Podcasts about security products

  • 60PODCASTS
  • 103EPISODES
  • 33mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jan 29, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about security products

Latest podcast episodes about security products

RSA Conference
Behind the Scenes of the Hackers and Threats Track

RSA Conference

Play Episode Listen Later Jan 29, 2025 26:52


Yes, winter is here, and some may find this time of year unbearable. But on the bright side, we're approaching RSAC 2025. And as we approach April, we're excited to bring together the Hackers & Threats track Program Committee Members. Tune into this podcast as they'll disclose behind-the-scenes insights, what they've seen in their tracks, which sessions stood out to them and why, and of course, what they're most excited about for RSAC 2025. Greg Day, VP & Global Field CISO, Cybereason Nicole Little, Security Products and Partnerships Manager, Netflix Tatyana Sanchez, Content & Program Coordinator, RSAC Kacy Zurkus, Director, Content, RSAC

The Artificial Intelligence Podcast
Cisco to Integrate Splunk Technology into Security Products

The Artificial Intelligence Podcast

Play Episode Listen Later May 6, 2024 4:19


Cisco has revealed its plans for integrating Splunk technology into its security products following the completion of their $28 billion acquisition of the analytics giant. The integration will focus on AI, security, network management, observability, and tool consolidation. One key integration is the addition of XDR capabilities from Cisco's XDR product into Splunk Enterprise Security (ES), allowing XDR alerts and detections to enhance customers' investigation and remediation efforts. Cisco also highlighted advancements in AI and machine learning across their products, launched an AI assistant for security analysts, and introduced new features for their zero-trust security product Cisco Duo. The integration marks a significant milestone in Cisco's efforts to enhance AI capabilities and provide comprehensive security solutions. --- Send in a voice message: https://podcasters.spotify.com/pod/show/tonyphoang/message

AVANT Technology Insights with Ken Presti
Greg Vander Gaast - Security Products Don't Work

AVANT Technology Insights with Ken Presti

Play Episode Listen Later Nov 15, 2023 30:42


In today's episode, Stephen Semmelroth, Sr. Director of Security at AVANT, is joined by Greg Vander Gaast, Chief Technologist of Security at CDW, to talk about security strategy. They explore some methods that some might consider blasphemous, while others think to be the real deal when it comes to building a security program. Plus, they guide listeners on how to prevent security problems before they even happen. Join them as they jump into the security strategy conversation!

The Cybersecurity Defenders Podcast
#60 - Building scalable security products quickly with the SecOps Cloud Platform

The Cybersecurity Defenders Podcast

Play Episode Listen Later Aug 29, 2023 25:01


A hosted panel discussion with industry leaders to explore the advantages of the SecOps Cloud Platform for product builders.The panel is moderated by LimaCharlie's Head of Product, Ross Haleliuk. The panel participants are:Founder & CTO of Recon InfoSec, Eric CapuanoLead Incident Detection Engineer at Blumira, Amanda BerlinWhat is the SecOps Cloud Platform?The SecOps Cloud Platform is a construct for delivering the core components needed to secure and monitor any given organization: things like, deploying endpoint capabilities through a single agent regardless of the technology, alerting and correlating from logs regardless of the source, automating analysis and response regardless of the environment.The SecOps Cloud Platform is:An environment where many solutions can exist, not as a collection of random tools, but as a series of cybersecurity solutions designed to interoperate in an un-opinionated way, from the ground up; where powerful systems can be put in place at incredible speeds.An environment fundamentally open through APIs, documentation, integrability, affordability; making it a neutral space for all cybersecurity professionals, whether they're in enterprise, services or vendors to build appropriate solutions.The SecOps Cloud Platform is not where data goes to die—it's a fabric, a sandbox ready for you to use, but also ready to disseminate data and insights to other systems as needed in cost-effective ways.The Cybersecurity Defenders Podcast: a show about cybersecurity and the people that defend the internet.

ITSPmagazine | Technology. Cybersecurity. Society
The Art of Building Security Products: Balancing Innovation and User-Friendly Design | A Conversation with Laurent Hausermann | Redefining CyberSecurity with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 26, 2023 50:33


Guest: Laurent Hausermann, EntrepreneurOn Linkedin | https://www.linkedin.com/in/laurenthausermann/On Twitter | https://twitter.com/lhausermannWebsite | https://cyberbuilders.substack.com/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Pentera | https://itspm.ag/penteri67a___________________________Episode NotesIn this episode of Redefining CyberSecurity Podcast, host Sean Martin and guest Laurent Hausermann discuss the process of building security products. They emphasize the importance of understanding customer needs and pain points before developing a product. Laurent shares his experience in the IoT security space and the significance of gathering feedback from potential customers. The conversation highlights the role of a product manager in championing the value and experience of a product, without overselling it to security practitioners. They discuss the challenges of marketing security products and the need for realistic expectations.The discussion explores the user experience of security products, from installation to operational ease. They discuss the importance of a well-defined product development process and the role of the product manager in bridging user experience, technology, and business. They touch on the evolving nature of product management in a world where almost everything is built using a SaaS model. They also discuss the concept of time to value, emphasizing the need for quick delivery of value to users. They also address the role of product marketing in promoting the product and supporting sales, including the creation of collateral such as sales decks, briefs and papers, user testimonials, and webinars.The conversation concludes by discussing the organizational structures and responsibilities for product management and product marketing. Sean and Laurent highlight the need for a clear understanding of the product manager's role and the distinction between product management and product marketing. They emphasize the importance of a collaborative product development process, where the product manager serves as a bridge between various aspects of the product.Overall, this episode provides valuable insights into the world of building security products, emphasizing the importance of considering customer needs, user experience, and marketing strategies. The conversation is informative and thought-provoking, offering practical advice and discussing the challenges faced by security product teams. The host, Sean Martin, and guest, Laurent Hausermann, bring their expertise and experiences to the discussion, making it engaging and relevant for listeners in the cybersecurity industry.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

Redefining CyberSecurity
The Art of Building Security Products: Balancing Innovation and User-Friendly Design | A Conversation with Laurent Hausermann | Redefining CyberSecurity with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Jul 26, 2023 50:33


Guest: Laurent Hausermann, EntrepreneurOn Linkedin | https://www.linkedin.com/in/laurenthausermann/On Twitter | https://twitter.com/lhausermannWebsite | https://cyberbuilders.substack.com/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Pentera | https://itspm.ag/penteri67a___________________________Episode NotesIn this episode of Redefining CyberSecurity Podcast, host Sean Martin and guest Laurent Hausermann discuss the process of building security products. They emphasize the importance of understanding customer needs and pain points before developing a product. Laurent shares his experience in the IoT security space and the significance of gathering feedback from potential customers. The conversation highlights the role of a product manager in championing the value and experience of a product, without overselling it to security practitioners. They discuss the challenges of marketing security products and the need for realistic expectations.The discussion explores the user experience of security products, from installation to operational ease. They discuss the importance of a well-defined product development process and the role of the product manager in bridging user experience, technology, and business. They touch on the evolving nature of product management in a world where almost everything is built using a SaaS model. They also discuss the concept of time to value, emphasizing the need for quick delivery of value to users. They also address the role of product marketing in promoting the product and supporting sales, including the creation of collateral such as sales decks, briefs and papers, user testimonials, and webinars.The conversation concludes by discussing the organizational structures and responsibilities for product management and product marketing. Sean and Laurent highlight the need for a clear understanding of the product manager's role and the distinction between product management and product marketing. They emphasize the importance of a collaborative product development process, where the product manager serves as a bridge between various aspects of the product.Overall, this episode provides valuable insights into the world of building security products, emphasizing the importance of considering customer needs, user experience, and marketing strategies. The conversation is informative and thought-provoking, offering practical advice and discussing the challenges faced by security product teams. The host, Sean Martin, and guest, Laurent Hausermann, bring their expertise and experiences to the discussion, making it engaging and relevant for listeners in the cybersecurity industry.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:

The Tech Blog Writer Podcast
2444: Unpacking the Kaseya 2023 MSP Benchmark Report

The Tech Blog Writer Podcast

Play Episode Listen Later Jul 15, 2023 42:21


Mike Puglia, Chief Strategy Officer and General Manager of Security Products at Kaseya, joins me on Tech Talks Daily.  Mike sheds light on the much-anticipated Kaseya 2023 MSP Benchmark Report, an insightful resource that dives deep into the trends, challenges, and priorities of over 1,000 managed services providers (MSPs) worldwide. Our discussion centers around the critical themes of automation, cybersecurity, and integration. Mike expounds on how 90% of the respondents view automation as a game-changing technology for their businesses, enhancing efficiency and revenue generation by streamlining processes such as endpoint management, monitoring, and cybersecurity. We delve into the growing significance of cybersecurity, a realm that has seen a 15% surge as the top IT challenge from the previous year. With a clear majority of MSPs regularly advising their clients on cybersecurity, Mike explains how this trend has also fuelled the growth of managed detection and response solutions. Tackling the issue of software integration, we explore how poor integration continues to hamper productivity and daily operations. Mike elucidates how the ability to integrate core applications can reduce duplication of efforts, automate repetitive tasks, and ultimately improve work-life balance for executives and technicians. We address the various challenges that MSPs anticipate, such as intensifying competition and escalating security threats. From co-managed IT services to M&A strategies, we delve into different tactics to overcome these hurdles and ensure business growth. Join us to uncover key insights about MSP operations, understand how break-fix activities impact revenue streams, and explore the strategic potential of co-managed IT services. This episode is a must-listen for anyone keen on the future trajectory of the MSP sector and the burgeoning role of cybersecurity within it.

