Podcasts about security solutions

  • 230PODCASTS
  • 301EPISODES
  • 30mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Apr 16, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about security solutions

Latest podcast episodes about security solutions

Emerging Tech Horizons
Building and Integrating Capabilities Using Modular Open Systems Architecture

Emerging Tech Horizons

Play Episode Listen Later Apr 16, 2025 39:54


Our guests, Dr. Evan Fortunato (President & CEO, Apogee Research), Kirk McConnell (retired Professional Staff Member on the Senate Armed Services Committee), and Robert “Otis” Winkler (Vice President, Kratos Defense & Security Solutions) join the podcast for a discussion on Modular Open Systems Architecture (MOSA). During this episode, they cover the operational advantages and acquisition risks, how recent legislation affects the Department of Defense's adoption of MOSA practices, and how to think about standards as a barrier or enabler of modular and open systems. The podcast also discusses potential tools for creating interoperable systems.To receive updates about the NDIA Emerging Technologies for Defense Conference and Exhibition on August 27-29, 2025 at the Washington D.C. Convention Center, please join our mailing list here: https://www.emergingtechnologiesinstitute.org/sign-up http://emergingtechnologiesinstitute.orghttps://www.facebook.com/EmergingTechETIhttps://www.linkedin.com/company/ndia-eti-emerging-technologies-institute https://www.twitter.com/EmergingTechETI

CanadianSME Small Business Podcast
Fraud Fight: Mastercard's Edge

CanadianSME Small Business Podcast

Play Episode Listen Later Mar 31, 2025 14:30


Welcome to the CanadianSME Small Business Podcast, where we explore the challenges and solutions that empower Canadian businesses in today's digital economy. Hosted by Maheen, this episode focuses on fraud prevention and how businesses can protect themselves from increasing cyber threats.Amisha Parikh, Vice President of Security Solutions at Mastercard, joins us to discuss Mastercard's recent survey on financial scams and fraud prevention, offering critical insights into the state of fraud in Canada and proactive approaches to safeguarding businesses and customers. With cybercrime on the rise, this episode is packed with practical tips and Mastercard's resources to help small businesses stay secure.Key Highlights from This Episode:Mastercard's Fraud Prevention Survey: Key findings on how Canadians feel about fraud, and what businesses can do to build trust.Proactive Fraud Prevention: How to take action before fraud happens to protect transactions and secure customer trust.Security Tips for SMBs: Practical, actionable advice for small business owners to protect their payments and digital transactions.Mastercard's Cybersecurity Assessment Tool: How businesses can leverage this free tool to enhance their cybersecurity posture and mitigate risks.Building Trust: Why small businesses should prioritize advanced security technologies to gain consumer trust.Takeaway Points:Vigilance and proactive measures are critical to fraud prevention.Investing in security technologies enhances trust with consumers.Mastercard offers free tools like the Cybersecurity Assessment Tool to help small businesses strengthen their defenses.Special Thanks to Our Partners:RBC: https://www.rbcroyalbank.com/dms/business/accounts/beyond-banking/index.htmlUPS: https://solutions.ups.com/ca-beunstoppable.html?WT.mc_id=BUSMEWAIHG Hotels and Resorts: https://businessedge.ihg.com/s/registration?language=en_US&CanSMEGoogle: https://www.google.ca/For more expert insights, visit www.canadiansme.ca and subscribe to the CanadianSME Small Business Magazine. Stay innovative, stay informed, and thrive in the digital age!Disclaimer: The information shared in this podcast is for general informational purposes only and should not be considered as direct financial or business advice. Always consult with a qualified professional for advice specific to your situation.

Get Connected
Rising threat of cyber fraud & How AI is used by criminals and security experts

Get Connected

Play Episode Listen Later Mar 12, 2025 37:22


In this episode of the Get Connected Podcast, we tackle some of the biggest issues in tech and security. Mastercard's VP of Security Solutions, Amisha Parikh, joins us to discuss the rising threat of cyber fraud, how AI is being used by both criminals and security experts, and what Canadians can do to stay safe online. We also dive into the impact of new U.S. tariffs on physical media, the shift toward digital downloads, and Google's latest AI-powered initiative to improve subway safety. Plus, we break down the growing legal battle over Google's dominance in search and web browsers. Don't miss this insightful discussion on the future of cybersecurity, digital commerce, and tech policy!

The Mitchell Institute’s Aerospace Nation Podcast
CCA: Realizing Tomorrow's Airpower Today | 1st Annual Airpower Futures Forum

The Mitchell Institute’s Aerospace Nation Podcast

Play Episode Listen Later Mar 7, 2025 55:04


Panelists: • Col Timothy M. Helfrich, Senior Materiel Leader, Advanced Aircraft Division, Air Force Materiel Command • Mike Shortsleeve, Vice President, Strategy Business Development, General Atomics Aeronautical Systems • Diem Salmon, Vice President for Air Dominance & Strike, Anduril Industries • Mike Benitez, Senior Director of Strategic Product Development, Shield AI • Robert Winkler, Vice President, Corporate Development and National Security Programs, Kratos Defense and Security Solutions

The Fraud Boxer Podcast
What Mastercard is doing to help us in the fight against fraud and scams!

The Fraud Boxer Podcast

Play Episode Listen Later Mar 3, 2025 39:02


In honor of International Fraud Awareness Week we're dropping a heavy hitter episode where Jordan interviews Seckin Yilgoren, SVP of Security Solutions for North America at Mastercard. They discuss the growing risks of cyber attacks, the role of AI in both facilitating and combating fraud, and Mastercard's initiatives to protect consumers from scams. They highlight the importance of evolving technology in the fight against fraud and the need for consumer awareness in an increasingly digital world. They also discuss the challenges of traceability in digital transactions and the rise of first party fraud. Seckin helps us understand the Mastercard product First Party Trust which is a program designed to hold the right parties accountable for fraud claims, and emphasizes the importance of data sharing and AI in preventing fraud. The show wraps up with their predictions on future trends in fraud prevention and their thoughts on the need for more regulations in cybersecurity. Seckin Yilgoren: https://www.linkedin.com/in/seckin-yilgoren/ Mastercard blog: https://b2b.mastercard.com/news-and-insights/blogs/  

@BEERISAC: CPS/ICS Security Podcast Playlist
How do you secure the smart grid infrastructure? | OT Security Made Simple

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Mar 1, 2025 19:09


Podcast: OT Security Made SimpleEpisode: How do you secure the smart grid infrastructure? | OT Security Made SimplePub date: 2025-02-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of OT Security Made Simple, Zeek Muratovic, Director of Security Solutions for the Landis+Gyr group talks about the challenges and shortcomings of energy distributors, and the first steps to secure the growing and ever more complex smart grid infrastructure from the distribution network to the edge like smart meters and EV charging stations.The podcast and artwork embedded on this page are from Klaus Mochalski, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

OT Security Made Simple Podcast
How do you secure the smart grid infrastructure? | OT Security Made Simple

OT Security Made Simple Podcast

Play Episode Listen Later Feb 27, 2025 19:09


In this episode of OT Security Made Simple, Zeek Muratovic, Director of Security Solutions for the Landis+Gyr group talks about the challenges and shortcomings of energy distributors, and the first steps to secure the growing and ever more complex smart grid infrastructure from the distribution network to the edge like smart meters and EV charging stations.

ITSPmagazine | Technology. Cybersecurity. Society
From Demo to Deployment: How A Hands-On Human Approach Transforms Security Implementation | A Conversation with Amanda Makowsky at Zero Trust World 2025 | On Location with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 25, 2025 4:49


This episode of the “On Location” series, recorded during ThreatLocker Zero Trust World 2025 in Orlando, features an insightful conversation with Amanda Makowsky, Solution Engineer at ThreatLocker. Amanda shares how ThreatLocker maintains a human touch in cybersecurity while delivering robust solutions for organizations of all sizes.The Human Element in TechnologyAmanda explains how ThreatLocker emphasizes human interaction from the first demo through implementation and beyond. When potential customers engage with ThreatLocker, they are assigned a dedicated Solution Engineer as their technical point of contact. Amanda highlights how this relationship extends beyond the sales process, ensuring partners have continuous support as they mature their security environments. Whether working with small businesses or large enterprises, the focus remains on personalized service and hands-on assistance.Support That Stands OutThreatLocker's commitment to human-centric support is evident through its 24/7 live helpdesk, staffed by real people in Orlando, Florida. Amanda notes the goal of responding to chat requests within a minute, providing immediate support without relying on bots or automated responses. This approach fosters trust and ensures that customers, regardless of their organization's size, receive timely and effective help.Customization and Real-World ImpactAmanda shares how every partner's environment is unique, requiring tailored solutions to accommodate different software, hardware, and operational needs. She emphasizes the importance of building specific and intentional roles within ThreatLocker's systems to match the diverse environments of their partners. The impact of this customization is profound, as partners express a sense of security that allows them to “sleep better at night.”Listen to this episode to explore how ThreatLocker combines technology with human connection, offering a refreshing perspective in the cybersecurity industry.Guest

Auscast Business Channel
We Dive Into: ByBit Hack - Crypto Community Reactions and Security Solutions

Auscast Business Channel

Play Episode Listen Later Feb 25, 2025 20:47


A major hack of the ByBit exchange, resulting in $1.5 billion being stolen, has sent ripples through the cryptocurrency community. Binance co-founder Changpeng Zhao (CZ) pointed to vulnerabilities in multisig wallets as a contributing factor. CZ highlighted the need for exchanges to re-evaluate multisig wallets, suggesting that hackers disguised the malicious transfer as a routine transaction. Ledger proposed the use of ‘Clear Signing’ to combat ‘Blind Signing’, where transaction details remain transparent. Fireblocks advocated for off-exchange settlement and MPC technology as ways to bolster security and prevent similar incidents. Some, like BitMEX's Arthur Hayes, even suggested a rollback of the Ethereum blockchain, although this was not widely supported.See omnystudio.com/listener for privacy information.

