POPULARITY
Cybersecurity Response Plan w/ Frank Grimmelmann of ACTRA - AZ TRT S06 EP03 (264) 2-9-2025 What We Learned This Week ACTRA Arizona Cyber Threat Response Alliance Cyber threats affect everyone from Gov't to business to private and growing Companies need to be responsive with speed to be effective + share information of attacks ACTRA has members from both government and private sector ACTRA helped create a state cybersecurity response model that other states can use Guest: Frank Grimmelmann https://www.actraaz.org/actra/leadership President & CEO/Intelligence Liaison Officer Mr. Grimmelmann also serves as Co-Chair (together with Arizona's Chief Information Security Officer) for the Arizona Cybersecurity Team (‘ACT'), created through the Governor's Executive Order signed in March 2018. He also serves as a Founding Member of the National Leadership Group for the Information Sharing & Analysis Organization Standards Organization (‘ISAO SO') at the University of Texas San Antonio (UTSA), created under the President's Executive Order 13691 in February 2015. As ACTRA's leader, Mr. Grimmelmann was invited as the first private sector representative in the Arizona Counter Terrorism Information Center (ACTIC) and served as its first private sector Executive Board representative from 2014-2019. He presently acts as ACTRA's designated private sector liaison to ACTRA's Key Agency and other non-Member Stakeholders. Mr. Grimmelmann served four terms as AZ InfraGard's President from 2009-2012, serves today on numerous academic advisory boards, co-Chairs the Greater Phoenix Chamber's Cybersecurity Workforce Collaborative initiative, and is an engaged Member of the Arizona Technology Council's Cybersecurity Advisory Board. In 2019, Mr. Grimmelmann was honored by the FBI, and the Board of Directors of both ACTRA and Arizona InfraGard as the first recipient of Arizona InfraGard's ‘Visionary Award' for creating the ACTRA framework over his last 2 terms as Arizona InfraGard's President, and ACTRA's resulting collaboration between law enforcement/ intelligence agencies/USCYBERCOM, and its public, private and academic organizations over the past 7 years. He was simultaneously recognized by the FBI's then Deputy Director for his contribution over the years. He remains an active Member of InfraGard since 2003 and an active Lifetime Member of the FBI Citizens Academy since 2006. Since 2002 he has devoted his full-time attention to protecting our nation's critical infrastructure and national security interests, through eliminating unnecessary silos that hinder communication, allowing us to respond to today's increasing threat from our cyber adversaries, and in turn permitting ACTRA's Member Organizations to protect their critical infrastructure and our national security interests, while protecting their organization's assets . Educationally, he holds a dual MBA in International Business and Finance from the University of California at Berkeley and brings decades of experience as a senior executive in finance, healthcare and government, prior to focusing on Cybersecurity in response to 9/11. Notes: Seg 2 Cyber threats affect everybody, business, personal, and government. Cyber crime is a fact of life that we need to live with it, but stay ahead. Criminals are on the offense and only have to be correct 1% of the time. Everybody else is playing defense and has to be right 100% of the time. AI is an advanced tool that is turned out to be a two edge sword, can help and hurt. AI can only catch so much but can give a few of what is going on. This is a matter of national security, dealing with homeland security and many other departments of the government. You have threat intelligence to determine roles on how you're going to handle hackers and ransom ware. Hackers can be local or foreign. All companies need a cyber policy and some sort of rapid tactical response. Cyber attacks are an ever growing threat to people and businesses, and continue to surge in 2024. There was 107% surge in malware attacks. These are on corporate computers, computers at work or home computers or even Home devices like Ring. You get a text through devices, phishing attacks. Company business email can be compromised in an attack, people's passwords come out and it leads to millions of dollars in losses. Elderly people are very vulnerable, 353,000 attacks. You have supply chain threats by terrorist and nation state actors. There was a recent attack on United Healthcare for 100 million. People‘s information was exposed. This led to a $22 million ransom payment. Cyber attacks cause $2.9 billion in damages. Companies are paying ransom to faceless criminals. Very tough for the FBI to be tracking down on these criminals and try to fend off the extortion of stolen data. Payments for ransom could be made through Bitcoin, which is difficult to trace, though it leaves somewhat of a forensic trail. Constant need for regulation and oversight from the government. Famous incident last year was not even an attack, but the Crowdstrike software update. ACTRA had a quick response that day. One that helps clients and partners recover fast. In a similar instant, Delta was down for weeks with computer problems. When you think about what goes on with banks back to 2008 - what loans they have on balance sheet and then off balance sheet securitized - not regulated like normal loans. Issues with underwriting standards on loans. Not even sure what can be affected in a Cyber attack. Off balance sheet loans and debt is similar to crypto or Bitcoin where it is not being regulated. PPD-41 was a directive to show responsibilities of government agencies and dealing in cyber. You had homeland security as a defensive arm to protect the nation's assets. Enforcement is done in the US by the FBI. Overseas it's done by US Cyber Command. Seg 3 Frank background in the 1990s in private business, worked in healthcare. Then was the chief info officer and the only 2000s at clinical in Stanford. Healthcare is very vulnerable. Post 9/11 he worked with FBI outreach program called InfraGuard on how to share intelligence with cyber threats. Needs to be treated like terrorism or criminal acts, though they're taking stolen IP. Need to move to a more stable world. 2011 study was done by government organizations to review the process and make recommendations on how to deal with counterterrorism and cyber. 