Sportsman of Colorado Radio Show
June 17, 2020: Tuffy Security Products & Pybus Point Lodge Alaska

Sportsman of Colorado Radio Show

Play Episode Listen Later Jun 20, 2023 53:40


Today's Guests: Jason Larson, Sales Manager for Tuffy Security Products joins us to talk about the top-quality security products designed to safeguard your valuables wherever you are. Whether you need to secure firearms, electronics, or other precious items, Tuffy products provide maximum protection and peace of mind. Visit www.TuffyProducts.com today to explore their wide range... READ MORE

The Car Doctor Podcast
In vehicle secure storage with Jason Larson of Tuffy Security Products https://tuffyproducts.com/

The Car Doctor Podcast

Play Episode Listen Later Jun 5, 2023 57:18


In this episode we talk with the sales manager of Tuffy Security Products. Tuffy provides customized locked storage for a variety of vehicles. In addition to the customized locked storage, Tuffy has lock boxes in just about every shape and size. Then we answer some of this weeks email as well as the Car Doctor's battery dilemma. Car Questions, email me for a personal response. jpaul@aaanortheast.com or go to aaa.com/cardoctor  

John Paul - Car Doctor Radio Podcast
In vehicle secure storage with Jason Larson of Tuffy Security Products https://tuffyproducts.com/

John Paul - Car Doctor Radio Podcast

Play Episode Listen Later Jun 5, 2023 57:18


In this episode we talk with the sales manager of Tuffy Security Products. Tuffy provides customized locked storage for a variety of vehicles. In addition to the customized locked storage, Tuffy has lock boxes in just about every shape and size. Then we answer some of this weeks email as well as the Car Doctor's battery dilemma. Car Questions, email me for a personal response. jpaul@aaanortheast.com or go to aaa.com/cardoctor

Connecting IT Podcast
Fast Track Cyber Insurance for MSPs & Their Customers

Connecting IT Podcast

Play Episode Listen Later Jun 1, 2023 27:18


There's been a lot of buzz surrounding cyber insurance as of late, and it's only becoming even more of a hot topic. In this episode, we speak with Kristen Bay, CEO and Co-Founder of Cysurance, and Mike Puglia, General Manager of Security Products at Kaseya, about the latest news MSPs need to know about getting their customers and themselves cyber insurance coverage with Kaseya's new Cyber Insurance Fast Track Program. 

Automation Unplugged Podcast
Automation Unplugged Episode #244 feat. Ryan Davis, President of Ratio Inc.

Automation Unplugged Podcast

Play Episode Listen Later May 30, 2023 65:02


During our time together, we discussed:Company culture and the importance of putting the right people in the right positions.The role of  branding and marketing to differentiate your businessThe outlook for the smart technology industry in the current economic climate.To get transcripts, resources of what was mentioned in the show, and more visit: onefirefly.com/au244SHOW NOTESIn 2002, Ryan founded Ratio Inc while studying at the University of Utah, where he earned his Bachelor's degree in Mechanical Engineering in 2005.Since then, the Ratio team has grown to a dozen people and countless great customers and vendors. Ratio Inc caters to luxury clientele in Utah's mountain communities and the Wasatch Front and specializes in low voltage systems, including Audio/Video, Lighting Controls, Motorized Shading, and Security Products. When Ryan isn't messing with AV systems (at work or for fun), he might be found crew-chiefing for his off-road race team, fantasizing about snowcats, or playing bad covers in his power duo "Real Topeka".Be sure to check out Ryan's first appearance on Automation Unplugged back on show #162 recorded March 24th, 2021.About One FireflyOne Firefly, LLC is an award-winning marketing agency that caters to technology professionals in the custom integration, security and solar energy markets. One Firefly is headquartered in Davie, Florida with staff located throughout North America and has been operating since 2007.

Cloud Security Podcast by Google
EP120 Building Secure Cloud and Building Security Products: Finding the Balance

Cloud Security Podcast by Google

Play Episode Listen Later May 8, 2023 26:00


Guest: Jeff Reed, VP of Product,  Cloud Security @ Google Cloud Topics: You've had a long career in software and security, what brought you to Google Cloud Security for this role? How do you balance the needs of huge global financials that often ask for esoteric controls (say EKM with KAJ) vs the needs of SMBs that want easy yet effective, invisibility security? We've got an interesting split within our security business: some of our focus is on making Google Cloud more secure, while some of our focus is on selling security products.  How are you thinking about the strategy and allocation between these functions for business growth? What aspects of Cloud security have you seen cloud customers struggle with the most? What's been the most surprising or unexpected security challenge you've seen with our users? “Google named a Leader in Forrester Wave™ IaaS Platform Native Security” - can you share a little bit about how this came to be and what was involved in this? Is cloud migration a risk reduction move?  Resources: “Google named a Leader in Forrester Wave™ IaaS Platform Native Security” “Sunil Potti on Building Cloud Security at Google” (ep102) Books by Haruki Murakami We are hiring product managers!

Secure Ventures with Kyle McNulty
Datatribe: John Funge on Building Successful Security Products

Secure Ventures with Kyle McNulty

Play Episode Listen Later Feb 7, 2023 31:22


John: Managing director at Datatribe, focusing on applying his success to help build great products Three exits from companies he founded! Check out the episode for our discussion on the Datatribe model and why it was compelling to him as an accomplished founder, as well as some of his top lessons for building successful cybersecurity products. https://datatribe.com/

Cybercrime Magazine Podcast
Mastering Cyber. Using Security Products. Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.

Cybercrime Magazine Podcast

Play Episode Listen Later Sep 28, 2022 1:34


Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard. https://mastercard.us/en-us.html

Paul's Security Weekly TV
Authz Bypass in Oracle Cloud, Chrome Prototype Pollution, Why Security Products Fail - ASW #213

Paul's Security Weekly TV

Play Episode Listen Later Sep 28, 2022 40:17


Wiz reveals authorization bypass in Oracle Cloud, Python 15-year old path traversal flaw, Prototype Pollution in Chrome, PS4 flaw reappears in PS5, Why security products fail Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw213

Emily Chang’s Tech Briefing
New Amazon security products include fewer false alarms and your own robot

Emily Chang’s Tech Briefing

Play Episode Listen Later Sep 28, 2022 3:17


Amazon showed off its newest line of home security products at its annual device showcase this morning. For more, KCBS news anchor Holly Quan spoke with Bloomberg tech reporter Mark Gurman.

Application Security Weekly (Video)
Authz Bypass in Oracle Cloud, Chrome Prototype Pollution, Why Security Products Fail - ASW #213

Application Security Weekly (Video)

Play Episode Listen Later Sep 27, 2022 40:17


Wiz reveals authorization bypass in Oracle Cloud, Python 15-year old path traversal flaw, Prototype Pollution in Chrome, PS4 flaw reappears in PS5, Why security products fail Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw213

Telecom Reseller
Acronis is on target and has added many security products next to their backup capabilities in their quiver of solutions, Podcast

Telecom Reseller

Play Episode Listen Later Jul 18, 2022 9:13


While Acronis takes care of many large Enterprise organizations, they are focused on the SMB segment of the channel. Most SMB organizations do not have the expertise or the bandwidth to handle cybersecurity threats that exists in the world today. Thinking that they are too small to be a target is just inviting the ransom-note to be written sooner. Candid Wüest Candid Wüest, VP of Cyber Protection Research at Acronis speaks to Don Witt of the Channel Daily News, a TR publication, about the channel and the SMB security threats. Their Acronis Cyber Protect Cloud is one the solutions that fits well into the SMB segment and has three pillars for the security including: Data protection Security end point protection Inventory of Software & devices along with a vulnerability assessment Listen in as Candid also talks about their Cyber Protection Weekly Report and their priorities for 2022. About: At Acronis, they believe the data, applications, systems and productivity of every organization should be protected against loss, theft, and downtime – whether it's caused by cyberattacks, hardware failure, natural disaster, or human error. From MSPs supporting clients to enterprises serving global users to organizations handling sensitive data, they lower risks, improve productivity, and ensure your organization is #CyberFit. Driven by their passion to protect every workload, they've created the only all-in-one cyber protection solution for environments of any size – and solved the safety, accessibility, privacy, authenticity, and security (SAPAS) challenges of the modern world. For more information, go to: https://www.acronis.com/

