orbs for Wallarm FAST, Automox raises $30 million, Radiflow Launches Business-Driven Industrial Risk Analytics Service, Check Point Delivers Unified Security Management as a Cloud Service, Now available: eSentire's 2019 Annual Threat Intelligence Report, STEALTHbits' free program helps orgs mitigate risks associated with Microsoft's pending AD update, NETSCOUT enables streamline monitoring and reduces risk, If You're Only Focused on Patching, You're Not Doing Vulnerability Management, 2019 Vulnerability Report: Cybercriminals Continue to Target Microsoft Products, Actionable Searching and Data Download with Vulnerability Management Dashboards, Companies and employees embrace BYOD but with compliance and risk challenges. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode171
This week in the Enterprise Security News segment, Paul, Jeff, and Matt cover the following news stories: Preempt Security Becomes First in Industry to do Real-Time Threat Detection for Encrypted Authentication Protocol Traffic, Wallarm announces CircleCI Orbs for Wallarm FAST, Automox raises $30 million, Radiflow Launches Business-Driven Industrial Risk Analytics Service, Check Point Delivers Unified Security Management as a Cloud Service, Now available: eSentire's 2019 Annual Threat Intelligence Report, STEALTHbits' free program helps orgs mitigate risks associated with Microsoft's pending AD update, NETSCOUT enables streamline monitoring and reduces risk, If You're Only Focused on Patching, You're Not Doing Vulnerability Management, 2019 Vulnerability Report: Cybercriminals Continue to Target Microsoft Products, Actionable Searching and Data Download with Vulnerability Management Dashboards, Companies and employees embrace BYOD but with compliance and risk challenges. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/ESWEpisode171
PJ Pereira is Founder and Creative Chairman at Pereira & O'Dell. PJ is an advertising pioneer, and one of the world's most influential creatives. He was named the Top CCO in Adweek's "Creative 100." He was recognized by "Creativity 50," and 4A's "100 People Who Make Advertising Great." In 2016, Pereira & O'Dell was behind the rare participation of a brand in the prestigious “Official Selection” of Sundance Film Festival with NETSCOUT and Werner Herzog's "Lo and Behold, Reveries of the Connected World", named in Esquire Magazine’s Top 10 Best Non-Fiction Films of 2016. His agency is credited with the creation of the first-ever social film, “The Inside Experience”, for Intel and Toshiba in 2011. Its follow-up, “The Beauty Inside”, was a triple Cannes Grand Prix winner, and the first branded content to win an Emmy against regular TV programming. He’s served on 6 Cannes Lions juries, including two jury presidencies. He also serves on the boards of the AdCouncil and The One Club. Beyond advertising, the Brazilian-born native is a best-selling novelist. In 2015, his book trilogy "Gods of Both Worlds" spent a month as the #1 novel in Brazil.
We interviewed NetScout, Remediant, and BitDefender at Black Hat 2019! Full Show Notes: https://wiki.securityweekly.com/ES_Episode149 Visit https://www.securityweekly.com/esw for all the latest episodes!
We interviewed NetScout, Remediant, and BitDefender at Black Hat 2019! Full Show Notes: https://wiki.securityweekly.com/ES_Episode149 Visit https://www.securityweekly.com/esw for all the latest episodes!
This week, Paul and Matt Alderman interview Mehul Revankar, Senior Product manager at SaltStack, to discuss the Sec and Ops Challenge! In the Enterprise Security News, Signal Sciences Rolls New Application Security Product, A10 Networks brings zero-day automated protection to DDoS defense, and we have some acquisition and funding updates from Symantec, McAfee, Cybereason, and Capsule8! In our final segment, we air three pre-recorded interviews with NETSCOUT, Remediant, and BitDefender from BlackHat USA 2019! To learn more about NetScout, visit: https://securityweekly.com/netscout Full Show Notes: https://wiki.securityweekly.com/ES_Episode149 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Paul and Matt Alderman interview Mehul Revankar, Senior Product manager at SaltStack, to discuss the Sec and Ops Challenge! In the Enterprise Security News, Signal Sciences Rolls New Application Security Product, A10 Networks brings zero-day automated protection to DDoS defense, and we have some acquisition and funding updates from Symantec, McAfee, Cybereason, and Capsule8! In our final segment, we air three pre-recorded interviews with NETSCOUT, Remediant, and BitDefender from BlackHat USA 2019! To learn more about NetScout, visit: https://securityweekly.com/netscout Full Show Notes: https://wiki.securityweekly.com/ES_Episode149 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Researchers at Netscout's ASERT Team have been tracking the growth of botnets originating in Egypt and targeting routers in South Africa. The payload is a variant of the Hakai DDoS bot. Richard Hummel is threat intelligence manager at Netscout, and he joins us to share their findings. The original research is here: https://www.netscout.com/blog/asert/realtek-sdk-exploits-rise-egypt The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.