90% of the critical infrastructure in the US is in the private sector. They do need Fed level help, but have also have a local response. Cyber threat actors move quickly and act like a terrorist organization. General Stanley McChrystal had a great quote, ‘It takes a network to defeat a network.' Cybersecurity is everyone's problem. You need education and organization. This is a 5th generation problem and you have to be adaptive. ACTRA is a nonprofit dealing with cyber security. They've got pillars of empowerment, trust technology and intelligence. Need for the private companies to develop to train and recruit to handle this threat. They created a model which allows to bring the fight on offense - and all work together sharing information. Virtual response team, small and big with the private sector as a partner. ACTRA is a hub for info, and keeps its member information private. Some members are public like Arizona State. Actual model can be used for the rest of the nation. Government and private cannot do it alone. Not all states have this type of organization, but probably need it. Seg 4 ACTRA started in January 2013. Give U.S. states a model for cyber security. Collective defense and share information with public and private organizations. The goal is to breakdown silos between government and the corporate world. Not just a thing tank, has an active model. Review of ACTRA model is best in the country and a good hub for response and info. In 2015, they helped Wisconsin create their own state organization for cyber threats. Soon after, Maryland created one using ACTRA as a model. Needs to be an effort of collaboration, merge the construct of entrepreneur spirit to take action. So the government cyber threats are handled nationally at a Fort Meade, where the NSA is. Frank's background in business in finance and healthcare fields. Info is useless if not used for action. You need actionable intelligence that is current to take down a threat. You need more than continuing education and certificates for people, must go beyond this. Virtual response team like a local militia who can help protect assets. Going after cyber criminals can be a little bit like a whack a mole. Overtime, hopefully there will be a national strategy for info sharing. A type of decentralized and local organization that work with government. The private sector owns the vast amount of data so they have to determine who they're going to share it with and how. Defend vs Cyber fast while still working within the spirit of the law. Seg. 1 Clips from Related Shows: Cybersecurity, Disruption, Blockchain & Terrorism w Ari Redbord of TRM Labs - BRT S02 EP31 (78) 8-1-2021 What We Learned This Week Cybersecurity is extremely important industry for national security TRM Labs startup in cyber-security, monitors blockchain OFAC - Gov't administers economic and trade sanctions Ransomeware – specific breach, takeover of a computer system, holds data hostage Programatic Money Laundering – bad guys create new addresses, create ‘shell' companies Guest: Ari Redbord, Head of Legal and Government Affairs w/ TRM Labs https://www.linkedin.com/in/ari-redbord-4054381b4/ https://www.trmlabs.com/post/trm-labs-appoints-ari-redbord-as-head-of-legal-government-affairs Ari is formerly a US Attorney, and worked in the Treasury Department, now advises the Government on cybersecurity, and Blockchain. Cybersecurity is a fast growing and extremely important industry for national security, and corporate interests. There are Nation States acting as bad players in the cyber realm and targeting the US Government and US business. We discuss the advancements in technology on cyber crime, blockchain, crypto, and online fraud. How is the FBI dealing with Ransomware, and other cyber attacks on prime targets like the Colonial Pipeline, or other big corps. What Regulations are coming in banking, and Fintech, with KYC (Know Your Customer), plus the big banks like JP Morgan Chase and Goldman are on board. What the blockchain ledger can help solve in security, to monitor criminal activity in real time with the help of crypto exchanges like Coinbase. Lastly, what TRM Labs does for clients, how they advise, operate, and who they work with. Full Show: HERE Phishing, Malware & Cybersecurity - Try Not to Get Pwned - BRT S02 EP47 (94) 11-21-2021 What We Learned This Week: Have I been Pwned? Means have I been breached / hacked – did someone hack my email or website Phishing – most common type of email threat, like when you receive a strange email with a link – Do Not Open – DELETE (and alert other office staff of the email) Ramsonware – hack your website, or data – hold it hostage for an extortion ‘ransom' payment Dark Web – where stolen data, & info is being bought & sold VPN Connections – direct and secure Guests: Vince Matteo, Seven Layer Networks, Inc. https://sevenlayers.com/ Vince Matteo is a certified penetration tester, a security researcher, and a senior consultant at Seven Layers (.com) where he focuses on securing small businesses. Vince is the author of "Hacking 101 – A Beginner's Guide to Penetration Testing", he's a bug bounty hunter with 17 published critical vulnerabilities, and he's presented talks on offensive hacking at security conferences -- most recently GrrCON in Grand Rapids, MI and BSides in College Station, TX. Outside of work, Vince is an accomplished endurance athlete, an Ironman age group champion, and in his spare time, you can find him in the desert -- training for the next hundred-mile ultramarathon. Full Show: HERE Biotech Shows: https://brt-show.libsyn.com/category/Biotech-Life+Sciences-Science AZ Tech Council Shows: https://brt-show.libsyn.com/size/5/?search=az+tech+council *Includes Best of AZ Tech Council show from 2/12/2023 Tech Topic: https://brt-show.libsyn.com/category/Tech-Startup-VC-Cybersecurity-Energy-Science Best of Tech: https://brt-show.libsyn.com/size/5/?search=best+of+tech ‘Best Of' Topic: https://brt-show.libsyn.com/category/Best+of+BRT Thanks for Listening. Please Subscribe to the AZ TRT Podcast. AZ Tech Roundtable 2.0 with Matt Battaglia The show where Entrepreneurs, Top Executives, Founders, and Investors come to share insights about the future of business. AZ TRT 2.0 looks at the new trends in business, & how classic industries are evolving. Common Topics Discussed: Startups, Founders, Funds & Venture Capital, Business, Entrepreneurship, Biotech, Blockchain / Crypto, Executive Comp, Investing, Stocks, Real Estate + Alternative Investments, and more… AZ TRT Podcast Home Page: http://aztrtshow.com/ ‘Best Of' AZ TRT Podcast: Click Here Podcast on Google: Click Here Podcast on Spotify: Click Here More Info: https://www.economicknight.com/azpodcast/ KFNX Info: https://1100kfnx.com/weekend-featured-shows/ Disclaimer: The views and opinions expressed in this program are those of the Hosts, Guests and Speakers, and do not necessarily reflect the views or positions of any entities they represent (or affiliates, members, managers, employees or partners), or any Station, Podcast Platform, Website or Social Media that this show may air on. All information provided is for educational and entertainment purposes. Nothing said on this program should be considered advice or recommendations in: business, legal, real estate, crypto, tax accounting, investment, etc. Always seek the advice of a professional in all business ventures, including but not limited to: investments, tax, loans, legal, accounting, real estate, crypto, contracts, sales, marketing, other business arrangements, etc.
