POPULARITY
Categories
This Week In Startups is made possible by:Northwest Registered Agent- https://www.northwestregisteredagent.com/twistVanta - http://www.vanta.com/twistLemon IO - https://lemon.io/twistToday's show: Jason's already a millionaire many times over… but what are the huge, blockbuster, dream purchases that he's still holding off on? BESIDES the private jet we all know he wants? The Noti Gang has asked, and JCal finally answers, on a holiday TWiST where we're taking questions from viewers and fans.Check out the episode for lots more intriguing queries, like how to push forward and glean useful information when your first customers aren't using your product the way you'd envisioned. Plus, is there room for both AI agents and great SaaS startups in the coming years? Hear why Jason thinks there IS.AND we've got the very last Gamma Pitch Deck Competition entry before we announce our winner in the new year. Check out AskHumans, an innovative approach to improving market research.Timestamps: (00:00) On a special holiday TWiST, we're answering YOUR pressing Founder Questions!(8:35) Northwest Registered Agent - Form your entire business identity in just 10 clicks and 10 minutes. Get more privacy, more options, and more done—visit https://www.northwestregisteredagent.com/twist today!(09:35) What should a founder do when a VC reaches out cold?(13:37) The importance of maintaining “ball control”(15:35) A European founder asks: Should I take European investments if they're targeting American customers?(19:47) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(20:51) A member of the Noti gang asks for JCal's dream mega-purchases(24:12) Why Jason thinks there's room for BOTH AI agents and great SaaS companies(27:18) Lemon.io - Get 15% off your first 4 weeks of developer time at https://lemon.io/twist(28:23) It's our final Gamma pitch with Zak from AskHumans!(29:24) How AskHumans uses AI to improve on marketing surveys and research(34:33) Management and measurement were designed before computers could understand language… why this matters.(35:48) Why no one ever wants to give feedback in a video(39:01) Why Zak's pitch is “two chapters of the same story”… and was this a pivot?(44:14) Why founders need to assume LLMs are going to get exponentially better*Subscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.com/Check out the TWIST500: https://twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcp*Follow Lon:X: https://x.com/lons*Follow Alex:X: https://x.com/alexLinkedIn: https://www.linkedin.com/in/alexwilhelm/*Follow Jason:X: https://twitter.com/JasonLinkedIn: https://www.linkedin.com/in/jasoncalacanis/*Thank you to our partners:(8:35) Northwest Registered Agent - Form your entire business identity in just 10 clicks and 10 minutes. Get more privacy, more options, and more done—visit https://www.northwestregisteredagent.com/twist today!(19:47) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(27:18) Lemon.io - Get 15% off your first 4 weeks of developer time at https://lemon.io/twistGreat TWIST interviews: Will Guidarahttps://youtu.be/pvJa2pzuXWQEoghan McCabehttps://youtu.be/9dHN4YFkgv4Steve Huffmanhttps://podcasts.apple.com/us/podcast/reddit-ceo-steve-huffman-on-mod-revolt-building-a/id315114957?i=1000617333424Brian Cheskyhttps://podcasts.apple.com/ca/podcast/airbnb-ceo-brian-chesky-on-early-rejection-customer/id315114957?i=1000611761112Bob Moestahttps://youtu.be/y2UMzSqX94QAaron Leviehttps://podcasts.apple.com/ca/podcast/box-ceo-aaron-levie-breaks-down-box-ai-and-generative/id315114957?i=1000612384545Sophia Amorusohttps://podcasts.apple.com/ca/podcast/sophia-amoruso-on-branding-raising-a-fund-portfolio/id315114957?i=1000601352978
Skype of Cthulhu presents a Call of Cthulhu scenario. Curse of Nineveh by Mike Mason, Mark Latham, Scott Dorward, Paul Fricker, and Andrew Kenrick. July, 1925 London The investigators learn more about the recenter murders and manage to turn the tables on their shadows. Dramatis Persone: Sean as the Keeper Edwin as Dame Agatha, Authoress Jonathan as Katherine "Kitty" Hall, Dilettante Steve as Connor Shaw, Archivist Max as Oswald Nickels, Big Game Hunter Gary as Heathcliff Hamilton, Military Officer Randall as Montgomery Helmsworth, Librarian Jim as Roger Schindler, Alienist Rachael as Maude Throckmorton, Adventuress Download Subcription Options Podcast statistics
Skype of Cthulhu presents a Call of Cthulhu scenario. This is Our Home by Jim Phillips. September 23, 1976 Staten Island, New York City, New York The residents of the Hoffman Building try to understand what happened in Apartment 1. Dramatis Persone: Jim as the Keeper of Arcane Lore Randall as Frank Romero, Electrical Engineer Meredith as Marsha Janelle, Waitress Steve as Trae Grier, Gas Station Attendant Edwin as Kevin Mazer, Chemistry Teacher Gary as Peter Michale, Ex Pro Quarterback Sean as Kirk Griffin, Actor Download Subcription Options Podcast statistics
In this episode, James sits down with Silas Cutler, Principal Security Researcher at Census and founding member of Oni Scans, to explore his unconventional journey through threat intelligence and malware analysis. What happens when your first day as a SOC analyst takes down a Fortune 500 company—and Anonymous gets the credit? From accidentally causing international headlines to going undercover in ransomware gangs, Silas has built a career on creative problem-solving and community building. He's become Facebook friends with hackers he investigates, created Malshare (a community malware repository), and founded B-Sides Pyongyang—a security conference celebrating "Missile Industry Day" that started as a joke but attracted 490 attendees.
