POPULARITY
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions at Airia, joins Business Security Weekly to discuss the challenges of MCP and how to secure this new protocol. Rahul will cover how Aria's solutions help you secure your AI development by: Centralizing Access Control Enforcing Security Policies Maintaining Compliance Enabling Rapid Response This segment is sponsored by Airia. Visit https://securityweekly.com/airia to learn more about them! In the leadership and communications segment, CISO Burnout – Epidemic, Endemic, or Simply Inevitable?, If Trust Is So Important, Why Aren't We Measuring It?, Over one-third of companies plan to replace entry roles with AI, survey says, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-421
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions at Airia, joins Business Security Weekly to discuss the challenges of MCP and how to secure this new protocol. Rahul will cover how Aria's solutions help you secure your AI development by: Centralizing Access Control Enforcing Security Policies Maintaining Compliance Enabling Rapid Response This segment is sponsored by Airia. Visit https://securityweekly.com/airia to learn more about them! In the leadership and communications segment, CISO Burnout – Epidemic, Endemic, or Simply Inevitable?, If Trust Is So Important, Why Aren't We Measuring It?, Over one-third of companies plan to replace entry roles with AI, survey says, and more! Show Notes: https://securityweekly.com/bsw-421
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions at Airia, joins Business Security Weekly to discuss the challenges of MCP and how to secure this new protocol. Rahul will cover how Aria's solutions help you secure your AI development by: Centralizing Access Control Enforcing Security Policies Maintaining Compliance Enabling Rapid Response This segment is sponsored by Airia. Visit https://securityweekly.com/airia to learn more about them! In the leadership and communications segment, CISO Burnout – Epidemic, Endemic, or Simply Inevitable?, If Trust Is So Important, Why Aren't We Measuring It?, Over one-third of companies plan to replace entry roles with AI, survey says, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-421
In part two of The Quality Hub: Chatting with ISO Experts, host Xavier Francis continues his conversation with Rick Krick, Director of Security Solutions at Core Business Solutions, to explore what the CMMC becoming law truly means in practice. Rick explains how contractors can still compete if they're not yet fully certified, what “conditional certification” allows, and the critical flow-down responsibility that requires every subcontractor in the defense supply chain to meet compliance standards. The discussion covers the biggest readiness gaps across the DIB (Defense Industrial Base), how small businesses can gain a competitive edge by acting now, and why documentation, monitoring, and continuous compliance are vital for long-term success. With real-world examples of costly noncompliance and practical advice on narrowing scope, maintaining SPRS scores, this episode is an essential guide for any company preparing for the future of cybersecurity and defense contracting. Helpful Resources: What is CMMC?: https://www.thecoresolution.com/nist-cmmc-3 CMMC Webinars: https://www.thecoresolution.com/cybersecurity-webinars The Core Vault Solution: https://www.thecoresolution.com/core-vault Contact us at 866.354.0300 or email us at info@thecoresolution.com A Plethora of Articles: https://www.thecoresolution.com/free-learning-resources
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions at Airia, joins Business Security Weekly to discuss the challenges of MCP and how to secure this new protocol. Rahul will cover how Aria's solutions help you secure your AI development by: Centralizing Access Control Enforcing Security Policies Maintaining Compliance Enabling Rapid Response This segment is sponsored by Airia. Visit https://securityweekly.com/airia to learn more about them! In the leadership and communications segment, CISO Burnout – Epidemic, Endemic, or Simply Inevitable?, If Trust Is So Important, Why Aren't We Measuring It?, Over one-third of companies plan to replace entry roles with AI, survey says, and more! Show Notes: https://securityweekly.com/bsw-421
EchoStar says it will sell a set of wireless spectrum licenses to SpaceX for about $2.6 billion in exchange for stock in the space startup. Kratos Defense & Security Solutions has signed a definitive agreement to acquire 100 percent of the ordinary shares of Orbit Technologies Ltd for $356.3 million. Reflex Aerospace has closed a €50 million Series A funding round, and more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Guest Our guest today is Yanni Barghouty, Co-founder and CEO of Cosmic Shielding Corporation. You can connect with Yanni on LinkedIn, and learn more about the Cosmic Shielding Corporation on their website. Selected Reading EchoStar to sell more spectrum licenses to SpaceX for $2.6 billion- Reuters Kratos to acquire Orbit Technologies - Intelligence Community News Reflex Aerospace Secures Record €50 Million Series A Record-Breaking Optical Power Beaming Proves Path to Scalable Power Grid for Space Portal unveils Starburst, an ESPA-class rapid-maneuverability spacecraft, and announces Starburst-1 mission on SpaceX in Q4 2026 Firefly Aerospace Closes Acquisition of SciTec National Security Technology Company Starlab Names Leidos as Primary Assembly, Integration and Testing Provider Ecosmic partners with ESA to validate SAFE on Agency satellites Raytheon UK awarded UK Space Agency contract to deliver orbital analyst capability- RTX ispace selected for Japan's Space Strategy Fund project Share your feedback. What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of The Quality Hub: Chatting with ISO Experts, host Xavier Francis sits down with Rick Krick, Director of Security Solutions at Core Business Solutions, to discuss a monumental update — CMMC is now law. As of November 10, 2025, the Cybersecurity Maturity Model Certification (CMMC) becomes legally enforceable under the Defense Federal Acquisition Regulation Supplement (DFARS), transforming compliance from a policy into a contractual requirement for all Department of Defense contractors. Rick breaks down what this means for organizations of all sizes, from small businesses to major defense contractors, explaining the three CMMC levels, phased rollout timeline, and common misconceptions about compliance. Together, they explore the real-world implications for defense suppliers, the importance of early preparation, and how companies can protect sensitive information while staying contract-ready in this new cybersecurity landscape. Helpful Resources: What is CMMC?: https://www.thecoresolution.com/nist-cmmc-3 CMMC Webinars: https://www.thecoresolution.com/cybersecurity-webinars The Core Vault Solution: https://www.thecoresolution.com/core-vault Contact us at 866.354.0300 or email us at info@thecoresolution.com A Plethora of Articles: https://www.thecoresolution.com/free-learning-resources
In this sponsored Soap Box edition of the Risky Business podcast, host Patrick Gray chats with Mastercard's Executive Vice President and Head of Security Solutions, Johan Gerber, about how the card brand thinks about cybersecurity and why it's aggressively investing in the space. After listening to this interview you'll understand why the credit card company spent $2.65b on threat intelligence vendor Recorded Future! This episode is also available on Youtube. Show notes
At Viirtue Connect in Nashville, Adrian Andrews, Founder of AspireOn Networks, joined Doug Green, Publisher of Technology Reseller News, to discuss how his company is delivering comprehensive telecommunications, connectivity, and security solutions to businesses across Central Florida and beyond. AspireOn Networks provides business-class telecom services, including fiber connectivity, telecom expense management, and security system installations. “We partner with all the carriers in the country,” Andrews explained. “If you're looking for fiber optics or a backup solution, we shop all the carriers and come back with the best options—so our customers don't have to.” In addition to telecom solutions, AspireOn offers access control and security camera systems for businesses with physical locations, helping customers strengthen both digital and physical security. The company also performs quality control for fiber construction projects, ensuring network builds meet safety and technical standards. Headquartered in Central Florida, AspireOn Networks serves Orange, Seminole, Volusia, and Hillsborough counties, with clients across the U.S. and internationally. The company's success, Andrews noted, is supported by strong partnerships — including with Ideal Technologies in Tampa Bay and Viirtue, with whom AspireOn maintains a close working relationship. To learn more, visit www.aspireonnetworks.com.
