Computer security testing tool
POPULARITY
In this episode, Christina Luconi, dubbed "the original people innovator," takes host Bill Banham on a fascinating journey through her pioneering career in transforming how fast-growing companies approach their most valuable asset - their people. With refreshing candor and hard-earned wisdom, she reveals how she's helped multiple tech startups scale from dozens to thousands of employees without sacrificing their cultural foundations.The conversation explores Christina's unconventional entry into HR after studying psychology, where her willingness to question established norms ("why do we call humans 'resources'?") set her on a path of people-centered innovation. Her formative experience at Sapient during the 90s tech boom—where she helped scale from 150 to 3,500 employees in just four years—established her philosophy that culture isn't just important for growth; it's the essential foundation that makes rapid growth possible.Christina shares practical strategies from her 14-year tenure at Rapid7, where she developed the concept of "scaling with soul." Rather than imposing values from the top down, she engaged employees directly in defining the company's identity and integrated these values throughout the employee lifecycle. The approach was so successful that even terminated employees would recommend the company to others—perhaps the ultimate test of cultural strength. She eloquently articulates how diversity of thought and cultural alignment can coexist when organizations focus on shared values while encouraging authentic self-expression.Now launching her consulting practice, People Innovations, Christina aims to help early-stage companies recognize the critical importance of human-centered approaches from day one. Having faced personal health challenges that shifted her perspective, she's passionate about maximizing her impact across multiple organizations. Despite acknowledging the current difficulties in people leadership, she remains optimistic: "This could be one of the most pivotal and important roles in a company because ultimately, it doesn't matter what you're building or selling...AI might replace a lot of stuff, but it can't replace human relationships and trust and collaboration."Ready to transform how your organization approaches culture and growth? Subscribe to the HRchat Show for more insights from visionary leaders who are redefining the world of work.Support the showFeature Your Brand on the HRchat PodcastThe HRchat show has had 100,000s of downloads and is frequently listed as one of the most popular global podcasts for HR pros, Talent execs and leaders. It is ranked in the top ten in the world based on traffic, social media followers, domain authority & freshness. The podcast is also ranked as the Best Canadian HR Podcast by FeedSpot and one of the top 10% most popular shows by Listen Score. Want to share the story of how your business is helping to shape the world of work? We offer sponsored episodes, audio adverts, email campaigns, and a host of other options. Check out packages here. Follow us on LinkedIn Subscribe to our newsletter Check out our in-person events
Pete Rubio reveals how Rapid7 transformed to an AI-first platform that automates security investigations and accelerates results from hours to seconds.Topics Include:Pete Rubio introduces Rapid7's journey to becoming an AI-first cybersecurity platformCybersecurity teams overwhelmed by growing attack surfaces and constant alert fatigueCustomers needed faster response times, not just more alerts coming fasterLegacy tools created silos requiring manual triage that doesn't scale effectivelyAI must turn raw security data into real-time decisions humans can trustUnified data platform correlates infrastructure, applications, identity, and business context togetherAgentic AI automates investigative work, reducing analyst tasks from hours to secondsRapid7 evaluated multiple vendors, choosing AWS for performance, cost, and flexibilityNova models delivered unmatched performance for global scaling at controlled costsBedrock provided secure model deployment with governance and data privacy boundariesAWS partnership enabled co-development and rapid iteration beyond typical vendor relationshipsTransparent AI shows customers how models reach conclusions before automated actionsSOC analyst expertise continuously trains models with real-time security intelligenceGovernance frameworks and guardrails implemented from day one, not retrofitted laterFuture plans include customer AI integration and bring-your-own-model capabilitiesParticipants:Pete Rubio – Senior Vice President, Platform & Engineering, Rapid7Additional Links:Rapid 7 – LinkedIn - Website – AWS MarketplaceSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/
Keywordscybersecurity, product management, career development, market strategy, customer insights, hacking, music, team building, startup life, risk management SummaryIn this episode of No Password Required, host Jack Clabby and co-host Kayleigh Melton engage in a lively conversation with John Shipp, a product strategist at Rapid7. They explore John's unique journey from a metalhead to a cybersecurity expert, discussing the importance of passion in career development, the intricacies of product management, and the significance of customer insights in shaping cybersecurity solutions. John shares his early experiences in hacking, the influence of music on his life, and the value of building strong teams and company culture. The episode concludes with a fun segment called the Lifestyle Polygraph, where John answers quirky questions about his ideal cyber team and his dream day with Ric Flair. TakeawaysBeing a metalhead prepares you for the boardroom.You can follow your passion and thrive in your career.Product management involves understanding customer needs and market dynamics.Curiosity is a key driver in the tech field.Great teams are built on strong leadership and culture.Startup life requires a willingness to take risks.Networking and building relationships are crucial in cybersecurity.Understanding your risk appetite is important when considering career moves.Music can be a significant influence on personal and professional life.Mentorship and sharing knowledge are vital for growth in the industry. TitlesFrom Metal to Management: A Cybersecurity JourneyPassion and Profession: Finding Your Path in Cybersecurity Sound bites"You can follow your passion and thrive.""I learned security at scale.""Curiosity drives my passion for tech." Chapters00:00 Introduction to Cybersecurity and Personal Journeys02:49 The Role of Passion in Career Development05:21 Navigating Product Management and Market Strategy08:23 The Evolution of Cybersecurity Skills11:37 The Importance of Customer Insights in Product Development14:35 Early Experiences in Hacking and Cybersecurity17:24 The Influence of Music on Personal and Professional Life20:19 Building Teams and Company Culture23:10 Startup Life and Risk Management26:08 Lifestyle Polygraph: Fun Questions and Insights29:13 Final Thoughts and Connections
Jon Schipp, the “Ric Flair of Cybersecurity,” is the senior director of inorganic growth strategy at Rapid7. Jon mixes cyber technical mastery, business acumen, and stage presence to identity mergers and partnerships for his company's growing cybersecurity platform. He shares his story with hosts Jack Clabby of Carlton Fields and Kayley Melton, executive director of […]
Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Baptist minister with aspirations of being a professional musician, Julian found it more practical to take some technology classes and practice his saxophone when he had time. His first tech job was at Texaco where he worked on early networks and moved into systems engineering at Compaq. Julian notes his ADD made coding less attractive than talking with others to solve problems and Compaq provided him with opportunities to pivot. Searching out diversity, Julian moved to DC, and had his first taste of startups. He now describes himself as a serial entrepreneur. We thank Julian for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Baptist minister with aspirations of being a professional musician, Julian found it more practical to take some technology classes and practice his saxophone when he had time. His first tech job was at Texaco where he worked on early networks and moved into systems engineering at Compaq. Julian notes his ADD made coding less attractive than talking with others to solve problems and Compaq provided him with opportunities to pivot. Searching out diversity, Julian moved to DC, and had his first taste of startups. He now describes himself as a serial entrepreneur. We thank Julian for sharing his story with us. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of Tech Talks Daily, I caught up with Raj Samani, Chief Scientist at Rapid7, to unpack the rapidly evolving world of ransomware. Raj has been on the front lines of cybercrime response for years and has seen firsthand how these attacks have professionalized. Gone are the days of casual ransomware notes asking for a few hundred dollars. Today, these groups operate like fully formed businesses with help desks, R&D teams, and carefully designed extortion models. We talked about how ransomware has become a reputational risk issue more than just a technical one. Raj shared that CEOs are often more concerned about data being exfiltrated and leaked to the press than they are about systems being locked down. It's no longer just about recovering files. It's about trust, public perception, and the long tail of brand damage. One of the most revealing parts of our discussion was how these attacks typically unfold. Raj walked me through real-world scenarios where criminals have remained inside networks for months, even years, before launching their final payload. He also described how careful planning, coordinated strike days, and threat intelligence can disrupt an attacker's kill chain before irreversible damage is done. We explored the uncomfortable truth that many organizations still fall victim to basic attacks because of poor cyber hygiene. While the threat landscape is becoming more sophisticated with the use of zero-day vulnerabilities and social engineering, many breaches still happen through exposed RDP ports or convincing phishing attempts. Raj also offered candid insights into the ethics and complexities of ransomware negotiations, why outright banning payments may backfire, and what companies should do in the first few hours after discovering they've been hit. He made it clear that cybersecurity is no longer just an IT issue. It affects everything from supply chains to public services and daily life. Is your organization prepared for the moment when ransomware moves from IT's concern to the boardroom's crisis?