Global News Headlines
We Dive Into: ByBit Hack - Crypto Community Reactions and Security Solutions

Global News Headlines

Play Episode Listen Later Feb 25, 2025 20:47


A major hack of the ByBit exchange, resulting in $1.5 billion being stolen, has sent ripples through the cryptocurrency community. Binance co-founder Changpeng Zhao (CZ) pointed to vulnerabilities in multisig wallets as a contributing factor. CZ highlighted the need for exchanges to re-evaluate multisig wallets, suggesting that hackers disguised the malicious transfer as a routine transaction. Ledger proposed the use of ‘Clear Signing’ to combat ‘Blind Signing’, where transaction details remain transparent. Fireblocks advocated for off-exchange settlement and MPC technology as ways to bolster security and prevent similar incidents. Some, like BitMEX's Arthur Hayes, even suggested a rollback of the Ethereum blockchain, although this was not widely supported.See omnystudio.com/listener for privacy information.

Pathmonk Presents Podcast
Developing a Digital-first Marketing Strategy for Security Solutions | Eric Howard from Troy Group

Pathmonk Presents Podcast

Play Episode Listen Later Jan 7, 2025 14:41


Join us as we talk with Eric Howard, Director of Marketing at Troy Group, a leading security solutions company with 60 years of expertise in MICR printing and check security.  In this episode, Eric shares insights into Troy Group's innovative approach to preventing check fraud through patented technology and their commitment to US manufacturing. He discusses their digital-first marketing strategy, the importance of organic search in lead generation, and how they're adapting to modern security challenges while maintaining their position as HP's exclusive OEM partner.  Eric also offers valuable perspectives on leadership and staying current with marketing trends in the security industry.

Bitcoin Takeover Podcast
S16 E1: Mike Belshe on BitGo, Self Custody & The Future of Bitcoin

Bitcoin Takeover Podcast

Play Episode Listen Later Jan 3, 2025 119:56


Time stamps: Introducing Mike Belshe (00:00:42) Mike Belshe's Background (00:01:58) Self-Custody vs. Institutional Custody (00:02:05) Multi-Signature Technology (00:03:56) Understanding Multi-Party Computation (00:04:51) Advancements in Cryptography (00:05:53) BitGo's Role in Tokenizing Bitcoin (00:08:26) Defining DeFi's Importance (00:09:09) Mike's Technology Background (00:12:12) Inspiration from Tim Berners-Lee (00:14:57) Bitcoin's Zero Click Payments (00:17:11) Bitcoin Custodianship Issues (00:17:36) Challenges of Bitcoin Payments (00:18:25) Scaling Bitcoin and Lightning Network (00:19:20) Bitcoin's Role in Digital Money (00:20:13) Layer Two Solutions and Drivechains (00:21:15) Scaling Discussions in Bitcoin's History (00:22:31) Sidechains and Their Limitations (00:23:16) Innovation vs. Immutability (00:24:29) Importance of Real Applications (00:25:32) Privacy and Fungibility in Bitcoin (00:28:42) Lessons from TCP/IP and Blockchain Privacy (00:30:51) Regulatory Concerns and Privacy Solutions (00:32:53) Understanding the Static of Security (00:34:01) SideShift (00:34:59) Bitcoin's Civil War: Block Size Wars (00:35:54) Human Decisions in Bitcoin (00:36:16) Historical Proposals and Interpretations (00:37:10) Challenges of Block Space and Fees (00:37:58) Bitcoin Consensus (00:38:48) SegWit and Its Implications (00:39:41) Gavin Andresen's Role in Bitcoin (00:42:00) Bitcoin's Resilience Against Adversaries (00:42:13) Need for Enhanced Security (00:43:05) Strategic Bitcoin Reserve in the USA (00:44:30) El Salvador's Currency Strategy (00:45:19) Self-Custody Concerns (00:49:13) Security Measures for Self-Custody (00:50:17) Privacy as a Solution (00:50:43) Self-Custody Options (00:51:14) Family Legacy and Custody Challenges (00:52:24) Public Key Cryptography Innovation (00:52:28) HODLING.ch (00:53:29) Protecting Against Government Confiscation (00:54:15) Multi-Custodial Model Explanation (00:54:21) Hardware Wallets Discussion (00:56:03) Safety Deposit Box Concerns (00:58:03) Trade-offs in Security Solutions (00:58:56) Onboarding New Users (01:00:09) Edge Wallet Features (01:01:01) BitGo's Wallet Recovery Wizard (01:03:02) BitGo vs. Casa (01:05:08) Multi-Signature Security (01:05:46) Early Adoption of Multi-Sig (01:09:10) Building a New Monetary System (01:11:54) Regulatory Changes in the US (01:13:49) Impact of MiCA in Europe (01:15:32) War on Cash (01:16:17) Global Financial Systems (01:18:03) Zero Knowledge Proofs (01:19:48) Zcash Discussion (01:20:04) Privacy Technologies in Bitcoin (01:21:18) Challenges of On-chain Traceability (01:22:26) Philosophy on Transaction Privacy (01:23:19) Concerns About Privacy Adoption (01:24:51) Historical Context of TCP/IP Security (01:25:34) Bitcoin as Digital Gold (01:27:24) Ethereum's Role in DeFi (01:29:01) Benefits of Smart Contracts (01:32:01) Reflections on Bitcoin's Journey (01:33:25) Future of Bitcoin (01:34:30) Lightning Network Fees (01:36:12) Trade-offs in Payment Systems (01:38:01) Adoption of Bitcoin and Early Adoption Costs (01:42:01) Long-term Viability of Bitcoin Mining (01:44:38) The Future of Bitcoin and Layer Solutions (01:47:17) Community Response to Bitcoin Vulnerabilities (01:49:01) Satoshi's Vision for Mining (01:51:11) Satoshi's Intentions (01:52:35) Empathy for Satoshi (01:54:16) 0 to 1 Concept (01:54:24) Bitcoin's Anniversary (01:55:53) Centralization in Crisis (01:56:33) Zero Knowledge Proof Bug (01:57:45) Following Mike Belshe's Work (01:58:45)

MSP Business School
Dror Liwer Coro Transforming MSPs The Secret to 2600 Growth in Cybersecurity

MSP Business School

Play Episode Listen Later Dec 26, 2024 25:32


In this engaging episode of MSP Business School, host Brian Doyle introduces Dror Liwer, co-founder of Coro, to dive into the arena of cybersecurity for MSPs (Managed Service Providers). As the holiday season emerges, there's a significant emphasis on drawing the curtains on 2023 with fortified security strategies. Dror shares Coro's approach to simplifying cybersecurity for small and mid-sized businesses by optimizing MSP capabilities through a robust, single-pane management platform. The episode explores Coro's unique positioning in the cybersecurity sphere, highlighting their seamless integration approach to mitigate sunk costs and training burdens faced by MSPs. Drawing keen attention to Coro's strategic alignment with MSPs, Dror discusses their modular cybersecurity platform that addresses six critical security domains, thus redefining efficiency and cost-efficacy in the cybersecurity landscape. The session also covers how Coro's solutions facilitate easier transitions to managed services, allowing MSPs to maintain flexibility while expanding their security offerings. Key Takeaways:  Coro's modular cybersecurity platform streamlines security management across six key areas, helping MSPs provide comprehensive protection with minimal sunk costs. Leveraging a single endpoint agent, Coro offers seamless integration, allowing IT administrators—regardless of their cybersecurity expertise—to operate efficiently from day one. The growing necessity for robust cybersecurity solutions is recognized as a primary driver for MSP growth, with security services forming a key part of customer retention and acquisition strategy. Dror emphasizes the importance of MSPs tapping into the rapidly expanding SMB cybersecurity market, projected to quadruple by 2028. Coro offers a partner-focused approach, including white-label managed services, to empower MSPs in building and scaling their cybersecurity offerings Show Website: https://mspbusinessschool.com/ Guest Name: Dror Liwer LinkedIn page: https://www.linkedin.com/in/drorliwer/ Company: Coro Website: https://www.coro.net/ Host Brian Doyle: https://www.linkedin.com/in/briandoylemetathinq/ Sponsor vCIOToolbox: https://vciotoolbox.com

Security Conversations
US government's VPN advice, dropping bombs on ransomware gangs

Security Conversations

Play Episode Listen Later Dec 23, 2024 118:40


Three Buddy Problem - Episode 26: We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International's explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite. Plus, thoughts on the US government's controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad's dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence. Also, a mysterious BeyondTrust 0-day! Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

ITSPmagazine | Technology. Cybersecurity. Society
Simplifying Cybersecurity for IT Service Providers: A New Era of Cyber Protection for Small and Medium Businesses | A Guardz Brand Story with Sarah Lampert and William Barr