In der heutigen Folge sprechen die Finanzjournalisten Anja Ettel und Holger Zschäpitz über einen Gamechanger-Deal, Wall-Street-Rekorde trotz Shutdown und das fulminante Börsendebüt von Fermi. Außerdem geht es um Pfizer, Merck, Eli Lilly, Novo Nordisk, Vertex, Regeneron, Thermo Fisher, Repligen, Danaher, Boston Scientific, Abbott, Intuitive Surgical, Bayer, Merck, Salzgitter, Thyssenkrupp, Bitcoin, Solana, Ether, Sartorius, Palantir Technologies, Thales, L3Harris Technologies, RTX, Kratos Defense & Security Solutions, AeroVironment, DroneShield, Elbit Systems, Electro Optic Systems, Saab AB, Hensoldt, Mercury Systems, QinetiQ, Chemring Group, Cohort, Exail Technologies, Rocket Lab, Iridium Communications, BlackSky Technology, Electro Optic Systems, Leidos Holdings, CACI International, Parsons, Telos Corp, Leidos, SAIC, QinetiQ, Parsons VanEck Space Innovators ETF (WKN: A3DP9J), Invesco Defence Innovation ETF (WKN: A40J95), Global X Defence Tech ETF (WKN: A40E7A), Droneshield, Palantir, Red Cat Holdings. Wir freuen uns über Feedback an aaa@welt.de. Noch mehr "Alles auf Aktien" findet Ihr bei WELTplus und Apple Podcasts – inklusive aller Artikel der Hosts und AAA-Newsletter. Hier bei WELT: https://www.welt.de/podcasts/alles-auf-aktien/plus247399208/Boersen-Podcast-AAA-Bonus-Folgen-Jede-Woche-noch-mehr-Antworten-auf-Eure-Boersen-Fragen.html. Der Börsen-Podcast Disclaimer: Die im Podcast besprochenen Aktien und Fonds stellen keine spezifischen Kauf- oder Anlage-Empfehlungen dar. Die Moderatoren und der Verlag haften nicht für etwaige Verluste, die aufgrund der Umsetzung der Gedanken oder Ideen entstehen. Hörtipps: Für alle, die noch mehr wissen wollen: Holger Zschäpitz können Sie jede Woche im Finanz- und Wirtschaftspodcast "Deffner&Zschäpitz" hören. +++ Werbung +++ Du möchtest mehr über unsere Werbepartner erfahren? Hier findest du alle Infos & Rabatte! https://linktr.ee/alles_auf_aktien Impressum: https://www.welt.de/services/article104636888/Impressum.html Datenschutz: https://www.welt.de/services/article157550705/Datenschutzerklaerung-WELT-DIGITAL.html
In der heutigen Folge sprechen die Finanzjournalisten Anja Ettel und Holger Zschäpitz über die großen Verschiebungen im 3. Quartal, Trumps wirren Deal mit Pfizer und Wolfspeed, die wie Phoenix aus der Asche steigen. Außerdem geht es um Applovin, Western Digital Corp, Warner Bros, Seagate Technologies, Intel, Tesla, Charter Communications, Trade Desk, Lululemon, FactSheet, Molina Healthcare, Gartner, Commerzbank, Deutsche Bank, BMW, Airbus, Fresenius, Bayer, Deutsche Börse, Symrise, Beiersdorf, Lithium America, Berkshire Hathaway, Occidental Petroleum, Nike, Adidas, Puma, Electronic Arts, MoonLake Immunotherapeutics, Insmed Incorporated, Madrigal Pharmaceuticals, Krystal Biotech, Mineralys Therapeutics, Vera Therapeutics, Summit Therapeutics, TripAdvisor, Zoom Communications, Unity Software, Workiva, Trimble, Take-Two Interactive Software, Avepoint, Groupon, Magnolia Oil, Kinetik Holdings, Kosmos Energy, Parsons Corporation, Hexcel Corporation, Science Applications International, Kratos Defense & Security Solutions, Scout24, Brenntag, Hugo Boss, Nordex, Temenos, Avolta, Burberry, Remy Cointreau, Whitbread, Reckitt Benckiser, Amadeus IT Group, Moncler, Signify, Iveco Group, EDP Renovaveis, Solaria Energia, Novo Nordisk, Eli Lilly, Vanguard FTSE All-World ETF (WKN: A2PKXG). Wir freuen uns über Feedback an aaa@welt.de. Noch mehr "Alles auf Aktien" findet Ihr bei WELTplus und Apple Podcasts – inklusive aller Artikel der Hosts und AAA-Newsletter. Hier bei WELT: https://www.welt.de/podcasts/alles-auf-aktien/plus247399208/Boersen-Podcast-AAA-Bonus-Folgen-Jede-Woche-noch-mehr-Antworten-auf-Eure-Boersen-Fragen.html. Der Börsen-Podcast Disclaimer: Die im Podcast besprochenen Aktien und Fonds stellen keine spezifischen Kauf- oder Anlage-Empfehlungen dar. Die Moderatoren und der Verlag haften nicht für etwaige Verluste, die aufgrund der Umsetzung der Gedanken oder Ideen entstehen. Hörtipps: Für alle, die noch mehr wissen wollen: Holger Zschäpitz können Sie jede Woche im Finanz- und Wirtschaftspodcast "Deffner&Zschäpitz" hören. +++ Werbung +++ Du möchtest mehr über unsere Werbepartner erfahren? Hier findest du alle Infos & Rabatte! https://linktr.ee/alles_auf_aktien Impressum: https://www.welt.de/services/article104636888/Impressum.html Datenschutz: https://www.welt.de/services/article157550705/Datenschutzerklaerung-WELT-DIGITAL.html
No matter what your end device is, be it a light bulb or a driver's license, it needs to be secure. I don't think we need to go through the reasons why it needs to be secure. How you do that is becoming increasingly more difficult. And you may be looking at protecting millions of devices, where each one needs its own unique identity. To get a handle on how you would do this, at least where you would begin this daunting task, I spoke to two experts: Patrick Carrier, a Manager for Secure Solutions at Infineon, and Xin Qiu, the Head of Security Solutions at CommScope. On this week's Embedded Executives podcast, they lay out the need and then the process a developer would follow.
CannCon and Alpha Warrior open this episode with laughs, cold plunges, and sponsor shout-outs before diving into the buzz around Brad Zerbo's Codex 9/11 documentary and the suspicious timing of mainstream outlets like CBS and Tucker Carlson jumping into 9/11 coverage. They call out weak “debunks” of the film and stress the need for accountability when challenging Badlands research. From there, the conversation shifts to deeper questions about intelligence agencies, false flags, and the manipulation of vulnerable individuals through AI-driven recruitment, echoing modern-day MK Ultra tactics. The hosts also wrestle with solutions to America's school shooting crisis, debating armed veterans, teacher gun safes, and innovative security systems designed by law enforcement vets. With sharp takes, humor, and personal stories, including Disney tunnel secrets and Club 33 rumors, this episode balances heavy geopolitical analysis with unfiltered banter that makes The SITREP a Badlands favorite.
Today's guest is Yogesh Ailawadi, Head of Products & Innovation - Identity, Safety and Security at Alert Enterprise. Founded in 2007, Alert Enterprise's mission is the seamless convergence of advanced physical access control, identity management and workspace automation. Their solutions are designed to empower businesses with secure, flexible and efficient work environments, catering to the dynamic needs of today's workforce. They understand that in the digital era, the security of physical and digital assets is paramount.Yogesh leads Alert Enterprise's global product management and solutions engineering teams and brings over 15 years of experience in information security, identity and access governance across IT, Physical and OT systems. He has led global deployments of PIAM/IAM solutions for Fortune 100/500 customers across various industries. Yogesh is well versed in industry regulatory standards with a deep understanding of engineering concepts and technologies, and their usage in the security domain.In the episode, Yogesh discusses:0:00 An insight into his 20-year career in security, product and innovation3:10 Pioneering physical security governance across critical industries at Alert Enterprise5:27 Expanding physical GRC by integrating with the ServiceNow platform8:04 Seeing a high-demand from large, regulated industries using ServiceNow workflows10:07 Product live on ServiceNow with focus on AI-driven access solutions11:39 Focusing on product innovation, scaling through global partners13:42 Bringing physical security workflows and AI use cases to ServiceNow
We're thrilled to introduce you to a nonprofit that is combining cutting edge logistics with addressing food insecurity and nutrition among some of the area's most vulnerable populations as we meet a board member and the founder of Nutrition Security Solutions.