Cybersecurity isn't just a concern for big corporations—it's a game-changer for businesses of all sizes. On this episode of the Success Leaves Clues podcast, Robin Bailey and Alan McDonald sit down with David Chernitzky, CEO and co-founder of Armour Cybersecurity, to uncover the hidden vulnerabilities many small and medium-sized businesses face. From the rise of ransomware to misconceptions about IT security versus cybersecurity, David shares valuable insights and practical steps to help organizations take control of their cyber risks. Tune in for expert advice on protecting your business and building resilience in an increasingly digital world."If you're connected, you're fair game." ~ David Chernitzky, CEO/Co-Founder at Armour CybersecurityKey Takeaways:Cybercrime affects businesses of all sizes – Small and medium enterprises are especially vulnerable but often underserved in cybersecurity.Ransomware and AI threats are rising – Cybercriminals are using advanced tools, making education and preparedness more crucial than ever.Cybersecurity is business risk management – It's not just an IT issue but a critical part of protecting your company.Affordable solutions exist – Effective cybersecurity doesn't have to be costly, especially with the right trusted partner.A global shortage of talent – The lack of cybersecurity professionals underscores the need for external expertise and support.Brought to you by Aria Benefits and Life & Legacy Advisory Group
Etiska hackare, så kallade bug hunters, blir allt vanligare när företag och organisationer vill säkra upp sina system för att slippa att bli utsatta för intrång och hot. Men hur fungerar det att vara en konsult i bedrägeribranschen – fast på den lagliga sidan? Det tredje avsnittet av Fakultet handlar om cybersäkerhet i din vardag. ”Hackning är väldigt likt att vara som en tjuv eller grov kriminell. Du har mer makt vid än dator än om du skulle råna en bank fysiskt. Anledningen till att jag inte gör något kriminellt är jag vet att hur det fungerar och genom att göra det etiskt så hjälper jag företag och kritiska infrastrukturer att skydda sig mot en attack.” Hör Alex, som är konsult och etisk hackare. Du hör även Mikael Asplund, biträdande professor vid Linköpings universitet som forskar om cybersäkerhet. -- Medverkade: Mikael Asplund, bitr. professor, Institutionen för datavetenskap vid Linköpings universitet Alex/Brumenz, säkerhetsspecialist/hackare Yeswehack -- Producent: Annelie Norberg Slutmix och musik: Mattias Edborg och Albin Linder Intervjuare i detta avsnitt är Albin Linder, student på kommunikation, samhälle- och medieproduktion vid Linköpings universitet. Vinjett: Bensound Projektledare: Marcus Nyenger -- Fler podcast från Linköpings universitet hittar du på https://liu.se/podcast
Ransomware is a type of malware that allows hackers to commandeer data on a device or an entire network. Increasingly, the threat actors behind these crimes set their sites on mission critical targets. We talked about it with renowned cybersecurity expert Keren Elazari this week. Learn more about your ad choices. Visit megaphone.fm/adchoices
Recent collaborative actions by U.S. and international law enforcement against ransomware rings such as LockBit, BlackCat, and Ragnar Locker serve as a critical wake-up call for CISOs and security leaders. These operations highlight ransomware's sophistication and pervasive nature, emphasizing the need for robust incident response measures that may involve law enforcement. In this special edition of CISO Talk, hosts Mitch Ashley and JJ Minella are joined by Caroline Wong (Cobalt) to discuss how to understand the evolving threat landscape, foster international collaboration and implement comprehensive security strategies.
End of Season 5 NARAZER. Last episode before entering Season 6. Sebagai Praktisi Industri IT dan masih peduli dengan nasib Bangsa & Masyarakat Indonesia, saya perlu speak up juga soal skandal kasus peretasan yang masuk ke server PDN Kemkominfo karena kelalaian yang fatal dan tidak kompetennya mereka dalam mengelola infra server dan cyber security.
This interview was recorded at GOTO Copenhagen for GOTO Unscripted.http://gotopia.techRead the full transcription of this interview hereScott Helme - Security Researcher, Hacker & Founder of Report URI & Security HeadersSebastian Brandes - Senior Principal Product Manager at F5RESOURCESScotthttps://twitter.com/Scott_Helmehttps://linkedin.com/in/scotthelmehttps://scotthelme.co.ukhttps://github.com/ScottHelmeSebastianhttps://twitter.com/br4ndeshttps://www.linkedin.com/in/sebastianbkhttps://github.com/sebastianbkLinksSebastian: https://youtu.be/BX0TVzHOJgQhttps://crawler.ninjahttps://docs.report-uri.com/setup/wizardScott: https://youtu.be/K9MwaSRdA94https://research.checkpoint.com/2019/hacking-fortniteTroy: https://youtu.be/pxPEdUFdayAJim: https://youtu.be/nvzMN5Z8DJIScott pt. 1: https://youtu.be/zvCXUozuI2AScott pt. 2: https://youtu.be/8PlCfYflz_ADESCRIPTIONGet deep into the realm of application security, debunking myths around filters and emphasizing the power of a comprehensive defense strategy. Sebastian Brandes and Scott Helme share practical tips, highlight valuable resources, and underscore the critical role of organizational commitment in securing applications effectively.Watch this interview to revamp your security approach with their actionable insights!RECOMMENDED BOOKSLiz Rice • Container SecurityAndy Greenberg • Tracers in the DarkThomas J. Holt, Adam M. Bossler & Kathryn C. Seigfried-Spellar • Cybercrime and Digital ForensicsAaron Parecki • OAuth 2.0 SimplifiedErdal Ozkaya • Cybersecurity: The Beginner's GuideTwitterInstagramLinkedInFacebookLooking for a unique learning experience?Attend the next GOTO conference near you! Get your ticket: gotopia.techSUBSCRIBE TO OUR YOUTUBE CHANNEL - new videos posted daily!
Benoit Desjardins MD PhD, Professor of Radiology University of Montreal (CHUM) weighs in on cybersecurity, hacking & AI
In this week's episode, we will continue with part 2 on "Preparing for and responding to ransomeware attack"As I said last week, ransomware is a threat that will be around us for the foreseeable future.Do listen to part 1 before you listen to this episode.With that out of the way, lets have a look a top trending piece of update for you.There is large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentialshttps://blog.talosintelligence.com: Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials- https://attack.mitre.org: Turla- https://www.chainalysis.com: ransomware 2024- https://www.cohesity.com: Ransomware RecoveryBe sure to subscribe! If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.comYou will find a list of all previous episodes in there too.
Cyber insurance is still evolving just as the threat vectors are that require insurance coverage. In his second appearance on the show Cowbell Cyber Co-founder and CEO Jack Kudale talks about how cyber insurance is adapting.In this episode:Understanding the 3D business model to evolve and adapt as a companyThe underwriting pillars for cyber insurance3 questions of Podcast PhilosophyThe long term perils of cyber threats and how insurers view riskCurrent threat vectors and what can be done in real-time to mitigate riskJack shares his experiences with growing and expanding a startup in one of the more difficult segments of the insurance industry and provides insight for others who are tying to evolve and address change.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Ransomware is a threat that will be around us for the foreseeable future. In this week's episode we will look at the history of ransomware, the common TTPs in use by threat actors such as Turla, how to align our incident response to that threat and others, and finally how to contain, eradicate, and recover from it.In addition we will answer the following pertinent question that are top of minds for the SOC team. Questions such as:- What are the best methods to inhibiter Threat actor's lateral movement?- What are the critical components that drive ransomware?etc...But before we dig into these gems, lets touch one important top trending piece of news. And that is:- CISA makes its malware analysis system publicly available- https://www.cisa.gov: CISA Announces Malware Next-Gen Analysis- https://attack.mitre.org: Turla- https://www.chainalysis.com: ransomware 2024- https://www.cohesity.com: Ransomware RecoveryBe sure to subscribe! If you like the content. Follow me @iayusuf or read my blog at https://yusufonsecurity.comYou will find a list of all previous episodes in there too.