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 20, 2024 44:54


In this Brand Story episode, Sean Martin and Marco Ciappelli explore how Guardz is transforming cybersecurity for Managed Service Providers (MSPs) and small to medium-sized businesses (SMBs). The discussion features insights from Sarah Lampert, Customer Success Manager, and William Barr, Account Executive at Guardz, who shed light on the company's innovative approach to simplifying and optimizing cybersecurity solutions.Bridging the Gap for SMBsSmall to medium-sized businesses often lack dedicated IT or security teams, leaving them vulnerable to cyber threats. William Barr emphasizes how Guardz fills this gap by providing MSPs with tools tailored for SMBs. These tools simplify security management, offering MSPs a unified platform that addresses complex needs without requiring a patchwork of expensive, disparate solutions.Ease of Use and FlexibilityGuardz stands out by offering a user-friendly, AI-powered platform that integrates seamlessly into MSPs' existing workflows. Sarah Lampert highlights the platform's simplicity, enabling even small MSPs to onboard quickly and manage cybersecurity effectively. The product's flexibility allows MSPs to scale their offerings, catering to clients with varying security needs while keeping costs manageable.Key features include:Unified detection and response capabilities.Customizable security controls for different client environments.User-based pricing models that eliminate device-based cost complexities.Support Beyond TechnologyGuardz doesn't stop at providing a robust platform—it empowers MSPs through comprehensive support. Sarah Lampert explains how the Customer Success team aids MSPs with onboarding, marketing materials, and strategic advice, ensuring they position Guardz as a core component of their service stack. The company also facilitates continued learning through webinars, hands-on trials, and direct communication channels.Innovative AI IntegrationAI plays a pivotal role in Guardz's ability to streamline cybersecurity. By analyzing patterns and predicting risks, the platform helps MSPs preempt threats and respond efficiently. William Barr underscores AI's potential to reduce manual effort while enhancing security accuracy, making advanced protection accessible to smaller organizations.Cyber Insurance: A Competitive EdgeGuardz takes its commitment a step further by integrating cyber insurance into its offerings. Qualified clients can access affordable coverage directly through Guardz, ensuring SMBs meet evolving security and compliance standards. This feature not only protects businesses but also equips MSPs with a unique selling point.The Future of GuardzAs Guardz continues to evolve, its focus remains on simplifying cybersecurity for MSPs while providing scalable, cost-effective solutions for SMBs. The team's proactive approach, coupled with constant feedback integration, ensures the platform stays relevant in a dynamic cybersecurity landscape.MSPs looking to streamline their operations and enhance client security are encouraged to explore how Guardz can help achieve these goals. For more information, connect with the Guardz team or visit their platform for a trial.Learn more about Guardz: https://itspm.ag/guardzrgigNote: This story contains promotional content. Learn more.Guests:Sarah Lampert, Customer Success Manager, Guardz [@GuardzCyber]On LinkedIn | https://www.linkedin.com/in/sarlampert/William Barr, Account Executive, Guardz [@GuardzCyber]On LinkedIn | https://www.linkedin.com/in/william-barr-a447541ab/ResourcesLearn more and catch more stories from Guardz: https://www.itspmagazine.com/directory/guardzFor a free 14 day trial of Guardz's platform please visit https://itspm.ag/guardzgvu3 .Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Logistics Matters with DC VELOCITY
Guest: Lee Ambrose of Remote Security Solutions on securing supply chain facilities from harm; California looks to phase out new gasoline-powered vehicles; What traffic congestion costs us.

Logistics Matters with DC VELOCITY

Play Episode Listen Later Dec 20, 2024 24:27


Our guest on this week's episode is Lee Ambrose, vice president at Remote Security Solutions. We hear regularly about securing our supply chains from threats, such as products being stolen while they are in transit. But security is more than just theft - it is also securing and protecting facilities and the people who work in them. Our guest discusses the possible threats that face our supply chains and how to keep both workers and products safe from harm. California this week got federal approval to move ahead to the final stages of approval for its 2022 plan to gradually scale back the sale of gas-powered cars within the state. They needed federal approval to have a standard different from broader U.S. rules, and the EPA has now allowed what's called the Advanced Clean Cars II rule. This means that by 2035, all new cars sold in California will have to be zero-emissions models, which includes battery-electric, hydrogen fuel cell, and plug-in hybrid cars. Congestion on U.S. highways is costing the trucking industry big, according to research from the American Transportation Research Institute (ATRI), which was released this week. The group found that traffic congestion on U.S. roadways added $108.8 billion in costs to the trucking industry in 2022—the latest data available. This is a record high. We look at states with the highest amount of traffic congestion. Supply Chain Xchange  also offers a podcast series called Supply Chain in the Fast Lane.  It is co-produced with the Council of Supply Chain Management Professionals. A series of ten episodes is now available on the "State of Logistics." The episodes provide in-depth looks into the current states of key transportation modes, such as trucking, rail, air, and ocean. It also looks at inventory management, 3PLs and more.  All ten episodes are available to stream now. Go to your favorite podcast platform to subscribe and to listen to past and future episodes. The podcast is also available at www.thescxchange.com.Articles and resources mentioned in this episode:Remote Security SolutionsCalifornia moves a step closer to requiring EV sales only by 2035Trucking industry experiences record high congestion costsVisit Supply Chain XchangeListen to CSCMP and Supply Chain Xchange's Supply Chain in the Fast Lane podcastSend feedback about this podcast to podcast@agilebme.comPodcast is sponsored by: Werner Premium ServicesOther linksAbout DC VELOCITYSubscribe to DC VELOCITYSign up for our FREE newslettersAdvertise with DC VELOCITYTop 10 Supply

Michigan Business Network
Michigan Business Beat | Christine Sermak Total Security Solutions '24 Manufacturing Talent Champion

Michigan Business Network

Play Episode Listen Later Dec 17, 2024 6:56


Chris Holman welcomes Christine Sermak, COO of Total Security Solutions and the winner of the 2024 Manufacturing Talent Champion Award. Welcome Chirstine, remind the Michigan business community about Total Security Solutions? How long have you served with the company, and what's changed over those years? So you recently won the 2024 Manufacturing Talent Champion Award from MMA, the Michigan Manufacturers Association tell us about that? How is your company keeping up with and innovating manufacturing? How do you leverage the services of MMA during the year? » Visit MBN website: www.michiganbusinessnetwork.com/ » Watch MBN's YouTube: www.youtube.com/@MichiganbusinessnetworkMBN » Like MBN: www.facebook.com/mibiznetwork » Follow MBN: twitter.com/MIBizNetwork/ » MBN Instagram: www.instagram.com/mibiznetwork/

Pathmonk Presents Podcast
Growing Reputation with Word-of-Mouth for Security Solutions | Nakita Rowell from ComTech

Pathmonk Presents Podcast

Play Episode Listen Later Dec 12, 2024 26:48


In today's episode, Rick interviews Nakita Rowell, Marketing Specialist at ComTech, a Georgia-based integrated security company offering physical security solutions like access control, video surveillance, and intercom systems.  Nakita shares how ComTech provides custom, product-agnostic security solutions for businesses, government entities, and industries like car dealerships, gyms, and retail. She highlights the company's reliance on word-of-mouth (WOM) referrals, their focus on customer needs, and efforts to modernize their digital presence. Nakita also provides marketing insights, emphasizing automation, storytelling, and relationship-building.  Tune in to learn how ComTech combines 30+ years of experience with customer-centric strategies to deliver peace of mind.  

Airplane Geeks Podcast
822 Cranky Dorkfest 2024

Airplane Geeks Podcast

Play Episode Listen Later Oct 30, 2024 98:18


We hear from participants at this year's Cranky Dorkfest, the U.S. Marine Corps flew the XQ-58A Valkyrie drone with four F-35B fighters, American Airlines flew a B787 from Dallas to Brisbane in a 15 hour and 44-minute flight, a pair of corporate flight attendants are suing their employer, airlines are reacting to flight restrictions over Russia, and the Portland Jetport is replacing the firefighting foam with something more environmentally friendly. Also, a self-propelling ionic thrust wing, an exploding satellite, and thoughts on DB Cooper from an expert parachutist. Cranky Dorkfest 2024 Brian Coleman recorded interviews at Cranky Dorkfest on September 14, 2024: Melissa - Why she keeps coming back. Her husband is former military mechanic. Benny - A first-timer with a unique Boeing airplane-related telephone number. Jvan - He took home last year's brick mosaic. This is his 3rd year participating. Matt Sauchelli - He's shooting with a Nikon mirrorless camera and a long lens. Ben Grenuchi and Heather - From NYCAviation. Ian Petchenik - Director of Communications at Flightradar24 the live, global flight tracking service. Also, the co-host of AvTalk podcast. Brett (Cranky) Snyder. The man behind it all. For Those Who Didn't Attend, Here's What You Missed at Cranky Dorkfest This Weekend Aviation News Marines score aviation firsts with F-35 squadron, drone test and more A Marine Corps XQ-58A Valkyrie drone completed a test flight last week at Eglin Air Force Base, Florida. Col. Derek Brannon, branch head for the Cunningham Group, deputy commandant for aviation said “The flight focused on the use of tactical data links to enable digital communication between the XQ-58A and an airborne four-ship of F-35Bs from Marine Fighter Attack Squadron 214 and other joint aircraft.” XQ-58A Valkyrie, courtesy AFRL. The XQ-58A Valkyrie is a low-cost, high-performance, reusable unmanned air vehicle developed through an Air Force Research Laboratory partnership with Kratos Defense & Security Solutions, Inc. This vehicle is an example of an “attritable” aircraft designed to be used for several missions, but built at a cost that permits it to be a combat loss. American Airlines' longest flight set to be one of the most tracked in the world The American Airlines inaugural flight from Dallas to Brisbane in Australia was heavily followed on Flightradar24. Director of Communications Ian Petchenik said people worldwide “are especially keen to watch the livestream of the landing.” The Boeing 787-9 (N825AA), flight AA7, made the trip in 15 hours and 44 minutes covering a great circle distance of 13,363 KM. See Flight history for American Airlines flight AA7. Overworked Private Flight Attendants For Co-Founder of The Home Depot Claim ‘Inept' Colleagues Kept Their Jobs Because They Were in ‘Romantic Relationship' With Boss Two private flight attendants filed a lawsuit claiming they were overworked while working for the co-founder of The Home Depot, while “inept” co-workers had romantic relationships with their bosses. The two FAs, who quit their jobs, said they sometimes worked 26 days per month and around 90 hours per week. Why It's Harder Getting to China As a result of the war in Ukraine, non-Chinese airlines are no longer entering Russian airspace, so some are discontinuing service to China, or reducing frequency. Demand for flights to China is down, and the cost of avoiding Russian airspace in time and fuel is significant. Virgin Atlantic is dropping its flight connecting Shanghai to London, LOT Polish Airlines is suspending its Warsaw-to-Beijing flights, and SAS plans to stop direct flights between Copenhagen and Shanghai. Chinese airlines are adding capacity. PFAS-free firefighting foam coming to jetport The Portland (Maine) Fire Department plans to replace the AFFF firefighting foam used at the Portland International Jetport with PFAS-free foam.