In this episode of Heroes of IT, Ashley sit down with Milton Webster to explore how his team transformed their IT operations using Automox. From reducing endpoint risk scores in record time to implementing automated Windows 11 upgrades with Worklets, Milton shares real-world wins and challenges from the frontlines of IT. Learn how a culture of proactive patching helped his organization boost security and sleep easier at night. If you're navigating risk management, remote device updates, or end-user satisfaction, this conversation is packed with practical insight.
In this episode, Amir sits down with Brooke Motta, CEO and co-founder of RAD Security, to unpack her career pivot from sales leadership to becoming a founder in the cybersecurity space. Brooke shares how her go-to-market background shaped her approach to building RAD, the challenge of stepping into technical leadership, how she's managing growth through hiring, and what's ahead for security and AI. Whether you're a technical founder or commercial operator, this one's packed with practical insight.
Ian Riopel is the CEO and Co-founder of Root, applying agentic AI to fix vulnerabilities instantly. A US Army veteran and former Counterintelligence Agent, he's held roles at Cisco, CloudLock, and Rapid7. Ian brings military-grade security expertise to software supply chains. John Amaral is the CTO and Co-founder of Root. Previously, he scaled Cisco Cloud Security to $500M in revenue and led CloudLock to a $300M acquisition. With five exits behind him, John specializes in building cybersecurity startups with strong technical vision. In this episode… Patching software vulnerabilities remains one of the biggest security challenges for many organizations. Security teams are often stretched thin as they try to keep up with vulnerabilities that can quickly be exploited. Open-source components and containerized deployments add even more complexity, especially when updates risk breaking production systems. As compliance requirements tighten and the volume of vulnerabilities grows, how can businesses eliminate software security risks without sacrificing productivity? Companies like Root are transforming how organizations approach software vulnerability remediation by applying agentic AI to streamline their approach. Rather than relying on engineers to triage and prioritize thousands of issues, Root's AI-driven platform scans container images, applies safe patches where available, and generates custom patches for outdated components that lack official fixes. Root's AI automation resolves approximately 95% or more vulnerabilities without breaking production systems, allowing organizations to meet compliance requirements while developers stay focused on building and delivering software. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels speak with Ian Riopel and John Amaral, Co-founders of Root, about how AI streamlines software vulnerability detection. Together, they explain how Root's agentic AI platform uses specialized agents to automate patching while maintaining software stability. John and Ian also discuss how regulations and compliance pressures are driving the need for faster remediation, and how Root differs from threat detection solutions. They also explain how AI can reduce security workloads without replacing human expertise.
Corey Thomas is the CEO and Chairman of Rapid7, a leading public cybersecurity software company valued around $3.5B. He is also an angel investor in several tech companies, a member of the Council on Foreign Relations, a director and deputy chair of the Federal Reserve Bank of Boston, and a member of the Blue Cross Blue Shield of Massachusetts board of directors, among other honors. Before Rapid7, Corey worked extensively at companies such as Microsoft, Deloitte, and AT&T. Corey joined host Robert Glazer on the Elevate Podcast to talk about his leadership approach, how he rose through the ranks at Fortune 500 companies, and much more. Special Thanks to the Sponsors of the Elevate Podcast Shopify: Sign up for your $1/month trial period at shopify.com/elevate Indeed: Get a $75 sponsored job credit to boost your job's visibility at Indeed.com/elevate. Masterclass: Get an additional 15% off any annual membership at masterclass.com/elevate. Northwest Registered Agent: Don't wait—protect your privacy, build your brand, and set up your business in just 10 clicks and 10 minutes! Visit https://northwestregisteredagent.com/elevate today. Quince: Go to quince.com/elevate for free shipping on your order and 365-day returns Learn more about your ad choices. Visit megaphone.fm/adchoices
Is GenAI safe to use or should we be cautious when using these tools? Tune in for an inspiring discussion with Etay Maor, Chief Security Strategist at Cato Networks on the 2025 Cato CTRL Threat Report.Moments with Marianne airs in the Southern California area on KMET1490AM & 98.1 FM, an ABC Talk News Radio affiliate! Etay Maor is the chief security strategist at Cato Networks, a founding member of Cato CTRL, and an industry-recognized cybersecurity researcher. Prior to joining Cato in 2021, Etay was the chief security officer for IntSights (acquired by Rapid7), where he led strategic cybersecurity research and security services. Etay has also held senior security positions at Trusteer (acquired by IBM), where he created and led breach response training and security research, and RSA Security's Cyber Threats Research Labs, where he managed malware research and intelligence teams. Etay is an adjunct professor at Boston College and is part of the Call for Paper (CFP) committees for the RSA Conference and Qubits Conference. Etay holds a Master's degree in Counterterrorism and Cyber-Terrorism and a Bachelor's degree in Computer Science from IDC Herzliya. www.catonetworks.com/report For more show information visit: www.MariannePestana.com
In this episode of the Cyber Uncut podcast, Raj Samani, senior vice president and chief scientist at Rapid 7, joins host Liam Garman to unpack how nation-state threats are actively targeting Australian organisations – and how we can proactively prepare for future attacks. They begin the podcast by looking at those groups that are most actively targeting Australian organisations and how their strategies are different from traditional cyber crime. Samani then unpacks some of the most common mistakes he sees from Australian organisations that are leaving them vulnerable to ransomware, before diving into the operating models of these threat actors, from negotiations and double extortion tactics. The pair then wrap up the podcast by looking at how companies can improve their post-breach response and resilience and the actionable steps they must take to stay ahead of emerging risks. To listen to Samani's previous appearance on the Cyber Uncut podcast, click here. Enjoy the podcast, The Cyber Uncut team.
In this episode of the Cyber Uncut podcast, Raj Samani, senior vice president and chief scientist at Rapid7, joins host Liam Garman to unpack how nation-state threats are actively targeting Australian organisations - and how we can proactively prepare for future attacks. They begin the podcast by looking at those groups that are most actively targeting Australian organisations and how their strategies are different from traditional cyber crime. Samani then unpacks some of the most common mistakes he sees from Australian organisations that are leaving them vulnerable to ransomware, before diving into the operating models of these threat actors, from negotiations to double extortion tactics. The pair then wrap up the podcast by looking at how companies can improve their post-breach response and resilience and the actionable steps they must take to stay ahead of emerging risks. To listen to Samani's previous appearance on the Cyber Uncut podcast, click here. Enjoy the podcast, The Cyber Uncut team.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
My Very Personal Guidance and Strategies to Protect Network Edge Devices A quick summary to help you secure edge devices. This may be a bit opinionated, but these are the strategies that I find work and are actionable. https://isc.sans.edu/diary/My%20Very%20Personal%20Guidance%20and%20Strategies%20to%20Protect%20Network%20Edge%20Devices/31660 PostgreSQL SQL Injection A followup to yesterday's segment about the PostgreSQL vulnerability. Rapid7 released a Metasploit module to exploit the vulnerability. https://github.com/rapid7/metasploit-framework/pull/19877 Ivanti Connect Secure Exploited The Japanese CERT observed exploitation of January's Connect Secure vulnerability https://blogs.jpcert.or.jp/ja/2025/02/spawnchimera.html WinZip Vulnerability WinZip patched a buffer overflow vulenrability that may be triggered by malicious 7Z files https://www.zerodayinitiative.com/advisories/ZDI-25-047/ Xerox Printer Patch Xerox patched two vulnerabililites in its enterprise multifunction printers that may be exploited for lateral movement. https://securitydocs.business.xerox.com/wp-content/uploads/2025/02/Xerox-Security-Bulletin-XRX25-003-for-Xerox-VersaLinkPhaser-and-WorkCentre.pdf
Three Buddy Problem - Episode 34: We dig into the latest exploited Apple iPhone zero-day (USB Restricted Mode bypass), an AMD microcode flaw so serious it's not being fully disclosed, a barrage of Patch Tuesday updates, the helpless nature of trying to defend corporate networks, Russian threat actor movements, and fresh intel from Rapid7, Volexity, and Microsoft. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).