This interview was recorded at GOTO Copenhagen for GOTO Unscripted.http://gotopia.techRead the full transcription of this interview hereAndy Greenberg - Author of "Sandworm" & "Tracers in the Dark" and Award-winning Senior Writer for WIREDScott Helme - Security Researcher, Hacker and Founder of Report URI & Security HeadersRESOURCESAndyhttps://twitter.com/a_greenberghttps://linkedin.com/in/andygreenbergjournalisthttps://andygreenberg.nethttps://www.wired.com/author/andy-greenberghttps://infosec.exchange/@agreenberg@agreenberg.bksy.socialScotthttps://twitter.com/Scott_Helmehttps://linkedin.com/in/scotthelmehttps://scotthelme.co.ukhttps://github.com/ScottHelmeDESCRIPTIONAndy Greenberg and Scott Helme explore the ever-evolving landscape of cyber crimes, discussing the anonymity of cryptocurrencies, the transition from cryptojacking to ransomware, and the enduring impact of blockchains on the realm of cyber security. They expose some of the most famous crytpojacking attacks of all time and reason about the unlimited potential of crime organizations that leverage cryptocurrencies.RECOMMENDED BOOKSAndy Greenberg • Tracers in the DarkAndy Greenberg • SandwormAndy Greenberg • This Machine Kills SecretsThomas J. Holt, Adam M. Bossler & Kathryn C. Seigfried-Spellar • Cybercrime and Digital ForensicsTwitterInstagramLinkedInFacebookLooking for a unique learning experience?Attend the next GOTO conference near you! Get your ticket: gotopia.techSUBSCRIBE TO OUR YOUTUBE CHANNEL - new videos posted daily!
Show is Sponsored by The Ayn Rand Institute https://www.aynrand.org/starthereandExpress VPN https://www.expressvpn.com/yaronJoin this channel to get access to perks:https://www.youtube.com/@YaronBrook/joinLike what you hear? Like, share, and subscribe to stay updated on new videos and help promote the Yaron Brook Show: https://bit.ly/3ztPxTxSupport the Show and become a sponsor: / yaronbrookshow Or make a one-time donation: https://bit.ly/2RZOyJJOnline War; Continue the discussion by following Yaron on Twitter (https://bit.ly/3iMGl6z) and Facebook (https://bit.ly/3vvWDDC )Want to learn more about Ayn Rand and Objectivism? Visit the Ayn Rand Institute: https://bit.ly/35qoEC3 #capitalism #Economy #Objectivism #AynRand #politics #elections2024
IT Setup & Cybersecurity w/ Luciano Aguayo of Redgear AZ TRT S05 EP07 (222) 2-18-2024 What We Learned This Week RedGear provides turnkey IT solutions for clients. Outsource IT to shift liability IT often an afterthought, when it should be a major priority - lifestyle of tech in a business Data is lifeblood of a company, need security Cybersecurity is just one part, need to monitor physical location, who has access, email, etc Guest: Luciano Aguayo of Redgear https://redgear.com/ Luciano Aguayo is a Texas native, and an active member and contributor to the Southwest Technology community. His professional career spans a diverse industry portfolio and has held various titles and certifications at the senior engineering and senior management levels. Luciano specializes in designing and implementing turnkey complex infrastructure solutions. For the past 20 years Luciano has designed and implemented numerous infrastructures for regional and local school districts, has a diverse portfolio of local and international businesses, including the federal government, and key Southwest landmarks and attractions. After several years in the private sector and after building a loyal customer base, Luciano launched RedGear in 2016. RedGear is a regional business to business technology solutions company. Since its inception, RedGear has quickly grown to 4 locations, 50+ employees, and recently opened a regional office in Phoenix, Arizona. Luciano remains active in the technology industry helping oversee the portfolio of one of Southwest's largest developers. He also is an active member of El Paso Community College ITSC Advisory Committee He also owns and operates El Paso's newest carrier neutral datacenter. He brings effective and proven leadership and mentoring qualities and has an eye for detail when managing projects. He has a passion for technology, giving back to the community, and mentoring the future generations of Engineers. 20+ years experience in: Cisco CCNP Routing and Switching, Cisco Nexus Datacenter, CCNP Voice, CCDA, Cisco Security, Cisco WLAN, Cisco Unified Communications (VoIP), Citrix CCA, Citrix Xen Desktop, Citrix XenApp, MCSE, MCSA, Operating Systems Troubleshooting, Hardware/Software Troubleshooting, Advanced Windows Server Configuration and Troubleshooting, VM Ware, Enterprise Design, Implementation, solutions, IT Consulting, and much more. RedGear RedGear provides professional technology services, equipment, and consulting in the Southwest US region. Our entire culture is built around supporting business infrastructures, while building relationships and delivering an exceptional customer service experience and always keeping our customers best interest a top priority. We've built our success by reputation, quality of work, professionalism, and always being there for clients every step of the way whenever they need us. Our services, certifications, experience, and expertise cover the entire spectrum of Information Technology that no other regional technology service provider can match. We manage all aspects of Technology so the customer can focus on running their business. Our company vision is based on delivering premier customer service by employing and retaining top talent that believes in our mission, we work hard to provide trusted, honest, immediate, and excellent IT services to every client, no matter how big or small. No more wondering what kind of support you will receive. Our staff is certified in numerous fields, to offer the upmost reliable support. Our experience is vast covering all sizes of organizations and industries. Notes: Seg 2 Redgear IT company responsible for security of their clients. IT is a lifestyle. RedGear value proposition is turkey solutions. They are your smart friend to help with tech. Support IT for small businesses. They also have larger enterprise type clients. They act as a consultant, and can screen for a CTO or a CIO for a company. IT should be a priority of companies yet, it is often an afterthought. Need to understand how to secure an IT room, not just in software, but also the actual room itself. Who has access? RedGear works in the tech and security industry which is the backbone of all organizations and compliance. People hire RedGear to outsource and shift liability. IT in its simplest form is anything that you plug into the wall and connect to the Internet. It can also mean security. Trust of your IT provider, and keeping business contingency. Question, businesses always have to answer is how long can they stay down with an interruption and survive. Plus what is their plan for data retention. IT can be about network, connections, computers, hardware, and the actual Physical IT room. Can also deal in cyber security and password resets. IT has both software as well as hardware like servers and programming applications. Luciano has 20+ years of experience working in IT and technology. Information Technology not always the priority of many companies but it really should be. Need a plan going forward to manage security and data in all businesses. You have to determine what's going to be your budget based on the size of the business. Not uncommon to outsource to companies like RedGear. Also need to think about the physical aspects of IT, like is your room secure? What type of energy your BTU air conditioner usage are you using? Who has control, how cool is it. Who has access to the room? What is your electrical