Business of Tech
CISA's Secure by Design, Delta vs. CrowdStrike, Apple AI Cloud, Kaseya's New Security Solutions

Business of Tech

Play Episode Listen Later Oct 30, 2024 14:43


CISA has garnered over 230 voluntary commitments from software manufacturers to adopt safer software development practices as part of the secure-by-design initiative. This initiative aims to address critical vulnerabilities, particularly those arising from memory-unsafe programming languages, which account for 60 to 70 percent of security issues. The agency has also released a document titled "Product Security Bad Practices," inviting public comments to guide vendors on best practices for enhancing software security.The episode also covers Delta Airlines' lawsuit against CrowdStrike, seeking $500 million in damages due to a software update that caused a massive outage affecting millions of customers. Delta claims that CrowdStrike's negligence in testing the update led to significant disruptions, while CrowdStrike argues that Delta's outdated IT infrastructure contributed to the slow recovery. Cybersecurity expert Dr. Elia Kolchenko suggests that proving negligence in court may be challenging for Delta, hinting that an out-of-court settlement could be more advantageous for both parties.Apple has launched its Private Cloud Compute Virtual Research Environment, allowing security researchers to verify the company's privacy and security claims regarding its AI-driven cloud intelligence system. This initiative includes the release of a security guide and source code for select components, reinforcing Apple's commitment to data privacy. The episode highlights how this move could influence vendor decisions as organizations increasingly prioritize privacy and security in their cloud strategies.Lastly, the episode discusses Kaseya's new user security solution, which is priced at $2.79 per user, following its acquisition of SaaS Alerts. This offering aims to help small businesses protect against identity threats and reflects a growing trend among managed service providers (MSPs) to focus on SaaS security. Sobel emphasizes the importance of proactive risk management and the need for MSPs to adapt to the evolving landscape, where cloud vulnerabilities have surpassed ransomware as the top security threat. The insights shared in this episode underscore the critical need for organizations to prioritize security in their software development and operational practices. Four things to know today 00:00 CISA's Secure-by-Design Initiative Gains Momentum as Delta-CrowdStrike Lawsuit Highlights Risks of Software Update Failures04:21 Security Experts Gain New Access as Apple Releases Private Cloud Compute Environment for AI and Privacy Verification05:54 Kaseya Acquires SaaS Alerts, Launches Affordable User Security Solution for MSPs at $2.79 Per User09:23 MSPs Shift Focus as Cloud Vulnerabilities Surpass Ransomware as Top Security Threat, Channel Mastered Survey Shows   Supported by:  https://timezest.com/mspradio/https://www.coreview.com/msp   All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social

Breaking Into Cybersecurity
Breaking Into Cybersecurity: The Role of AI in Strengthening Cybersecurity

Breaking Into Cybersecurity

Play Episode Listen Later Oct 25, 2024 31:07


Breaking into Cybersecurity: The Role of AI in Strengthening Cybersecurity / Bryan KissingerBryan C. Kissinger, PhD, serves as the Senior Vice President of Security Solutions and Chief Information Security Officer at Trace3. With over 25 years of experience, he excels in maturing IT risk and information security programs and implementing emerging technologies. Previously, he was a CISO at Banner Health and had extensive experience across various sectors, including healthcare and finance. Dr. Kissinger holds a PhD in Information Technology Management and several professional certifications. He is also a Navy veteran and divides his time between Miami Beach, FL, and Asheville, NC.Sponsored by CPF Coaching LLC - http://cpf-coaching.comThe Breaking into Cybersecurity: It's a conversation about what they did before, why did they pivot into cyber, what the process was they went through Breaking Into Cybersecurity, how they keep up, and advice/tips/tricks along the way.The Breaking into Cybersecurity Leadership Series is an additional series focused on cybersecurity leadership and hearing directly from different leaders in cybersecurity (high and low) on what it takes to be a successful leader. We focus on the skills and competencies associated with cybersecurity leadership and tips/tricks/advice from cybersecurity leaders.This podcast runs on listener support and funding. Consider supporting this podcast:https://breaking-into-cybersecurity.captivate.fm/supportCheck out our books:Develop Your Cybersecurity Career Path: How to Break into Cybersecurity at Any Level https://amzn.to/3443AUIHack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career https://www.amazon.com/dp/1801816638/About the hosts:Renee Small is the CEO of Cyber Human Capital, one of the leading human resources business partners in the field of cybersecurity, and author of the Amazon #1 best-selling book, Magnetic Hiring: Your Company's Secret Weapon to Attracting Top Cyber Security Talent. She is committed to helping leaders close the cybersecurity talent gap by hiring from within and helping more people get into the lucrative cybersecurity profession. https://www.linkedin.com/in/reneebrownsmall/Download a free copy of her book at magnetichiring.com/bookChristophe Foulon focuses on helping to secure people and processes with a solid understanding of the technology involved. He has over ten years of experience as an experienced Information Security Manager and Cybersecurity Strategist with a passion for customer service, process improvement, and information security. He has significant experience in optimizing the use of technology while balancing the implications to people, processes, and information security by using a consultative approach.https://www.linkedin.com/in/christophefoulon/Find out more about CPF-Coaching at https://www.cpf-coaching.comWebsite:

Inside Scoop
$2B Jamf is "Gold Standard" via Partner Rocketman Tech

Inside Scoop

Play Episode Listen Later Oct 24, 2024 32:38


In this conversation, Founding Partner and Chief Investment Officer at Avory & Co. Sean Emory interviews Christopher Shasse, founder of Rocketman Tech, discussing the role of Jamf in managing Apple devices in enterprise environments. They explore Jamf's history, its relationship with Apple, and the competitive landscape, particularly focusing on Microsoft Intune as a significant competitor. The discussion also touches on Jamf's security solutions and the future direction of the company following the JNUC conference. Learn more about Rocketman Tech: https://www.rocketman.tech/Linkedin: https://www.linkedin.com/company/rocketman-tech/about/Youtube Video: Intune vs Jamf: https://www.youtube.com/watch?v=tEI52ho411A Chapters 00:00 Introduction to Jamf and Rocketman Tech 03:00 The Role of Jamf in Enterprise IT 05:52 Understanding Jamf Users and Administrators 09:13 Jamf's Relationship with Apple 12:02 Competitive Landscape: Jamf vs. Apple Business Essentials 14:55 Microsoft Intune: A Major Competitor 17:53 Jamf's Future and Expansion Strategies 21:14 Security Solutions and Opportunities for Growth 25:05 Post-Conference Reflections and Future Directions Keywords Jamf, Rocketman Tech, Apple, enterprise IT, Microsoft Intune, security solutions, technology conference, JNUC, IT management, MDM Disclaimer Avory & Co. is a Registered Investment Adviser. This platform is solely for informational purposes. Advisory services are only offered to clients or prospective clients where Avory & Co. and its representatives are properly licensed or exempt from licensure. Past performance is no guarantee of future returns. Investing involves risk and possible loss of principal capital. No advice may be rendered by Avory & Co. unless a client service agreement is in place. Listeners and viewers are encouraged to seek advice from a qualified tax, legal, or investment adviser to determine whether any information presented may be suitable for their specific situation. Past performance is not indicative of future performance. “Likes” are not intended to be endorsements of our firm, our advisors or our services. Please be aware that while we monitor comments and “likes” left on this page, we do not endorse or necessarily share the same opinions expressed by site users. While we appreciate your comments and feedback, please be aware that any form of testimony from current or past clients about their experience with our firm is strictly forbidden under current securities laws. Please honor our request to limit your posts to industry-related educational information and comments. Third-party rankings and recognitions are no guarantee of future investment success and do not ensure that a client or prospective client will experience a higher level of performance or results. These ratings should not be construed as an endorsement of the advisor by any client nor are they representative of any one client's evaluation. Please reach out to Houston Hess our head of Compliance and Operations for any further details. Find more here https.⁠www.avory.xyz/disclaimer-pagee

