POPULARITY
How does a sales leader drive consistent growth and navigate through the challenges of the ever-changing tech industry, including mergers and acquisitions? Join us as Brendan Conley , Chief Revenue Officer of AppOmni, shares his invaluable insights gained from a glittering 25+ year career into sales strategies, adapting to market dynamics, and successfully navigating the complexities of mergers and acquisitions in the tech world. Get ready to learn from the best and take your sales career to new heights. KEY TAKEAWAYS FROM THIS WEEK'S EPISODE Understand the unique traits of successful startup individuals and their ability to thrive in challenging environments without extensive support. Identify your ideal customer profiles and allocate resources strategically to maximize impact. Manage sales pipelines effectively, acknowledging the unpredictable nature of closing deals, and remain patient and persistent. Embrace visionary leadership and strategic acquisitions to build a strong platform in the market. Prioritize culture fit, likability, and back channel references when hiring, while demonstrating passion for the industry and a service mindset. THIS WEEK'S GUEST - BRANDON CONLEY Introducing Brandon Conley, a dynamic sales leader with an incredible career spanning over 25 years, driving growth in early stage and multinational technology businesses. Notably, he spent seven years with Aventail, which was later acquired by SonicWall, followed by five years there, until he moved on to Zenprise, acquired by Citrix, where he led the Mobility sales teams across the Americas. Brendan then made significant contributions to Netskope and Redlock, both subsequently acquired by Palo Alto Networks, where he successfully ran their global Cloud Security sales team, phenomenally scaling annual sales from $2M to $100M. As the Chief Revenue Officer of AppOmni since 2020, Brandon continues to lead with vision and passion, steering the company at the forefront of SaaS Security Management software providers. With an unwavering commitment to driving innovation and a proven history of empowering businesses,he remains an influential figure in the cybersecurity industry, inspiring growth and success at every turn. Connect with Brandon on LinkedIn, and learn more about AppOmni here. YOUR HOST Simon Lader is the host of The Conference Room, Co-Founder of global executive search firm Salisi Human Capital, and podcast growth consultancy Viva Podcasts. Since 1997, Simon has helped cybersecurity vendors to build highly effective teams, and since 2022 he has helped people make money from podcasting. Get to know more about Simon at: Website: https://simonlader.com/ Make Money from Podcasting: https://www.vivapodcasts.com/podcastpowerups Twitter: https://twitter.com/simonlader LinkedIn: https://www.linkedin.com/in/headhuntersimonlader The Conference Room is available on Spotify Apple Podcasts Amazon Music iHeartRadio And everywhere else you listen to podcasts!
Episode SummaryOn this episode, the Co-Founder and CEO of Endor Labs, Varun Badhwar, joins Matt to talk about software supply chain security. Varun has a proven track record of building and leading enterprise security companies across Product Strategy, Marketing, Technical Sales, and Customer Success functions. He serves as a Member of the Forbes Technology Council, a Board Member of Cowbell, a Board Advisor of ArmorCode, and the former Founder and CEO of RedLock.Today, Varun talks about open source risks, how to identify and mitigate risks, and how to incentivize the use of security tools. Where can organizations start? Hear about SBOMs, security in the Cloud, and software security best practices. Timestamp Segments· [01:42] A bit about Varun.· [04:48] Identifying and mitigating risk.· [10:32] Where should organizations start?· [14:42] The SBOM.· [19:51] Industry standards and best practices.· [22:26] Cloud security.· [25:50] Endor Labs.· [29:52] Incentivizing using security tools. Notable Quotes· “Select, secure, maintain, comply.”· “The first thing that drives a lot of security shifts is compliance.” Relevant LinksWebsite: www.endorlabs.comLinkedIn: Varun BadhwarSecure applications from code to cloud. Prisma Cloud secures applications from code to cloud enabling security and DevOps teams.Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.