Researchers at Netscout's ASERT Team have been tracking the growth of botnets originating in Egypt and targeting routers in South Africa. The payload is a variant of the Hakai DDoS bot. Richard Hummel is threat intelligence manager at Netscout, and he joins us to share their findings. The original research is here: https://www.netscout.com/blog/asert/realtek-sdk-exploits-rise-egypt
In this episode of the Impact Michigan podcast, we host Jim Tenzillo of Invest Michigan. Invest Michigan is an investment fund that invests in early stage technology companies that are located in the state of Michigan. Jim started there a few years ago after first cutting his teeth as an accountant in Chicago, eventually breaking into the world of startups running Operations & Marketing at LinkCapital. We chat about how he got his start in venture capital, what’s he’s seen with regard to the growth of the Michigan startup ecosystem, and he even gives us a few startups to watch over the next few years. ————— Links: Invest Michigan: https://investmichigan.org Jim's LinkedIn: https://www.linkedin.com/in/jimtenzillo/ NETSCOUT: https://www.netscout.com/ Intermitten: https://intermitten.org
Beth is an expert at navigating corporate cultures and has over a decade of experience maximizing organizational impact. She leads the community engagement initiative at NETSCOUT leading the charge on impactful community initiatives. In today’s episode, we get to chat about her take on culture from a wide range of professions, how to create meaningful community strategies, and what drives her to do good work. ————— NETSCOUT: https://netscout.com Beth's Twitter: https://twitter.com/bethskirsch Intermitten: https://intermitten.org/
On the latest episode, Glenn Gaudet is joined by Kendall Hershey, Digital Marketing Manager at NETSCOUT. Kendall is a self-proclaimed social media nerd that uses her inquisitive nature to help craft compelling digital marketing strategies. Kendall will also be speaking at the AMPlify event June 11-12 in Boston. In this podcast you will learn about: How to launch an employee advocacy program Getting executive buy-in to the program Capitalizing on social media as it relates to SEO Focusing on the quality of social media engagement How to sustain an employee advocacy program Connect with Kendall on Twitter or via LinkedIn.
In today’s podcast, we hear updates on suspicions of Chinese operators. Some trend reports from IBM and NETSCOUT. Bare-metal cloud services get reflashed. USB-C ports may be more vulnerable than thought to direct memory access attacks. Credential-stuffing attacks hit users of online tax-preparation services. And that missile attack on Tampa was not a drill—in fact, it never happened at all—and congratulations to the citizens of Florida for recognizing a hack and a hoax when they see one. Justin Harvey from Accenture on the types of vulnerabilities adversaries target. Guest is Guarav Tuli from F-Prime Capital on the current venture capital environment for cyber. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_26.html Support our show
Researchers from Netscout's ASERT team have been making use of honeypots to gather information on rapidly evolving IoT botnets that take advantage of default usernames and passwords to gain access and take control of unprotected devices. Matt Bing is a security research analyst with Netscout, and he guides us through their findings. The original research can be found here: https://asert.arbornetworks.com/dipping-into-the-honeypot/ The CyberWire's Research Saturday is presented by Juniper Networks. Thanks to our sponsor Enveil, closing the last gap in data security.