Microsoft Mechanics Podcast
New Low-Cost Log Options, Automation, AI & SIEM Migration | Microsoft Sentinel Updates

Microsoft Mechanics Podcast

Play Episode Listen Later Oct 14, 2024 14:29


Streamline threat detection and response across diverse environments with Microsoft Sentinel, your cloud-native SIEM solution. With features like Auxiliary logs for low-cost storage and proactive data optimization recommendations, you can efficiently manage high volumes of security data without compromising on threat intelligence. Leverage built-in AI and automation to uncover hidden threats and reduce investigation time from days to minutes. Rob Lefferts, CVP for Security Solutions at Microsoft, joins Jeremy Chapman to show how to migrate from existing SIEM solutions with built-in migration tools, ensuring seamless access to your security logs while maintaining investigative integrity.   ► QUICK LINKS: 00:00 - Microsoft Sentinel, modern Cloud SIEM 01:12 - Unified security operations platform 02:55 - Prioritize security updates 04:27 - Storage options 05:11 - Optimize data coverage and usage 06:17 - Protect against long-term persistent attacks 07:58 - Automation using auxiliary logs 08:59 - Manual effort 10:10 - Automation 12:07 - Migration 13:31 - Wrap up   ► Link References Get started at https://aka.ms/MicrosoftSentinel Find samples for the Playbook Logic App and the Function app at https://aka.ms/AuxLogsTIapp   ► Unfamiliar with Microsoft Mechanics?  As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast   ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics  • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

Pathmonk Presents Podcast
Marketing AI-Driven Security Solutions for Finances | Brianna Valleskey from Inscribe

Pathmonk Presents Podcast

Play Episode Listen Later Oct 4, 2024 16:33


In this episode of Pathmonk Presents, host Ernesto welcomes Brianna Valleskey, Head of Marketing at Inscribe. Brianna shares insights into Inscribe's AI-powered solutions for fraud detection and risk assessment in the financial services sector. She discusses how their technology analyzes application data, including documents and open banking information, to identify trustworthy and creditworthy customers. Brianna also delves into Inscribe's marketing strategies, emphasizing the importance of data-driven decision-making and the role of their website in client acquisition. The conversation covers emerging trends in fraud prevention, the impact of generative AI, and valuable tips for effective marketing leadership.

Nighttime
Cyber Crime in Canada - with Amisha Parikh and Det. David Coffey

Nighttime

Play Episode Listen Later Oct 2, 2024 68:43


In this Cyber Security Awareness Month special episode of Nighttime, we explore the growing threat of cybercrime in Canada. Joined by Amisha Parikh, Vice President of Security Solutions at Mastercard, and Detective David Coffey from the Toronto Police Services Financial Crimes Unit, we delve into the latest cybercrime trends, their impact on individuals and small businesses, and real-world Canadian cases making headlines. This episode offers valuable insights into how Canadians can safeguard themselves in an increasingly digital world. Links: make a case suggestion: https://www.nighttimepodcast.com/contact Provide feedback and comments on the episode: nighttimepodcast.com/contact Subscribe to the show: https://www.nighttimepodcast.com/subscribe Musical Theme: Noir Toyko by Monty Datta Contact: Website: https://www.nighttimepodcast.com Twitter: https://twitter.com/NightTimePod Facebook: https://www.facebook.com/NightTimePod Instagram: https://www.instagram.com/nighttimepod Support the show: https://www.patreon.com/nighttimepodcast Learn more about your ad choices. Visit megaphone.fm/adchoices

Remarkable Results Radio Podcast
Securing the Future: Insights from NASTF [RR 994]

Remarkable Results Radio Podcast

Play Episode Listen Later Oct 1, 2024 32:31


Thanks to our Partner, NAPA Auto Care Recorded at the 2024 Automotive Aftermarket Retailers of Ontario (AARO) Business Management and Lindertech Training Tradeshow, Carm sits down with Donny to explore his pivotal role at NASTF and his experiences working with automakers like Tesla. Donny shares behind-the-scenes insights on NASTF's technician support initiatives, their impressive membership growth, and the innovative solutions they're implementing to support automotive technicians. We dive into Donny's personal journey, his passion for the automotive industry, and the critical role of good business management in ensuring the success of repair shops. "The National Automotive Service Task Force (NASTF) is a 501 C6 not-for-profit organization established in 2000 by Automakers and the independent aftermarket to identify and resolve gaps in Service information, Tool Information, and Training." Donny Seyfer, NASTF, Listen to Donny's previous episodes HERE. Show Notes Watch Full Video Episode Automotive Aftermarket Retailers of Ontario (AARO): https://www.aaro.ca/ Overview of NASTF's Work (00:01:17) Donny discusses his responsibilities at NASTF and the importance of technician support. Technician Connection (00:02:09) Donny expresses his passion for helping technicians solve problems in the automotive industry. Growth of NASTF (00:02:39) Donny highlights the increase in NASTF membership from 6,000 to 43,000 members. Funding and Operations (00:03:02) Discussion on NASTF's funding model and its impact on operations for technicians. Listening and Gathering Information (00:04:23) Donny explains how he gathers information from industry members through subcommittees. Challenges with Automakers (00:06:08) Donny talks about the disconnect between aftermarket technicians and automakers. Collaboration with Tesla (00:07:15) Donny shares his experience in establishing a relationship with Tesla regarding repair initiatives. Implementation of Security Solutions (00:08:57) Discussion on the development of security solutions for Tesla vehicles. Building Relationships with Rivian (00:10:36) Donny mentions ongoing collaboration with Rivian to improve security features. Future Projects (00:11:29) Donny outlines upcoming projects and initiatives NASTF is working on. Scan Tool Validation Program (00:11:52) Introduction of a program aimed at validating aftermarket scan tools for security.. Key services in repair shops (00:18:03) Exploration of the role of vehicle security professionals in service repair. Importance of key cutting in shops (00:19:19) Insight into the necessity of key cutting machines in repair shops for customer service. Car theft statistics (00:20:18) Revelation of alarming statistics regarding car thefts linked to dealer interactions. Advice for young adults (00:23:19) Donny shares fatherly advice on financial responsibility and managing phone distractions. Economic education for kids (00:24:24) Discussion on the lack of financial education for youth and its implications. Donny's leadership roles (00:26:47) Overview of Donny's extensive...

Tech Talk with Mathew Dickerson
Cellular Cancer Claims Crushed, Futuristic Car Security Solutions and Smarter Sensors Sparking Exercise.

Tech Talk with Mathew Dickerson

Play Episode Listen Later Sep 22, 2024 47:11


Smart Speaker Sleuthing: Echo Evidence and Digital Detectives.  Sensory Synergy: Smarter Sensors Sparking Exercise Engagement.  Virtual Reality, Valkyrie, and Voyages: A Robotic Revolution in Space.  Cellular Cancer Claims Crushed: Mobile Misconceptions Dispelled.  Failed Feedback: The Fizzling of '90s Haptic Vests. Mario Moves: Machine Learning Meets Mushroom Kingdom in AI Game Generation.  Crack-Resistant Concrete: Nature-Inspired Toughness Takes Shape.  Muscle-Powered Mechanics: Robotic Legs Leap with Oil-Filled Agility.  Holographic Hounds and Police Projections: Ford's Futuristic Car Security Solution. 

Detailed: An original podcast by ARCAT
LIVE From AIA 2024 with Total Security Solutions

Detailed: An original podcast by ARCAT

Play Episode Listen Later Sep 4, 2024 22:03


In this bonus episode of Detailed, we share a LIVE conversation from the 2024 AIA Conference on Architecture & Design in Washington D.C.Cherise is joined by Paul La Vigne, Chief Marketing Officer at Total Security Solutions. Paul details how Total Security Solutions' designs, installations, and manufactured products are crucial in stopping bullets, thereby saving and protecting lives, facilities, and property.If you enjoy this episode, visit arcat.com/podcast for more. If you're a frequent listener of Detailed, you might enjoy similar content at Gābl Media.

USA v. Miles Guo Trial Transcripts
EP 84|Miles Guo's Witness #7 Gerald Scott Barnett, Owner of GS Security Solutions|Part 2 | AI Audio

USA v. Miles Guo Trial Transcripts

Play Episode Listen Later Jul 17, 2024 49:03


July 8th, 2024 USA v. Miles Guo trial transcript AI audio reading. Miles Guo's Witness #7 Gerald Scott Barnett, Owner of GS Security Solutions|Part 2 | AI Audio Hosted on Acast. See acast.com/privacy for more information.

USA v. Miles Guo Trial Transcripts
EP 85|Miles Guo's Witness #7 Gerald Scott Barnett, Owner of GS Security Solutions|Part 3 | AI Audio

USA v. Miles Guo Trial Transcripts

Play Episode Listen Later Jul 17, 2024 74:29


Hosted on Acast. See acast.com/privacy for more information.