circuit set up? Do you have redundancy? Or electrical circuit separate and dedicated to the IT. What is your data or cloud storage like? Seg 3 IT is the backbone of many organizations and should be a priority. Need to hire trustworthy people, as well as outsource IT to trustworthy companies. There's no perfect set up. Unfortunately, security breaches are more question of When, and not if. One of the worst stories about IT Luciano ever heard of was the janitor storage closet was the same as the IT room. Another issue with a lot of IT rooms is they don't have good cooling. IT should be a separate room with good security. You want to also have video security and badge access. Physical access of an IT room is very underrated. Security is the biggest threat to the end-user. You have to know when a breach happens. How did it happen? It could be software but often it's actually the employees as a threat. They need to pay attention to what is going on and types of emails they get. Also, sometimes security breaches are an inside job. Companies need to test and educate their staff about IT. Once Malware gets in to the system it can take over accounts and send email as the person. Phishing scams unfortunately are still very popular with emails. Good email security typically will filter out malicious emails. Then you waitlist your contact, so you know who it's OK to email. All these need to examine emails. Seg 4 IT reviews & monitors compliance, so a company must determine a budget. Data is the gold of companies now. Data contains the companies processes, industry secrets, and private employee and customer info. It is crucial to have a backup of company data, typically onsite and secured, plus offsite in the cloud. You'll always want to build in redundancy and have backup servers for data. Good IT set up will have disaster recovery. As for the physical set up and protecting data, you want to be aware of how your sprinkler system is set up. You always have to guard against disgruntled employees, who could steal or delete company data. Your IT provider needs to know the industry and have good experience to engineer the proper solution. RedGear has worked with some top level clients, including the DEA in Washington DC on a federal level. Their cyber security needs to be top-of-the-line. It is not in common for the average big company to deal with corporate attacks where hackers try to steal data, and then even hold it hostage for ransom. Common practice nowadays is for a business to have cyber security liability insurance. The application for the insurance will ask about the physical environment and the set up of the IT and data. The medical industry has updated cyber and HIPAA compliance. It is essential to have good IT, hospitals and any major medical office. RedGear is your IT smart friends. They will always give you recommendations of good better and best. Seg 1. – Related IT Clips from: Phishing, Malware & Cybersecurity - Try Not to Get Pwned - BRT S02 EP47 (94) 11-21-2021 What We Learned This Week: Have I been Pwned? Means have I been breached / hacked – did someone hack my email or website Phishing – most common type of email threat, like when you receive a strange email with a link – Do Not Open – DELETE (and alert other office staff of the email) Ramsonware – hack your website, or data – hold it hostage for an extortion ‘ransom' payment Dark Web – where stolen data, & info is being bought & sold VPN Connections – direct and secure Guests: Vince Matteo, Seven Layer Networks, Inc. https://sevenlayers.com/ There are many different types of cyber attacks from a password breach, website hack to email phishing scams. Vince Matteo of Seven Layers (.com) gives advice on what to be on the lookout for, tips for protection, and some reference sites for more info. We discuss Email Phishing scams, spearphishing attack, password breaches, website hacks, data breaches, ramsonware, software and VPNs. Full Show: HERE Cybersecurity, Disruption, Blockchain & Terrorism w Ari Redbord of TRM Labs - BRT S02 EP31 (78) 8-1-2021 What We Learned This Week Cybersecurity is extremely important industry for national security TRM Labs startup in cyber-security, monitors blockchain OFAC - Gov't administers economic and trade sanctions Ransomeware – specific breach, takeover of a computer system, holds data hostage Programatic Money Laundering – bad guys create new addresses, create ‘shell' companies Guest: Ari Redbord, Head of Legal and Government Affairs w/ TRM Labs https://www.linkedin.com/in/ari-redbord-4054381b4/ https://www.trmlabs.com/post/trm-labs-appoints-ari-redbord-as-head-of-legal-government-affairs Ari is formerly a US Attorney, and worked in the Treasury Department, now advises the Government on cybersecurity, and Blockchain. Cybersecurity is a fast growing and extremely important industry for national security, and corporate interests. There are Nation States acting as bad players in the cyber realm and targeting the US Government and US business. We discuss the advancements in technology on cyber crime, blockchain, crypto, and online fraud. How is the FBI dealing with Ransomware, and other cyber attacks on prime targets like the Colonial Pipeline, or other big corps. What Regulations are coming in banking, and Fintech, with KYC (Know Your Customer), plus the big banks like JP Morgan Chase and Goldman are on board. What the blockchain ledger can help solve in security, to monitor criminal activity in real time with the help of crypto exchanges like Coinbase. Lastly, what TRM Labs does for clients, how they advise, operate, and who they work with. Notes: TRM Labs – blockchain security biz, works with law enforcement and businesses. Financial exchanges and Regulators. Monitor cyber-security - TRM – startup, 3 yrs old, Ari joined 2021. Monitor risk in crypto currency. Full Show: HERE Best of Biotech from AZ Bio & Life Sciences to Jellatech: HERE Biotech Shows: HERE AZ Tech Council Shows: https://brt-show.libsyn.com/size/5/?search=az+tech+council *Includes Best of AZ Tech Council show from 2/12/2023 ‘Best Of' Topic: https://brt-show.libsyn.com/category/Best+of+BRT Thanks for Listening. Please Subscribe to the BRT Podcast. AZ Tech Roundtable 2.0 with Matt Battaglia The show where Entrepreneurs, Top Executives, Founders, and Investors come to share insights about the future of business. AZ TRT 2.0 looks at the new trends in business, & how classic industries are evolving. Common Topics Discussed: Startups, Founders, Funds & Venture Capital, Business, Entrepreneurship, Biotech, Blockchain / Crypto, Executive Comp, Investing, Stocks, Real Estate + Alternative Investments, and more… AZ TRT Podcast Home Page: http://aztrtshow.com/ ‘Best Of' AZ TRT Podcast: Click Here Podcast on Google: Click Here Podcast on Spotify: Click Here More Info: https://www.economicknight.com/azpodcast/ KFNX Info: https://1100kfnx.com/weekend-featured-shows/ Disclaimer: The views and opinions expressed in this program are those of the Hosts, Guests and Speakers, and do not necessarily reflect the views or positions of any entities they represent (or affiliates, members, managers, employees or partners), or any Station, Podcast Platform, Website or Social Media that this show may air on. All information provided is for educational and entertainment purposes. Nothing said on this program should be considered advice or recommendations in: business, legal, real estate, crypto, tax accounting, investment, etc. Always seek the advice of a professional in all business ventures, including but not limited to: investments, tax, loans, legal, accounting, real estate, crypto, contracts, sales, marketing, other business arrangements, etc.