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
ISC StormCast for Wednesday, June 22nd, 2022

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jun 22, 2022 6:16 Very Popular


Experimental New Domain / Domain Age API https://isc.sans.edu/forums/diary/Experimental+New+Domain+Domain+Age+API/28770/ Forescout Vedere Labs Discovers 56 OT Vulnerabilities https://www.forescout.com/resources/ot-icefall-report/ Cloudflare Outage https://blog.cloudflare.com/cloudflare-outage-on-june-21-2022/ Does Acrobat Reader Unload Injection of Security Products https://blog.minerva-labs.com/does-acrobat-reader-unload-injection-of-security-products 7-Zip Mark-of-the-Web Support https://www.7-zip.org/history.txt

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Experimental New Domain / Domain Age API https://isc.sans.edu/forums/diary/Experimental+New+Domain+Domain+Age+API/28770/ Forescout Vedere Labs Discovers 56 OT Vulnerabilities https://www.forescout.com/resources/ot-icefall-report/ Cloudflare Outage https://blog.cloudflare.com/cloudflare-outage-on-june-21-2022/ Does Acrobat Reader Unload Injection of Security Products https://blog.minerva-labs.com/does-acrobat-reader-unload-injection-of-security-products 7-Zip Mark-of-the-Web Support https://www.7-zip.org/history.txt

CSO Perspectives (public)
How to buy security products.

CSO Perspectives (public)

Play Episode Listen Later Jun 20, 2022 23:00


Rick Howard, the Cyberwire's CSO and Chief Analyst, is joined by Hash Table members Helen Patton, CISO for Duo Security's Advisory, and Nikk Gilbert, CISO for the Cherokee Nation Businesses, to discuss how to buy security products.

Cybercrime Magazine Podcast
CISO Minute. Using Russian Technology & Security Products. Theresa Payton, Former White House CIO.

Cybercrime Magazine Podcast

Play Episode Listen Later May 30, 2022 2:43


Cybercrime Magazine CISO Minute host Theresa Payton, Former White House CIO, discusses whether CISOs should continue using Russian technology and security products, as well as giving some tips on how to properly evaluate your company's relationship to these products, and more. The CISO Minute is sponsored by https://knowbe4.com/ • For more on cybersecurity, visit us at https://cybersecurityventures.com/

Security Voices
Designing Category Smashing Businesses with Oliver Friedrichs (Phantom, Pangea)

Security Voices

Play Episode Listen Later Apr 26, 2022 72:39


For the second episode in a row, we've caught a seasoned entrepreneur at that perfect moment when they've started a new company but still have time for a conversation before their new adventure kicks into high gear. Oliver Friedrichs, founder of several security companies including Immunenet and Phantom, joins us to talk product strategy as he embarks on a new journey to disrupt the security industry once again with his new venture Pangea.The most critical, first question for any young company is “what are we making”? And equally important is the follow-on question of what category does the offering fit into or how should people think about it? Is it a better version of something that exists? A new type of something that's meaningfully different? Or is it an entirely new category of product they've never seen before?Oliver and Dave discuss examples of each type of strategy from their own experience and the industry in general. The “better mousetrap” approach is covered with examples from antivirus and more recently cloud security posture management. We discuss when it is a good time to “next gen” a category to revitalize it and return it to growth. Examples here include Palo Alto Networks firewall and Vulnerability Management (from its early days as vulnerability assessment). Oliver and Dave call out the fatal mistake so many market incumbents make that result in them missing out on a refresh cycle.Creating new categories dominates our conversation and we explore Oliver's case study of Phantom in depth. We start by explaining the core principles of a new category and lay bare some indicators that a product group hasn't yet made the leap to a full blown category. Oliver then shares the spark of idea that led him to found Phantom as the first SOAR followed by how he built the boundaries for their product and ultimately the companies that followed their lead as the first mover. While most of our time is spent discussing what worked and didn't from a product perspective, Oliver also shares his go-to-market playbook, including what he will avoid this time around and what he intends to do again with Pangea.We wrap up with a quick look at the future of SOAR and Oliver shares an early peek at what he's building now at his new company. This episode is perfect for early cybersecurity companies looking for product advice, product professionals wrestling with category questions, or anyone who wants to listen in on a dialogue between 2 industry veterans geeking out on product. BioFriedrichs serves as Founder and CEO of Pangea. Prior to Pangea, Friedrichs served as Vice President, Security Products at Splunk, driving the vision and direction of Splunk's security portfolio. With a record in building four successful enterprise security companies over the past two decades, Friedrichs founded and served as CEO of Phantom (creators of the SOAR category, acquired by Splunk), founder and CEO of Immunet (early innovators in the cloud EDR category, acquired by Sourcefire/Cisco), co-founder of SecurityFocus (creators of Bugtraq and DeepSight, the world's first Internet early warning system, acquired by Symantec), and Secure Networks (one of the industry's first vulnerability management solutions, acquired by McAfee). Friedrichs also architected and developed a prototype of the first commercial penetration-testing product, SNIPER, acquired by Core Security Technologies in 2001 and further developed into CORE IMPACT. He attended the University of Manitoba and is the co-author of three security books and a recipient of 33 patents.

Risk Management Show
Correctly Implementing Security Programs with Branko Džakula

Risk Management Show

Play Episode Listen Later Mar 23, 2022 13:43


In this episode you will hear Branko's expertise and observations about how companies can implement security programs correctly and why they often face issues in this process, and what are somethings to be aware about. Branko Džakula is an Information Security Executive, Entrepreneur and Educator | Co-Founder of UN1QUELY. As an InfoSec Executive he supports companies in developing, maintaining and implementing a comprehensive Information Security Management System with most up-to-date best practices tailored to the needs and culture of the company in Incident Management, GRC, Data Privacy, Physical Security, Education&Awareness, Secure SDLC and Security Products development. If you want to be our guest, or you know some one who would be a great guest on our show, just send your email to info@globalriskconsult.com with a subject line “Global Risk Community Show” and give a brief explanation of what topic you would like to to talk about and we will be in touch with you asap.

Detection at Scale
EP 16 - Panther Labs's Joren McReynolds: Developing Security Products that Can Scale

Detection at Scale

Play Episode Listen Later Mar 8, 2022 41:31


What does it take to shape an early-stage security project into a product that solves real problems?  Understanding your customers is a key first step. Knowing the personas who can use your product and the leverage they can get out of it, it's what ultimately brings value to security teams and even other teams that can seize their benefits. We had a great conversation with Joren McReynolds who is the VP of Engineering, IT and Security at Panther Labs. In today's episode he shares the experiences and lessons over the course of his journey at Facebook, Airbnb, and how they shaped his knowledge on what building a great product takes. Topics discussed: - What led to the creation of osquery and why open source. - What the progression was to build that as an MVP. - Joren's approach to building the IR Team at Airbnb. - How different Airbnb's cloud-based environment was from Facebook's. - How Joren's past experience at Facebook influenced his work at Airbnb. - Joren's thought process around implementing security monitoring. - What inspired StreamAlert. - 3 pieces of actionable advice to security teams looking to excel in detection at scale.

Cloud Security Podcast
Building Google Cloud Security Products

Cloud Security Podcast

Play Episode Listen Later Mar 3, 2022 47:41


In this episode of the Virtual Coffee with Ashish edition, we spoke with Sunil Potti @sunilpotti VP/GM, Google Cloud Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Host Twitter: Ashish Rajan (@hashishrajan) Guest Linkedin: Sunil Potti @sunilpotti Podcast Twitter - @CloudSecPod @CloudSecureNews If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - Cloud Security News - Cloud Security Academy

MacVoices Audio
MacVoices #22042: MacVoices Live! - Chat App Security, Products We Want That Don't Exist (2)