USA v. Miles Guo Trial Transcripts
EP 82|Miles Guo's Witness #7 Gerald Scott Barnett, Owner of GS Security Solutions|Part I | AI Audio

USA v. Miles Guo Trial Transcripts

Play Episode Listen Later Jul 17, 2024 94:27


July 8th, 2024 USA v. Miles Guo trial transcript AI audio reading. Miles Guo's Witness #7 Gerald Scott Barnett, Owner of GS Security Solutions|Part I | AI Audio Hosted on Acast. See acast.com/privacy for more information.

The Security Podcast of Silicon Valley
Vivek Ramachandran, Founder and CEO of SquareX, Pioneering Browser-Based Security Solutions

The Security Podcast of Silicon Valley

Play Episode Listen Later Jul 13, 2024 46:29


In this episode of the Security Podcast of Silicon Valley, hosts Jon McLachlan and Sasha Sinkevich welcome Vivek Ramachandran, the visionary Founder and CEO of SquareX. Vivek shares his inspiring journey into the cybersecurity field, sparked by his fascination with the power of individual hackers and their impact on massive websites. He discusses the evolution of the security landscape over the past 25 years, emphasizing the shift from lone warriors to collaborative team efforts against sophisticated cyber threats. Vivek introduces SquareX's innovative approach to web security, focusing on a browser-native solution to protect enterprise employees from online attacks. He elaborates on the challenges and breakthroughs in developing a seamless, effective browser extension that enhances security without compromising user experience. With insightful discussions on the importance of patience, community contributions, and the evolving role of AI in cybersecurity, this episode is a must-listen for entrepreneurs, security professionals, and anyone interested in the future of online protection. Tune in to hear Vivek's vision for the future and his advice for aspiring entrepreneurs in the tech industry.

USA v. Miles Guo Trial Transcripts
Miles Guo's Witness #7 Gerald Scott Barnett, Owner of GS Security Solutions|Part 2 | AI Audio

USA v. Miles Guo Trial Transcripts

Play Episode Listen Later Jul 13, 2024 49:03


July 8th, 2024 USA v. Miles Guo trial transcript AI audio reading. Miles Guo's Witness #7 Gerald Scott Barnett, Owner of GS Security Solutions|Part 2 | AI Audio Hosted on Acast. See acast.com/privacy for more information.

USA v. Miles Guo Trial Transcripts
Miles Guo's Witness #7 Gerald Scott Barnett, Owner of GS Security Solutions|Part 3 | AI Audio

USA v. Miles Guo Trial Transcripts

Play Episode Listen Later Jul 13, 2024 74:29


Hosted on Acast. See acast.com/privacy for more information.

Cybercrime Magazine Podcast
Security Solutions For MSPs. What Business Owners Need To Know. Vadim Sedletsky, Cynet.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 11, 2024 10:49


Vadim Sedletsky is the Director of Product Management and Product Marketing at Cynet. In this episode, he joins host Heather Engel to discuss security solutions for managed service providers, or MSPs, including how businesses can distinguish between effective and ineffective cybersecurity tools, how automation plays a role, and more. Cynet is developing the world's first end-to-end, natively automated cybersecurity platform with 24/7 service, specifically designed to streamline security for lean security teams. Learn more about our sponsor at https://cynet.com.

USA v. Miles Guo Trial Transcripts
Miles Guo's Witness #7 Gerald Scott Barnett, Owner of GS Security Solutions|Part 2 | AI Audio

USA v. Miles Guo Trial Transcripts

Play Episode Listen Later Jul 10, 2024 49:03


July 8th, 2024 USA v. Miles Guo trial transcript AI audio reading. Miles Guo's Witness #7 Gerald Scott Barnett, Owner of GS Security Solutions|Part 2 | AI Audio Hosted on Acast. See acast.com/privacy for more information.

USA v. Miles Guo Trial Transcripts
Miles Guo's Witness #7 Gerald Scott Barnett, Owner of GS Security Solutions|Part I | AI Audio

USA v. Miles Guo Trial Transcripts

Play Episode Listen Later Jul 10, 2024 94:27


July 8th, 2024 USA v. Miles Guo trial transcript AI audio reading. Miles Guo's Witness #7 Gerald Scott Barnett, Owner of GS Security Solutions|Part I | AI Audio Hosted on Acast. See acast.com/privacy for more information.

Cybercrime Magazine Podcast
Cybersecurity In Perspective. Endpoint Security Solutions. John Pelton & Steve Fielder, Optiv.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 3, 2024 16:38


John Pelton is the Senior Director of Managed Detection & Response at Optiv, and Steve Fielder is the Sr. Director of Managed Engineering at Optiv. In this episode, Pelton and Fielder join host Melissa O'Leary to discuss EPP and EDR solutions, including what businesses should consider when evaluating the vendor landscape, whether companies are better off outsourcing their endpoint security, and more. Cybersecurity In Perspective is a Cybercrime Magazine podcast series brought to you by Optiv. The cyber advisory and solutions leader, Optiv mitigates risk, accelerates potential, and centers every solution not just on your vulnerabilities, but your vision. To learn more about our sponsor, visit https://optiv.com.

The Cybersecurity Defenders Podcast
#134 - Incident command with Gerard Johansen, Principal Security Solutions Specialist at Red Canary

The Cybersecurity Defenders Podcast

Play Episode Listen Later Jun 18, 2024 35:57


On this episode of The Cybersecurity Defenders Podcast, we speak with Gerard Johansen, Principal Security Solutions Specialist at Red Canary.Gerard is a seasoned expert in the field of cybersecurity. Gerard holds the prestigious Certified Information System Security Professional - or CISSP. His extensive career includes serving as a Special Deputy United States Marshal for the FBI's Connecticut Computer Crimes Task Force and working as a Certification and Accreditation Analyst for a federal inter-agency unit. Gerard has conducted numerous technical and non-technical vulnerability assessments for both financial and government organizations, demonstrating his deep expertise in digital forensics and incident response.With a wealth of experience in risk assessment, cyber threat intelligence, and penetration testing, Gerard is frequently sought after for his knowledge in corporate counterintelligence, threat emulation, and cloud security challenges. He has developed and maintained crucial industry relationships through ongoing professional development and is a trusted resource for information security seminars and training programs.

The Tech Blog Writer Podcast
2921: Innovative Defenses: Tom Gillis on Cisco's Latest Security Solutions

The Tech Blog Writer Podcast

Play Episode Listen Later Jun 5, 2024 21:37


Are you and your organization prepared for the future of cyber security? Today, I'm joined by Tom Gillis, Senior Vice President and General Manager of Cisco's Security Business Group on the Tech Talks Daily Podcast.  Broadcasting directly from the vibrant atmosphere of Cisco Live in Las Vegas, Tom joins us to unravel the dynamics of cyber security within the framework of a renowned networking giant. With a career that spans influential roles at VMware and now at Cisco, Tom offers unique insights into the evolution of cybersecurity strategies and their crucial role in shaping business resilience. Tom discusses the latest innovations unveiled at Cisco Live. From the groundbreaking Cisco Hypershield to enhancements in AI-driven security management, these developments represent Cisco's commitment to fortifying enterprise defenses against increasingly sophisticated threats. As we delve into these topics, Tom will also share his personal journey and the reasons behind Cisco's accelerated innovation in recent times. So, buckle up as we transport you to the heart of Cisco Live, where the future of enterprise security is being redrawn. Join us for a conversation that promises to be as enlightening as it is inspiring. What are your thoughts on the trajectory of cyber security and the innovations discussed today? How do these advancements resonate with your professional experiences or the challenges faced by your organization? I encourage you to share your perspectives and join the ongoing dialogue by reaching out through our various platforms.  

Tower Talks with Inside Towers
#222 - 5G Non-terrestrial Network Opportunities with Kratos

Tower Talks with Inside Towers

Play Episode Listen Later Jun 3, 2024 23:57


Satellite-based services for decades have provided a variety of applications across commercial, industrial and government markets. Different satellite systems – GEO, MEO, LEO - serve different purposes.Recent discussions on direct satellite to cell phone connections or broadband internet connectivity address just a part of the broader satellite-based communications business.Greg Quiggle, Senior Vice President at Kratos Defense and Security Solutions shares with John Celentano, Inside Towers Business Editor, his insights and outlook on the satellite communications business and non-terrestrial network opportunities.For information on Kratos' Open Space Platform, visit https://www.kratosdefense.com/systems-and-platforms/space-systems/dynamic-ground/platform.Support the Show.

Security Heroes
Surviving the Unthinkable: Drew's Active Shooter Experience & Cost-Effective Campus Security Solutions

Security Heroes

Play Episode Listen Later May 30, 2024 31:40


In this episode of Security Heroes, host Lisa Falzone is joined by Drew Neckar, the Principal Consultant for healthcare security at CoSecure. They discuss how healthcare security has grown in strategic importance for organizations, Drew's experience with preventing an active shooter incident, and some strategies for how campuses can save money while improving their security.