Chain Analysis shows that victims of hacking attacks paid out a record $1.1 billion to the bad guys in 2023 as ransom in exchange for a return of those digital assets seized by them. By way of comparison, $567 million was paid out in 2022. 2023 marks a major year for ransomware with record breaking payments and a substantial increase in the scope and complexity of such attacks.
Die Angriffe auf Firmen haben sich in den letzten Jahren immer stärker in den digitalen Bereich verlagert. Welchen Schutz hier hochautomatisierte Netzwerke bieten können, erklärt Marc Schmidt, COO bei avodaq. Wie sich Unternehmen auf die Bedrohung durch Ransomware vorbereiten können, um großen Schaden zu verhindern, erörtert Ralf Wigand, National Security Officer von Microsoft Deutschland. Außerdem hören wir rein in das Bitkom@eight mit Unionsfraktionsvize Jens Spahn, der über die schleppende Staatsmodernisierung und die schlechten Umfragewerte der Ampel-Koalition spricht. Hosted on Acast. See acast.com/privacy for more information.
Cyberattacks surged this year, with millions of companies falling victim to ransomeware attacks. Ransomeware "gangs" are getting even more sophisticated, targeting organizations with critical user data, such as government and healthcare facilities. How do you keep your all-important data safe, especially as you integrate more AI into your systems? This week, Kevin and Tom break down all the latest information, giving wholesale distributors and manufacturers greater insight into how to stay protected. We also take a look at the latest news in artificial intelligence, as Google took its next leap in AI with the launch of project Gemini, a model trained to behave in human-like ways that's likely to intensify the debate about the technology's potential promise and perils.Join the conversation each week on LinkedIn Live.Want even more insight to the stories we discuss each week? Subscribe to the Around The Horn Newsletter.You can also hear the podcast and other excellent content on our YouTube Channel.Follow us on Facebook, Twitter, Instagram, or TikTok.
#SecurityConfidential #darkrhiinosecurity Chris Rock is no stranger to Security Confidential. He is a Cyber Mercenary, A three-time presenter at DEFCON, Author of The Baby Harvest, and Co-Founder of SIEMonster. Chris has spent the last 30 years in the Middle East, the US, and Asia preventing cyber attacks for governments and private organizations alike. 00:00 Introduction 00:16 Our Guest 01:19 What does the talent pool look like for our industry? 04:48 Do you see any non-traditional jobs entering the field? 06:01 Researching how companies and AI handle the finances 08:25 How money is moved through the drug trade 13:09 The Advancement of Natural Language Processes 18:03 How do you build trust? 18:59 The further we go into an automated environment, the easier it is to hack 23:07 Would you rather come up against a Bank teller or a Bot? 25:30 Ransomeware as a service 29:04 Defeating MFA and how we deal with it 38:14 Shelf Babies: Killing and Birthing someone virtually 50:02 More about Chris ---------------------------------------------------------------------- To learn more about Chris visit https://chrisrockhacker.com/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ---------------------------------------------------------------------- #darkrhiinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday
In this episode Michael and Sarah talk with guest Madeline Eckert about Security Bug Bounties.We also discuss Azure Security news about SQL Server 2022, Azure certificate changes, TLS 1.0 and 1.1 deprecation, GitHub security scanning, Ransomeware defenses, Zero Trust and more.; and by 'more' we mean lock-picking!
Most ransomware attacks now employ fileless techniques that cannot be detected by scanning idle backups, posing a major threat to organizations. VMware Ransomware Recovery is an award-winning VMware Cloud service available today designed to recover from fileless attacks using behavioral analysis of powered-on VMs in cloud-based isolated recovery environments (IREs). On this episode of The Virtually Speaking Podcast Pete and John speak with Belu De Arbelaiz and Yoomi Hong of VMware Product Marketing, to get all the updates for VCDR and VMware Ransomeware Recovery. Watch the video of this episode Watch all VMware Explore Recap episodes
In this episode, we discuss the differences between cloud file storage and traditional storage systems. We discuss the challenge of performance and distributed data. Dave also shares strategies for how companies should approach data in remote work and recovery issues from ransomware attack Bio: David Grant, President at NasuniDavid Grant is responsible for all field operations, which include sales, marketing, alliances, professional services, customer success and experience.Dave is a veteran marketer with 20 years of experience in senior leadership roles at software companies – from startups to multibillion-dollar operations. He joined Nasuni from Veeam Software, where he was the senior vice president of global marketing. Prior to Veeam, he served as the vice president, marketing at VMware. Dave also served as the CMO at two startups. Desktone, acquired by VMware, and Watchfire, acquired by IBM. Dave has a master's in finance from Dalhousie University and a bachelor's in marketing from Saint Mary's University.You can find Dave on social media at :LinkedIn: https://www.linkedin.com/in/dgrant4/ Twitter: https://twitter.com/dgrant4 You can learn more about Nasuni at: https://www.nasuni.com/
For managed service providers (MSPs), making the IT infrastructure as invisible as possible isn't just a “nice-to-have" — it's also elemental to delivering the best customer experience. Securing IT for these tech services and support users is no different. The less complexity and interference with productivity from the underlying security apparatus — the better. The next BriefingsDirect security innovations discussion examines how Scottish MSP Grant McGregor Ltd. has taken the customer experience imperative to new heights — even as its users move increasingly to hybrid IT models. Subscribe to the podcast on iTunes. Read a full transcript or download a copy. Here to share their story of better managing the security experience as a means of enhancing the overall IT services value are David Lawrence, Co-Founder and Director of IT Support Services and Advice at Grant McGregor in Edinburgh, and Paul Sinclair, Head of IT Service at Grant McGregor. The discussion is moderated by Dana Gardner, Principal Analyst at Interarbor Solutions. Subscribe to the podcast on iTunes. Read a full transcript or download a copy. Sponsor: Bitdefender.
An underappreciated aspect of enhancing IT security is the impact on an end user's comfort and trust in the services provided. In the case of health care services and support, making the patient feel welcome and safe can be a game-changer as they seek access to needed services and care. The next BriefingsDirect security innovations discussion examines how Macmillan Cancer Support in the United Kingdom (UK) places the ease of use and sense of security in the services provided as a top IT -- and community service -- requirement. Subscribe to the podcast on iTunes. Read a full transcript or download a copy. Here to share their story on how to develop and deliver a cloud-ready security bubble around all users, their activities, and the sensitive data they share is our guest, Tim O'Neill, Head of Information Security at Macmillan Cancer Support in London. The interview is moderated by Dana Gardner, Principal Analyst at Interarbor Solutions. Subscribe to the podcast on iTunes. Read a full transcript or download a copy. Sponsor: Bitdefender.