MacVoices Audio

Play Episode Listen Later Mar 2, 2022 31:01


Our MacVoices Live! discussion with David Ginsburg, Guy Serle, Andrew Orr, Jim Rea, and Kelly Guimont continues as we did into the security of chat apps. Which one should you use, which ones should you avoid, and why you might not want to trust any of them with that really personal information. Then, we start to talk about products we want but that don't exist. Yet. (Part 2)  This edition of MacVoices is supported by Zocdoc. Find local doctors who take your insurance at Zocdoc.com/macvoices. Show Notes: Links: The best encrypted messaging apps in 2022 - Tom's Guide Guests: David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Kelly Guimont is a podcaster and friend of the Rebel Alliance. She appears on The Incomparable network as well as hosts I Want My M(CU) TV. You can also hear her on The Aftershow with Mike Rose, and she still has more to say which she saves for Twitter. Andrew Orr is a freelance writer and amateur photographer. He loves Apple products and enjoys writing and sharing all things tech. When he's not writing about Apple, you can often find him snapping photos with his iPhone. Read what he writes at The Mac Observer, and follow him on Twitter. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Guy Serle, best known for being one of the co-hosts of the MyMac Podcast, sincerely apologizes for anything he has done or caused to have happened while in possession of dangerous podcasting equipment. He should know better but being a blonde from Florida means he's probably incapable of understanding the damage he has wrought. Guy is also the author of the novel, The Maltese Cube. You can follow his exploits on Twitter, catch him on Mac to the Future on Facebook, and find everything at VertShark.com. Support:      Become a MacVoices Patron on Patreon     http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:     http://macvoices.com      Twitter:     http://www.twitter.com/chuckjoiner     http://www.twitter.com/macvoices      Facebook:     http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:     http://www.facebook.com/macvoices/      MacVoices Group on Facebook:     http://www.facebook.com/groups/macvoice      LinkedIn:     https://www.linkedin.com/in/chuckjoiner/      Instagram:     https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes     Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

MacVoices Video
MacVoices #22042: MacVoices Live! - Chat App Security, Products We Want That Don't Exist (2)

MacVoices Video

Play Episode Listen Later Mar 1, 2022 31:00


Our MacVoices Live! discussion with David Ginsburg, Guy Serle, Andrew Orr, Jim Rea, and Kelly Guimont continues as we did into the security of chat apps. Which one should you use, which ones should you avoid, and why you might not want to trust any of them with that really personal information. Then, we start to talk about products we want but that don't exist. Yet. (Part 2)  This edition of MacVoices is supported by Zocdoc. Find local doctors who take your insurance at Zocdoc.com/macvoices. Show Notes: Links: The best encrypted messaging apps in 2022 - Tom's Guide Guests: David Ginsburg is the host of the weekly podcast In Touch With iOS where he discusses all things iOS, iPhone, iPad, Apple TV, Apple Watch, and related technologies. He is an IT professional supporting Mac, iOS and Windows users. Visit his YouTube channel at https://youtube.com/daveg65 and find and follow him on Twitter @daveg65. Kelly Guimont is a podcaster and friend of the Rebel Alliance. She appears on The Incomparable network as well as hosts I Want My M(CU) TV. You can also hear her on The Aftershow with Mike Rose, and she still has more to say which she saves for Twitter. Andrew Orr is a freelance writer and amateur photographer. He loves Apple products and enjoys writing and sharing all things tech. When he's not writing about Apple, you can often find him snapping photos with his iPhone. Read what he writes at The Mac Observer, and follow him on Twitter. Jim Rea has been an independent Mac developer continuously since 1984. He is the founder of ProVUE Development, and the author of Panorama X, ProVUE's ultra fast RAM based database software for the macOS platform. Follow Jim at provue.com and via @provuejim on Twitter. Guy Serle, best known for being one of the co-hosts of the MyMac Podcast, sincerely apologizes for anything he has done or caused to have happened while in possession of dangerous podcasting equipment. He should know better but being a blonde from Florida means he's probably incapable of understanding the damage he has wrought. Guy is also the author of the novel, The Maltese Cube. You can follow his exploits on Twitter, catch him on Mac to the Future on Facebook, and find everything at VertShark.com. Support:      Become a MacVoices Patron on Patreon     http://patreon.com/macvoices      Enjoy this episode? Make a one-time donation with PayPal Connect:      Web:     http://macvoices.com      Twitter:     http://www.twitter.com/chuckjoiner     http://www.twitter.com/macvoices      Facebook:     http://www.facebook.com/chuck.joiner      MacVoices Page on Facebook:     http://www.facebook.com/macvoices/      MacVoices Group on Facebook:     http://www.facebook.com/groups/macvoice      LinkedIn:     https://www.linkedin.com/in/chuckjoiner/      Instagram:     https://www.instagram.com/chuckjoiner/ Subscribe:      Audio in iTunes     Video in iTunes      Subscribe manually via iTunes or any podcatcher:      Audio: http://www.macvoices.com/rss/macvoicesrss      Video: http://www.macvoices.com/rss/macvoicesvideorss

STEM Southwest Podcast
080 Entrepreneurial Excellence through Perseverance, with Dr. Srinivas Mukkamala

STEM Southwest Podcast

Play Episode Listen Later Jan 30, 2022 61:39


What started with a class project led to an entrepreneurial journey and innovation in the informational technology company, RiskSense.  Today's guest, Dr. Srinivas Mukkamala, openly shares the challenges and victories of his amazing race.  In 2021, Ivanti acquired his company and he now serves as Senior Vice President of Security Products.  Sri impressed Shelly while openly sharing his journey during a keynote presentation at the New Mexico Technology Council Experience IT Conference in 2021.  There is a lot to unpack in this episode so let's get started! Show Notes Watch episode here Dr. Srinivas Mukkamala is Senior Vice President of Security Products for Ivanti.  He was the founder and CEO for RiskSense until Ivanti acquired the company in August 2021.  He is a recognized authority in the artificial intelligence (AI) and neural networks communities and was part of a think tank that collaborated with the U.S. Department of Defense on applying these concepts to cybersecurity problems.  Dr. Mukkamala is responsible for Product Management for all Ivanti Security products and will continue to drive innovation in integrated security solutions across all company pillars: ITSM, Security, and UEM. Dr. Mukkamala was also a lead researcher for CACTUS (Computational Analysis of Cyber Terrorism against the U.S.) and holds a patent on Intelligent Agents for Distributed Intrusion Detection System and Method of Practicing. Dr. Mukkamala holds a PhD of Philosophy and a Master of Science degree from New Mexico Institute of Mining and Technology. New Mexico Tech Indian Space Research Organisation RiskSense Ivanti   Battling Bots League (Be Greater Than Average and Electric Playhouse partnership) Robot Rumble (in partnership with Cottonwood Mall) Be Greater Than Average Gift of Learning Be Greater Than Average Courses Be Greater Than Average Family Fun! Be Greater Than Average A Semester of STEM Activities E-Book   Contact: Dr. Srinivas Mukkamala Linkedin

mnemonic security podcast
Buying security products

mnemonic security podcast

Play Episode Listen Later Nov 15, 2021 32:07


Buying security productsPurchasing cybersecurity solutions and services can be challenging. Not only is the industry rapidly evolving, but there is rarely a case where solutions can be compared "apples to apples."  In this episode, we explore the procurement of cybersecurity solutions. Robby is joined by Thor Milde, SVP - Head of IT Access Management at DNB, sharing his experiences from one of the largest banks in the Nordics, and Øyvind Nordvik, BID Manager in mnemonic, with more than 10 years of experience from procurement.They discuss where the seller and customer side have mutual interests, and the role of procurement departments. And they try to answer the question; how can we make sure we buy the right services? For the right price? Producer: Paul Jæger 

The Security Show
AI Will Not Save Cybersecurity...What Will?

The Security Show

Play Episode Listen Later Nov 9, 2021 47:41


Raffael Marty joins Alona to discuss the state of AI for security systems, why it is important to get the users more involved with security, and how data exploration is still in its infancy. Highlights For small enterprises and MSP it's important for a security product to be easy to use. The threat landscape is slightly different for small businesses. The security problems today are still fundamentally the same as 20 years ago despite having more powerful programs. Understanding how people use their systems is critical to understanding and identifying when there is a deviation. Many AI systems are being built with poor, biased, or incomplete data. We cannot solve everything with supervised machine learning. Data visualization for dashboards has improved but data exploration is still emerging. Data should be ingested and formatted for anonymity. Some data is very difficult to make anonymous by the nature of it. It is imperative to build security into the system from the beginning. Something like GDPR will most likely be enacted in the United States. Relevant Links https://www.linkedin.com/in/raffy/ https://www.connectwise.com/ https://raffy.ch/ https://www.vicarius.io/ Get to Know Raffy Raffael Marty is SVP of Security Products at ConnectWise. He brings more than 20 years of cybersecurity industry experience across engineering, analytics, research, and strategy to the company. Marty is responsible for developing and executing the ConnectWise cybersecurity strategy. Prior to Connectwise, Marty was head of research and intelligence at Forcepoint, ran security analytics for Sophos, launched PixlCloud, a visual analytics platform, and Loggly, a cloud-based log management solution. Additionally, Marty held key roles at IBM Research, ArcSight and Splunk and is an expert on established best practices and emerging innovative trends in the big data and security analytics space. Marty is one of the industry's most respected authorities on security data analytics, big data and visualization. He is the author of Applied Security Visualization and is a frequent speaker at global academic and industry events. Marty holds a master's degree in computer science from ETH Zurich, Switzerland and is a student of the Japanese tradition of Zen meditation.