Unsupervised Learning
A Conversation on Maritime Security with BlackBerry Threat Intelligence

Unsupervised Learning

Play Episode Listen Later May 16, 2024 40:16 Transcription Available


In this sponsored conversation, I speak with Corey Ranslem, CEO of Dryad—and the resident expert on Maritime Attacks—and Ismael Valenzuela, VP of Threat Intelligence and Research at Blackberry. We talked about all things Maritime Security, and I learned a whole lot from the conversation. Digital Hijacking at Sea: Unveiling a Cyber Attack Scenario in the Red Sea BlackBerry Quarterly Global Threat Report — March 2024 00:00:00 Introduction and Guest Welcome00:00:30 Maritime Security Overview00:01:15 Baltimore Incident Discussion00:02:00 Legacy Systems on Ships00:03:20 Connectivity Challenges at Sea00:04:10 Cyber Threats in Maritime Industry00:05:00 Post-Accident Cyber Investigations00:06:00 Potential Cyber Attacks on Ships00:07:30 Threat Scenarios and Models00:08:45 USB and External Media Threats00:09:30 Evolution of Navigation System Connectivity00:10:30 Crew Connectivity and Cyber Risks00:11:30 Lessons from Other Industries00:12:15 GPS Spoofing and Navigation Interference00:13:30 Digital Hijacking of Ships00:14:45 Economic Disruption via Cyber Attacks00:16:00 Financial Motivation Behind Attacks00:17:15 Ransomware in Maritime Context00:18:30 Panama Canal and Economic Impact00:19:30 Cyber Security Maturity in Maritime Industry00:21:00 Legacy Systems and Geopolitical Interests00:22:15 Challenges with Security Solutions at Sea00:23:30 Historical Cyber Incidents in Maritime00:24:30 GPS Spoofing Techniques00:25:15 International Maritime Organization Standards00:26:30 Criminal Trends and Cyber Attacks00:27:45 Open Source Tools and Threat Actors00:28:45 Information Sharing in Maritime Industry00:29:30 Real-World Examples of Cyber Incidents00:31:00 Cruise Ships and Large Yachts Security00:32:15 Autonomous Vessels and Cyber Protection00:33:30 Future of Autonomous Vessels00:34:15 Learning and Improving Cyber Security in Maritime00:35:30 Role of Threat Intelligence in Maritime Security00:36:15 Optimism for the Future of Maritime Security00:37:30 Industry Awareness and Education Efforts00:38:30 AI Integration in Maritime Security Solutions00:39:15 Conclusion and Final ThoughtsBecome a Member: https://danielmiessler.com/upgradeSee omnystudio.com/listener for privacy information.

Holy City Sinner Radio
Episode 254 - Interview with Ryan Cowell, CEO of Mayday Security Solutions  - (5/12/24)

Holy City Sinner Radio

Play Episode Listen Later May 13, 2024 38:41


On today's show: 1. Mayday Security Solutions website - https://maydaysafe.com/ 2. Local business makes bullet-resistant tech in the Lowcountry - https://www.counton2.com/news/local-news/new-security-technology-lands-in-the-lowcountry/ 3. South Carolina governor signs bill allowing permitless handgun carrying into law - https://myfox8.com/news/south-carolina/south-carolina-governor-signs-bill-allowing-permitless-handgun-carrying-into-law/ 4. SLED issues new guidelines with signing of permitless carry law - https://www.wbtw.com/news/state-regional-news/sled-issues-new-guidelines-with-signing-of-permitless-carry-law/ 5. Full text of H. 3594 - https://www.scstatehouse.gov/sess125_2023-2024/bills/3594.htm This episode's music is by Tyler Boone (tylerboonemusic.com). The episode was produced by LMC Soundsystem.

ITSPmagazine | Technology. Cybersecurity. Society
Revolutionizing Network Security: How to strategies the relationship between IT and OT | A Brand Story Conversation From RSA Conference 2024 | A Dispersive Story with Rajiv Pimplaskar | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 9, 2024 20:35


One company at the forefront of redefining IT security is Dispersive, led by the visionary CEO, Rajiv Pimplaskar. In a recent discussion with Sean Martin of ITSB Magazine at the RSA Conference, Rajiv shared insights into Dispersive's cutting-edge approach to network security and how they are revolutionizing the industry.Unveiling Dispersive's Stealth NetworkingAt the heart of Dispersive's network security strategy lies the concept of Dispersive Stealth Networking. Rajiv Pimplaskar, with over 25 years of experience in the industry, revealed that Dispersive is a DARPA-incubated network security company with 53 patents granted. Their approach leverages spread spectrum technology from the radio frequency domain to secure cloud and internet communications effectively. By enabling customers to hide in plain sight while ensuring the integrity of their critical systems, Dispersive offers a unique solution in the cybersecurity landscape.The Evolution of Network SecurityRajiv emphasized the shift from legacy SD WAN solutions to a more cloud-native approach, highlighting the challenges faced by businesses in ensuring security and privacy in today's distributed workforce model. The conversation with Sean shed light on the need for a more resilient and efficient networking infrastructure that can adapt to the evolving demands of modern businesses.Use Cases and Success StoriesThrough real-world examples with customers like Afzon and Endeavor Energy, Rajiv illustrated how Dispersive's solutions are driving transformation in sectors such as satellite communications and sustainable infrastructure. By providing secure and efficient network connectivity across geographically dispersed assets, Dispersive is empowering organizations to meet the demands of the digital age without compromising on security.Looking Towards the FutureAs the conversation delved deeper into the intricacies of network security, Rajiv expressed optimism for the future of cybersecurity. Embracing principles like zero trust and automated moving target defense, Dispersive aims to stay ahead of the curve in protecting critical assets and resources from evolving cyber threats.In a rapidly changing digital landscape where cybersecurity is non-negotiable, companies like Dispersive and leaders like Rajiv Pimplaskar are paving the way for a more secure and resilient network infrastructure. By combining innovative technology with a collaborative approach, Dispersive is redefining the art of network security in the digital age.With Dispersive's disruptive approach to stealth networking, businesses can navigate the digital landscape with confidence, knowing that their critical systems are protected and secure.Learn more about Dispersive: https://itspm.ag/dispermlwtNote: This story contains promotional content. Learn more.Guest: Rajiv Pimplaskar, President & CEO, DispersiveOn LinkedIn | https://www.linkedin.com/in/rajiv1p/ResourcesLearn more and catch more stories from Dispersive: https://www.itspmagazine.com/directory/dispersiveView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
Innovations in Cybersecurity and Threat Intelligence Solutions | A Brand Story Conversation From RSA Conference 2024 | A MITRE Story with Jon Baker | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 8, 2024 19:57


The cybersecurity landscape is ever-evolving, and staying ahead of threats requires constant innovation and collaboration. At the recent RSA Conference, industry experts gathered to discuss the latest trends and advancements in the field. One of the On Location Coverage with Sean Martin and Marco Ciappelli was the insightful conversation between Sean and Jon Baker, shedding light on the groundbreaking work being done at MITRE's Center for Threat Informed Defense.The Art of Possible: A Glimpse into RSA Conference 2024The RSA Conference provided a platform for cybersecurity professionals to come together and discuss pressing issues in the industry. Sean Martin and Jon Baker's conversation touched upon the theme of this year's conference, "The Art of Possible." This theme resonated with the audience as they delved into the dynamic nature of cybersecurity and the need for continual learning and growth.MITRE: A Beacon of Innovation in CybersecurityJon Baker, Director of the Center for Threat Informed Defense at MITRE, shared insights into the organization's rich history and its mission to solve problems for a safer world. With a focus on advancing threat informed defense globally, MITRE has been a driving force behind initiatives like the ATT&CK framework and the CVE program.Collaborative Research and Development at MITREOne of the key pillars of MITRE's work is collaborative research and development. Through projects like the Technique Inference Engine and Summoning the Pyramid, MITRE is pushing the boundaries of what is possible in cybersecurity. These projects not only aim to enhance detection capabilities but also empower security teams to proactively defend against threats.Engaging the Community: How You Can Get InvolvedThe Center for Threat Informed Defense encourages active participation from the cybersecurity community. By leveraging resources like the Top Attack Technique Calculator and M3TID, organizations can enhance their threat intelligence capabilities and improve their defenses. MITRE also hosts global events and training sessions to promote awareness and facilitate knowledge sharing.Join the Movement: Embracing Innovation in CybersecurityAs the cybersecurity landscape continues to evolve, embracing innovation is key to staying ahead of cyber threats. MITRE's Center for Threat Informed Defense offers a roadmap for organizations looking to enhance their security posture and adapt to the changing threat landscape. By getting involved, providing feedback, and leveraging the tools and resources available, organizations can contribute to a safer and more secure digital ecosystem.Closing ThoughtsThe conversation between Sean Martin and Jon Baker at the RSA Conference highlighted the critical role of collaboration and innovation in cybersecurity. MITRE's Center for Threat Informed Defense is at the forefront of driving impactful research and development efforts that benefit the entire cybersecurity community. By embracing the spirit of continual learning and advancement, organizations can strengthen their defenses and create a more resilient cybersecurity posture.Stay tuned for more insights and updates from MITRE's Center for Threat Informed Defense and join the movement towards a safer digital world.Learn more about MITRE:https://itspm.ag/mitre-eng24Note: This story contains promotional content. Learn more.Guest: Jon Baker, Director , Center for Threat-Informed Defense, MITRE [@MITREcorp]On LinkedIn | https://www.linkedin.com/in/jonathanobaker/ResourcesLearn more and catch more stories from MITRE: https://www.itspmagazine.com/directory/mitreView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
Shacking Up the Security Information and Event Management Market | A Brand Story Conversation From RSA Conference 2024 | An Abstract Security Story with Colby DeRodeff | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 8, 2024 18:26