Pete is CEO and co-founder of Realm Security, which is building a security data fabric to help companies manage their disparate log sources for monitoring tools. For companies spending millions of dollars every year on contracts with Splunk, Realm is the light at the end of the tunnel that can help them move to a cheaper SIEM tool. Pete started his career at Rapid7 after dropping out of college, and he worked his way through a variety of cybersecurity sales leadership roles since, including companies acquired by CarbonBlack and Cisco. In the episode we talk about his emphasis on moving roles for new learning opportunities, his obsession with customer problems rather than potential solutions, and how Realm's message is unique in a cyber ecosystem where vendors are always asking for CISOs to grow their budget. Website Sponsor: VulnCheck
In this holiday episode special, we're joined by Hamza Fodderwala, Executive Director at Morgan Stanley, where he leads cybersecurity equity coverage. He joined Morgan Stanley's software research team in early 2016 and leads coverage for public cybersecurity companies like Palo Alto Networks, CrowdStrike, Fortinet, SentinelOne, Okta, Zscaler, Cloudflare, Rapid7, Check Point, Qualys, Varonis and Tenable. Before Morgan Stanley, Hamza was an equity research associate at Susquehanna International Group covering the financial technology sector. Hamza graduated from New York University, with a Bachelor of Arts in Economics.We dive into Hamza's insights on the major customer buying patterns in cybersecurity throughout 2024 and what might shift in 2025. Hamza shares his observations on how the Generative AI boom is influencing product adoption in the industry, and whether enterprises are currently adopting AI security solutions. Additionally, we explore key trends from cybersecurity resellers, discuss what might unlock public equity markets for new IPOs, and which private cyber companies could go public next.Our discussion covers the cybersecurity M&A landscape, highlighting over $50B in deal volume this year with companies like Juniper, Darktrace, Recorded Future, Synopsys, Venafi, and more all getting acquired. Finally, Hamza shares lessons for founders, offering advice on identifying areas ripe for disruption, navigating the venture funding landscape, and building resilience in a competitive industry.
Podcast: (CS)²AI Podcast Show: Control System Cyber SecurityEpisode: Rapid7's Approach to ICS and OT Security: Lessons from the FieldPub date: 2024-12-03Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationJoin Derek Harp and his guests from Rapid7—Lonnie Best, William Price, and Nicholas Butcher—as they delve into the critical challenges and exciting opportunities within the Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity landscape. Recorded live at Hack the Capitol 7.0, this episode highlights the growing demand for OT cybersecurity, innovative approaches to managing threats, and the evolving dynamics between IT and OT professionals.In this episode, the panel discusses real-world examples of managing ICS threats, the nuances of integrating OT into traditional IT security frameworks, and the importance of trust and communication in bridging gaps between teams. Learn how managed security services are adapting to meet the unique demands of OT environments and why collaboration across roles and expertise is essential.Whether you're a seasoned professional or new to the field, this episode offers actionable insights and inspiring stories that highlight the importance of securing critical infrastructure in today's evolving threat landscape. Visit cs2ai.org to learn more about resources, events, and professional development opportunities in OT and ICS cybersecurity.The podcast and artwork embedded on this page are from Derek Harp, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Control System Cyber Security Association International: (CS)²AI
Join Derek Harp and his guests from Rapid7—Lonnie Best, William Price, and Nicholas Butcher—as they delve into the critical challenges and exciting opportunities within the Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity landscape. Recorded live at Hack the Capitol 7.0, this episode highlights the growing demand for OT cybersecurity, innovative approaches to managing threats, and the evolving dynamics between IT and OT professionals.In this episode, the panel discusses real-world examples of managing ICS threats, the nuances of integrating OT into traditional IT security frameworks, and the importance of trust and communication in bridging gaps between teams. Learn how managed security services are adapting to meet the unique demands of OT environments and why collaboration across roles and expertise is essential.Whether you're a seasoned professional or new to the field, this episode offers actionable insights and inspiring stories that highlight the importance of securing critical infrastructure in today's evolving threat landscape. Visit cs2ai.org to learn more about resources, events, and professional development opportunities in OT and ICS cybersecurity.
Unredacted court filings from WhatsApp's 2019 lawsuit against NSO Group reveal the scope of spyware infections. Glove Stealer can bypass App-Bound Encryption in Chromium-based browsers. Researchers uncover a new zero-day vulnerability in Fortinet's FortiManager. Rapid7 detects an updated version of LodaRAT. CISA warns of active exploitation of Palo Alto Networks' Expedition tool. Misconfigured Microsoft Power Pages accounts expose sensitive data. Iranian state hackers mimic North Koreans in fake job scams. Australia warns its critical infrastructure providers about state sponsored embedded malware. An especially cruel cybercriminal gets ten years in the slammer. Guest Ambuj Kumar, Co-founder and CEO of Simbian, joins us to discuss how AI Agents may change the cyber landscape. We're countin' down the top ten least secure passwords. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Guest Ambuj Kumar, Co-founder and CEO of Simbian, joins us to discuss how AI Agents are going to change the cyber landscape. Selected Reading 1,400 Pegasus spyware infections detailed in WhatsApp's lawsuit filings (The Record) Glove Stealer Malware Bypasses Chrome's App-Bound Encryption (SecurityWeek) watchTowr Finds New Zero-Day Vulnerability in Fortinet Products ( Infosecurity Magazine) LodaRAT: Established malware, new victim patterns (Rapid7 Blog) CISA Warns of Two More Palo Alto Expedition Flaws Exploited in Attacks (SecurityWeek) Microsoft Power Pages misconfigs exposing sensitive data (The Register) Iranian Threat Actors Mimic North Korean Job Scam Techniques (BankInfo Security) Hackers Lurking in Critical Infrastructure to Wage Attacks (BankInfo Security) Cybercriminal devoid of boundaries gets 10-year prison sentence (The Register) Top 200 Most Common Passwords (NordPass) Special voting request. Just when you thought voting was over for this year…It's time to vote…again! The N2K CyberWire hosting team of Dave Bittner, Maria Varmazis, and Joseph Carrigan have been nominated for the Creator of the Year category in the Baltimore region's 2024 Technical.ly Awards for their incredible work on the Hacking Humans podcast! If you're a fan of Hacking Humans, we'd be thrilled to have your support! Please cast your vote here. (Make sure you select the “Baltimore” region). Thanks for your vote! Voting ends Monday, November 18th, so don't delay! Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts wit h us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Drex shares timely updates including potential changes to HIPAA regulations aimed at clarifying security rules, Rapid7's possible sale exploration and its implications, and the importance of updating Apple devices to address critical security vulnerabilities. Remember, Stay a Little Paranoid Subscribe: This Week Health Twitter: This Week Health LinkedIn: Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
In this episode, J.R. Lowry sits down with former CEO Mike Tuchen, who shares invaluable lessons from tech CEOs. Mike discusses his journey leading tech companies like Rapid7, Talend, and Onfido, reflecting on the leadership challenges and strategies that helped him succeed. With candid insights on building teams, executing strategies, and navigating market trends, this conversation offers a wealth of knowledge for aspiring leaders and tech enthusiasts. Tune in to hear Mike's experiences and practical advice from his impressive career.Check out the full series of “Career Sessions, Career Lessons” podcasts here or visit pathwise.io/podcast/. A full written transcript of this episode is also available at https://pathwise.io/podcast/mike-tuchenBecome a PathWise member today! Join at https://pathwise.io/join-now
Host Karl Palachuk caught up with Dor Eisner, CEO of Guardz. Right off the bat, Eisner points out the reason enterprise cybersecurity attacks are different from those focused on small business. Like it or not, most of the attacks that work against SMB clients will not work against larger enterprises. Eisner discusses the toolsets that are built specifically to attack small businesses, and marketed that way on the dark web. Assuming you don't want to spend time browsing the dark web, it's good to have a partner who is willing to. Guardz is focused completely on securing small businesses, and helping them to secure their networks in a way that helps them lower their insurance premiums. Think about what that means for your clients: A dashboard that benchmarks a network against the requirements and checklists used by cybersecurity insurance companies to set rates. A secure network AND lower insurance rates: That's a great combination! You can connect with Guardz at: https://guardz.com Request a Guardz Demo at https://guardz.com/schedule-a-meeting/ Karl asked about pricing and was pleased to find a very transparent, friendly pricing structure. Dor gives the pricing in the podcast, and it's posted clearly on the web site. In addition, you are not locked into longterm, inflexible contracts. Scale up and down as you need. Also check out the free internal-use licensing for MSPs. Learn it. Use it. And integrate Guardz into your solution. You get your free demo, free license, and some great sales tools at https://guardz.com. Check out the full podcast to hear Dor's advice on sales techniques and the response options for various clients and attack alerts. Connect with Guardz on social media at: YouTube - https://www.youtube.com/@Guardz_com LinkedIn - https://www.linkedin.com/company/guardz/ Twitter - https://x.com/GuardzCyber Instagram - https://www.instagram.com/guardz_cyber/ Facebook - https://www.facebook.com/guardzcom/ About Dor Eisner Dor Eisner is the CEO and Co-Founder of Guardz, working to create a safer digital world for SMBs. Dor has over 20 years of experience in the field of cybersecurity. Prior to founding Guardz, Dor worked at IntSights, a Rapid7 company, as their VP of Business Development, as well as at Alarum Technologies as Director of Sales. Dor began his career in cybersecurity in the Israeli Defense Force's 8200 Unit as Cyber Security Team Lead. About Guardz Guardz distinguishes itself in the cybersecurity market with the first AI-Native MDR solution that redefines security management for Managed Service Providers (MSPs) with an automated detection and response platform. It simplifies and strengthens security operations, enabling MSPs to protect their SMB customers against the ever-evolving cyber threat landscape. Guardz's MDR empowers MSPs by integrating fragmented security controls into a cohesive, unified security ecosystem. By leveraging advanced artificial intelligence, the platform correlates data across multiple sources – such as dark web monitoring, email security, and cloud services – to detect threats at their earliest stages. This capability ensures that all security components, from user profiles to endpoint protection, work harmoniously, reducing the risk of overlooked vulnerabilities. Guardz's cost-effective pricing reduces cybersecurity expenses by up to 75% compared to traditional solutions, making it accessible for businesses with lean IT teams. The platform also supports MSPs through the MSP Growth Hub, offering tools for business development, including ROI reports and AI-powered risk assessments. By combining innovation, affordability, and comprehensive protection, Guardz positions itself as a leader in the cybersecurity industry, empowering MSPs and their SMB clients to thrive in a safer digital world. Learn more at https://guardz.com. -- -- -- Thank you to Guardz for sponsoring this interview. :-)
Veracode's CRO Andre Cuenin joins CXO Conversations and shares his journey from sales to the C suite. He doesn't like the title Chief Revenue Officer as it puts the focus on him versus the customer. Andre moved from presales to sales by having a post presentation conversation with a customer; he casually asked for the signature. During the conversation, Andre shares his three core management philosophies: Authenticity; be more authentic, gain and share experiences and value wisdom Importance of having a plan; don't chase the money- chase the dream Go the extra mile; there's no traffic jam there Andre discusses the value and importance of always being curious and learning. Key take aways from the conversation with Andre: Be who you are and be truthful to yourself Go outside your comfort zone Passion gives you confidence In addition to Veracode, Andre has served in C level roles for Rapid7, Cherwell Software and President for the Americas and Europe for IR. Andre also led worldwide sales for StrataVia until it was acquired by HP and held many leadership roles for CA in both Europe and the US. He earned his BSC in Computer Science from the University of Applied Sciences and Arts Northwestern Switzerland.