New Cyber Frontier
NCF-277 Marketing of Cyber Security Products

New Cyber Frontier

Play Episode Listen Later Nov 2, 2021 25:40


Our guest Kerry Matre from Mandiant Security supports marketing cybersecurity products. It is interesting to hear her path from application development and Security Intelligence to support marketing and business development. She brings the primary question to clients: why are we doing this, and how will people interact? Our guest says she often finds that many tools the organization purchased already are not fully implemented. The use of statistics such as configuration confidence is a very insightful measure, as she explains. What does it take to be using your tools effectively? This conversation also has some great discussions on AI versus human analysis, where we are producing viable solutions using AI. Finally, it was interesting to hear Kerry's take on the analyst industry in a few years. This show provides some great incite about the direction of the intelligence industry. Visit our sponsors: BlockFrame Inc. SecureSet Academy Murray Security Services

Cyware's CyberCast
CyberCast EP 7: Ivanti's Dr. Srinivas Mukkamala on AI's Impact on Cyber Security

Cyware's CyberCast

Play Episode Listen Later Oct 18, 2021 37:22


Artificial Intelligence (AI): Future of cybersecurity or buzzword? This week we dig into how AI is shaping cybersecurity, its history of incorporation into the Department of Defense (DoD)'s, and how it's helping secure businesses today. We are joined by Dr. Srinivas Mukkamala, an industry AI and neural network pioneer who co-founded RiskSense, an infosec company recently acquired by Ivanti. This week's guest: Dr. Srinivas Mukkamala, SVP of Product of Security Products at Ivanti Host: Thomas Bain, VP of Marketing at Cyware Producer: Elliot Volkman, Editorial Lead at Cyware

Man Behind The Machine
Pipeline Cyberattack: 21st Century Warfare Gas Hoarding Grid DDOS Games 1984 Hackers Artificial

Man Behind The Machine

Play Episode Listen Later May 12, 2021 29:22


On this episode : Colonial Pipeline Cyberattack: 21st Century Warfare: Oh this episode: COVID-19 cybersecurity. Dreambot malware operation goes silent This cyberwar : eventbot, ‘Black Rose Lucy' Malware Botnet Returns With Ransomware Apple e-mail app for iOS infected w malware, Chip readers and not so state of the art technology: insert chip insert chip insert chip : mobile security, India, FaceBook, Chinese hackers 1.1 Air-Gapped Network. 1.2 Antivirus. 1.3 Best Practices. 1.4 Black Hat. 1.5 Blacklist. 1.6 Botnet. 1.7 Casus Belli. 1.8 Civilian Participation. The saga continues with Cybercrime: China and COVID-19. leave a voicemail at 313-MAN-0231........ 寻找有关中国间谍活动的真相的人:病毒,生物战,口罩和路边COVID-19 @ Best Buy,当心这些冠状病毒网站和骗局,中国散布有关COVID-19,黑客,台湾,美国,中国和中国的谣言 俄罗斯巨魔全天候(24/7)传播虚假信息,国务院员工对冠状病毒,埃博拉病毒和Netflix呈阳性反应,以减慢流传输速度以阻止互联网中断,并在313-MAN-0231留下语音邮件1.1 Air-Gapped Network. 1.2 Antivirus. 1.3 Best Practices. 1.4 Black Hat. 1.5 Blacklist. 1.6 Botnet. 1.7 Casus Belli. 1.8 Civilian Participation. Igloo Security, ESTSecurity, SOPHOS, SK Infosec, Check Point, and Trend Micro have selected 7 cyber security keywords for the year 2020. △AI △Ransomware △Supply Chain Attacks △Cloud △IoT △Malicious Emails △Dark Web ASIA PACIFIC SECURITY, CYBER RESILIENCE, DATA BREACH, EDITOR'S DESK, EDUCATION, EVENTS, IT SOLUTIONS, MOVERS & SHAKERS, RISK MANAGEMENT, SECURITY PRODUCTS, TECHTIME, VULNERABILITIES//////Secure possible entry points. Malicious sites, spam, and third-party components like browser plug-ins can all be sources of fileless malware. Be cautious when downloading attachments and other files, and never click links from unfamiliar sources. Reboot device and change passwords. In case of infection, users can stop fileless attacks that do not employ persistence techniques by restarting the device. As an extra precaution, users should also change their passwords. Utilize behavior monitoring and analysis. These can detect and block malicious behaviors and routines associated with malware, stopping threats before they can reach the system. 中华人民共和国(COVID-19)研究组织的定位 联邦调查局(FBI)和网络安全与基础设施安全局(CISA)发布了此公告,以提高人们对与COVID-19相关的研究的威胁的认识。美国联邦调查局(FBI)正在调查与中国有关联的网络参与者和非传统收藏家开展与COVID-19相关研究的美国组织的目标和妥协。观察到这些行为者试图从与COVID-19相关研究相关的网络和人员中识别并非法获取与疫苗,治疗和测试有关的有价值的知识产权(IP)和公共卫生数据。这些信息的潜在盗用危及安全,有效和高效治疗方案的交付。 FBI和CISA敦促在这些领域进行研究的所有组织保持专门的网络安全和内部威胁行为,以防止对COVID-19相关材料进行秘密审查或盗窃。 FBI负责保护美国免受外国情报,间谍活动和网络操作的侵害,还有其他责任。 CISA负责保护国家的关键基础架构免受物理和网络威胁。 CISA正在提供服务和信息,以支持在COVID-19研究和应对中发挥关键作用的联邦和州/州/地方/部落/地区实体和私营部门实体的网络安全。 推荐建议 假设媒体关注使您的组织参与了与COVID-19相关的研究,将会引起人们的兴趣和网络活动的增加。 修补所有系统的关键漏洞,优先及时修补已知的互联网连接服务器和处理互联网数据的软件的漏洞。 主动扫描Web应用程序以进行未经授权的访问,修改或异常活动。 改进凭据要求,并要求多因素身份验证。 识别并中止表现出异常活动的用户的访问。

Talking Cloud with an emphasis on Cloud Security
24-Talking Cloud with special guest TJ (Tsion) Gonen, Head of Cloud Security Products at Check Point Software

Talking Cloud with an emphasis on Cloud Security

Play Episode Listen Later Feb 14, 2021 44:14


I absolutely love hosting TalkingCloud!I get to meet and speak with brilliant executives and entrepreneurs about the most exciting segment of the technology industry today...Cloud computing. And, this is an episode you'll not want to miss because I'm talking with the Head of Cloud Security Products for Check Point Software Technologies, TJ (Tsion) Gonen. TJ came to Check Point through the acquisition of Protego Labs and has had (and continues to have) a significant influence on what once was a single product and is now the CloudGuard security platform. Hear TJ discuss his views of Cloud and how current technology trends are influencing development, family, and the future of computing overall.

Tech Podcasts Network Show Coverage
Essence USA introduces healthcare and security products @ CES 2021

Tech Podcasts Network Show Coverage

Play Episode Listen Later Feb 4, 2021 10:40


Israel-based security manufacturer Essence introduced various new 5G forward-compatible security products at CES 2021. In our interview, Todd Cochrane talks to Josh Locke, Director of Sales for Essence USA. Essence provides smart connected-living solutions for security, communication, and healthcare service providers. Backed by 20 years of experience and over 15 million devices installed worldwide, Essence … Continue reading Essence USA introduces healthcare and security products @ CES 2021 → The post Essence USA introduces healthcare and security products @ CES 2021 appeared first on Tech Podcast Network.

PLuGHiTz Live Special Events (Audio)
Essence USA introduces healthcare and security products @ CES 2021

PLuGHiTz Live Special Events (Audio)

Play Episode Listen Later Feb 4, 2021 10:40


Israel-based security manufacturer Essence introduced various new 5G forward-compatible security products at CES 2021.In our interview, Todd Cochrane talks to Josh Locke, Director of Sales for Essence USA. Essence provides smart connected-living solutions for security, communication, and healthcare service providers. Backed by 20 years of experience and over 15 million devices installed worldwide, Essence takes pride in the full ownership of our end-to-end solutions; from concept development and design, through the manufacturing of hardware and software to the day to day operations. Essence's PERS 5G, introduced at CES, is, according to a press release, "a highly advanced gateway that provides activity monitoring, fall detection, and voice capabilities anywhere in the home. The 5G technology enables service providers and users to enjoy the highest levels of dependability and accuracy."As for a non-5G wellness application, Essence also touted its MDSense fall detection system, which leverages another cutting-edge technology - radar - to cover a full room using a wireless device that looks much like a traditional PIR motion detector. The product is ideal for people who might not be wearing an emergency pendant and/or cannot reach a panic button. Beyond the wellness monitoring area, Essence also introduced an intrusion detection system aimed at homes and small businesses. The company calls its Integrated FogShield product "the world's first 5G standalone solution for intruder prevention." Connected via 5G CAT-M networks, it includes motion detection, video recording, two-way voice capabilities, and a smoke diffuser that fills a room with a harmless but disorienting smoke that forces intruders out of the premises. Suitable for both residential and commercial buildings, the company says the system can be integrated with existing security systems or used as a standalone solution.Essence believes in building a future where technology is a seamless extension of people's lives. Enriching, enabling, and shaping life's possibilities. Learn more about these and all of Essence's products on their blog.Interview by Todd Cochrane of Geek News Central.Sponsored by: Get $5 to protect your credit card information online with Privacy. Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more. The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.