There's always a lot of good going on in the greater Naugatuck Valley and today we're going to tell you all about nearly a half-million dollars in grants that were just announced to help support 16 wide-ranging organizations, agencies and activities with the President of the Valley Community Foundation. Then we're going to introduce you to a nonprofit that is combining cutting edge logistics with addressing food insecurity and nutrition among some of the area's most vulnerable populations as we meet a board member and the founder of Nutrition Security Solutions. And we'll close with our partners from Bridges, a Certified Community Behavioral Health Clinic, and state-designated local mental health authority. Their biggest community building event and fundraiser is celebrating its 34th anniversary this September - so whether you walk or bike, we'll tell you how to get involved, and why you should.
Episode 245 : Intro: Welcome to the next episode of Pi Perspectives. Today Matt welcomes David DeJesus of Argus365. David and his team offer an interesting security solution built around Artificial Intelligence. The guys discuss the synergy between private investigations and security consulting. Stick around to the end and learn how you can participate as a qualified partner with this technology. Please welcome David DeJesus and your host, NY Private Investigator, Matt Spaier Links: Matt's email: MatthewS@Satellitepi.com Linkedin: Matthew Spaier www.investigators-toolbox.com David on Linkedin: David Dejesus Email: David@Argus365.com https://www.argus365.com/ PI-Perspectives Youtube link: https://www.youtube.com/channel/UCYB3MaUg8k5w3k7UuvT6s0g Sponsors: https://piinstitute.com/ https://www.skopenow.com https://researchfpr.com/ https://www.trackops.com FBI Tip Line https://tips.fbi.gov/home https://www.fbi.gov/contact-us/field-offices/newyork/about - (212) 384-1000 WAD info https://wad100conf.net/
In this episode of Command Control Power, Sam and Jerry address listener feedback about their on-air chemistry and dive into a variety of tech discussions. Sam talks about his recent MacBook Pro M4 upgrade and the challenges he faced during the data migration process. The duo discusses the importance of maintaining and justifying tech expenses, with Sam sharing his strategy of integrating different services using Hudu for efficient billing and management. Jerry shares a humorous support call mix-up, stressing the importance of communication. The episode also touches on VPN solutions using Ubiquiti's Teleport and the surprising endurance of legacy technologies like the iPod. Throughout, Sam and Jerry explore the nuances of staying relevant and efficient in tech consulting while maintaining client satisfaction. 00:00 Introduction and Setting the Scene 00:56 Mac Migration Woes 02:11 Challenges with Migration Assistant 03:16 Time Machine Backup Struggles 07:05 Choosing the Right MacBook 10:18 Travel Tales and Personal Insights 14:42 Client Challenges and Security Concerns 17:52 User Training and Security Solutions 28:42 Microsoft Signatures and Email Platforms 29:13 Balancing Technology Costs 30:04 Subscription Services and Expense Management 31:36 Cutting Costs and Employee Tools 34:21 Old Work Stories and Company Policies 40:16 Travel Gadgets and Recommendations 48:25 Client Management and Documentation Tools 50:59 Funny Client Interaction 53:33 Conclusion and Sign Off
Cybercrime damages are predicted by Cybersecurity Ventures to cost the world $10.5 trillion annually by 2025. This harrowing statistic helped a blogger from GRAPIX AI narrate the future of cybersecurity powered by AI-driven solutions. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com.
An die 20 Werte inklusive Gold und Bitcoin als Beimischung stecken im wiki Space Innovation von "techguru" Dirk Althaus. "Ich bin fokussierter und handle weniger emotional. Ich führe weniger Werte, die aber höher gewichtet sind. Darunter einige Europäer", so der Space-Experte auf dem Vermögenstag der V-Bank in München. Im Portfolio ( https://go.brn-ag.de/426 ): Palantir, Elbit Systems, ROCKET LAB CORP. O.N., AST SPACEMOBIL.A DL-,0001, Rheinmetall, LUMIBIRD, Dassault Aviation, SAAB AB B O.N., SES, Thales, Leonardo, SAFRAN, GE AEROSPACE , Howmet Aerospace, Teledyne Technologies, Kratos Defense & Security Solutions, Eutelsat Communications und SPI.GL.INC. CL.A DL-,0001. Sowie zwei ETFs als Cashanlage: 21SHARES BITCOIN ETP OE und 21SHARES ETHER ETP OE. Der Cashbestand fällt gering aus und liegt bei derzeit 0,3 Prozent.
Brandi LaVarnway, Director of Accounting at Chimera Integrations, speaks to the importance of integrated systems, some industry challenges, and why you should take a unique approach to security solutions with the emergence of technologies.
Neil Fisher of Birdseye Security Solutions talks about cargo theft, leveraging AI for proactivity & why security solutions drive business-wide improvements. IN THIS EPISODE WE DISCUSS: [02.28] An introduction to Neil, his background, and role at Birdseye Security Solutions. [03.12] How a shifting approach to security led Mike Grabovica to establish Birdseye. “There was this shift in security in general, from being reactive to having proactive solutions. And our founder identified early on that trucking and logistics companies have really specific needs when it comes to security.” [03.57] The ongoing issue of yard security and cargo theft. [04.47] An overview of Birdseye – who they are, what they do, and how they help their customers. [05.11] The ideal client for Birdseye Security Solutions. [05.50] The biggest factors influencing the rapid rise in cargo theft. “There's some economic uncertainty out there and, with that, comes all sorts of challenges… And criminals are getting smarter and bolder.” [06.55] An overview of Birdseye's security solutions and the benefits of implementing them. “We can protect a yard, starting at the gate. Just like if you were going to protect your home, the most important part is your front door.” [08.11] The two primary ‘traditional' ways of tackling security, and their fundamental weaknesses. [09.21] How Birdseye can help organizations analyze their infrastructures and determine the security solutions that are right for them. [10.27] The importance of efficient gate management, and how it works with Birdseye. “It's important that you process trucks as quickly as possible, for efficiency but also for safety… We create a tunnel of cameras… so we can gather all that information quickly.” [12.26] Birdseye's hybrid people-plus-technology approach to security, and how they're leveraging AI to tackle a range of issues, from preventing fire to reducing liability. “In the old days, you would have a couple of agents looking at a handful of monitors. With AI, an agent doesn't have to see every action… The AI alerts the live agent that something's going on, and then the agent jumps into action… The whole point is to be proactive.” [15.10] What implementation and onboarding looks like with Birdseye. [16.04] How Birdseye's solutions and approach helps organizations with driver safety and satisfaction, ultimately helping them to retain drivers. “Drivers want to keep moving… A line-up at a facility typically counts against a drivers hours of service. So if we can move them more quickly and efficiently – which can be up to 50%, versus a live guard – drivers love it!” [17.31] A case study detailing how Birdseye helped a transportation company avoid theft and operate more efficiently. [19.43] From cargo theft to AI, the big conversations coming out of 2025 conference season. RESOURCES AND LINKS MENTIONED: Head over to Birdseye Security Solutions' website now to find out more and discover how they could help you too. You can also connect with Birdseye and keep up to date with the latest over on LinkedIn, YouTube, Facebook, Instagram and X (Twitter), or you can connect with Neil on LinkedIn. Check out our other podcasts HERE.