Michael Belton, founder and CISO at 23P, is a well-respected provider of services including cybersecurity training, offensive assessment, simulation, and more. Michael has over 25 years of information security experience. He previously served as vice president of research and development at Optiv, and manager, global penetration testing services at Rapid7. He is also featured on our list of Cybersecurity Pundits. In this episode, he joins host Heather Engel to discuss a report that manufacturing is number one in cyberattacks, as well as what can be done. • For more on cybersecurity, visit us at https://cybersecurityventures.com
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and shadow IT. Identity is one of the most common entry points for attacks, so we've got to do better as an industry here. We'll cover a variety of topics in this interview, including: Why Henrique chose to go to Saviynt from Gartner Vendor risk concentration in identity Resilience in identity, especially when depending on a SaaS IdP Identity attack evolution (and the creation of the ITDR category) What's working in identity to move things forward, and what is holding us back This segment is sponsored by Saviynt. Visit https://securityweekly.com/saviynt to learn more about them! In this week's enterprise security news, Seed rounds are getting huge Lots of funding for niche security vendors Rapid7 acquires Noetic Cyber but Rapid7 is also rumored to sell itself! Slack battles infostealers The loss of Chevron deference impacts cyber Should cybersecurity put up a no vacancy sign? Figma and Google both make some embarrassing mistakes The RockYou2024 file does NOT contain 10 billion passwords I introduce a new news category: AI indegestion All that and more, on this episode of Enterprise Security Weekly! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-367
I'm always thrilled to chat with ex-analysts, and Henrique Teixeira can cover a lot of ground with us on the topic of identity management and governance. The more I talk to folks about IAM/IGA, the more I'm shocked at how little has changed. If anything, it seems like we've gone backwards a bit, with the addition of cloud SaaS, mobile devices, and shadow IT. Identity is one of the most common entry points for attacks, so we've got to do better as an industry here. We'll cover a variety of topics in this interview, including: Why Henrique chose to go to Saviynt from Gartner Vendor risk concentration in identity Resilience in identity, especially when depending on a SaaS IdP Identity attack evolution (and the creation of the ITDR category) What's working in identity to move things forward, and what is holding us back This segment is sponsored by Saviynt. Visit https://securityweekly.com/saviynt to learn more about them! In this week's enterprise security news, Seed rounds are getting huge Lots of funding for niche security vendors Rapid7 acquires Noetic Cyber but Rapid7 is also rumored to sell itself! Slack battles infostealers The loss of Chevron deference impacts cyber Should cybersecurity put up a no vacancy sign? Figma and Google both make some embarrassing mistakes The RockYou2024 file does NOT contain 10 billion passwords I introduce a new news category: AI indegestion All that and more, on this episode of Enterprise Security Weekly! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-367
In this week's enterprise security news, Seed rounds are getting huge Lots of funding for niche security vendors Rapid7 acquires Noetic Cyber but Rapid7 is also rumored to sell itself! Slack battles infostealers The loss of Chevron deference impacts cyber Should cybersecurity put up a no vacancy sign? Figma and Google both make some embarrassing mistakes The RockYou2024 file does NOT contain 10 billion passwords I introduce a new news category: AI indegestion All that and more, on this episode of Enterprise Security Weekly! Show Notes: https://securityweekly.com/esw-367
In this week's enterprise security news, Seed rounds are getting huge Lots of funding for niche security vendors Rapid7 acquires Noetic Cyber but Rapid7 is also rumored to sell itself! Slack battles infostealers The loss of Chevron deference impacts cyber Should cybersecurity put up a no vacancy sign? Figma and Google both make some embarrassing mistakes The RockYou2024 file does NOT contain 10 billion passwords I introduce a new news category: AI indegestion All that and more, on this episode of Enterprise Security Weekly! Show Notes: https://securityweekly.com/esw-367
In this week's episode of The Conference Room, host Simon Lader sits down with Alon Arvatz, former co-founder of Insights, a cybersecurity vendor acquired by Rapid7 for $350 million. Alon shares his journey from childhood inspiration through his father's tech career to becoming a successful entrepreneur and investor in Israeli cybersecurity startups. He discusses the factors driving Israel's dominance in the cybersecurity industry, the challenges of starting and scaling a tech company, and the story behind the acquisition of Insights. 02:30 - Alon's initial experiences with tech through his father's work. 03:50 - Transition from nonprofit to for-profit ventures in cybersecurity. 07:44 - Alon explains Israel's defense-driven tech advancements. 11:36 - Factors contributing to Israel's tech success and entrepreneurial culture. 13:20 - The need for diversification beyond cybersecurity in Israel's tech sector. 17:36 - Alon's journey with Insights, from clueless beginnings to rapid growth. 19:00 - Challenges and strategies in achieving product-market fit. 21:42 - Insights' go-to-market strategy and organizational alignment. 21:43 - The acquisition of Insights by Rapid7 and how it came about. 26:58 - Where to find Eleanor's book on Amazon. 27:19 - Three key tips for tech entrepreneurs. 27:48 - The importance of understanding technology for tech entrepreneurs. 29:16 - Taking small steps towards big goals in tech entrepreneurship. 30:03 - Introduction to Point Five and its mission to manage lab cost efficiency for engineers. To learn more about Alon Arvatz please visit his Linkedin Profile To learn more about PointFive please visit their website YOUR HOST - SIMON LADER Simon Lader is the host of The Conference Room, Co-Founder of global executive search firm Salisi Human Capital, and lead generation consultancy Flow and Scale. Since 1997, Simon has helped cybersecurity vendors to build highly effective teams, and since 2022 he has helped people create consistent revenue through consistent lead generation. Get to know more about Simon at: Website: https://simonlader.com/ Twitter: https://twitter.com/simonlader LinkedIn: https://www.linkedin.com/in/headhuntersimonlader/ The Conference Room is available on Spotify Apple podcasts Amazon Music IHeartRadio
Juniper issues an emergency patch for its routers. A compromised helpdesk portal sends out phishing emails. Prudential updates the victim count in their February data breach. Rapid7 finds trojanized software installers in apps from a popular developer in India. Australian authorities arrest a man for running a fake mile-high WiFi network. Florida Man's Violent Bid for Bitcoin Ends Behind Bars. N2K's CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of Identity and Access Management (IAM). A scholarship scammer gets a one-way ticket home. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CSO Perspectives preview N2K's CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of Identity and Access Management (IAM): A Rick-the-Toolman episode. N2K CyberWire Pro members can find the full episode here. Rick's accompanying essay can be found here. If you are not yet an N2K CyberWire Pro member, you can get a preview of the episode here. Selected Reading Juniper Networks Warns of Critical Authentication Bypass Vulnerability (SecurityWeek) Router maker's support portal hacked, replies with MetaMask phishing (Bleeping Computer) Prudential Financial Data Breach Impacts 2.5 Million (SecurityWeek) Supply Chain Compromise Leads to Trojanized Installers for Notezilla, RecentX, Copywhiz (Rapid7 Blog) Police allege ‘evil twin' in-flight Wi-Fi used to steal info (The Register) Inside a violent gang's ruthless crypto-stealing home invasion spree (ARS Technica) Cyber insurance costs finally stabilising, says Howden (Tech Monitor) AI Transcript, Fake School Website: Student's US Scholarship Scam Exposed on Reddit (Hackread) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Plus, activist investor Jana Partners plans to push cybersecurity firm Rapid7 to sell itself. And HP appoints a new finance chief. Zoe Thomas hosts. Learn more about your ad choices. Visit megaphone.fm/adchoices