PLUGHITZ Live Presents (Video)
Essence USA introduces healthcare and security products @ CES 2021

PLUGHITZ Live Presents (Video)

Play Episode Listen Later Feb 4, 2021 10:40


Israel-based security manufacturer Essence introduced various new 5G forward-compatible security products at CES 2021.In our interview, Todd Cochrane talks to Josh Locke, Director of Sales for Essence USA. Essence provides smart connected-living solutions for security, communication, and healthcare service providers. Backed by 20 years of experience and over 15 million devices installed worldwide, Essence takes pride in the full ownership of our end-to-end solutions; from concept development and design, through the manufacturing of hardware and software to the day to day operations. Essence's PERS 5G, introduced at CES, is, according to a press release, "a highly advanced gateway that provides activity monitoring, fall detection, and voice capabilities anywhere in the home. The 5G technology enables service providers and users to enjoy the highest levels of dependability and accuracy."As for a non-5G wellness application, Essence also touted its MDSense fall detection system, which leverages another cutting-edge technology - radar - to cover a full room using a wireless device that looks much like a traditional PIR motion detector. The product is ideal for people who might not be wearing an emergency pendant and/or cannot reach a panic button. Beyond the wellness monitoring area, Essence also introduced an intrusion detection system aimed at homes and small businesses. The company calls its Integrated FogShield product "the world's first 5G standalone solution for intruder prevention." Connected via 5G CAT-M networks, it includes motion detection, video recording, two-way voice capabilities, and a smoke diffuser that fills a room with a harmless but disorienting smoke that forces intruders out of the premises. Suitable for both residential and commercial buildings, the company says the system can be integrated with existing security systems or used as a standalone solution.Essence believes in building a future where technology is a seamless extension of people's lives. Enriching, enabling, and shaping life's possibilities. Learn more about these and all of Essence's products on their blog.Interview by Todd Cochrane of Geek News Central.Sponsored by: Get $5 to protect your credit card information online with Privacy. Amazon Prime gives you more than just free shipping. Get free music, TV shows, movies, videogames and more. The most flexible tools for podcasting. Get a 30 day free trial of storage and statistics.

Stock Day Media
StrikeForce Technologies, Inc. Discusses The Potential of Video Conference Security Products, SafeVChat™ and PrivacyLok™, with The Stock Day Podcast

Stock Day Media

Play Episode Listen Later Feb 4, 2021 11:44


READ PULL PRESS RELEASE HERE: https://stockdaymedia.com/strikeforce-technologies-inc-discusses-the-potential-of-video-conference-security-products-safevchat-and-privacylok-with-the-stock-day-podcast-sfor/ The Stock Day Podcast welcomed StrikeForce Technologies, Inc. (OTC PINK: SFOR)(“the Company”), a company that helps to prevent cyber theft and data security breaches for consumers, corporations, and government agencies. CEO of the Company, Mark Kay, joined Stock Day host Everett Jolly. 

Man Behind The Machine
Warner Bros, AMC & Movie Theatres, HBO + COVID-19

Man Behind The Machine

Play Episode Listen Later Dec 7, 2020 31:01


On this episode Demise of AMC & Movie Theatres vs HBO MAX vs YouTube : Man in search of the truth over Chinese Espionage: Virus, Bio Warfare, Masks & Curbside COVID-19 @ Best Buy, watch out for these Coronavirus websites and scams, China spreading rumors about COVID-19, hackers, Taiwan, US, Chinese and Russian trolls working 24/7 to spread disinformation, State Department employees test positive for Coronavirus, ebola, Netflix to slow down streaming to stop the internet from breaking, leave a voicemail at 313-MAN-0231........ 寻找有关中国间谍活动的真相的人:病毒,生物战,口罩和路边COVID-19 @ Best Buy,当心这些冠状病毒网站和骗局,中国散布有关COVID-19,黑客,台湾,美国,中国和中国的谣言 俄罗斯巨魔全天候(24/7)传播虚假信息,国务院员工对冠状病毒,埃博拉病毒和Netflix呈阳性反应,以减慢流传输速度以阻止互联网中断,并在313-MAN-0231留下语音邮件COVID-19: De-Coupling, Cyber-Bio-Toxic Warfare and Man search of truth and the COVID-19: China Virus Dis.info campaign waged by

Man Behind The Machine
Artificial Intelligence: Deepfakes, Great Firewall, JEDI, C-19, CHICOM

Man Behind The Machine

Play Episode Listen Later Nov 26, 2020 46:30


On this episode A.i. Deepfakes, Chicom Freedom, Malware, Chinese Espionage COVID-19, YouTube censorship , dominion voting machines : artificial intelligence : grid stability: hydrogen, agriculture: research: global artificial intelligence fusion data, satellite data : racial bias: tech giants SKYNET : T-800/Systems Model 101 and T-1000 and video games JEDI military system : . leave a voicemail at 313-MAN-0231... episode: WH Bans TikTok : Chinese espionage and the hunt for red October. On this episode : spies in cinema and Spy Games: Agents, Operatives, Spurs, Moles: Man in search of COVID-19 Hackers and Malware: Apple, Hong Kong, Universities, South China, robotics And industrial automation and cyber. Vulnerabilities ————On this episode: China : TikTok, COVID-19 and the Cybercrime Threat Matrix : Canada, Trudeau, Australia Chinese apps wash your hands and send a voicemail to 313-MAN-0231.............. ° ͜ʖ ͡°) ◕_◕ ༽ *‿'*(•_•)じゃ ┌༼ຈل͜ຈ༽┐ ¬^(-¬)!! ( ᵖᴼᵒʳ ᶦᶠᶦᵉ ᵐ⁸) _(ツ)_/¯ کಥೊಸೃ ಠ_ಠ) ʕ•ᴥ•ʔ ᴗʰᴀʜ ʕ•ᴥ•ʔ ( ─__ .寻找有关中国间谍活动的真相的人:病毒,生物战,口罩和路边COVID-19 @ Best Buy,当心这些冠状病毒网站和骗局,中国散布有关COVID-19,黑客,台湾,美国,中国和中国的谣言 俄罗斯巨魔全天候(24/7)传播虚假信息,国务院员工对冠状病毒,埃博拉病毒和Netflix呈阳性反应,以减慢流传输速度以阻止互联网中断,并在313-MAN-0231留下语音邮件1.1 Air-Gapped Network. 1.2 Antivirus. 1.3 Best Practices. 1.4 Black Hat. 1.5 Blacklist. 1.6 Botnet. 1.7 Casus Belli. 1.8 Civilian Participation. Igloo Security, ESTSecurity, SOPHOS, SK Infosec, Check Point, and Trend Micro have selected 7 cyber security keywords for the year 2020. △AI △Ransomware △Supply Chain Attacks △Cloud △IoT △Malicious Emails △Dark Web ASIA PACIFIC SECURITY, CYBER RESILIENCE, DATA BREACH, EDITOR'S DESK, EDUCATION, EVENTS, IT SOLUTIONS, MOVERS & SHAKERS, RISK MANAGEMENT, SECURITY PRODUCTS, TECHTIME, VULNERABILITIES公司(BBC)记者芭芭拉·普莱特·厄瑟(Barbara Plett Usher)提出的有关病毒起源情报的问题。FBI和CISA警告不要以中国为目标打击COVID-19研究组织 联邦调查局(FBI)和网络安全与基础设施安全局(CISA)今天发布了一项公共服务公告,警告那些正在研究COVID-19的组织可能会被中华人民共和国(PRC)定位为目标并危害网络。从事COVID-19响应的医疗,制药和研究部门都应意识到它们是这项活动的主要目标,并采取必要的步骤来保护其系统。 中国针对这些领域的努力对我国应对COVID-19的行动构成了重大威胁。该公告旨在提高研究机构和美国公众的认识,并为可能成为目标的人提供资源和指导。 FBI要求怀疑可疑活动的组织联系其当地的FBI外地办事处。 CISA要求所有支持COVID-19响应的组织与该机构合作,以帮助保护这些关键响应工作。 有关威胁的其他技术详细信息将在未来几天发布。 CISA和英国国家网络安全局(National Cyber​​ Security Agency)在本月早些时候发布了类似的警报,警告恶意行为者使用密码喷雾策略针对COVID-19响应组织。

Fail Faster
#41 - Building Security Products That People Don't Hate

Fail Faster

Play Episode Listen Later Oct 8, 2020 33:02


Peter Baker chats with Fail Faster about the importance of always placing the user at the center of any security product, the benefits of in-house teams, and tells a curious story about one of his first "fast fails" for a once massive bookstore!