Our guests, Dr. Evan Fortunato (President & CEO, Apogee Research), Kirk McConnell (retired Professional Staff Member on the Senate Armed Services Committee), and Robert "Otis" Winkler (Vice President, Kratos Defense & Security Solutions) join the podcast for a discussion on Modular Open Systems Architecture (MOSA). During this episode, they cover the operational advantages and acquisition risks, how recent legislation affects the Department of Defense's adoption of MOSA practices, and how to think about standards as a barrier or enabler of modular and open systems. The podcast also discusses potential tools for creating interoperable systems. To receive updates about the NDIA Emerging Technologies for Defense Conference and Exhibition on August 27-29, 2025 at the Washington D.C. Convention Center, please join our mailing list here: https://www.emergingtechnologiesinstitute.org/sign-up http://emergingtechnologiesinstitute.org https://www.facebook.com/EmergingTechETI https://www.linkedin.com/company/ndia-eti-emerging-technologies-institute https://www.twitter.com/EmergingTechETI
Our guests, Dr. Evan Fortunato (President & CEO, Apogee Research), Kirk McConnell (retired Professional Staff Member on the Senate Armed Services Committee), and Robert “Otis” Winkler (Vice President, Kratos Defense & Security Solutions) join the podcast for a discussion on Modular Open Systems Architecture (MOSA). During this episode, they cover the operational advantages and acquisition risks, how recent legislation affects the Department of Defense's adoption of MOSA practices, and how to think about standards as a barrier or enabler of modular and open systems. The podcast also discusses potential tools for creating interoperable systems.To receive updates about the NDIA Emerging Technologies for Defense Conference and Exhibition on August 27-29, 2025 at the Washington D.C. Convention Center, please join our mailing list here: https://www.emergingtechnologiesinstitute.org/sign-up http://emergingtechnologiesinstitute.orghttps://www.facebook.com/EmergingTechETIhttps://www.linkedin.com/company/ndia-eti-emerging-technologies-institute https://www.twitter.com/EmergingTechETI
In this episode of the Get Connected Podcast, we tackle some of the biggest issues in tech and security. Mastercard's VP of Security Solutions, Amisha Parikh, joins us to discuss the rising threat of cyber fraud, how AI is being used by both criminals and security experts, and what Canadians can do to stay safe online. We also dive into the impact of new U.S. tariffs on physical media, the shift toward digital downloads, and Google's latest AI-powered initiative to improve subway safety. Plus, we break down the growing legal battle over Google's dominance in search and web browsers. Don't miss this insightful discussion on the future of cybersecurity, digital commerce, and tech policy!
Panelists: • Col Timothy M. Helfrich, Senior Materiel Leader, Advanced Aircraft Division, Air Force Materiel Command • Mike Shortsleeve, Vice President, Strategy Business Development, General Atomics Aeronautical Systems • Diem Salmon, Vice President for Air Dominance & Strike, Anduril Industries • Mike Benitez, Senior Director of Strategic Product Development, Shield AI • Robert Winkler, Vice President, Corporate Development and National Security Programs, Kratos Defense and Security Solutions
In honor of International Fraud Awareness Week we're dropping a heavy hitter episode where Jordan interviews Seckin Yilgoren, SVP of Security Solutions for North America at Mastercard. They discuss the growing risks of cyber attacks, the role of AI in both facilitating and combating fraud, and Mastercard's initiatives to protect consumers from scams. They highlight the importance of evolving technology in the fight against fraud and the need for consumer awareness in an increasingly digital world. They also discuss the challenges of traceability in digital transactions and the rise of first party fraud. Seckin helps us understand the Mastercard product First Party Trust which is a program designed to hold the right parties accountable for fraud claims, and emphasizes the importance of data sharing and AI in preventing fraud. The show wraps up with their predictions on future trends in fraud prevention and their thoughts on the need for more regulations in cybersecurity. Seckin Yilgoren: https://www.linkedin.com/in/seckin-yilgoren/ Mastercard blog: https://b2b.mastercard.com/news-and-insights/blogs/
Podcast: OT Security Made SimpleEpisode: How do you secure the smart grid infrastructure? | OT Security Made SimplePub date: 2025-02-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of OT Security Made Simple, Zeek Muratovic, Director of Security Solutions for the Landis+Gyr group talks about the challenges and shortcomings of energy distributors, and the first steps to secure the growing and ever more complex smart grid infrastructure from the distribution network to the edge like smart meters and EV charging stations.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
This episode of the “On Location” series, recorded during ThreatLocker Zero Trust World 2025 in Orlando, features an insightful conversation with Amanda Makowsky, Solution Engineer at ThreatLocker. Amanda shares how ThreatLocker maintains a human touch in cybersecurity while delivering robust solutions for organizations of all sizes.The Human Element in TechnologyAmanda explains how ThreatLocker emphasizes human interaction from the first demo through implementation and beyond. When potential customers engage with ThreatLocker, they are assigned a dedicated Solution Engineer as their technical point of contact. Amanda highlights how this relationship extends beyond the sales process, ensuring partners have continuous support as they mature their security environments. Whether working with small businesses or large enterprises, the focus remains on personalized service and hands-on assistance.Support That Stands OutThreatLocker's commitment to human-centric support is evident through its 24/7 live helpdesk, staffed by real people in Orlando, Florida. Amanda notes the goal of responding to chat requests within a minute, providing immediate support without relying on bots or automated responses. This approach fosters trust and ensures that customers, regardless of their organization's size, receive timely and effective help.Customization and Real-World ImpactAmanda shares how every partner's environment is unique, requiring tailored solutions to accommodate different software, hardware, and operational needs. She emphasizes the importance of building specific and intentional roles within ThreatLocker's systems to match the diverse environments of their partners. The impact of this customization is profound, as partners express a sense of security that allows them to “sleep better at night.”Listen to this episode to explore how ThreatLocker combines technology with human connection, offering a refreshing perspective in the cybersecurity industry.Guest
Join us as we talk with Eric Howard, Director of Marketing at Troy Group, a leading security solutions company with 60 years of expertise in MICR printing and check security. In this episode, Eric shares insights into Troy Group's innovative approach to preventing check fraud through patented technology and their commitment to US manufacturing. He discusses their digital-first marketing strategy, the importance of organic search in lead generation, and how they're adapting to modern security challenges while maintaining their position as HP's exclusive OEM partner. Eric also offers valuable perspectives on leadership and staying current with marketing trends in the security industry.