Varun Badhwar is the CEO of Endor Labs, his third startup. He previously founded CipherCloud and RedLock, which were acquired by Lookout and Palo Alto Networks respectively.After the SolarWinds attack, Varun recognized the vulnerability of open-source software and set out to find a solution. He founded Endor Labs to help developers understand the risks of using open-source software, enabling them to make informed decisions. In this episode, you will learn the following:1. Why Varun sets expectations of his new hire sales team to become certified on both the demo and also the pitch within 2 weeks 2. Varun's brilliant reframing of the SBOM (software bill of materials) concept3. The importance of building a brand and creating content to engage audiencesResources:Varun BadhwarEndor Labs Sponsor:This episode was brought to you by IT-Harvest. With over 3,200 vendors in cybersecurity, it is hard to keep track of all the latest developments as well as researching and analyzing categories and subcategories…that's where the IT-Harvest cybersecurity platform comes in. IT-Harvest is the first and only research platform dedicated to cybersecurity. And it's run by Richard Stiennon who has done it all in cybersecurity. Find out more by going to salesbluebird.com/research.Other episodes you'll enjoy:Top 8 reasons why great sales people leave5 steps to ramp new sellers when you have no enablement and no timeUnlocking Data Protection with Paul Lewis, CEO of CalamuAction:If you enjoyed this episode, please could you give a review by going to Salesbluebird.com/R. It would mean a lot to me personally, and it would help grow the podcast.Connect with me: YouTube: https://www.youtube.com/@salesbluebirdTwitter: https://www.twitter.com/unstoppable_doLinkedIn: https://www.linkedin.com/in/andrewmonaghanSupport the show
Welcome back to another episode of Puzzling Company! This week's episode covers Redlock from Redlocked! Redlock does something very interesting by combining elements of escape rooms with a puzzle box while introducing and having a short film narrative that you watch before you do the game! Make sure to listen in to hear what Jared and Zach had to say about Redlock! On the show, we had one of the creators on to discuss Redlock and the future of Redlocked! We hope you all enjoy the episode. If you would like to purchase/Check out a Redlock Game: https://www.redlockedpuzzles.com/products If you would like to support us: 1) Support us on Patreon! 2) Leave us a 5-Star Review! 3) Follow us on Social Media Learn more about your ad choices. Visit megaphone.fm/adchoices
Mark Fernandes is Managing Partner at Sierra Ventures, an early-stage VC firm that specializes in Enterprise & Emerging Tech Companies. Mark hit a homer in his first at-bat when his first-ever investment in Sourcefire paid off big time when it was acquired by Cisco for $2.7B in 2013. If you want to understand what separates a good entrepreneur from a great one and how the high stakes venture business works, you don't want to miss this episode.
This episode is sponsored by The Chief I/O, an online publication where you can read and share stories about cloud native, DevOps, Kubernetes, AIOps, and many other topics. You can subscribe to The Chief I/O newsletter to receive our best stories and the latest cloud native news and trends twice a week. Visit thechief.io/newsletter. It's a sunny May afternoon in a Barcelona KubeCon. Liz Rice is on the stage discussing penetration testing in Kubernetes. She says that one of the reasons why you might want to do penetration testing is stories such as this. In 2018, Tesla left their Kubernetes Dashboard open to the internet. The Dashboard has cluster-admin privileges. They were hacked, and the end result was their system was used to run cryptocurrency mining malware. "The hackers had infiltrated Tesla's Kubernetes console, which was not password-protected," RedLock researchers wrote. "Within one Kubernetes pod, access credentials were exposed to Tesla's AWS environment, which contained an Amazon S3 (Amazon Simple Storage Service) bucket that had sensitive data such as telemetry." It was a big headline and one that prompted the larger Kubernetes industry to focus more on security. But why? How did one of the biggest tech companies in Silicon Valley got hacked? Is it simply a human issue? Or is there more to Security in Kubernetes? I'm your host Kassandra Russel, and today we are going to talk about Security in Kubernetes. We will examine the differences between securing a traditional environment and a container-based environment. Next, we will discuss industry standards and emerging thought patterns around security. And finally, we will go through some of the best security practices and general security advice for production workloads in Kubernetes. Before diving into all of this, we've been busy during the last weeks working on a new project. If you like this podcast, you will certainly like the new project, it's a surprise, we are going to talk more about it in the future. In the meantime, you can subscribe to the podcast announcement list, we will announce it soon. Back to the subject at hand, remember the two generals' problem from one of our previous episodes? It's a classic thought experiment exposing an unsolvable problem and demonstrating the design challenges of distributed systems and the pitfall of reaching consensus over a lossy network. If you are interested in knowing more about this, we recommend you listen to our 5th episode “The Ubiquity of Kubernetes”. --- Send in a voice message: https://anchor.fm/thedevopsfauncast/message Support this podcast: https://anchor.fm/thedevopsfauncast/support
Hello everyone, Welcome to "The Prodcast" where we share insights from the industry leaders on how to build great tech products and companies. In today’s show, we have Varun Badhwar, founder and CEO of Redlock, a cyber security startup that recently had a successful exit. Varun has had a long history in cyber security in building companies from the ground up. He’s currently the SVP GM at Palo Alto Networks. If there was a 40 under 40 list in cyber security, Varun would be on it. If you’re an entrepreneur interested in learning about how to go from ground Zero to a successful Exit, you don't want to miss this episode. If you want to enjoy the episode by reading the transcript, it can be found at this link.