Man Behind The Machine
China AI/Deepfakes Facebook Apple Google Contact Tracing

Man Behind The Machine

Play Episode Listen Later Sep 25, 2020 38:40


On man : Chinese AI/Deepfake faces on Facebook Apple Google Contact Tracing Samsung : In this episode COVID-19 Contact Tracing and Cyberwar Man episode. News : Chinese Hackers: Coronavirus Research : . leave a voicemail at 313-MAN-0231.....寻找有关中国间谍活动的真相的人:病毒,生物战,口罩和路边COVID-19 @ Best Buy,当心这些冠状病毒网站和骗局,中国散布有关COVID-19,黑客,台湾,美国,中国和中国的谣言 俄罗斯巨魔全天候(24/7)传播虚假信息,国务院员工对冠状病毒,埃博拉病毒和Netflix呈阳性反应,以减慢流传输速度以阻止互联网中断,并在313-MAN-0231留下语音邮件1.1 Air-Gapped Network. 1.2 Antivirus. 1.3 Best Practices. 1.4 Black Hat. 1.5 Blacklist. 1.6 Botnet. 1.7 Casus Belli. 1.8 Civilian Participation. Igloo Security, ESTSecurity, SOPHOS, SK Infosec, Check Point, and Trend Micro have selected 7 cyber security keywords for the year 2020. △AI △Ransomware △Supply Chain Attacks △Cloud △IoT △Malicious Emails △Dark Web ASIA PACIFIC SECURITY, CYBER RESILIENCE, DATA BREACH, EDITOR'S DESK, EDUCATION, EVENTS, IT SOLUTIONS, MOVERS & SHAKERS, RISK MANAGEMENT, SECURITY PRODUCTS, TECHTIME, VULNERABILITIES公司(BBC)记者芭芭拉·普莱特·厄瑟(Barbara Plett Usher)提出的有关病毒起源情报的问题。FBI和CISA警告不要以中国为目标打击COVID-19研究组织 联邦调查局(FBI)和网络安全与基础设施安全局(CISA)今天发布了一项公共服务公告,警告那些正在研究COVID-19的组织可能会被中华人民共和国(PRC)定位为目标并危害网络。从事COVID-19响应的医疗,制药和研究部门都应意识到它们是这项活动的主要目标,并采取必要的步骤来保护其系统。 中国针对这些领域的努力对我国应对COVID-19的行动构成了重大威胁。该公告旨在提高研究机构和美国公众的认识,并为可能成为目标的人提供资源和指导。 FBI要求怀疑可疑活动的组织联系其当地的FBI外地办事处。 CISA要求所有支持COVID-19响应的组织与该机构合作,以帮助保护这些关键响应工作。 有关威胁的其他技术详细信息将在未来几天发布。 CISA和英国国家网络安全局(National Cyber​​ Security Agency)在本月早些时候发布了类似的警报,警告恶意行为者使用密码喷雾策略针对COVID-19响应组织。

Man Behind The Machine
RBG + Facebook-Instagram spy A.I. 2020 dis.info fake news

Man Behind The Machine

Play Episode Listen Later Sep 23, 2020 24:49


On this episode JUSTICE GINSBURG HAS DIED plus Facebook is in court over spying on Instagram users' cameras and Facebook ‘s a.i. Robot. On this episode: WH Bans TikTok : Chinese espionage and the hunt for red October. On this episode : spies in cinema and Spy Games: Agents, Operatives, Spurs, Moles: Man in search of COVID-19 Hackers and Malware: Apple, Hong Kong, Universities, South China, robotics And industrial automation and cyber. Vulnerabilities ————On this episode: China : TikTok, COVID-19 and the Cybercrime Threat Matrix : Canada, Trudeau, Australia Chinese apps wash your hands and send a voicemail to 313-MAN-0231.............. ° ͜ʖ ͡°) ◕_◕ ༽ *‿'*(•_•)じゃ ┌༼ຈل͜ຈ༽┐ ¬^(-¬)!! ( ᵖᴼᵒʳ ᶦᶠᶦᵉ ᵐ⁸) _(ツ)_/¯ کಥೊಸೃ ಠ_ಠ) ʕ•ᴥ•ʔ ᴗʰᴀʜ ʕ•ᴥ•ʔ ( ─__ .寻找有关中国间谍活动的真相的人:病毒,生物战,口罩和路边COVID-19 @ Best Buy,当心这些冠状病毒网站和骗局,中国散布有关COVID-19,黑客,台湾,美国,中国和中国的谣言 俄罗斯巨魔全天候(24/7)传播虚假信息,国务院员工对冠状病毒,埃博拉病毒和Netflix呈阳性反应,以减慢流传输速度以阻止互联网中断,并在313-MAN-0231留下语音邮件1.1 Air-Gapped Network. 1.2 Antivirus. 1.3 Best Practices. 1.4 Black Hat. 1.5 Blacklist. 1.6 Botnet. 1.7 Casus Belli. 1.8 Civilian Participation. Igloo Security, ESTSecurity, SOPHOS, SK Infosec, Check Point, and Trend Micro have selected 7 cyber security keywords for the year 2020. △AI △Ransomware △Supply Chain Attacks △Cloud △IoT △Malicious Emails △Dark Web ASIA PACIFIC SECURITY, CYBER RESILIENCE, DATA BREACH, EDITOR'S DESK, EDUCATION, EVENTS, IT SOLUTIONS, MOVERS & SHAKERS, RISK MANAGEMENT, SECURITY PRODUCTS, TECHTIME, VULNERABILITIES公司(BBC)记者芭芭拉·普莱特·厄瑟(Barbara Plett Usher)提出的有关病毒起源情报的问题。FBI和CISA警告不要以中国为目标打击COVID-19研究组织 联邦调查局(FBI)和网络安全与基础设施安全局(CISA)今天发布了一项公共服务公告,警告那些正在研究COVID-19的组织可能会被中华人民共和国(PRC)定位为目标并危害网络。从事COVID-19响应的医疗,制药和研究部门都应意识到它们是这项活动的主要目标,并采取必要的步骤来保护其系统。 中国针对这些领域的努力对我国应对COVID-19的行动构成了重大威胁。该公告旨在提高研究机构和美国公众的认识,并为可能成为目标的人提供资源和指导。 FBI要求怀疑可疑活动的组织联系其当地的FBI外地办事处。 CISA要求所有支持COVID-19响应的组织与该机构合作,以帮助保护这些关键响应工作。 有关威胁的其他技术详细信息将在未来几天发布。 CISA和英国国家网络安全局(National Cyber​​ Security Agency)在本月早些时候发布了类似的警报,警告恶意行为者使用密码喷雾策略针对COVID-19响应组织。

Man Behind The Machine
WH Bans TikTok : Chinese spies, hunt for red October, hackers, COVID-19