Time stamps: Introducing Mike Belshe (00:00:42) Mike Belshe's Background (00:01:58) Self-Custody vs. Institutional Custody (00:02:05) Multi-Signature Technology (00:03:56) Understanding Multi-Party Computation (00:04:51) Advancements in Cryptography (00:05:53) BitGo's Role in Tokenizing Bitcoin (00:08:26) Defining DeFi's Importance (00:09:09) Mike's Technology Background (00:12:12) Inspiration from Tim Berners-Lee (00:14:57) Bitcoin's Zero Click Payments (00:17:11) Bitcoin Custodianship Issues (00:17:36) Challenges of Bitcoin Payments (00:18:25) Scaling Bitcoin and Lightning Network (00:19:20) Bitcoin's Role in Digital Money (00:20:13) Layer Two Solutions and Drivechains (00:21:15) Scaling Discussions in Bitcoin's History (00:22:31) Sidechains and Their Limitations (00:23:16) Innovation vs. Immutability (00:24:29) Importance of Real Applications (00:25:32) Privacy and Fungibility in Bitcoin (00:28:42) Lessons from TCP/IP and Blockchain Privacy (00:30:51) Regulatory Concerns and Privacy Solutions (00:32:53) Understanding the Static of Security (00:34:01) SideShift (00:34:59) Bitcoin's Civil War: Block Size Wars (00:35:54) Human Decisions in Bitcoin (00:36:16) Historical Proposals and Interpretations (00:37:10) Challenges of Block Space and Fees (00:37:58) Bitcoin Consensus (00:38:48) SegWit and Its Implications (00:39:41) Gavin Andresen's Role in Bitcoin (00:42:00) Bitcoin's Resilience Against Adversaries (00:42:13) Need for Enhanced Security (00:43:05) Strategic Bitcoin Reserve in the USA (00:44:30) El Salvador's Currency Strategy (00:45:19) Self-Custody Concerns (00:49:13) Security Measures for Self-Custody (00:50:17) Privacy as a Solution (00:50:43) Self-Custody Options (00:51:14) Family Legacy and Custody Challenges (00:52:24) Public Key Cryptography Innovation (00:52:28) HODLING.ch (00:53:29) Protecting Against Government Confiscation (00:54:15) Multi-Custodial Model Explanation (00:54:21) Hardware Wallets Discussion (00:56:03) Safety Deposit Box Concerns (00:58:03) Trade-offs in Security Solutions (00:58:56) Onboarding New Users (01:00:09) Edge Wallet Features (01:01:01) BitGo's Wallet Recovery Wizard (01:03:02) BitGo vs. Casa (01:05:08) Multi-Signature Security (01:05:46) Early Adoption of Multi-Sig (01:09:10) Building a New Monetary System (01:11:54) Regulatory Changes in the US (01:13:49) Impact of MiCA in Europe (01:15:32) War on Cash (01:16:17) Global Financial Systems (01:18:03) Zero Knowledge Proofs (01:19:48) Zcash Discussion (01:20:04) Privacy Technologies in Bitcoin (01:21:18) Challenges of On-chain Traceability (01:22:26) Philosophy on Transaction Privacy (01:23:19) Concerns About Privacy Adoption (01:24:51) Historical Context of TCP/IP Security (01:25:34) Bitcoin as Digital Gold (01:27:24) Ethereum's Role in DeFi (01:29:01) Benefits of Smart Contracts (01:32:01) Reflections on Bitcoin's Journey (01:33:25) Future of Bitcoin (01:34:30) Lightning Network Fees (01:36:12) Trade-offs in Payment Systems (01:38:01) Adoption of Bitcoin and Early Adoption Costs (01:42:01) Long-term Viability of Bitcoin Mining (01:44:38) The Future of Bitcoin and Layer Solutions (01:47:17) Community Response to Bitcoin Vulnerabilities (01:49:01) Satoshi's Vision for Mining (01:51:11) Satoshi's Intentions (01:52:35) Empathy for Satoshi (01:54:16) 0 to 1 Concept (01:54:24) Bitcoin's Anniversary (01:55:53) Centralization in Crisis (01:56:33) Zero Knowledge Proof Bug (01:57:45) Following Mike Belshe's Work (01:58:45)
In this engaging episode of MSP Business School, host Brian Doyle introduces Dror Liwer, co-founder of Coro, to dive into the arena of cybersecurity for MSPs (Managed Service Providers). As the holiday season emerges, there's a significant emphasis on drawing the curtains on 2023 with fortified security strategies. Dror shares Coro's approach to simplifying cybersecurity for small and mid-sized businesses by optimizing MSP capabilities through a robust, single-pane management platform. The episode explores Coro's unique positioning in the cybersecurity sphere, highlighting their seamless integration approach to mitigate sunk costs and training burdens faced by MSPs. Drawing keen attention to Coro's strategic alignment with MSPs, Dror discusses their modular cybersecurity platform that addresses six critical security domains, thus redefining efficiency and cost-efficacy in the cybersecurity landscape. The session also covers how Coro's solutions facilitate easier transitions to managed services, allowing MSPs to maintain flexibility while expanding their security offerings. Key Takeaways: Coro's modular cybersecurity platform streamlines security management across six key areas, helping MSPs provide comprehensive protection with minimal sunk costs. Leveraging a single endpoint agent, Coro offers seamless integration, allowing IT administrators—regardless of their cybersecurity expertise—to operate efficiently from day one. The growing necessity for robust cybersecurity solutions is recognized as a primary driver for MSP growth, with security services forming a key part of customer retention and acquisition strategy. Dror emphasizes the importance of MSPs tapping into the rapidly expanding SMB cybersecurity market, projected to quadruple by 2028. Coro offers a partner-focused approach, including white-label managed services, to empower MSPs in building and scaling their cybersecurity offerings Show Website: https://mspbusinessschool.com/ Guest Name: Dror Liwer LinkedIn page: https://www.linkedin.com/in/drorliwer/ Company: Coro Website: https://www.coro.net/ Host Brian Doyle: https://www.linkedin.com/in/briandoylemetathinq/ Sponsor vCIOToolbox: https://vciotoolbox.com
Three Buddy Problem - Episode 26: We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International's explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite. Plus, thoughts on the US government's controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad's dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence. Also, a mysterious BeyondTrust 0-day! Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).
In this Brand Story episode, Sean Martin and Marco Ciappelli explore how Guardz is transforming cybersecurity for Managed Service Providers (MSPs) and small to medium-sized businesses (SMBs). The discussion features insights from Sarah Lampert, Customer Success Manager, and William Barr, Account Executive at Guardz, who shed light on the company's innovative approach to simplifying and optimizing cybersecurity solutions.Bridging the Gap for SMBsSmall to medium-sized businesses often lack dedicated IT or security teams, leaving them vulnerable to cyber threats. William Barr emphasizes how Guardz fills this gap by providing MSPs with tools tailored for SMBs. These tools simplify security management, offering MSPs a unified platform that addresses complex needs without requiring a patchwork of expensive, disparate solutions.Ease of Use and FlexibilityGuardz stands out by offering a user-friendly, AI-powered platform that integrates seamlessly into MSPs' existing workflows. Sarah Lampert highlights the platform's simplicity, enabling even small MSPs to onboard quickly and manage cybersecurity effectively. The product's flexibility allows MSPs to scale their offerings, catering to clients with varying security needs while keeping costs manageable.Key features include:Unified detection and response capabilities.Customizable security controls for different client environments.User-based pricing models that eliminate device-based cost complexities.Support Beyond TechnologyGuardz doesn't stop at providing a robust platform—it empowers MSPs through comprehensive support. Sarah Lampert explains how the Customer Success team aids MSPs with onboarding, marketing materials, and strategic advice, ensuring they position Guardz as a core component of their service stack. The company also facilitates continued learning through webinars, hands-on trials, and direct communication channels.Innovative AI IntegrationAI plays a pivotal role in Guardz's ability to streamline cybersecurity. By analyzing patterns and predicting risks, the platform helps MSPs preempt threats and respond efficiently. William Barr underscores AI's potential to reduce manual effort while enhancing security accuracy, making advanced protection accessible to smaller organizations.Cyber Insurance: A Competitive EdgeGuardz takes its commitment a step further by integrating cyber insurance into its offerings. Qualified clients can access affordable coverage directly through Guardz, ensuring SMBs meet evolving security and compliance standards. This feature not only protects businesses but also equips MSPs with a unique selling point.The Future of GuardzAs Guardz continues to evolve, its focus remains on simplifying cybersecurity for MSPs while providing scalable, cost-effective solutions for SMBs. The team's proactive approach, coupled with constant feedback integration, ensures the platform stays relevant in a dynamic cybersecurity landscape.MSPs looking to streamline their operations and enhance client security are encouraged to explore how Guardz can help achieve these goals. For more information, connect with the Guardz team or visit their platform for a trial.Learn more about Guardz: https://itspm.ag/guardzrgigNote: This story contains promotional content. Learn more.Guests:Sarah Lampert, Customer Success Manager, Guardz [@GuardzCyber]On LinkedIn | https://www.linkedin.com/in/sarlampert/William Barr, Account Executive, Guardz [@GuardzCyber]On LinkedIn | https://www.linkedin.com/in/william-barr-a447541ab/ResourcesLearn more and catch more stories from Guardz: https://www.itspmagazine.com/directory/guardzFor a free 14 day trial of Guardz's platform please visit https://itspm.ag/guardzgvu3 .Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Our guest on this week's episode is Lee Ambrose, vice president at Remote Security Solutions. We hear regularly about securing our supply chains from threats, such as products being stolen while they are in transit. But security is more than just theft - it is also securing and protecting facilities and the people who work in them. Our guest discusses the possible threats that face our supply chains and how to keep both workers and products safe from harm. California this week got federal approval to move ahead to the final stages of approval for its 2022 plan to gradually scale back the sale of gas-powered cars within the state. They needed federal approval to have a standard different from broader U.S. rules, and the EPA has now allowed what's called the Advanced Clean Cars II rule. This means that by 2035, all new cars sold in California will have to be zero-emissions models, which includes battery-electric, hydrogen fuel cell, and plug-in hybrid cars. Congestion on U.S. highways is costing the trucking industry big, according to research from the American Transportation Research Institute (ATRI), which was released this week. The group found that traffic congestion on U.S. roadways added $108.8 billion in costs to the trucking industry in 2022—the latest data available. This is a record high. We look at states with the highest amount of traffic congestion. Supply Chain Xchange also offers a podcast series called Supply Chain in the Fast Lane. It is co-produced with the Council of Supply Chain Management Professionals. A series of ten episodes is now available on the "State of Logistics." The episodes provide in-depth looks into the current states of key transportation modes, such as trucking, rail, air, and ocean. It also looks at inventory management, 3PLs and more. All ten episodes are available to stream now. Go to your favorite podcast platform to subscribe and to listen to past and future episodes. The podcast is also available at www.thescxchange.com.Articles and resources mentioned in this episode:Remote Security SolutionsCalifornia moves a step closer to requiring EV sales only by 2035Trucking industry experiences record high congestion costsVisit Supply Chain XchangeListen to CSCMP and Supply Chain Xchange's Supply Chain in the Fast Lane podcastSend feedback about this podcast to podcast@agilebme.comPodcast is sponsored by: Werner Premium ServicesOther linksAbout DC VELOCITYSubscribe to DC VELOCITYSign up for our FREE newslettersAdvertise with DC VELOCITYTop 10 Supply
Chris Holman welcomes Christine Sermak, COO of Total Security Solutions and the winner of the 2024 Manufacturing Talent Champion Award. Welcome Chirstine, remind the Michigan business community about Total Security Solutions? How long have you served with the company, and what's changed over those years? So you recently won the 2024 Manufacturing Talent Champion Award from MMA, the Michigan Manufacturers Association tell us about that? How is your company keeping up with and innovating manufacturing? How do you leverage the services of MMA during the year? » Visit MBN website: www.michiganbusinessnetwork.com/ » Watch MBN's YouTube: www.youtube.com/@MichiganbusinessnetworkMBN » Like MBN: www.facebook.com/mibiznetwork » Follow MBN: twitter.com/MIBizNetwork/ » MBN Instagram: www.instagram.com/mibiznetwork/
In today's episode, Rick interviews Nakita Rowell, Marketing Specialist at ComTech, a Georgia-based integrated security company offering physical security solutions like access control, video surveillance, and intercom systems. Nakita shares how ComTech provides custom, product-agnostic security solutions for businesses, government entities, and industries like car dealerships, gyms, and retail. She highlights the company's reliance on word-of-mouth (WOM) referrals, their focus on customer needs, and efforts to modernize their digital presence. Nakita also provides marketing insights, emphasizing automation, storytelling, and relationship-building. Tune in to learn how ComTech combines 30+ years of experience with customer-centric strategies to deliver peace of mind.
We hear from participants at this year's Cranky Dorkfest, the U.S. Marine Corps flew the XQ-58A Valkyrie drone with four F-35B fighters, American Airlines flew a B787 from Dallas to Brisbane in a 15 hour and 44-minute flight, a pair of corporate flight attendants are suing their employer, airlines are reacting to flight restrictions over Russia, and the Portland Jetport is replacing the firefighting foam with something more environmentally friendly. Also, a self-propelling ionic thrust wing, an exploding satellite, and thoughts on DB Cooper from an expert parachutist. Cranky Dorkfest 2024 Brian Coleman recorded interviews at Cranky Dorkfest on September 14, 2024: Melissa - Why she keeps coming back. Her husband is former military mechanic. Benny - A first-timer with a unique Boeing airplane-related telephone number. Jvan - He took home last year's brick mosaic. This is his 3rd year participating. Matt Sauchelli - He's shooting with a Nikon mirrorless camera and a long lens. Ben Grenuchi and Heather - From NYCAviation. Ian Petchenik - Director of Communications at Flightradar24 the live, global flight tracking service. Also, the co-host of AvTalk podcast. Brett (Cranky) Snyder. The man behind it all. For Those Who Didn't Attend, Here's What You Missed at Cranky Dorkfest This Weekend Aviation News Marines score aviation firsts with F-35 squadron, drone test and more A Marine Corps XQ-58A Valkyrie drone completed a test flight last week at Eglin Air Force Base, Florida. Col. Derek Brannon, branch head for the Cunningham Group, deputy commandant for aviation said “The flight focused on the use of tactical data links to enable digital communication between the XQ-58A and an airborne four-ship of F-35Bs from Marine Fighter Attack Squadron 214 and other joint aircraft.” XQ-58A Valkyrie, courtesy AFRL. The XQ-58A Valkyrie is a low-cost, high-performance, reusable unmanned air vehicle developed through an Air Force Research Laboratory partnership with Kratos Defense & Security Solutions, Inc. This vehicle is an example of an “attritable” aircraft designed to be used for several missions, but built at a cost that permits it to be a combat loss. American Airlines' longest flight set to be one of the most tracked in the world The American Airlines inaugural flight from Dallas to Brisbane in Australia was heavily followed on Flightradar24. Director of Communications Ian Petchenik said people worldwide “are especially keen to watch the livestream of the landing.” The Boeing 787-9 (N825AA), flight AA7, made the trip in 15 hours and 44 minutes covering a great circle distance of 13,363 KM. See Flight history for American Airlines flight AA7. Overworked Private Flight Attendants For Co-Founder of The Home Depot Claim ‘Inept' Colleagues Kept Their Jobs Because They Were in ‘Romantic Relationship' With Boss Two private flight attendants filed a lawsuit claiming they were overworked while working for the co-founder of The Home Depot, while “inept” co-workers had romantic relationships with their bosses. The two FAs, who quit their jobs, said they sometimes worked 26 days per month and around 90 hours per week. Why It's Harder Getting to China As a result of the war in Ukraine, non-Chinese airlines are no longer entering Russian airspace, so some are discontinuing service to China, or reducing frequency. Demand for flights to China is down, and the cost of avoiding Russian airspace in time and fuel is significant. Virgin Atlantic is dropping its flight connecting Shanghai to London, LOT Polish Airlines is suspending its Warsaw-to-Beijing flights, and SAS plans to stop direct flights between Copenhagen and Shanghai. Chinese airlines are adding capacity. PFAS-free firefighting foam coming to jetport The Portland (Maine) Fire Department plans to replace the AFFF firefighting foam used at the Portland International Jetport with PFAS-free foam.