Rapid7 recently announced a new security research partnership with CSIT at Queen's University Belfast. The new partnership will be with CSIT's AI hub and will research into threats facing the cloud by utilising AI and machine learning techniques. The partnership will be another avenue for CSIT students into the cybersecurity industry and Rapid7. With NCSC recently reporting that any cybercriminal will be able to leverage AI and access cloud services, the partnership comes at a critical time. It will also continue the strong relationship seen between the cybersecurity industry and academia in Belfast. After the partnership announcement Ronan spoke to Dr Stuart Millar, Principal AI Engineer at Rapid7. Dr Miller talks about his background, AI and music, the new partnership between Rapid7 and CSIT, the Cyber AI hub and more. More about the Cyber AI hub: The Cyber-AI Hub, hosted by CSIT, presents an exciting opportunity to develop exceptional research, skills and innovation across a range of cyber related themes and develop a talent pipeline of cyber security professionals with strong industry links. This new initiative, funded by the UK Government from the New Deal for Northern Ireland, will see a new Doctoral Training Programme, a hub for industry collaboration and skills development, bursaries for students to join Queen's MSc in Applied Cyber Security or Artificial Intelligence, as well as a report mapping the growth and development of the cyber industry in the region.
Rapid7 recently announced a new security research partnership with CSIT at Queen's University Belfast. The new partnership will be with CSIT's AI hub and will research into threats facing the cloud by utilising AI and machine learning techniques. The partnership will be another avenue for CSIT students into the cybersecurity industry and Rapid7. With NCSC recently reporting that any cybercriminal will be able to leverage AI and access cloud services, the partnership comes at a critical time. It will also continue the strong relationship seen between the cybersecurity industry and academia in Belfast. After the partnership announcement Ronan spoke to Dr Stuart Millar, Principal AI Engineer at Rapid7. Dr Miller talks about his background, AI and music, the new partnership between Rapid7 and CSIT, the Cyber AI hub and more. More about the Cyber AI hub: The Cyber-AI Hub, hosted by CSIT, presents an exciting opportunity to develop exceptional research, skills and innovation across a range of cyber related themes and develop a talent pipeline of cyber security professionals with strong industry links. This new initiative, funded by the UK Government from the New Deal for Northern Ireland, will see a new Doctoral Training Programme, a hub for industry collaboration and skills development, bursaries for students to join Queen's MSc in Applied Cyber Security or Artificial Intelligence, as well as a report mapping the growth and development of the cyber industry in the region.
What free must attend the vendor agnostic Browser Automation Conference is happening this week? Have you explored the practicality of the open-source LLM evaluation framework that can significantly enhance your testing capabilities? Do you want to know how to Upskill your Testing Team with AI and Navigate the Future of Quality Assurance? Find out in this episode of the Test Guild New Shows for the week of Jun 16th. So, grab your favorite cup of coffee or tea, and let's do this. Time News Title Link 0:24 The Browser Conference https://testguild.me/browsercon 1:22 Running Test in Java https://testguild.me/prbxc0 2:09 ortoni-report https://testguild.me/q0mcld 2:54 Turbocharge Playwright https://testguild.me/kubeweb 3:15 BlinqIO 5 million https://testguild.me/s96rj4 3:49 AI Upskill Your Testing Team https://testguild.me/blinqweb 4:05 Generative AI Not Replacing You https://testguild.me/6g9d15 5:07 Panaya AI-Codeless I11 https://testguild.me/wla6pr 5:56 DeepEval https://testguild.me/11xbsh 7:01 Windows Recall rollout https://testguild.me/bmljit 8:05 Rapid7's AI Engine https://testguild.me/606pmh
In der heutigen Folge von “Alles auf Aktien” sprechen die Finanzjournalisten Anja Ettel und Holger Zschäpitz über einen enttäuschenden Ausblick bei Bath&Body Works, die bittere Indien-Überraschung und ein attraktives Nordlicht fürs Depot. Außerdem geht es um Hewlett Packard, Bavarian Nordic, Novo Nordisk, Sanofi, Wisdomtree Cybersecurity (A2QGAH), IBM, Booz Allen Hamilton, Bechtle, Gen Digital, Trend Micro, Check Point Software, Fastly, Cloudflare, Zscaler, Fortinet, Cisco Systems, Palo Alto Networks, Microsoft, IBM, Sentinel One, Rapid7, Zscaler, Okta, Datadog, Cyberark Software, iShares Digital Security ETF (WKN: A2JMGE), Rize Cybersecurity & Data Privacy (A2PX6V), L&G Cyber Security ETF (WKN: A14WU5), und First Trust Nasdaq Cybersecurity (WKN: A2P4HV). Eure Sprachnachrichten für die 1000. Folge schickt ihr bitte an die Nummer: 0170/3753558. Wir freuen uns an Feedback über aaa@welt.de. Ab sofort gibt es noch mehr "Alles auf Aktien" bei WELTplus und Apple Podcasts – inklusive aller Artikel der Hosts und AAA-Newsletter. Hier bei WELT: https://www.welt.de/podcasts/alles-auf-aktien/plus247399208/Boersen-Podcast-AAA-Bonus-Folgen-Jede-Woche-noch-mehr-Antworten-auf-Eure-Boersen-Fragen.html. Disclaimer: Die im Podcast besprochenen Aktien und Fonds stellen keine spezifischen Kauf- oder Anlage-Empfehlungen dar. Die Moderatoren und der Verlag haften nicht für etwaige Verluste, die aufgrund der Umsetzung der Gedanken oder Ideen entstehen. Hörtipps: Für alle, die noch mehr wissen wollen: Holger Zschäpitz können Sie jede Woche im Finanz- und Wirtschaftspodcast "Deffner&Zschäpitz" hören. Außerdem bei WELT: Im werktäglichen Podcast „Das bringt der Tag“ geben wir Ihnen im Gespräch mit WELT-Experten die wichtigsten Hintergrundinformationen zu einem politischen Top-Thema des Tages. +++ Werbung +++ Du möchtest mehr über unsere Werbepartner erfahren? Hier findest du alle Infos & Rabatte! https://linktr.ee/alles_auf_aktien Impressum: https://www.welt.de/services/article7893735/Impressum.html Datenschutz: https://www.welt.de/services/article157550705/Datenschutzerklaerung-WELT-DIGITAL.html
Spyware is discovered on U.S. hotel check in systems. A Microsoft outage affects multiple services. Bitdefender uncovers Unfading Sea Haze. University of Maryland researchers find flaws in Apple's Wi-Fi positioning system. Scotland's NRS reveals a sensitive data leak. Rapid7 tracks the rise in zero-day exploits and mass compromise events. The SEC hits the operator of the New York Stock Exchange with a ten million dollar fine. Operation Diplomatic Specter targets political entities in the Middle East, Africa, and Asia. The FCC considers AI disclosure rules for political ads. N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guests Brianna Bace and Unal Tatar PhD sharing their work on Legal Perspectives on Cyberattacks Targeting Space Systems. Tone-blasting underwater data centers. Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guests Brianna Bace and Unal Tatar PhD sharing their work on their paper: Law in Orbit: International Legal Perspectives on Cyberattacks Targeting Space Systems. You can learn more about their work in this post. Check out T-Minus Space Daily for your daily space intelligence. Selected Reading Spyware found on US hotel check-in computers ( TechCrunch) Microsoft outage affects Bing, Copilot, DuckDuckGo and ChatGPT internet search (Bleeping Computer) Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea (Bitdefender) Apple's Wi-Fi Positioning Can Be System Abused To Track Users (GB Hackers) National Records of Scotland Data Breached in NHS Cyber-Attack (Infosecurity Magazine) Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report (SecurityWeek) NYSE Operator Intercontinental Exchange Gets $10M SEC Fine Over 2021 Hack (SecurityWeek) Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia (Palo Alto Networks Unit 42 Intel) FCC chair proposes requirement for political ads to disclose when AI content is used (The Record) Acoustic attacks could be a serious threat to the future of underwater data centers (TechSpot) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Caitlin Condon of Rapid7 joins Dennis Fisher to dive into the juicy tidbits from the Rapid7 Attack iNtelligence Report, including the rise in attacks on zero days, ransomware proliferation, and why network edge devices remain a major problem. Read the report here: https://www.rapid7.com/c/fr-2024-attack-intelligence-report-TY/1/
Join us for an enlightening episode of "How I Met Your Data" as hosts Sandy Estrada and Anjali Bansal explore the dynamic world of artificial intelligence with Laura Grace Ellis, Vice President of Data and AI at Rapid7. Laura shares her journey and expertise, discussing the challenges and strategies of AI implementation in organizations, with a focus on efficiency, scalability, and enablement. Discover how Laura's role has evolved to lead both data and AI operations at Rapid7, and learn about her involvement with Women Leaders in Data and AI. She offers valuable insights into prioritizing AI projects for real business value, navigating the 'buy vs. build' decision, and the creative aspects of engineering. You'll also hear about surprising wins, the importance of organizational alignment, and the rapid evolution of AI. This episode is packed with practical advice and thought-provoking discussions that will inspire anyone interested in the future of AI.