A special breed of company -- even though it has a relatively small number of employees -- does very big jobs with those lean and often distributed workforces. A perfect example of such a concentrated and efficient business is A-Core Concrete Specialists, which builds large and complex structures across the Western United States. When it comes to managing IT, the lean-and-mean mantra also holds true. The jack-of-all-trades requirements means that the IT leadership of it is often the head of security. As a prime example, that's another way that A-Core Concrete shines. Listen to the podcast. Find it on iTunes. Read a full transcript or download a copy. Today's BriefingsDirect security innovations discussion examines how A-Core Concrete has created a security culture that relies on centralized administration, proactive insights, and rapid remediation to successfully assure that the whole company operates at peak performance. Here to share the story of how to best balance resilient security with the efficient use of human capital and resources is Andy Black, Chief Information Officer (CIO) at A-Core Concrete Specialists Inc., in Salt Lake City. The discussion is moderated by Dana Gardner, Principal Analyst at Interarbor Solutions. Listen to the podcast. Find it on iTunes. Read a full transcript or download a copy. Sponsor: Bitdefender.
In December, Rackspace was hit by a ransomware group that took customers' data. Potentially, this group has held onto this data in exchange for ransom, but the company has not said either way due to the investigation run by the FBI.
Neuste Sicherheitsberichte warnen vor großen Cyberangriffen. Auch Versicherer haben das Risiko erkannt und Produkte entwickelt. Doch wie gut schützen diese?
Atlantic Hurricane Season, which runs from June 1 through November 30, had a slow start this year but has begun ramping up as Hurricane Fiona made its way … Read More » The post EP. 47: How to Avoid Being a ‘Sitting Duck' During a Disaster-Related Ransomware Attack appeared first on Insurance Journal TV.
Atlantic Hurricane Season, which runs from June 1 through November 30, had a slow start this year but has begun ramping up as Hurricane Fiona made its way … Read More » The post EP. 47: How to Avoid Being a ‘Sitting Duck' During a Disaster-Related Ransomware Attack appeared first on Insurance Journal TV.
Atlantic Hurricane Season, which runs from June 1 through November 30, had a slow start this year but has begun ramping up as Hurricane Fiona made its way … Read More » The post EP. 47: How to Avoid Being a ‘Sitting Duck' During a Disaster-Related Ransomware Attack appeared first on Insurance Journal TV.
Leere OP-Säle und stillgelegte Server - die Uniklinik Düsseldorf ist im Ausnahmezustand als Cyber-Kriminelle mithilfe einer Ransomeware Lösegeld erpressen wollen. Nicht nur Daten stehen auf dem Spiel, sondern auch die Gesundheit der Patient*innen. Welche Schritte Ermittler*innen einleiten und wie sich Unternehmen im Falle einer digitalen Lösegeldforderung verhalten sollten, erzählen der Leiter des Kompetenzzentrum Cybercrime, Peter Vahrenhorst, sowie der IT-Spezialist Michael Waldbrenner.
Although reports indicate ransomware activity has been quieter than usual to start the year, experts say that likely won't last for long. “What we see is there’s an … Read More » The post EP. 41: Is Ransomware at a Turning Point? appeared first on Insurance Journal TV.
Although reports indicate ransomware activity has been quieter than usual to start the year, experts say that likely won't last for long. “What we see is there’s an … Read More » The post EP. 41: Is Ransomware at a Turning Point? appeared first on Insurance Journal TV.
In this week's episode, the cybersecurity experts Bryan Hornung, Reginald Andre, Randy Bryan, and Ryan O'Hara talk about the Hane's ransomware attack, which was not one of the attacks over Memorial Day weekend. Next, the crew goes into a county in New Jersey under a ransomware attack and new ransomware tactics that these cybercriminals are using towards businesses. Then, the team gets some exciting information about a state that had its financial passwords stolen. At the end of the show, the expert's deep dive into some ransomware statistics and how many of these attacks are happening in a day? Listen to find out more information!
The Chief Executive Officer and Co-Founder of GroupSense, Mr. Kurtis Minder joins Co-Host Andy Bonillo on Episode #209 of Task Force 7 Radio to talk about how he became a Ransomware Negotiator, lessons learned from those negotiations, and how empathy has helped him in those negotiations. He talked about the importance of running a business that starts with focusing on customer desired outcomes and how small businesses need cyber security resources. We finished the show discussing how cyber criminals may be shifting their focus during the Russia/Ukraine conflict. All this and much more on Episode #209 of Task Force 7 Radio.
The Chief Executive Officer and Co-Founder of GroupSense, Mr. Kurtis Minder joins Co-Host Andy Bonillo on Episode #209 of Task Force 7 Radio to talk about how he became a Ransomware Negotiator, lessons learned from those negotiations, and how empathy has helped him in those negotiations. He talked about the importance of running a business that starts with focusing on customer desired outcomes and how small businesses need cyber security resources. We finished the show discussing how cyber criminals may be shifting their focus during the Russia/Ukraine conflict. All this and much more on Episode #209 of Task Force 7 Radio.