In this episode of the Virtual Coffee with Ashish edition, we spoke with Gaurav Kumar, co-founder of RedLock (now part of Palo Alto Prisma Cloud). Host: Ashish Rajan - Twitter @hashishrajan Guest: Gaurav Kumar - Linkedin In this episode, Gaurav & Ashish spoke about What was your path into CyberSecurity What does Cloud Security mean for you? If I am starting in Cloud today, do I need a CSPM? Do I need a CSPM if I am in multi-cloud with a small foot print? Story behind Gartner not recognising CSPM as a legit space? What are the current problem spaces that are being solved or not solved in Cloud Security? Is Security Observability, same as behaviour analysis? Is Security Observability, appear in cloud space and not just logging? What’s the example of Observability? Is CloudTrail and Insights an example of Observability? How important is logging everything vs relevant observation from logs? What do you think of CASB and that space? How do you find out what to protect the assets you have in cloud? Recommendation on getting over “alert fatigue” from CASB, CSPM? Do you see compliance at scale done really well? Apart from Cost Saving, & moving fast, is security another reason for why people should look at cloud? Are there are any good resources for Cloud Security training for staff? ShowNotes and Episode Transcript on www.cloudsecuritypodcast.tv Twitter - @kaizenteq @hashishrajan If you want to watch videos of this and previous episodes: - Twitch Channel: https://lnkd.in/gxhFrqw - Youtube Channel: https://lnkd.in/gUHqSai
https://soundcloud.com/jordi-van-deerse https://soundcloud.com/t_log https://www.facebook.com/RedlockDSI/ https://www.facebook.com/djtlog/ Tracklist: 1. Redlock - Drown 2. Mindfaker & KCMA - Get Back 3. KCMA & T-Plus - We Must Destroy Them 4. Technological Terror Crew - Swearcore 5. Technological Terror Crew - The Ripper (Remix) 6. Rottencore - Your Own Stuff 7. Rottencore - This Is Hardcore Cuz Got No Damn Vocals 8. The Liquidators - Keep It Quiet! 9. Speedfolter vs The Hitman - Gabba Is Alive! 10. Hellcreator - Fuck Em To Death! 11. Lenz - Suck My Balls 12. X2 - Android Behavior 2.0 13. 909 Junkies - I Ain't No Syko 14. Rottencore - Bad Day 15. Rottencore - Not On My Head 16. The Hitman - Drop One 17. The Speed Freak - Ebola 18. T-Log vs Immutek & Redlock - Back Together 19. Necronym - Blood Vengeance 20. Rottencore & Tantulum - Fatality 21. HCM - Like A Train 22. 909 Junkies - I'm Afraid
People, Culture and Customer Empathy – an Entrepreneur’s Journey In this episode of the podcast Varun Badhwar, SVP of Prisma Cloud at Palo Alto Networks, discusses growing a cloud security company and RedLock’s journey from startup to acquisition. At inception, a crowded market necessitated an innovative approach to sales and marketing which RedLock achieved by […]
You could say Chris Fago has had a pretty amazing 2018… among other things…Named one of InsideSales.com Top 10 Sales Development Leaders. 