עמית בן דב ייסד את Gong ב-2015 יחד עם היזם אילון רשף, CPO לפני הקמת גונג כיהן בן דב בשורה של תפקידי ניהול בכירים בחברות הייטק מובילות. בתפקידו האחרון לפני גונג שימש כמנכ"ל SiSense, ולפני כן תפקידי ניהול בכירים בחברת ClickSoftware ו-Panaya. בהובלת בן דב ורשף פיתחה גונג פלטפורמת בינה עסקית עבור אנשי מכירות הממנפת טכנולוגיות בינה מלאכותית לשדרוג היכולות של צוותי מכירות. פלטפורמת הבינה העסקית עטורת הפטנטים של גונג לוכדת ומבינה כל אינטראקציה עם הלקוח ומספקת תובנות המעצימות את יכולת צוותי המכירות לקבל החלטות המבוססות על נתונים בעזרת בינה מלאכותית ולא על דעה סובייקטיבית. למעלה מ-4,000 חברות מובילות ברחבי העולם ובישראל, בהן: Monday, Zillow, LinkedIn, Github, Spotify, Walkme, Rapid7, Checkpoint, Bottomline, הטמיעו את הפתרון וחווים שיפור בשיעור העסקאות שנסגרות, עסקאות בהיקף כספי גדול יותר והאצה של תהליך ההכשרה של עובדים חדשים. גונג גייסה עד היום 583 מיליון דולר ב-7 סבבים. גיוס E האחרון בהיקף של 250 מיליון דולר התבצע לפי שווי של 7.2 מיליארד דולר. מטה החברה נמצא בסן פרנסיסקו, ארה"ב, ומרכזי המחקר והפיתוח שלה ברמת גן, ישראל וכן באירלנד ובארה"ב. החברה מעסיקה למעלה מ-1,000 עובדים ברחבי העולם ובהם 360 עובדים ברמת גן. (*) ללינקדאין שלי: https://www.linkedin.com/in/guykatsovich/ (*) לאינסטגרם שלי: https://www.instagram.com/guykatsovich/ (*) עקבו אחרינו ב"עוד פודקאסט לסטארטאפים" וקבלו פרק מדי שבוע: ספוטיפיי:https://open.spotify.com/show/0dTqS27ynvNmMnA5x4ObKQ אפל פודקאסט:https://podcasts.apple.com/podcast/id1252035397 גוגל פודקאסט:https://bit.ly/3rTldwq עוד פודקאסט - האתר שלנו:https://omny.fm/shows/odpodcast ה-RSS פיד שלנו:https://www.omnycontent.com/.../f059ccb3-e0c5.../podcast.rssSee omnystudio.com/listener for privacy information.
Corey Thomas is the CEO and Chairman of Rapid7, a leading public cybersecurity software company valued around $3.5B. He is also an angel investor in several tech companies, a member of the Council on Foreign Relations, a director and deputy chair of the Federal Reserve Bank of Boston, and a member of the Blue Cross Blue Shield of Massachusetts board of directors, among other honors. Before Rapid7, Corey worked extensively at companies such as Microsoft, Deloitte, and AT&T. Corey joined host Robert Glazer on the Elevate Podcast to talk about his leadership approach, how he rose through the ranks at Fortune 500 companies, and much more. Learn more about your ad choices. Visit megaphone.fm/adchoices
Register here for The AWS for Software Companies "Generative AI and Business Applications Executive Forum", Wednesday May 15, The Sofitel, New York City---------Ep035: Today's podcast features panel discussion from the "AWS for Software Companies Generative AI and Data Executive Forum" featuring leaders from Anyscale, Qlik and Rapid7 sharing insights on data models, policies and optimization for Generative AI applications.Panelists:Zhe Zang, Head of Open Source Engineering, AnyscaleBrendan Grady, EVP & GM, Analytics Business Unit, QlikLaura Ellis, VP - Data Engineering and Platform Analytics, Rapid7Sherry Marcus Ph.D., Director, Applied Science, AWSTopics Include:Introductions of the panelWhat big bets are you making with your companies and why?What have the learnings been with data preparation?Balancing present needs with the future of AI – growing data literacyCost optimization for AI and Data platformsConstraints of hardware and growing expenseWhat models and solutions have customers been asking for?High stakes risks for AI and DataHow customers are reacting to different compute modelsGuardrails, filters and risk-mitigation best practicesData and AI pain pointsNew global policies challenging data and AI developmentChallenges with data qualityHow has AI changed and evolved with digital natives?Open and closed models in the marketMetrics and selection for modelsBiggest lessons learned in the AI and data spaceSession conclusion
The Supreme Court is getting a heavy serving of first amendment social media cases. Gus Hurwitz covers two that made the news last week. In the first, Justice Barrett spoke for a unanimous court in spelling out the very factbound rules that determine when a public official may use a platform's tools to suppress critics posting on his or her social media page. Gus and I agree that this might mean a lot of litigation, unless public officials wise up and simply follow the Court's broad hint: If you don't want your page to be treated as official, simply say up top that it isn't official. The second social media case making news was being argued as we recorded. Murthy v. Missouri appealed a broad injunction against the US government pressuring social media companies to take down posts the government disagrees with. The Court was plainly struggling with a host of justiciability issues and a factual record that the government challenged vigorously. If the Court reaches the merits, it will likely address the question of when encouraging the suppression of particular speech slides into coerced censorship. Gus and Jeffrey Atik review the week's biggest news – the House has passed a bill to force the divestment of TikTok, despite the outcry of millions of influencers. Whether the Senate will be quick to follow suit is deeply uncertain. Melanie Teplinsky covers the news that data about Americans' driving habits is increasingly being sent to insurance companies to help them adjust their rates. Melanie also describes the FCC's new Cyber Trust Mark for IOT devices. Like the Commission, our commentators think this is a good idea. Gus takes us back to more contest territory: What should be done about the use of technology to generate fake pictures, especially nude fake pictures. We also touch on a UK debate about a snippet of audio that many believe is a fake meant to embarrass a British Labour politician. Gus tells us the latest news from the SVR's compromise of a Microsoft network. This leads us to a meditation on the unintended consequences of the SEC's new cyber incident reporting requirements. Jeffrey explains the bitter conflict over app store sales between Apple and Epic games. Melanie outlines a possible solution to the lack of cybersecurity standards (not to mention a lack of cybersecurity) in water systems. It's interesting but it's too early to judge its chances of being adopted. Melanie also tells us why JetBrains and Rapid7 have been fighting over “silent patching.” Finally, Gus and I dig into Meta's high-stakes fight with the FTC, and the rough reception it got from a DC district court.