Man Behind The Machine

Play Episode Listen Later Sep 18, 2020 43:53


On this episode: WH Bans TikTok : Chinese espionage and the hunt for red October. On this episode : spies in cinema and Spy Games: Agents, Operatives, Spurs, Moles: Man in search of COVID-19 Hackers and Malware: Apple, Hong Kong, Universities, South China, robotics And industrial automation and cyber. Vulnerabilities ————On this episode: China : TikTok, COVID-19 and the Cybercrime Threat Matrix : Canada, Trudeau, Australia Chinese apps wash your hands and send a voicemail to 313-MAN-0231.............. ° ͜ʖ ͡°) ◕_◕ ༽ *‿'*(•_•)じゃ ┌༼ຈل͜ຈ༽┐ ¬^(-¬)!! ( ᵖᴼᵒʳ ᶦᶠᶦᵉ ᵐ⁸) _(ツ)_/¯ کಥೊಸೃ ಠ_ಠ) ʕ•ᴥ•ʔ ᴗʰᴀʜ ʕ•ᴥ•ʔ ( ─__ .寻找有关中国间谍活动的真相的人:病毒,生物战,口罩和路边COVID-19 @ Best Buy,当心这些冠状病毒网站和骗局,中国散布有关COVID-19,黑客,台湾,美国,中国和中国的谣言 俄罗斯巨魔全天候(24/7)传播虚假信息,国务院员工对冠状病毒,埃博拉病毒和Netflix呈阳性反应,以减慢流传输速度以阻止互联网中断,并在313-MAN-0231留下语音邮件1.1 Air-Gapped Network. 1.2 Antivirus. 1.3 Best Practices. 1.4 Black Hat. 1.5 Blacklist. 1.6 Botnet. 1.7 Casus Belli. 1.8 Civilian Participation. Igloo Security, ESTSecurity, SOPHOS, SK Infosec, Check Point, and Trend Micro have selected 7 cyber security keywords for the year 2020. △AI △Ransomware △Supply Chain Attacks △Cloud △IoT △Malicious Emails △Dark Web ASIA PACIFIC SECURITY, CYBER RESILIENCE, DATA BREACH, EDITOR'S DESK, EDUCATION, EVENTS, IT SOLUTIONS, MOVERS & SHAKERS, RISK MANAGEMENT, SECURITY PRODUCTS, TECHTIME, VULNERABILITIES公司(BBC)记者芭芭拉·普莱特·厄瑟(Barbara Plett Usher)提出的有关病毒起源情报的问题。FBI和CISA警告不要以中国为目标打击COVID-19研究组织 联邦调查局(FBI)和网络安全与基础设施安全局(CISA)今天发布了一项公共服务公告,警告那些正在研究COVID-19的组织可能会被中华人民共和国(PRC)定位为目标并危害网络。从事COVID-19响应的医疗,制药和研究部门都应意识到它们是这项活动的主要目标,并采取必要的步骤来保护其系统。 中国针对这些领域的努力对我国应对COVID-19的行动构成了重大威胁。该公告旨在提高研究机构和美国公众的认识,并为可能成为目标的人提供资源和指导。 FBI要求怀疑可疑活动的组织联系其当地的FBI外地办事处。 CISA要求所有支持COVID-19响应的组织与该机构合作,以帮助保护这些关键响应工作。 有关威胁的其他技术详细信息将在未来几天发布。 CISA和英国国家网络安全局(National Cyber​​ Security Agency)在本月早些时候发布了类似的警报,警告恶意行为者使用密码喷雾策略针对COVID-19响应组织。

Man Behind The Machine
Technology : Bill &Ted #3, Epic vs Apple, Mac or PC? Flash & Adobe's gambit

Man Behind The Machine

Play Episode Listen Later Sep 17, 2020 41:22


In this episode COVID-19 Contact Tracing and Cyberwar Man episode. News : Chinese Hackers: Coronavirus Research : . leave a voicemail at 313-MAN-0231.....寻找有关中国间谍活动的真相的人:病毒,生物战,口罩和路边COVID-19 @ Best Buy,当心这些冠状病毒网站和骗局,中国散布有关COVID-19,黑客,台湾,美国,中国和中国的谣言 俄罗斯巨魔全天候(24/7)传播虚假信息,国务院员工对冠状病毒,埃博拉病毒和Netflix呈阳性反应,以减慢流传输速度以阻止互联网中断,并在313-MAN-0231留下语音邮件1.1 Air-Gapped Network. 1.2 Antivirus. 1.3 Best Practices. 1.4 Black Hat. 1.5 Blacklist. 1.6 Botnet. 1.7 Casus Belli. 1.8 Civilian Participation. Igloo Security, ESTSecurity, SOPHOS, SK Infosec, Check Point, and Trend Micro have selected 7 cyber security keywords for the year 2020. △AI △Ransomware △Supply Chain Attacks △Cloud △IoT △Malicious Emails △Dark Web ASIA PACIFIC SECURITY, CYBER RESILIENCE, DATA BREACH, EDITOR'S DESK, EDUCATION, EVENTS, IT SOLUTIONS, MOVERS & SHAKERS, RISK MANAGEMENT, SECURITY PRODUCTS, TECHTIME, VULNERABILITIES公司(BBC)记者芭芭拉·普莱特·厄瑟(Barbara Plett Usher)提出的有关病毒起源情报的问题。FBI和CISA警告不要以中国为目标打击COVID-19研究组织 联邦调查局(FBI)和网络安全与基础设施安全局(CISA)今天发布了一项公共服务公告,警告那些正在研究COVID-19的组织可能会被中华人民共和国(PRC)定位为目标并危害网络。从事COVID-19响应的医疗,制药和研究部门都应意识到它们是这项活动的主要目标,并采取必要的步骤来保护其系统。 中国针对这些领域的努力对我国应对COVID-19的行动构成了重大威胁。该公告旨在提高研究机构和美国公众的认识,并为可能成为目标的人提供资源和指导。 FBI要求怀疑可疑活动的组织联系其当地的FBI外地办事处。 CISA要求所有支持COVID-19响应的组织与该机构合作,以帮助保护这些关键响应工作。 有关威胁的其他技术详细信息将在未来几天发布。 CISA和英国国家网络安全局(National Cyber​​ Security Agency)在本月早些时候发布了类似的警报,警告恶意行为者使用密码喷雾策略针对COVID-19响应组织。

Man Behind The Machine
Spy Games in Movies : Emma Peel - Avengers + GOT, Moles, operatives

Man Behind The Machine

Play Episode Listen Later Sep 14, 2020 27:48


On this episode : spies in cinema and Spy Games: Agents, Operatives, Spurs, Moles: Man in search of COVID-19 Hackers and Malware: Apple, Hong Kong, Universities, South China, robotics And industrial automation and cyber. Vulnerabilities ————On this episode: China : TikTok, COVID-19 and the Cybercrime Threat Matrix : Canada, Trudeau, Australia Chinese apps wash your hands and send a voicemail to 313-MAN-0231.............. ° ͜ʖ ͡°) ◕_◕ ༽ *‿'*(•_•)じゃ ┌༼ຈل͜ຈ༽┐ ¬^(-¬)!! ( ᵖᴼᵒʳ ᶦᶠᶦᵉ ᵐ⁸) _(ツ)_/¯ کಥೊಸೃ ಠ_ಠ) ʕ•ᴥ•ʔ ᴗʰᴀʜ ʕ•ᴥ•ʔ ( ─__ .寻找有关中国间谍活动的真相的人:病毒,生物战,口罩和路边COVID-19 @ Best Buy,当心这些冠状病毒网站和骗局,中国散布有关COVID-19,黑客,台湾,美国,中国和中国的谣言 俄罗斯巨魔全天候(24/7)传播虚假信息,国务院员工对冠状病毒,埃博拉病毒和Netflix呈阳性反应,以减慢流传输速度以阻止互联网中断,并在313-MAN-0231留下语音邮件1.1 Air-Gapped Network. 1.2 Antivirus. 1.3 Best Practices. 1.4 Black Hat. 1.5 Blacklist. 1.6 Botnet. 1.7 Casus Belli. 1.8 Civilian Participation. Igloo Security, ESTSecurity, SOPHOS, SK Infosec, Check Point, and Trend Micro have selected 7 cyber security keywords for the year 2020. △AI △Ransomware △Supply Chain Attacks △Cloud △IoT △Malicious Emails △Dark Web ASIA PACIFIC SECURITY, CYBER RESILIENCE, DATA BREACH, EDITOR'S DESK, EDUCATION, EVENTS, IT SOLUTIONS, MOVERS & SHAKERS, RISK MANAGEMENT, SECURITY PRODUCTS, TECHTIME, VULNERABILITIES公司(BBC)记者芭芭拉·普莱特·厄瑟(Barbara Plett Usher)提出的有关病毒起源情报的问题。FBI和CISA警告不要以中国为目标打击COVID-19研究组织 联邦调查局(FBI)和网络安全与基础设施安全局(CISA)今天发布了一项公共服务公告,警告那些正在研究COVID-19的组织可能会被中华人民共和国(PRC)定位为目标并危害网络。从事COVID-19响应的医疗,制药和研究部门都应意识到它们是这项活动的主要目标,并采取必要的步骤来保护其系统。 中国针对这些领域的努力对我国应对COVID-19的行动构成了重大威胁。该公告旨在提高研究机构和美国公众的认识,并为可能成为目标的人提供资源和指导。 FBI要求怀疑可疑活动的组织联系其当地的FBI外地办事处。 CISA要求所有支持COVID-19响应的组织与该机构合作,以帮助保护这些关键响应工作。 有关威胁的其他技术详细信息将在未来几天发布。 CISA和英国国家网络安全局(National Cyber​​ Security Agency)在本月早些时候发布了类似的警报,警告恶意行为者使用密码喷雾策略针对COVID-19响应组织。

WIRED Security: News, Advice, and More
Security News This Week: Feds Give Kaspersky Security Products the Boot

WIRED Security: News, Advice, and More

Play Episode Listen Later Sep 19, 2017 8:59


Apple finally announced the iPhone X this week, complete with a facial recognition system that Apple calls FaceID. Preliminary impressions are that FaceID will be difficult to trick, and should be secure for the average user, but researchers are eager to test its robustness. Consumer facial recognition has been around, but not yet at this scale, inviting questions about what its implications will be, particularly for privacy.