3rd sales hire at RedLock, which acquired by Palo Alto Networks for $173 Million in October ‘18Featured on Sales Secrets Podcast with Gabe Larsen, Make It Happen Podcast with John Barrows, Predictable Revenue Podcast, Hubspot Sales Blog and The Sales Development Podcast by Tenbound. Spoke at AA-ISP's Unite and Digital Sales World.And more… Listen in on how he came to be a Sales Development Rock Star, how he plans and executes his strategy, and what he’s cooking up in 2019 to make it even better. This is a can’t miss episode! Big thanks to @Darryl Praill of @VanillaSoft for making this podcast possible. Check out their new Sales Engagement solutions here... https://www.vanillasoft.com/solutions/business-function/sales-engagement-platform/Subscribe to the @tenbound YouTube channel to get updates on podcasts, webinars and messaging Break N’ Builds → https://www.youtube.com/channel/UCHBsZnSSZ92VnUPZQhgI4-w #SDR #BDR #salesdevelopmentrep #salesdevelopment #prospecting #coldcalling #salesloft #outreach #sales #tenbound #salesforce #salesappointment #revenue #salesops #salesdev19#marketingops #salesforce #tech #salestech #marketingtech #salestraining #brighttalk#salesenablement #discoverorg #leadgeneration #accountbasedmarketing #abm
@IanColdwater https://www.redteamsecure.com/ *new gig* So many different moving parts Plugins Code Hardware She’s working on speaking schedule for 2019 How would I use these at home? https://kubernetes.io/docs/setup/minikube/ Kubernetes - up and running https://www.amazon.com/Kubernetes-Running-Dive-Future-Infrastructure/dp/1491935677 General wikipedia article (with architecture diagram): https://en.wikipedia.org/wiki/Kubernetes https://twitter.com/alicegoldfuss - Alice Goldfuss Derbycon Talk: http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-10-perfect-storm-taking-the-helm-of-kubernetes-ian-coldwater Tesla mis-configured Kubes env: From the talk: https://arstechnica.com/information-technology/2018/02/tesla-cloud-resources-are-hacked-to-run-cryptocurrency-mining-malware/ Redlock report mentioned in Ars article: https://redlock.io/blog/cryptojacking-tesla Setup your own K8s environment: https://kubernetes.io/docs/setup/pick-right-solution/#local-machine-solutions (many options to choose from) Securing K8s implementations: https://kubernetes.io/docs/tasks/administer-cluster/securing-a-cluster/ https://github.com/aquasecurity/kube-hunter - Threat Model What R U protecting? Who R U protecting from? What R your Adversary’s capabilities? What R your capabilities? Defenders think in Lists Attackers think in Graphs What are some of the visible ports used in K8S? 44134/tcp - Helmtiller, weave, calico 10250/tcp - kubelet (kublet exploit) No authN, completely open 10255/tcp - kublet port (read-only) 4194/tcp - cAdvisor 2379/tcp - etcd Etcd holds all the configs Config storage Engineering workflow: Ephemeral - CVE for K8S subpath - https://kubernetes.io/blog/2018/04/04/fixing-subpath-volume-vulnerability/ Final points: Advice securing K8S is standard security advice Use Defense in Depth, and least Privilege Be aware of your attack surface Keep your threat model in mind David Cybuck (questions from Slack channel) My questions are: 1. Talk telemetry? What is the best first step for having my containers or kubernetes report information? (my overlords want metrics dashboards which lead to useful metrics). How do you threat model your containers? Has she ever or how would she begin to run a table-top exercise, a cross between a threat model and a disaster recovery walk through, for the container infrastructure? Mitre Att&ck framework, there is a spin off for mobile. Do we need one for Kube, swarm, or DC/OS?