In 2026, security is no longer a final checkpoint; it is the very foundation of the code you write. With global cybercrime costs crossing the $10.5 trillion mark, the industry has moved toward a "Secure-by-Design" mandate. This episode dives into the DevSecOps revolution: the art of bridging the gap between rapid innovation and stringent regulatory compliance (GDPR, HIPAA, SOC-2). We explore the specialized tools that transform compliance from a manual bottleneck into an automated, self-running process within your CI/CD pipeline.
Show Notes: Isa D'Elia, co-founder of GoalBridge, an AI startup in stealth mode opens the conversation with a brief overview of her background, mentioning she was at Amazon for five years and her co-founder, Vedant, was a software engineer at a financial institution in India. The Origin Story of GoalBridge Isa met her business partner in Berkeley Haas Business school. Through many discussions, they identified a problem in the consulting industry where consultants spent too much time on admin and manual work. They saw an opportunity to use AI to automate these tasks, leading to the creation of GoalBridge. Isa describes how they started working on GoalBridge, entering accelerators, and doing pivots. GoalBridge Iterations They found a design partner who needed a solution to discover their work within SharePoint, Google Drive, CRM, and email. GoalBridge's first iteration was a search AI agent that taps into various platforms to understand the context of engagements. The tool is called "building the brain of a firm" and has been tested with clients, leading to the development of additional agents. Isa introduces the first agent they built, a proposal building agent, which focuses on storyboarding proposals. Dealing with Non-billable Work Streams Consultants often complain about the tediousness of writing proposals, which are non-billable work streams. The agent helps create cohesive stories for proposals by using information from various sources and allowing iterations. They have a roadmap of additional agents to help consultants focus on strategy work rather than manual tasks. GoalBridge's Ideal Customer Profile When asked about the ideal customer profile for GoalBridge, Isa confirms they are targeting SMBs and tier two consulting firms, as larger firms have the resources to build their own tools. Currently, they have signed letters of intent with larger firms, indicating interest in their solution. The tool is designed to help consultants tap into strategy more effectively by automating manual tasks. Goalbridge's Access to Data The conversation turns to the limitations of GoalBridge in terms of access to data. Isa explains that the tool only accesses data that the user has access to, such as their email and specific folders in Google Drive or SharePoint. The tool acts as an AI agent that can quickly scan and understand the context of the data the user has access to. She talks about the challenges of accessing data that is not organized in SharePoint or Google Drive, such as emails. AI Agent that Writes Case Studies and Compendiums Isa introduces the project closeout agent, which helps partners extract and share information, write case studies and compendiums for projects. The agent anonymizes data and creates a cohesive story from various sources, including emails. This agent addresses the issue of knowledge management being left to good intentions and helps capture project context. The closeout agent can also be used for older projects. Demonstrating GoalBridge Isa shows the tool's interface, which includes a project creation feature, a chat dialog box for queries, and a files tab for uploading documents. The tool can tap into various platforms like SharePoint, Google Drive, and CRM systems, with current integrations for HubSpot and Salesforce. They talk about the tool's ability to find examples of old projects and provide feedback on proposals. Isa explains the limitations of GoalBridge in terms of access to data. The tool only accesses data that the user has access to, such as their email and specific folders in Google Drive or SharePoint. The tool acts as an AI agent that can quickly scan and understand the context of the data the user has access to. She also talks about the challenges of accessing data that is not organized in SharePoint or Google Drive, such as emails. Primary Use Cases for GoalBridge Isa outlines the primary use cases for GoalBridge, including partners finding examples of old projects, engagement managers leveraging formatting, and associates copying slides. They discuss the potential for the tool to create PowerPoint presentations and provide feedback on them. Isa mentions future agents in the roadmap, such as a case study writing agent and a pricing strategy agent. The tool is designed to help consultants at all levels by automating manual tasks and improving the quality of their work. Security Concerns and Data Privacy On the issue of security and data privacy when giving external firms access to sensitive data, Isa explains that they have a separate server hosting client data, ensuring it is secure and not accessible by other clients. They are working on SOC 2 certification to further assure clients of their security measures. The tool does not train on client data, ensuring IP is protected and not used for other purposes. When it comes to pricing, Isa mentions their willingness to discuss pricing on a case-by-case basis. Timestamps: 00:02: GoalBridge AI Startup Introduction 02:19: Development and Initial Success of GoalBridge 03:36: Proposal Building Agent and Future Plans 05:59: Target Market and Ideal Customer Profile 09:20:Privacy and Access Limitations 11:25: Project Closeout Agent and Additional Use Cases 15:58: Demonstration of GoalBridge Tool 21:57: Primary Use Cases and Future Agents 22:55: Security and Data Privacy Links: Website: www.GoalBridge.ai Email: isa@GoalBridge.ai This episode on Umbrex: https://umbrex.com/unleashed/episode-629-isa-deila-co-founder-of-goalbridge/ Unleashed is produced by Umbrex, which has a mission of connecting independent management consultants with one another, creating opportunities for members to meet, build relationships, and share lessons learned. Learn more at www.umbrex.com. *AI generated timestamps and show notes.