CISA has garnered over 230 voluntary commitments from software manufacturers to adopt safer software development practices as part of the secure-by-design initiative. This initiative aims to address critical vulnerabilities, particularly those arising from memory-unsafe programming languages, which account for 60 to 70 percent of security issues. The agency has also released a document titled "Product Security Bad Practices," inviting public comments to guide vendors on best practices for enhancing software security.The episode also covers Delta Airlines' lawsuit against CrowdStrike, seeking $500 million in damages due to a software update that caused a massive outage affecting millions of customers. Delta claims that CrowdStrike's negligence in testing the update led to significant disruptions, while CrowdStrike argues that Delta's outdated IT infrastructure contributed to the slow recovery. Cybersecurity expert Dr. Elia Kolchenko suggests that proving negligence in court may be challenging for Delta, hinting that an out-of-court settlement could be more advantageous for both parties.Apple has launched its Private Cloud Compute Virtual Research Environment, allowing security researchers to verify the company's privacy and security claims regarding its AI-driven cloud intelligence system. This initiative includes the release of a security guide and source code for select components, reinforcing Apple's commitment to data privacy. The episode highlights how this move could influence vendor decisions as organizations increasingly prioritize privacy and security in their cloud strategies.Lastly, the episode discusses Kaseya's new user security solution, which is priced at $2.79 per user, following its acquisition of SaaS Alerts. This offering aims to help small businesses protect against identity threats and reflects a growing trend among managed service providers (MSPs) to focus on SaaS security. Sobel emphasizes the importance of proactive risk management and the need for MSPs to adapt to the evolving landscape, where cloud vulnerabilities have surpassed ransomware as the top security threat. The insights shared in this episode underscore the critical need for organizations to prioritize security in their software development and operational practices. Four things to know today 00:00 CISA's Secure-by-Design Initiative Gains Momentum as Delta-CrowdStrike Lawsuit Highlights Risks of Software Update Failures04:21 Security Experts Gain New Access as Apple Releases Private Cloud Compute Environment for AI and Privacy Verification05:54 Kaseya Acquires SaaS Alerts, Launches Affordable User Security Solution for MSPs at $2.79 Per User09:23 MSPs Shift Focus as Cloud Vulnerabilities Surpass Ransomware as Top Security Threat, Channel Mastered Survey Shows Supported by: https://timezest.com/mspradio/https://www.coreview.com/msp All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social
Breaking into Cybersecurity: The Role of AI in Strengthening Cybersecurity / Bryan KissingerBryan C. Kissinger, PhD, serves as the Senior Vice President of Security Solutions and Chief Information Security Officer at Trace3. With over 25 years of experience, he excels in maturing IT risk and information security programs and implementing emerging technologies. Previously, he was a CISO at Banner Health and had extensive experience across various sectors, including healthcare and finance. Dr. Kissinger holds a PhD in Information Technology Management and several professional certifications. He is also a Navy veteran and divides his time between Miami Beach, FL, and Asheville, NC.Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books:Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/About the hosts:Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/Download a free copy of her book at magnetichiring.com/bookChristophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.comWebsite:
In this conversation, Founding Partner and Chief Investment Officer at Avory & Co. Sean Emory interviews Christopher Shasse, founder of Rocketman Tech, discussing the role of Jamf in managing Apple devices in enterprise environments. They explore Jamf's history, its relationship with Apple, and the competitive landscape, particularly focusing on Microsoft Intune as a significant competitor. The discussion also touches on Jamf's security solutions and the future direction of the company following the JNUC conference. Learn more about Rocketman Tech: https://www.rocketman.tech/Linkedin: https://www.linkedin.com/company/rocketman-tech/about/Youtube Video: Intune vs Jamf: https://www.youtube.com/watch?v=tEI52ho411A Chapters 00:00 Introduction to Jamf and Rocketman Tech 03:00 The Role of Jamf in Enterprise IT 05:52 Understanding Jamf Users and Administrators 09:13 Jamf's Relationship with Apple 12:02 Competitive Landscape: Jamf vs. Apple Business Essentials 14:55 Microsoft Intune: A Major Competitor 17:53 Jamf's Future and Expansion Strategies 21:14 Security Solutions and Opportunities for Growth 25:05 Post-Conference Reflections and Future Directions Keywords Jamf, Rocketman Tech, Apple, enterprise IT, Microsoft Intune, security solutions, technology conference, JNUC, IT management, MDM Disclaimer Avory & Co. is a Registered Investment Adviser. This platform is solely for informational purposes. Advisory services are only offered to clients or prospective clients where Avory & Co. and its representatives are properly licensed or exempt from licensure. Past performance is no guarantee of future returns. Investing involves risk and possible loss of principal capital. No advice may be rendered by Avory & Co. unless a client service agreement is in place. Listeners and viewers are encouraged to seek advice from a qualified tax, legal, or investment adviser to determine whether any information presented may be suitable for their specific situation. Past performance is not indicative of future performance. “Likes” are not intended to be endorsements of our firm, our advisors or our services. Please be aware that while we monitor comments and “likes” left on this page, we do not endorse or necessarily share the same opinions expressed by site users. While we appreciate your comments and feedback, please be aware that any form of testimony from current or past clients about their experience with our firm is strictly forbidden under current securities laws. Please honor our request to limit your posts to industry-related educational information and comments. Third-party rankings and recognitions are no guarantee of future investment success and do not ensure that a client or prospective client will experience a higher level of performance or results. These ratings should not be construed as an endorsement of the advisor by any client nor are they representative of any one client's evaluation. Please reach out to Houston Hess our head of Compliance and Operations for any further details. Find more here https.www.avory.xyz/disclaimer-pagee
Streamline threat detection and response across diverse environments with Microsoft Sentinel, your cloud-native SIEM solution. With features like Auxiliary logs for low-cost storage and proactive data optimization recommendations, you can efficiently manage high volumes of security data without compromising on threat intelligence. Leverage built-in AI and automation to uncover hidden threats and reduce investigation time from days to minutes. Rob Lefferts, CVP for Security Solutions at Microsoft, joins Jeremy Chapman to show how to migrate from existing SIEM solutions with built-in migration tools, ensuring seamless access to your security logs while maintaining investigative integrity. ► QUICK LINKS: 00:00 - Microsoft Sentinel, modern Cloud SIEM 01:12 - Unified security operations platform 02:55 - Prioritize security updates 04:27 - Storage options 05:11 - Optimize data coverage and usage 06:17 - Protect against long-term persistent attacks 07:58 - Automation using auxiliary logs 08:59 - Manual effort 10:10 - Automation 12:07 - Migration 13:31 - Wrap up ► Link References Get started at https://aka.ms/MicrosoftSentinel Find samples for the Playbook Logic App and the Function app at https://aka.ms/AuxLogsTIapp ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
In this episode of Pathmonk Presents, host Ernesto welcomes Brianna Valleskey, Head of Marketing at Inscribe. Brianna shares insights into Inscribe's AI-powered solutions for fraud detection and risk assessment in the financial services sector. She discusses how their technology analyzes application data, including documents and open banking information, to identify trustworthy and creditworthy customers. Brianna also delves into Inscribe's marketing strategies, emphasizing the importance of data-driven decision-making and the role of their website in client acquisition. The conversation covers emerging trends in fraud prevention, the impact of generative AI, and valuable tips for effective marketing leadership.