Researchers from Netscout's ASERT team have been making use of honeypots to gather information on rapidly evolving IoT botnets that take advantage of default usernames and passwords to gain access and take control of unprotected devices. Matt Bing is a security research analyst with Netscout, and he guides us through their findings. The original research can be found here: https://asert.arbornetworks.com/dipping-into-the-honeypot/
The allure of the cloud is compelling and offers greater agility, elasticity, and reduced capex. Businesses seek to reap these benefits by migrating to AWS, all while enforcing corporate governance and security policies to minimize risk. To accomplish this objective, businesses must continuously monitor the performance of complex applications, which is not practical with point solutions, such as bytecode instrumentation. In this session, learn how NETSCOUT's smart data platform enables continuous monitoring in hybrid cloud environments to minimize risk and control costs. Hear real-life examples of how businesses optimized their AWS migration, gaining visibility and deep insights into both the physical and virtual worlds, to maintain the continuity and security of the services throughout the migration process.This session is brought to you by AWS partner, NETSCOUT Systems.
Netscout takes internet scale Threat Protection to the EDGE, Splunk addresses several vulnerabilities in Enterprise and Light products, Ping Identity launches a Quickstart Private Sandbox, and we have some acquisition updates from CheckPoint acquiring Dome9, CrowdStrike, Fortinet, Rapid7, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode112 Visit http://securityweekly.com/esw for all the latest episodes!
Netscout takes internet scale Threat Protection to the EDGE, Splunk addresses several vulnerabilities in Enterprise and Light products, Ping Identity launches a Quickstart Private Sandbox, and we have some acquisition updates from CheckPoint acquiring Dome9, CrowdStrike, Fortinet, Rapid7, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode112 Visit http://securityweekly.com/esw for all the latest episodes!
This week, Paul is joined by guest host Tyler Shields to interview Jonathan Sander, Security Field CTO of Snowflake computing! Jonathan explains how he came to work for Snowflake, what Snowflake does in the enterprise security space, and how Snowflake contains their data and protect from breaches as well as keeping the data safe! In the Enterprise Security News, Netscout takes internet scale Threat Protection to the Edge, Splunk addresses several vulnerabilities in Enterprise and Light products, Ping Identity launches a Quickstart Private Sandbox, and we have some acquisition updates from CheckPoint acquiring Dome9, CrowdStrike, Fortinet, Rapid7, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode112 Visit https://www.securityweekly.com/esw for all the latest episodes! Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter! →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
This week, Paul is joined by guest host Tyler Shields to interview Jonathan Sander, Security Field CTO of Snowflake computing! Jonathan explains how he came to work for Snowflake, what Snowflake does in the enterprise security space, and how Snowflake contains their data and protect from breaches as well as keeping the data safe! In the Enterprise Security News, Netscout takes internet scale Threat Protection to the Edge, Splunk addresses several vulnerabilities in Enterprise and Light products, Ping Identity launches a Quickstart Private Sandbox, and we have some acquisition updates from CheckPoint acquiring Dome9, CrowdStrike, Fortinet, Rapid7, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode112 Visit https://www.securityweekly.com/esw for all the latest episodes! Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Keith Harmeyer is a founding partner at SmartStorming, where he helps organizations, teams and individuals think and perform more innovatively, every day, and is co-author of the book, SmartStorming: The Game-Changing Process for Generating Bigger, Better Ideas. Keith has shared his insights with an international audience of thousands of corporate professionals from companies like Google, Under Armour, NBC Universal, Siemens, Diageo, Omnicom Group, WPP, NETSCOUT, Macmillan Publishing, numerous marketing communication firms, and has even taught his innovative problem-solving process to graduate students at the MIT Sloan School of Management. Prior to his work at SmartStorming, Keith worked as a creative director at several New York City advertising agencies, where he generated business-building ideas for some of the world’s leading brands. He is also a former professional singer and actor, and has appeared in opera and theater productions throughout the country. Keith is a graduate of Loyola and Tulane Universities, both in his hometown of New Orleans, Louisiana. Today, he lives at the beach in South Florida, with his wife, Vivian. Company website is https://SmartStorming.com Speaker site at http://KeithHarmeyer.com, Learn more about your ad choices. Visit megaphone.fm/adchoices
Keith Harmeyer is all about IDEAS. Author, Speaker, and Innovative Thinking Catalyst spends his time speaking, writing, and consulting on the topics of innovative thinking and creative problem-solving. Keith has worked with market leaders like Google, Under Armour, NBCUniversal, Diageo, Siemens, Omnicom Group, WPP, NETSCOUT, Macmillan Publishing, and many others… and has even trained MBA candidates at MIT’s Sloan School of Management. Keith is a founding partner at SmartStorming.com, and is co-author of the book, SmartStorming: The Game-Changing Process for Generating Bigger, Better Ideas. He's got such an interesting (and artistic) background that you'll want to hear all about.