This week, we start the show off with an interview Sean Metcalf, the Founder & CTO of Trimarc, where we talk “Active Directory, Azure AD, & Okta Oh My!” An interview featuring featuring Jay Beale, the CEO of InGuardians, about Kubernetes & Container security! Finally, in the Security News for this week: Ransomeware that was a breeze, getting an eyeful while charging your electric vehicle, scanning for secrets, find my iphone is useful, WTF Apple moments and why I run Linux, Wyze is not very wise, stopping teen hackers, and ranking endpoint detection! Show Notes: https://securityweekly.com/psw735 Segment Resources: -Peirates, a Kubernetes penetration testing tool: https://www.inguardians.com/peirates/ -Free Kubernetes workshops: https://inguardians.com/kubernetes/ -DEF CON Kubernetes CTF https://containersecurityctf.com/ -Jay's Black Hat Kubernetes Attack and Defense Training https://www.blackhat.com/us-22/training/schedule/index.html#abusing-and-protecting-kubernetes-linux-and-containers-26473 Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we start the show off with an interview Sean Metcalf, the Founder & CTO of Trimarc, where we talk “Active Directory, Azure AD, & Okta Oh My!” An interview featuring featuring Jay Beale, the CEO of InGuardians, about Kubernetes & Container security! Finally, in the Security News for this week: Ransomeware that was a breeze, getting an eyeful while charging your electric vehicle, scanning for secrets, find my iphone is useful, WTF Apple moments and why I run Linux, Wyze is not very wise, stopping teen hackers, and ranking endpoint detection! All that and more, on this episode of Paul's Security Weekly! Show Notes: https://securityweekly.com/psw735 Segment Resources: -Peirates, a Kubernetes penetration testing tool: https://www.inguardians.com/peirates/ -Free Kubernetes workshops: https://inguardians.com/kubernetes/ -DEF CON Kubernetes CTF https://containersecurityctf.com/ -Jay's Black Hat Kubernetes Attack and Defense Training https://www.blackhat.com/us-22/training/schedule/index.html#abusing-and-protecting-kubernetes-linux-and-containers-26473 Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
ORIGINALLY AIRED ON MARCH 21, 2022 Articles discussed in this episode: 03:27 – Netflix to clamp down on password sharing – https://about.netflix.com/en/news/paying-to-share-netflix-outside-your-household 10:15 – Ransomeware is still a thing 12:31 – Ransomeware Tell-All – https://www.zdnet.com/article/hit-by-ransomware-or-paid-a-ransom-now-some-companies-will-have-to-tell-the-government/ 24:01 – Microsoft Defender tags Office Updates as ransomware – https://www.bleepingcomputer.com/news/security/microsoft-defender-tags-office-updates-as-ransomware-activity/ 31:01 – Microsft Double Patch Tuesday – https://www.bleepingcomputer.com/news/microsoft/windows-zero-day-flaw-giving-admin-rights-gets-unofficial-patch-again/ 32:28 […] The post Talkin' About Infosec News – 3/29/2022 appeared first on Black Hills Information Security.
The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you by CyberArk. Listen to the podcast weekly and read it daily at ransomwareminute.com • CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
The Chief Executive Officer and Co-Founder of GroupSense, Mr. Kurtis Minder joins Co-Host Andy Bonillo on Episode #209 of Task Force 7 Radio to talk about how he became a Ransomware Negotiator, lessons learned from those negotiations, and how empathy has helped him in those negotiations. He talked about the importance of running a business that starts with focusing on customer desired outcomes and how small businesses need cyber security resources. We finished the show discussing how cyber criminals may be shifting their focus during the Russia/Ukraine conflict. All this and much more on Episode #209 of Task Force 7 Radio.
The Chief Executive Officer and Co-Founder of GroupSense, Mr. Kurtis Minder joins Co-Host Andy Bonillo on Episode #209 of Task Force 7 Radio to talk about how he became a Ransomware Negotiator, lessons learned from those negotiations, and how empathy has helped him in those negotiations. He talked about the importance of running a business that starts with focusing on customer desired outcomes and how small businesses need cyber security resources. We finished the show discussing how cyber criminals may be shifting their focus during the Russia/Ukraine conflict. All this and much more on Episode #209 of Task Force 7 Radio.
The Chief Executive Officer and Co-Founder of GroupSense, Mr. Kurtis Minder joins Co-Host Andy Bonillo on Episode #209 of Task Force 7 Radio to talk about how he became a Ransomware Negotiator, lessons learned from those negotiations, and how empathy has helped him in those negotiations. He talked about the importance of running a business that starts with focusing on customer desired outcomes and how small businesses need cyber security resources. We finished the show discussing how cyber criminals may be shifting their focus during the Russia/Ukraine conflict. All this and much more on Episode #209 of Task Force 7 Radio.
Why APTs use Ransomeware? [ML BSide]Advertising Inquiries: https://redcircle.com/brands
How can you protect your law firm from online attacks? Dave and Larry chat with Gary Moore and Rick Krenmayer from Stasmayer Incorporated about ransomware and cybersecurity and what you can do to stay safe. From common mistakes to examples of recent attacks, Gary and Rick share their knowledge of this dangerous and ever-present risk Read more about Ep 79 – Security and Ransomeware Awareness for Law Firms[…]
Facebook Whistleblower Senate Hearing / Facebook Outage / Ransomeware Gang Arrests
Rich and Toby mention quite a few things in this episode that you may be interested in reading more about.Cohaesus Group websiteSecure Delivery websiteNIST 2020 vulnerability analysisOWASP Top 10 (as of time of release)ICO report on British Airways caseRework, by Jason FriedZdnet article about Microsoft's study into two-factor authenticationOWASP Application Security Curriculum (Appsec)OWASP MembershipAnd remember, you can contact Toby at enquiries@securedelivery.io, and Richard at tiedtogether@cohaesus.co.uk. if you have any questions about the content of this episode.
The never-ending cybersecurity battles intensify as attackers & defenders have raised the stakes and integrated more advanced techniques, including the increasing use of artificial intelligence (AI). Mike DeCesare has been in the proverbial trenches, and recently joined Exabeam as President and CEO. In this far-ranging conversation, Mike and I discuss the evolving security landscape, Zero Trust, the assumption that all credentials are compromised, the impact of AI and more. Thanks again Mike, always enjoy getting my 'state of security' lesson from you. Show Notes LinkedIn Article YouTube Video
Following a short vacation, we are back to announce college graduations, medical school acceptances and that we missed you all dearly. We open the episode by catching you up on our recent rendezvous and then move to those pesky UFO's (24:16) ultimately tossing some shade at NDT (41:03). We catch you up on the American Oliver Twist story of the Florida orphans who went to the mattresses with local law enforcement (47:04) and close the hour with Ransomeware (53:11) and Infrastructure (57:00). The 2nd hour is all Covid: Covid lotteries (1:03:13) and show us where the Fauci emails touched you (1:21:41). We wrap up with some normal movie banter. We are stoked to be back and, as always, many thanks for the support everyone!
Former New England Patriot and Philadelphia Eagle Ellis Hobbs joins the crew for a fun but heartfelt episode of Noonish. These topics include transitioning from the NFL to the life of an entrepreneur, playing college football at Iowa State, ransomeware, and more! Jonas sure knows how to scare the hell out of our guests and anyone else listening so don't say we didn't warn you! Follow JA, Jonas and Mark! https://www.instagram.com/j.a._the_first https://www.instagram.com/claytom.mc https://www.instagram.com/jonasbu11 https://www.instagram.com/noonish_live
This week on The Cyber Tap, Mat and Mike welcome Vishal Salvi, CISO and Head of Cyber Business for Infosys, to chat about how cybersecurity is fueling change in the global workforce along with breaking down the latest cyber news. -------------------------Follow us on all the things:Twitter: @PCyberTAPLinkedIn: Purdue cyberTAPInstagram: purduecybertapEmail the Cyber Tap with suggestions (or tips)cybertappodcast@purdue.eduTo learn more about Purdue cyberTAP's education and professional services, visit cyber.tap.purdue.edu