In this Cyber Security Awareness Month special episode of Nighttime, we explore the growing threat of cybercrime in Canada. Joined by Amisha Parikh, Vice President of Security Solutions at Mastercard, and Detective David Coffey from the Toronto Police Services Financial Crimes Unit, we delve into the latest cybercrime trends, their impact on individuals and small businesses, and real-world Canadian cases making headlines. This episode offers valuable insights into how Canadians can safeguard themselves in an increasingly digital world. Links: make a case suggestion: https://www.nighttimepodcast.com/contact Provide feedback and comments on the episode: nighttimepodcast.com/contact Subscribe to the show: https://www.nighttimepodcast.com/subscribe Musical Theme: Noir Toyko by Monty Datta Contact: Website: https://www.nighttimepodcast.com Twitter: https://twitter.com/NightTimePod Facebook: https://www.facebook.com/NightTimePod Instagram: https://www.instagram.com/nighttimepod Support the show: https://www.patreon.com/nighttimepodcast Learn more about your ad choices. Visit megaphone.fm/adchoices
Thanks to our Partner, NAPA Auto Care Recorded at the 2024 Automotive Aftermarket Retailers of Ontario (AARO) Business Management and Lindertech Training Tradeshow, Carm sits down with Donny to explore his pivotal role at NASTF and his experiences working with automakers like Tesla. Donny shares behind-the-scenes insights on NASTF's technician support initiatives, their impressive membership growth, and the innovative solutions they're implementing to support automotive technicians. We dive into Donny's personal journey, his passion for the automotive industry, and the critical role of good business management in ensuring the success of repair shops. "The National Automotive Service Task Force (NASTF) is a 501 C6 not-for-profit organization established in 2000 by Automakers and the independent aftermarket to identify and resolve gaps in Service information, Tool Information, and Training." Donny Seyfer, NASTF, Listen to Donny's previous episodes HERE. Show Notes Watch Full Video Episode Automotive Aftermarket Retailers of Ontario (AARO): https://www.aaro.ca/ Overview of NASTF's Work (00:01:17) Donny discusses his responsibilities at NASTF and the importance of technician support. Technician Connection (00:02:09) Donny expresses his passion for helping technicians solve problems in the automotive industry. Growth of NASTF (00:02:39) Donny highlights the increase in NASTF membership from 6,000 to 43,000 members. Funding and Operations (00:03:02) Discussion on NASTF's funding model and its impact on operations for technicians. Listening and Gathering Information (00:04:23) Donny explains how he gathers information from industry members through subcommittees. Challenges with Automakers (00:06:08) Donny talks about the disconnect between aftermarket technicians and automakers. Collaboration with Tesla (00:07:15) Donny shares his experience in establishing a relationship with Tesla regarding repair initiatives. Implementation of Security Solutions (00:08:57) Discussion on the development of security solutions for Tesla vehicles. Building Relationships with Rivian (00:10:36) Donny mentions ongoing collaboration with Rivian to improve security features. Future Projects (00:11:29) Donny outlines upcoming projects and initiatives NASTF is working on. Scan Tool Validation Program (00:11:52) Introduction of a program aimed at validating aftermarket scan tools for security.. Key services in repair shops (00:18:03) Exploration of the role of vehicle security professionals in service repair. Importance of key cutting in shops (00:19:19) Insight into the necessity of key cutting machines in repair shops for customer service. Car theft statistics (00:20:18) Revelation of alarming statistics regarding car thefts linked to dealer interactions. Advice for young adults (00:23:19) Donny shares fatherly advice on financial responsibility and managing phone distractions. Economic education for kids (00:24:24) Discussion on the lack of financial education for youth and its implications. Donny's leadership roles (00:26:47) Overview of Donny's extensive...
Smart Speaker Sleuthing: Echo Evidence and Digital Detectives. Sensory Synergy: Smarter Sensors Sparking Exercise Engagement. Virtual Reality, Valkyrie, and Voyages: A Robotic Revolution in Space. Cellular Cancer Claims Crushed: Mobile Misconceptions Dispelled. Failed Feedback: The Fizzling of '90s Haptic Vests. Mario Moves: Machine Learning Meets Mushroom Kingdom in AI Game Generation. Crack-Resistant Concrete: Nature-Inspired Toughness Takes Shape. Muscle-Powered Mechanics: Robotic Legs Leap with Oil-Filled Agility. Holographic Hounds and Police Projections: Ford's Futuristic Car Security Solution.
In this bonus episode of Detailed, we share a LIVE conversation from the 2024 AIA Conference on Architecture & Design in Washington D.C.Cherise is joined by Paul La Vigne, Chief Marketing Officer at Total Security Solutions. Paul details how Total Security Solutions' designs, installations, and manufactured products are crucial in stopping bullets, thereby saving and protecting lives, facilities, and property.If you enjoy this episode, visit arcat.com/podcast for more. If you're a frequent listener of Detailed, you might enjoy similar content at Gābl Media.
On this episode of The Cybersecurity Defenders Podcast, we speak with Gerard Johansen, Principal Security Solutions Specialist at Red Canary.Gerard is a seasoned expert in the field of cybersecurity. Gerard holds the prestigious Certified Information System Security Professional - or CISSP. His extensive career includes serving as a Special Deputy United States Marshal for the FBI's Connecticut Computer Crimes Task Force and working as a Certification and Accreditation Analyst for a federal inter-agency unit. Gerard has conducted numerous technical and non-technical vulnerability assessments for both financial and government organizations, demonstrating his deep expertise in digital forensics and incident response.With a wealth of experience in risk assessment, cyber threat intelligence, and penetration testing, Gerard is frequently sought after for his knowledge in corporate counterintelligence, threat emulation, and cloud security challenges. He has developed and maintained crucial industry relationships through ongoing professional development and is a trusted resource for information security seminars and training programs.
Are you and your organization prepared for the future of cyber security? Today, I'm joined by Tom Gillis, Senior Vice President and General Manager of Cisco's Security Business Group on the Tech Talks Daily Podcast. Broadcasting directly from the vibrant atmosphere of Cisco Live in Las Vegas, Tom joins us to unravel the dynamics of cyber security within the framework of a renowned networking giant. With a career that spans influential roles at VMware and now at Cisco, Tom offers unique insights into the evolution of cybersecurity strategies and their crucial role in shaping business resilience. Tom discusses the latest innovations unveiled at Cisco Live. From the groundbreaking Cisco Hypershield to enhancements in AI-driven security management, these developments represent Cisco's commitment to fortifying enterprise defenses against increasingly sophisticated threats. As we delve into these topics, Tom will also share his personal journey and the reasons behind Cisco's accelerated innovation in recent times. So, buckle up as we transport you to the heart of Cisco Live, where the future of enterprise security is being redrawn. Join us for a conversation that promises to be as enlightening as it is inspiring. What are your thoughts on the trajectory of cyber security and the innovations discussed today? How do these advancements resonate with your professional experiences or the challenges faced by your organization? I encourage you to share your perspectives and join the ongoing dialogue by reaching out through our various platforms.
In this sponsored conversation, I speak with Corey Ranslem, CEO of Dryad—and the resident expert on Maritime Attacks—and Ismael Valenzuela, VP of Threat Intelligence and Research at Blackberry. We talked about all things Maritime Security, and I learned a whole lot from the conversation. Digital Hijacking at Sea: Unveiling a Cyber Attack Scenario in the Red Sea BlackBerry Quarterly Global Threat Report — March 2024 00:00:00 Introduction and Guest Welcome00:00:30 Maritime Security Overview00:01:15 Baltimore Incident Discussion00:02:00 Legacy Systems on Ships00:03:20 Connectivity Challenges at Sea00:04:10 Cyber Threats in Maritime Industry00:05:00 Post-Accident Cyber Investigations00:06:00 Potential Cyber Attacks on Ships00:07:30 Threat Scenarios and Models00:08:45 USB and External Media Threats00:09:30 Evolution of Navigation System Connectivity00:10:30 Crew Connectivity and Cyber Risks00:11:30 Lessons from Other Industries00:12:15 GPS Spoofing and Navigation Interference00:13:30 Digital Hijacking of Ships00:14:45 Economic Disruption via Cyber Attacks00:16:00 Financial Motivation Behind Attacks00:17:15 Ransomware in Maritime Context00:18:30 Panama Canal and Economic Impact00:19:30 Cyber Security Maturity in Maritime Industry00:21:00 Legacy Systems and Geopolitical Interests00:22:15 Challenges with Security Solutions at Sea00:23:30 Historical Cyber Incidents in Maritime00:24:30 GPS Spoofing Techniques00:25:15 International Maritime Organization Standards00:26:30 Criminal Trends and Cyber Attacks00:27:45 Open Source Tools and Threat Actors00:28:45 Information Sharing in Maritime Industry00:29:30 Real-World Examples of Cyber Incidents00:31:00 Cruise Ships and Large Yachts Security00:32:15 Autonomous Vessels and Cyber Protection00:33:30 Future of Autonomous Vessels00:34:15 Learning and Improving Cyber Security in Maritime00:35:30 Role of Threat Intelligence in Maritime Security00:36:15 Optimism for the Future of Maritime Security00:37:30 Industry Awareness and Education Efforts00:38:30 AI Integration in Maritime Security Solutions00:39:15 Conclusion and Final ThoughtsBecome a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.