In the bustling atmosphere of the RSA Conference, a conversation unfolded that shed light on the evolution of cybersecurity and the innovative solutions paving the way for a more efficient and effective approach to data management. Colby DeRodeff, the CEO and co-founder of Abstract Security, shared insights into the journey that led to the creation of a groundbreaking platform designed to transform the way organizations tackle data collection, analysis, and threat detection.A Walk Down Memory LaneThe dialogue between Colby DeRodeff and Sean Martin at the RSA Conference delved into the history of cybersecurity, reflecting on the shifts from perimeter security to compliance-driven approaches and the emergence of new technologies like XDR. This introspective look highlighted the need for a paradigm shift in cybersecurity strategies to keep pace with the rapidly evolving threat landscape.Challenges in Traditional ApproachesOne of the key challenges discussed was the inefficiency of traditional SIEM solutions, which often resulted in data overload, lack of actionable insights, and hefty costs associated with data storage. Colby emphasized the importance of focusing on outcome-driven data collection and detection scenarios rather than accumulating vast amounts of data with limited value.The Birth of Abstract SecurityThe catalyst for Abstract Security stemmed from Colby's experiences in previous companies, where the disconnect between data collection and effective threat detection became glaringly apparent. This realization led to the inception of a platform that prioritizes data relevance, streamlining the process of identifying and responding to security threats efficiently.Abstract Security's Unique ApproachAbstract Security's modular platform offers a refreshing take on cybersecurity data management, with a focus on tailored data collection, analytics, and storage solutions. By enabling organizations to align data sources with specific detection outcomes, Abstract Security empowers teams to make informed decisions and optimize their cybersecurity strategies.Seamless Integration with Existing Tech StackOne of the standout features of Abstract Security is its seamless integration capabilities with existing tech stacks. The platform can complement and enhance current security infrastructure without the need for rip-and-replace, offering a smooth transition towards more effective threat detection and response mechanisms.Looking Towards the FutureAs organizations navigate the complexities of cloud environments and evolving cybersecurity challenges, Abstract Security stands out with fresh innovative ideas and practicality. By reimagining the data management process and emphasizing outcome-driven approaches, Abstract Security is poised to shape the future of cybersecurity operations.ConclusionThe conversation between Colby DeRodeff and Sean Martin at the RSA Conference not only highlighted the pivotal role of Abstract Security in revolutionizing cybersecurity data management but also underscored the importance of reevaluating traditional approaches in the face of modern threats. With Abstract Security leading the charge towards a more efficient and proactive cybersecurity landscape, organizations have the opportunity to elevate their security posture and stay ahead of emerging cyber risks.Learn more about Abstract Security: https://itspm.ag/abstractsec-zaoNote: This story contains promotional content. Learn more.Guest: Colby DeRodeff, CEO and Co-Founder, Abstract Security [@get_abstracted]On LinkedIn | https://www.linkedin.com/in/colbyderodeff/ResourcesLearn more and catch more stories from Abstract Security: https://www.itspmagazine.com/directory/abstract-securityView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
Leading the Charge to Fortify Web Browsing Security | A Brand Story Conversation From RSA Conference 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 25, 2024 20:31


Vivek Ramachandran, a cybersecurity luminary with over two decades of experience, embarked on a transformative journey from developer to esteemed security researcher. His relentless pursuit of innovation led to the creation of SquareX, a pioneering cybersecurity company redefining secure web browsing.Vivek's journey epitomizes a shift towards innovative and proactive cybersecurity measures. With a keen eye for detecting vulnerabilities and a passion for safeguarding corporate assets, he envisioned a solution that transcends traditional security paradigms. SquareX stands as a testament to Vivek's commitment to fortifying online defenses against sophisticated cyber threats.By providing real-time attack detection and comprehensive insights, SquareX empowers organizations to fortify their web browsing environment effectively. Vivek's team's innovations address the critical gap in existing security measures, offering a holistic approach to threat mitigation. With a focus on user-centric protection and robust defense mechanisms, SquareX champions a new era of cybersecurity resilience. Vivek's visionary leadership positions SquareX as a trailblazer in secure browsing solutions.As SquareX continues to make strides in the cybersecurity arena, Vivek's story serves as an inspiration for budding innovators and security enthusiasts while providing much-needed confidence for business and security leaders looking to protect their business assets.Learn more about SquareX: https://itspm.ag/sqrx-l91Note: This story contains promotional content. Learn more.Guest: Vivek Ramachandran, Founder, SquareX [@getsquarex]On LinkedIn | https://www.linkedin.com/in/vivekramachandran/ResourcesLearn more and catch more stories from SquareX: https://www.itspmagazine.com/directory/squarexView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

The Quality Hub
Episode 12 - S2 - Cybersecurity Best Practices Part 1

The Quality Hub

Play Episode Listen Later Apr 24, 2024 23:04


In this episode of the Quality Hub podcast, host Xavier Francis discusses Cybersecurity Best Practices with Reagan Jorgensen, Security Solutions technician, and Robert Hoffman, Windows System Administrator, both from CORE. The episode discusses a case study involving the 2011 breach of Sony's PlayStation Network and its impact on cybersecurity practices. Reagan highlights the evolution of cyber threats, emphasizing social engineering, zero-day exploits, and ransomware attacks as ongoing challenges. Rob emphasizes the importance of policies in managing access and authentication, particularly in cloud environments and mobile devices. The discussion covers preventive measures such as robust network security, and network access control, among others, and recommends seeking expertise when needed. Here is the link to our free download of the Cybersecurity Self-Assessment Glossary:  https://getcertified.thecoresolution.com/cyber-glossary Helpful Resources: For All Things ISO 9001:2015: https://www.thecoresolution.com/iso-9001-2015 Cybersecurity:  https://www.thecoresolution.com/cybersecurity CMMC:  https://www.thecoresolution.com/cmmc-compliance-checklist ISO 27001:  https://www.thecoresolution.com/iso-27001-certification Contact us at 866.354.0300 or email us at info@thecoresolution.com ISO 9001 Standards: https://www.thecoresolution.com/iso-90012015-standard-1 Articles: https://www.thecoresolution.com/free-learning-resources ISO 9001 Consulting: https://www.thecoresolution.com/iso-consulting  

Future of Mobility
#201 – Desmond Wheatley | Beam Global – Off-Grid, Scalable Electric Vehicle Charging Infrastructure

Future of Mobility

Play Episode Listen Later Mar 31, 2024 51:51


Desmond Wheatley is President and CEO and Chairman of the Board at Beam Global, a clean technology innovator which develops and manufactures sustainable infrastructure products and technologies. Chapters Introduction and Background Early Challenges and Market Approach The Off-Grid Charging Solution Challenges in Implementing EV Charging Infrastructure The Need for Decentralized and Scalable Solutions The Product and its Hard Parts Changing the Fueling Behavior for EVs The Future of EV Charging: Fueling Behavior and Infrastructure The Importance of Ubiquitous, Slower Speed Charging Challenges of Energy Storage and Thermal Management Reasons for In-House Battery Manufacturing Balancing Manufacturing and System Level Assembly Strategic Considerations in Acquiring a Battery Company Managing Diversification and Focus Maintaining Motivation and Excitement in the Early Stages The Importance of Capital Markets and Innovation The Growth Potential and Expansion Plans Balancing Growth and Managing Success Embracing Progress and Electrification of Transportation Links Show notes: http://brandonbartneck.com/futureofmobility/desmondwheatley https://www.linkedin.com/in/desmondwheatley/ https://beamforall.com/ Bio: Desmond Wheatley is President and CEO and Chairman of the Board at Beam Global. Wheatley joined BEAM as a consultant in 2010 when it was Envision Solar and has served as the Company's CEO since 2011 and as Chairman of the Board since 2016. He has two decades of senior international management experience in technology systems integration, energy management, communications and renewable energy. He was a founding partner in the international consulting practice Crichton Hill LLC. Prior to Crichton Hill, Wheatley was CEO of iAxis FZ LLC, a Dubai based alternative energy and technology systems integration company. From 2000 to 2007, he held a variety of senior management positions at San Diego based Kratos Defense and Security Solutions, fka Wireless Facilities with the last five years as President of ENS, the largest independent security and energy management systems integrator in the USA. Prior to ENS, Wheatley held senior management positions in the cellular and broadband wireless industries, deploying infrastructure and lobbying in Washington DC on behalf of major wireless service providers. Wheatley has founded, funded and operated four profitable start-up companies and was previously engaged in M&A activities. Wheatley evaluated acquisition opportunities, conducted due diligence, and raised commitments of $500M in debt and equity. About Beam Global: Beam Global is a clean technology innovator which develops and manufactures sustainable infrastructure products and technologies. We operate at the nexus of clean energy and transportation with a focus on sustainable energy infrastructure, rapidly deployed and scalable EV charging solutions, safe energy storage and vital energy security. With operations in the U.S. and Europe, Beam Global develops, patents, designs, engineers and manufactures unique and advanced clean technology solutions that power transportation, provide secure sources of electricity, save time and money and protect the environment. Headquartered in San Diego with facilities in Chicago, Belgrade and Kraljevo, Beam Global has a deep patent portfolio and is listed on Nasdaq under the symbols BEEM and BEEMW. Future of Mobility: The Future of Mobility podcast is focused on the development and implementation of safe, sustainable, effective, and accessible mobility solutions, with a spotlight on the people and technology advancing these fields. Edison Manufacturing and Engineering: Edison is your low volume contract manufacturing partner, focused on assembly of complex mobility and energy products that don't neatly fit within traditional high-volume production methods. linkedin.com/in/brandonbartneck/