The Supreme Court is getting a heavy serving of first amendment social media cases. Gus Hurwitz covers two that made the news last week. In the first, Justice Barrett spoke for a unanimous court in spelling out the very factbound rules that determine when a public official may use a platform's tools to suppress critics posting on his or her social media page. Gus and I agree that this might mean a lot of litigation, unless public officials wise up and simply follow the Court's broad hint: If you don't want your page to be treated as official, simply say up top that it isn't official. The second social media case making news was being argued as we recorded. Murthy v. Missouri appealed a broad injunction against the US government pressuring social media companies to take down posts the government disagrees with. The Court was plainly struggling with a host of justiciability issues and a factual record that the government challenged vigorously. If the Court reaches the merits, it will likely address the question of when encouraging the suppression of particular speech slides into coerced censorship. Gus and Jeffrey Atik review the week's biggest news – the House has passed a bill to force the divestment of TikTok, despite the outcry of millions of influencers. Whether the Senate will be quick to follow suit is deeply uncertain. Melanie Teplinsky covers the news that data about Americans' driving habits is increasingly being sent to insurance companies to help them adjust their rates. Melanie also describes the FCC's new Cyber Trust Mark for IOT devices. Like the Commission, our commentators think this is a good idea. Gus takes us back to more contest territory: What should be done about the use of technology to generate fake pictures, especially nude fake pictures. We also touch on a UK debate about a snippet of audio that many believe is a fake meant to embarrass a British Labour politician. Gus tells us the latest news from the SVR's compromise of a Microsoft network. This leads us to a meditation on the unintended consequences of the SEC's new cyber incident reporting requirements. Jeffrey explains the bitter conflict over app store sales between Apple and Epic games. Melanie outlines a possible solution to the lack of cybersecurity standards (not to mention a lack of cybersecurity) in water systems. It's interesting but it's too early to judge its chances of being adopted. Melanie also tells us why JetBrains and Rapid7 have been fighting over “silent patching.” Finally, Gus and I dig into Meta's high-stakes fight with the FTC, and the rough reception it got from a DC district court.
Link to blog post This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Alexandra Landegger, Executive Director and CISO Collins Aerospace Thanks to our show sponsor, Vanta From dozens of spreadsheets and screenshots to fragmented tools and manual security reviews, managing the requirements for modern compliance and security programs is increasingly challenging. Vanta is the leading Trust Management Platform that helps you centralize your efforts to establish trust and enable growth across your organization. Over 6,000 companies partner with Vanta to automate compliance, strengthen security posture, streamline security reviews, and reduce third-party risk. To learn more, go to vanta.com/ciso and watch their 3-minute product demo. All links and the video of this episode can be found on CISO Series.com
In the latest episode of GreyNoise Labs Storm⚡️Watch, we delve into a meta-discussion that stems from an escalating feud between cybersecurity firm Rapid7 and software development company JetBrains over the disclosure of two critical vulnerabilities in JetBrains' TeamCity CI/CD platform. The contention stems from differing approaches to vulnerability disclosure, leading to public disagreements and a series of attacks exploiting these vulnerabilities, identified as CVE-2024-27198 and CVE-2024-27199. On February 20, 2024, Rapid7 disclosed these vulnerabilities to JetBrains, highlighting the severity of CVE-2024-27198, which allows for a complete authentication bypass, potentially enabling attackers to perform administrative actions on the server and its host environment. JetBrains criticized Rapid7 for what it perceived as an uncoordinated disclosure, arguing that Rapid7's immediate release of exploit examples enabled attackers of any skill level to quickly exploit the vulnerabilities. This dispute has led to a "land-rush like assault" from threat groups, with ransomware attacks exploiting these flaws for initial access. Despite the contention, JetBrains remains committed to its Coordinated Disclosure Policy, emphasizing the importance of collaboration and ethical responsibility in addressing vulnerabilities. Meanwhile, Rapid7 insists on following its disclosure policy, emphasizing the importance of public disclosure to prevent silent patching and ensure that patches are thoroughly vetted. Joining us for a cyberside chat is GreyNoise's own Matthew Remacle, who shifts the focus from the feud to discuss silent patching, patch diffing, coordinated disclosure, and offers advice for budding cybersecurity professionals. For a comprehensive understanding of this issue, we reference discussions and analyses from various sources, including The Register, TechTarget, JetBrains' official blog, and Rapid7's blog, which provide insights into the vulnerabilities, the dispute, and the broader implications for cybersecurity practices and policies. Citations: https://www.techtarget.com/searchsecurity/news/366572432/Critical-JetBrains-TeamCity-vulnerabilities-under-attack https://blog.jetbrains.com/teamcity/2024/03/preventing-exploits-jetbrains-ethical-approach-to-vulnerability-disclosure/ https://blog.jetbrains.com/teamcity/2024/03/additional-critical-security-issues-affecting-teamcity-on-premises-cve-2024-27198-and-cve-2024-27199-update-to-2023-11-4-now/ https://www.rapid7.com/blog/post/2024/03/04/etr-cve-2024-27198-and-cve-2024-27199-jetbrains-teamcity-multiple-authentication-bypass-vulnerabilities-fixed/ https://news.ycombinator.com/item?id=39603074 https://www.splunk.com/en_us/blog/security/security-insights-jetbrains-teamcity-cve-2024-27198-and-cve-2024-27199.html https://therecord.media/jet-brains-advisory-teamcity-vulnerabilities https://forums.theregister.com/forum/all/2024/03/12/jetbrains_is_still_mad_at/ https://www.tenable.com/blog/cve-2024-27198-cve-2024-27199-two-authentication-bypass-vulnerabilities-in-jetbrains-teamcity https://www.theregister.com/2024/03/05/rapid7_jetbrains_vuln_disclosure_dispute/ https://thecyberexpress.com/jetbrains-vs-rapid7-vulnerability-disclosure/amp/ https://arcticwolf.com/resources/blog/2024-27198-and-cve-2024-27199/ https://securityaffairs.com/159995/security/jetbrains-teamcity-flaws.html https://securityboulevard.com/2024/03/jetbrains-says-rapid7s-fast-release-of-flaw-details-harmed-users/ https://socprime.com/blog/cve-2024-27198-and-cve-2024-27199-detection-critical-vulnerabilities-in-jetbrains-teamcity-pose-escalating-risks-with-exploits-underway/ https://www.cybersecuritydive.com/news/jetbrains-teamcity-vulnerabilities/709329/ https://www.cybersecuritydive.com/news/jetbrains-teamcity-exploited-disclosure/710017/ https://www.bankinfosecurity.com/jetbrains-teamcity-bugs-could-lead-to-server-takeover-a-24520 https://vulnera.com/newswire/critical-vulnerabilities-in-teamcity-pose-threat-to-software-supply-chain/
In today's cybersecurity landscape, where does the true threat of ransomware lie? I explore this critical question with Raj Samani, SVP and Chief Scientist at Rapid7, in a revealing episode of Tech Talks Daily. With ransomware attacks making headlines and disrupting operations for both public and private organizations, the conversation shifts from the frequency of these incidents to the evolving capabilities of ransomware actors. Raj, who has extensive experience assisting law enforcement agencies and serves as a special advisor to the European Cybercrime Centre (EC3), brings a wealth of knowledge on dark web trends and the tactics employed by these malicious actors. The discussion opens with Raj's perspective on how the cybersecurity community has been addressing ransomware threats, suggesting a need to refocus our attention on the capabilities and strategies of ransomware groups rather than the sheer number of attacks. He highlights recent campaigns, such as MOVEit and SysAid, to illustrate how ransomware actors are moving beyond traditional methods like exploiting the Remote Desktop Protocol (RDP) to leveraging zero-day vulnerabilities. Raj explains how the dark web facilitates a marketplace for skills, allowing individuals with minimal expertise to launch sophisticated ransomware attacks. This shift emphasizes the importance of understanding and mitigating the threat landscape's dynamic nature. Listeners will gain insight into the implications of these trends for cybersecurity strategies and the measures organizations can take to protect against these evolving threats. Raj also shares his journey in cybersecurity, acknowledging the support and mentorship that have been pivotal in his career. As the episode concludes, Neil and Raj discuss where listeners can connect with them online to continue the conversation and learn more about combating ransomware effectively. This episode is not just an exploration of the technicalities of ransomware but a call to action for the cybersecurity community to rethink our approach to one of the most pressing challenges of our time.