Ian Coldwater- @IanColdwater https://www.redteamsecure.com/ *new gig* So many different moving parts Plugins Code Hardware She’s working on speaking schedule for 2019 How would I use these at home? https://kubernetes.io/docs/setup/minikube/ Kubernetes - up and running https://www.amazon.com/Kubernetes-Running-Dive-Future-Infrastructure/dp/1491935677 General wikipedia article (with architecture diagram): https://en.wikipedia.org/wiki/Kubernetes https://twitter.com/alicegoldfuss - Alice Goldfuss Derbycon Talk: http://www.irongeek.com/i.php?page=videos/derbycon8/track-3-10-perfect-storm-taking-the-helm-of-kubernetes-ian-coldwater Tesla mis-configured Kubes env: From the talk: https://arstechnica.com/information-technology/2018/02/tesla-cloud-resources-are-hacked-to-run-cryptocurrency-mining-malware/ Redlock report mentioned in Ars article: https://redlock.io/blog/cryptojacking-tesla Setup your own K8s environment: https://kubernetes.io/docs/setup/pick-right-solution/#local-machine-solutions (many options to choose from) Securing K8s implementations: https://kubernetes.io/docs/tasks/administer-cluster/securing-a-cluster/ https://github.com/aquasecurity/kube-hunter - Threat Model What R U protecting? Who R U protecting from? What R your Adversary’s capabilities? What R your capabilities? Defenders think in Lists Attackers think in Graphs What are some of the visible ports used in K8S? 44134/tcp - Helmtiller, weave, calico 10250/tcp - kubelet (kublet exploit) No authN, completely open 10255/tcp - kublet port (read-only) 4194/tcp - cAdvisor 2379/tcp - etcd Etcd holds all the configs Config storage Engineering workflow: Ephemeral - CVE for K8S subpath - https://kubernetes.io/blog/2018/04/04/fixing-subpath-volume-vulnerability/ Final points: Advice securing K8S is standard security advice Use Defense in Depth, and least Privilege Be aware of your attack surface Keep your threat model in mind David Cybuck (questions from Slack channel) My questions are: 1. Talk telemetry? What is the best first step for having my containers or kubernetes report information? (my overlords want metrics dashboards which lead to useful metrics). How do you threat model your containers? Has she ever or how would she begin to run a table-top exercise, a cross between a threat model and a disaster recovery walk through, for the container infrastructure? Mitre Att&ck framework, there is a spin off for mobile. Do we need one for Kube, swarm, or DC/OS? heck out our Store on Teepub! https://brakesec.com/store Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email bds.podcast@gmail.com #Brakesec Store!:https://www.teepublic.com/user/bdspodcast #Spotify: https://brakesec.com/spotifyBDS #RSS: https://brakesec.com/BrakesecRSS #Youtube Channel: http://www.youtube.com/c/BDSPodcast #iTunes Store Link: https://brakesec.com/BDSiTunes #Google Play Store: https://brakesec.com/BDS-GooglePlay Our main site: https://brakesec.com/bdswebsite #iHeartRadio App: https://brakesec.com/iHeartBrakesec #SoundCloud: https://brakesec.com/SoundcloudBrakesec Comments, Questions, Feedback: bds.podcast@gmail.com Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon https://brakesec.com/BDSPatreon #Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir #Player.FM : https://brakesec.com/BDS-PlayerFM #Stitcher Network: https://brakesec.com/BrakeSecStitcher #TuneIn Radio App: https://brakesec.com/TuneInBrakesec
Splunk unveils first IoT platform for customers, Palo Alto Networks acquires RedLock to build out Cloud Security Tech, KnowBe4 boosts security awareness training with Virtual Risk Officer, Symantec brings workload assurance security to the Cloud, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode110 Visit http://securityweekly.com/esw for all the latest episodes!