Keith Harmeyer is all about IDEAS. Author, Speaker, and Innovative Thinking Catalyst spends his time speaking, writing, and consulting on the topics of innovative thinking and creative problem-solving. Keith has worked with market leaders like Google, Under Armour, NBCUniversal, Diageo, Siemens, Omnicom Group, WPP, NETSCOUT, Macmillan Publishing, and many others… and has even trained MBA candidates at MIT’s Sloan School of Management. Keith is a founding partner at SmartStorming.com, and is co-author of the book, SmartStorming: The Game-Changing Process for Generating Bigger, Better Ideas. He's got such an interesting (and artistic) background that you'll want to hear all about.
Keith Harmeyer is all about IDEAS. Author, Speaker, and Innovative Thinking Catalyst spends his time speaking, writing, and consulting on the topics of innovative thinking and creative problem-solving. Keith has worked with market leaders like Google, Under Armour, NBCUniversal, Diageo, Siemens, Omnicom Group, WPP, NETSCOUT, Macmillan Publishing, and many others… and has even trained MBA candidates at MIT’s Sloan School of Management. Keith is a founding partner at SmartStorming.com, and is co-author of the book, SmartStorming: The Game-Changing Process for Generating Bigger, Better Ideas. He's got such an interesting (and artistic) background that you'll want to hear all about.
Keith Harmeyer is all about IDEAS. Author, Speaker, and Innovative Thinking Catalyst spends his time speaking, writing, and consulting on the topics of innovative thinking and creative problem-solving. Keith has worked with market leaders like Google, Under Armour, NBCUniversal, Diageo, Siemens, Omnicom Group, WPP, NETSCOUT, Macmillan Publishing, and many others… and has even trained MBA candidates at MIT’s Sloan School of Management. Keith is a founding partner at SmartStorming.com, and is co-author of the book, SmartStorming: The Game-Changing Process for Generating Bigger, Better Ideas. He's got such an interesting (and artistic) background that you'll want to hear all about.
We recap Netscout presenting at Mobility Field Day 2 (MFD2) which aired live on July 26th, 2017. This episode is sponsored by Metageek Netscout At Mobility Field Day 2 Netscout has a number of network and application tools but for Mobility Field Day 2 (MFD2) they brought out the AirCheck G2 and Link-Live. The greatest […] The post CTS 087: AirCheck G2 w/ Netscout at MFD2 appeared first on Clear To Send.
Fortinet preps for a next-gen firewall, Samsung no longer males printers, beware of Cisco training, using the right switches, Kubernetes, requirements and testing, to update or not to update and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode52 Visit http://securityweekly.com/esw for all the latest episodes!
Fortinet preps for a next-gen firewall, Samsung no longer males printers, beware of Cisco training, using the right switches, Kubernetes, requirements and testing, to update or not to update and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode52 Visit http://securityweekly.com/esw for all the latest episodes!
Victor Vila, cofundador de TheLemonIT Ltd, explica cómo pasar de Windows a Mac y no morir en el intento. David Rodriguez gerente de cuentas de canales de Europa del Sur de NETSCOUT, presenta un comprobador de redes inalámbricas que nos ayudará en nuestro trabajo como herramienta de análisis. David Arráez es periodista, responsable del Cyberdiario del grupo Editorial Prensa Ibérica, analista tecnológico, consultor TIC y responsable de usuarioarraez.com, valora las nuevas tendencias presentadas en el Mobile World Congress de Barcelona. Sergio Navas ingeniero industrial, youtuber y editor de isenacode.com nos sorprende con su selección de juegos y aplicaciones.