We feature a panel discussion from the AWS for Software Companies Executive Forum at re:Invent, featuring software leaders from Appen, Coinbase, Rapid7 and AWS sharing strategies and best practices to optimize their businesses to free up budgets and enable further software innovations. Panelists:Bobby Smith, Vice President of IT and Engineering, AppenSumanth Sukumar, Vice President Engineering, CoinbaseElaine Hardwick, Director of Engineering, Rapid7Sree Ratnasinghe, Director, NAMER Tech, Amazon Web ServicesTopics Include:Potential future market and impact of driving optimizationHow optimization drove innovationUsing optimization to free up budget & time for growth programsOptimization becomes part of the organizational cultureLessons learned through optimizationRunning internal competitions to drive innovation and modernizationAWS' “Experience Based Accelerator” 3 day hackathon-style optimization programLeveraging AWS to help optimize to invest in generative AIInvestment returns in Bedrock and Code WhispererEnsuring team alignment for optimization focusMaking roadmap trade-offs – features v optimizationFinal thoughts, panel wrap up
Seek the stress. Scale with soul. Embrace your uniqueness. These are just a few of the pearls of wisdom flying fast and furious when Christina Luconi, Chief People Officer at Rapid7, visits with Host Chris Schembra on this episode of Gratitude Through Hard Times. Her self-awareness, strength and positive vision have not only been central to building out staff for some amazing startup companies (from inception through IPO). These are also the traits that have defined her full and fascinating life – whether taking her teen-aged daughters on a transformational trip to Tanzania or snatching life-giving lessons from a life-changing cancer diagnosis. This is a woman who brings her whole, authentic self to every interaction and in the process offers connection and empathy to others. You'll learn about how Christina expresses gratitude and the powerful benefits it confers, rippling out in how she frames “negative autobiographical experiences.” Where did she find the courage to reinvent herself at the age of 14 without erasing who she was before? When did she realize that she held within her the ability to embrace things in tension and turn them into opportunity? Christina shares her journey and explains how she has been able to bridge her reality as the lone woman in many C-suites by staying true to her core values: “If you work hard enough, there aren't a lot of boundaries you can't overcome. IF you're committed and drive towards that!” Tune in to find out why this Bostonian dynamo hopped in her car to pay Chris a visit. It's a very special episode chalk full of “news you can use” and that you won't want to miss!Interested in hearing more from Christina? She offers a treasure trove of interesting perspectives in more than 200 LinkedIn posts you can find at this link.Check out this brand new website to learn about the keynote topics and workplace leadership trends that are top of mind for Chris these days! And if you're interested in having a 7:47 Virtual Gratitude Experience or subscribing to our newsletter, please visit this link.Click hereto hear more fascinating conversations with Fortune 500 CEOs, professional athletes and entertainerswho have shared their human stories on Gratitude Through Hard Times. KEY TOPICS:If you could give credit or thanks to one person in your life that you don't give enough credit or thanks to – that you've never thought to thank – who would that be and why? Although she's always been very intentional about sharing her appreciation, she still feels she couldn't possibly have thanked her parents – whom she so admires – enough.Using the Right Words: About the power of expressing gratitude in language that resonates with the recipient.Breaking Rules: How Christina reinvented herself at the age of 14, figuring out how to expand her world and thinking in ways that have served her well ever since. Three Options for Managing Through a “Negative Autobiographical Experience”:Ignore it, pretend it didn't happen and just move on.Talk it out with a therapist or by journaling and then move on.Specifically assign positive benefits that have occurred as a result and give thanks to it for becoming a beneficial part of your life story, a practice known as "grateful processing."Why Not Me? What Christina has come to understand about our ability to challenge our self-imposed limitations through humility, determination and drive.Breaking the Ceiling: How Christina figured out ways to leverage being the only woman in the room to break boundaries and elicit vulnerability in C-suites full of male entrepreneurs. A superpower!Buck the Statistics: Why it's important not to get trapped by what is and surrender to a victim mentality rather than pushing the envelope and making change!Leading With Empathy: About the importance of understanding other people's experiences and perspectives when navigating corporate culture and decision-making.Be the Change: When living with unresolved conflict impacts others with forms of entitlement and hearts at war.How Trauma Lands: Why every person's threshold is different.Scaling With Soul: How to stay authentic under even the most stressful circumstances, like taking Rapid7 from being a startup with 75 employees to a publicly traded company with more than 2,000 global personnel.Christina's World View: About the role of challenge and seeking while also keeping balance through life experiences that promote openness and awareness.Observing Versus Engaging; Empathy Versus Sympathy: It's all in the perspective!Hope & Healing: How an attitude of gratitude – not found in comparison – yields very real mental, emotional and physical rewards. 365 Days: About Christina's decision to write – and post publicly – her thoughts and experiences by pretending no one was reading them! It was about seeking connection with others and by putting herself out there, she did exactly that.When In Rome: How pasta and all its associations creates magic for Chris and Christina!Three Things From the Conversation:The power of Mudita, the dharmic concept of joy that comes from delighting in other people's well-being (as Christina experienced in her chemo encounter).Christina lives life in a dialectic posture, embracing black and white as well as the gray. She is able to hold things in tension.While she's open to therapy, what Christina finds most helpful and healing is candid conversations like this one with Chris!Timing Is Everything: How, when and why Chris and Christina connected.Honor the Moose: About the concept of aligning individual and team collaboration as part of the core corporate ethic at Rapid7.The 3C Model of Collaborative Leadership: Connect, Collaborate and Champion.In Parting: What it was that inspired Christina to get in her car and drive 3.5 hours from Boston to NYC in order to connect and share meaningful conversation with Chris!Closing the Gratitude Loop: Christina's message for her parents and daughters. QUOTABLE“Life is about connections … For me what has made the work that I've done or my life interesting is the connections I've made with people. It makes my world expand.” (Christina) “There's something beautiful about (not) turning your back on the past but looking for the positive benefits in it and keeping it as part of your life story.” (Chris) “Everything I have lived through is an opportunity. There are things that I've screwed up or am not proud of, but I don't dwell on them. I look at what I can take away from that moment and do better.” (Christina) “If you work hard enough, there aren't a lot of boundaries you can't overcome. IF you're committed and drive towards that!” (Christina) “Life is not about avoiding bad things happening to you. Life is about avoiding a negative mental attitude when those things occur.” (Chris) “Scaling with soul is about how you keep the essence of your value set and what you're trying to be … You can still be a really great place!” (Christina) “You can observe or you can engage. And those are two really different things.” (Christina) “There's good in everybody. You just have to be open to finding it and open-hearted to know that just because someone is different from you doesn't make them better or worse. We're all just humans.” (Christina) “Hard times don't have to create loneliness. Hard times can create meaningful moments of connection.” (Chris) “All the best things in my life have happened when I've said ‘yes,' versus ‘no.' ” (Christina) LINKS/FURTHER RESOURCES:Click here to learn more about “Taking Care of Business? Grateful Processing of Unpleasant Memories,” the study conducted by researchers at Eastern Washington University."The Anatomy of Peace: Resolving the Heart of Conflict," by The Arbinger Institute.More about the many benefits of an attitude of gratitude available at this link."No One Wins Alone," by Mark “the Moose” Messier. ABOUT OUR GUEST:Christina Luconi leads Rapid7's strategic people initiatives as its Chief People Officer. She is responsible for the entire employee lifecycle, with critical focus on recruiting stellar talent, building and inspiring corporate culture, acquisition integration, and “scaling with soul.” Prior to joining Rapid7, Christina was the owner of People Innovations, an independent consulting firm focused on the creation of innovative people strategies for startups and high-growth companies, primarily in the high technology industry. Christina also served as Chief People Officer at @stake, a professional services security firm that she helped build from the launch through its acquisition by Symantec. She also played the role of Vice President of People Strategy at Sapient Corporation. Joining the company prior to its public offering, she was responsible for building the people-focused side of the company from the ground up, aligning business strategy with people needs. Christina also played a critical role as a member of the senior management team, focusing on the strategic and operational direction of the company as well as executing acquisitions, from due diligence through integration. FOLLOW OUR GUEST:WEBSITE | LINKEDIN ABOUT OUR HOST:Chris Schembra is a philosopher, question asker and facilitator. He's a columnist at Rolling Stone magazine, USA Today calls him their "Gratitude Guru" and he's spent the last six years traveling around the world helping people connect in meaningful ways. As the offshoot of his #1 Wall Street Journal bestselling book, "Gratitude Through Hard Times: Finding Positive Benefits Through Our Darkest Hours,"he uses this podcast to blend ancient stoic philosophy and modern-day science to teach how the principles of gratitude can be used to help people get through their hard times. FOLLOW CHRIS:WEBSITE | INSTAGRAM | LINKEDIN| BOOKS