This week, in the Enterprise News, Paul is joined by Joff Thyer to discuss WhiteHat Security's single page application scanning, Palo Alto Networks acquires RedLock to build out Cloud Security, KnowBe4 boosts security awareness training, Symantec brings workload assurance security to the cloud, and Splunk unveils first IoT platform for Customers! In our final segment, we air a Pre Recorded interview from Microsoft Ignite with Secure Digital Life host Doug White and CTO of Microsoft, Mark Russinovich! Full Show Notes: https://wiki.securityweekly.com/ES_Episode110 Visit https://www.securityweekly.com/esw for all the latest episodes! Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter! →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
This week, in the Enterprise News, Paul is joined by Joff Thyer to discuss WhiteHat Security's single page application scanning, Palo Alto Networks acquires RedLock to build out Cloud Security, KnowBe4 boosts security awareness training, Symantec brings workload assurance security to the cloud, and Splunk unveils first IoT platform for Customers! In our final segment, we air a Pre Recorded interview from Microsoft Ignite with Secure Digital Life host Doug White and CTO of Microsoft, Mark Russinovich! Full Show Notes: https://wiki.securityweekly.com/ES_Episode110 Visit https://www.securityweekly.com/esw for all the latest episodes! Visit https://www.activecountermeasures/esw to sign up for a demo or buy our AI Hunter! →Follow us on Twitter: https://www.twitter.com/securityweekly →Like us on Facebook: https://www.facebook.com/secweekly
Splunk unveils first IoT platform for customers, Palo Alto Networks acquires RedLock to build out Cloud Security Tech, KnowBe4 boosts security awareness training with Virtual Risk Officer, Symantec brings workload assurance security to the Cloud, and more! Full Show Notes: https://wiki.securityweekly.com/ES_Episode110 Visit http://securityweekly.com/esw for all the latest episodes!
George Magnus, associate at the China Centre at Oxford University and former chief economist of UBS, on his new book, "Red Flags: Why Xi’s China is in Jeopardy."Matt Chiodi, Vice President and Chief Information Security Officer at RedLock, on a major U.S. telecom company discovering more manipulated hardware from China’s Super Micro Computer Inc. Molly Smith, corporate finance reporter for Bloomberg, on Tesla's bonds showing no signs of default anytime soon. Jim Paulsen, Chief Investment Strategist at Leuthold, discusses why concerns that the U.S. economy will overheat and inflation will accelerate is becoming “the prevailing attitude of Wall Street." Hosted by Pimm Fox and Lisa Abramowicz.
Matt Chiodi, Chief Information Security Officer at RedLock, on China's hack into U.S companies, and what companies should be doing. Edward Hertzman, Founder and President of Sourcing Journal, on the impact of tariffs on textiles and the supply chain, and how Amazon is changing the apparel landscape. Jeremy Keehn, Bloomberg editor, on China using a tiny chip in a hack that infiltrated US companies, including Apple and Amazon. Justin Gover, CEO of GW Pharmaceuticals, on their FDA-approved cannabis drug Epidiolex receiving the lowest drug restriction by the DEA, and what's next in the company pipeline.
On this edition of The Predictable Revenue Podcast, co-host Collin Stewart welcomes Christopher Fago, Cloud Security Specialist at RedLock, a fast-growing, you guessed it, cloud security company based in Menlo Park. In his burgeoning sales career, Christopher has held just about every sales role there is. But it's his precision at booking meetings that's caught our attention. Throughout the pod, Collin and Christopher discuss a critical aspect of every SDRs day-to-day: ensuring prospects show up to meetings. Highlights include: Chris' wide-ranging sales experience (4:17), some impressive sales stats (10:02), getting prospects to show up to meetings (17:30), Chris's cadence for booking meetings (25:12).
On this edition of The Predictable Revenue Podcast, co-host Collin Stewart welcomes Christopher Fago, Cloud Security Specialist at RedLock, a fast-growing, you guessed it, cloud security company based in Menlo Park. In his burgeoning sales career, Christopher has held just about every sales role there is. But it's his precision at booking meetings that's caught our attention. Throughout the pod, Collin and Christopher discuss a critical aspect of every SDRs day-to-day: ensuring prospects show up to meetings. Highlights include: Chris' wide-ranging sales experience (4:17), some impressive sales stats (10:02), getting prospects to show up to meetings (17:30), Chris's cadence for booking meetings (25:12).