Studying bats' hearing can be tricky due to their small size, making certain styles of measurement used for larger echolocating mammals unavailable to researchers. In this episode, we talk to Victoria Fouhy and Michael Smotherman (Texas A&M University) about their work to develop a noninvasive method to study cortical auditory evoked potentials in bats, thereby allowing scientists to better understand how these animals process echolocation information.Associated paper:- Victoria Fouhy, Sam Ellis, and Michael Smotherman. "Subcutaneous cortical auditory evoked potentials in echolocating bats." J. Acoust. Soc. Am. 158, 3390-3399 (2025). https://doi.org/10.1121/10.0039659.Read more from The Journal of the Acoustical Society of America (JASA).Learn more about Acoustical Society of America Publications.Music Credit: Min 2019 by minwbu from Pixabay.
In this episode of JacquesTalk we take a deep dive on DeSoto, Duncanville and SOC and the high school playoffs. Then we talk about whether Schotty's culture will show up Sunday after being eliminated from the playoffs. Finally, we discuss a bad experience at a local steakhouse.
Doug Green, Publisher of Technology Reseller News, spoke with Josh Flinn, Director of Product, Cloud Software at Digi International, about the company's achievement of SOC 2 Type 2 compliance and what it means for channel partners building secure, cloud-based IoT solutions. Digi International is a global leader in cellular connectivity for IoT, delivering secure, reliable connectivity for distributed devices such as remote sensors, smart city infrastructure, vehicles, and industrial systems. Operating as a channel-first company, Digi focuses on helping partners deploy and manage IoT solutions at scale through cloud-based platforms like Digi Remote Manager and Digi Ventus. During the discussion, Flinn explained that SOC 2 Type 2 is a significant milestone because it validates not only Digi's security controls but also the ongoing execution of secure development, auditing, and change management practices over time. For channel partners, this reduces friction in the sales cycle, simplifies security questionnaires, and provides confidence that core components of their solutions already meet rigorous security standards. As Flinn noted, “SOC 2 is not a one-time event—it's an ongoing commitment to secure operations.” The compliance attestation currently covers Digi Remote Manager for Digi 360 router and gateway platforms, as well as Digi Ventus, Digi's managed services cloud platform. Looking ahead, Digi is continuing to invest in security enhancements such as long-term support firmware, eSIM security capabilities, and automated compliance controls, reinforcing its cloud-first approach as partners and customers move toward increasingly distributed, IoT-driven environments. Learn more about Digi International at https://www.digi.com/. Software Mind Telco Days 2025: On-demand online conference Engaging Customers, Harnessing Data
Send Bidemi a Text Message!In this episode, host Bidemi Ologunde spoke with Bruce Johnson of TekStream Solutions to unpack how the Whole of State initiative—with the Louisiana State University, Splunk, and Amazon Web Services—is turning classrooms into 24/7, student-powered SOCs that launch graduates into mid-level roles. With nearly four decades in IT security, Bruce shares how opening the door to any discipline builds stronger teams and real-world readiness. How do these student SOCs keep organizations safe while students learn? What does a typical shift and escalation look like? Can a philosophy or nursing major really become an analyst? How is success measured—placements, detection speed, or something else? Where does AI help without replacing humans? And what changed as the model expanded to New Jersey Institute of Technology and Louisiana Tech University?Support for The Bid Picture Podcast comes from Black Rifle Coffee Company, a veteran-founded coffee brand roasting premium beans for people who love a strong start to the day. From bold blends to convenient ready-to-drink cans, Black Rifle Coffee keeps you fueled for whatever's ahead. Check them out at blackriflecoffee.com.Support for The Bid Picture Podcast comes from GymShark, performance apparel designed for people who take their training seriously. With gym-ready fits that move with you, GymShark helps you stay focused from warm-up to cooldown. Explore their latest drops at gymshark.com.Support for The Bid Picture Podcast comes from Uncommon Goods, an online marketplace filled with unique, independently made gifts. From clever gadgets to handcrafted home goods, Uncommon Goods helps you find something thoughtful for everyone on your list. Learn more at uncommongoods.com.Support the show
professorjrod@gmail.comIn this episode of Technology Tap: CompTIA Study Guide, we dive deep into incident response, forensics, and monitoring essentials crucial for your tech exam prep. Learn the full incident response lifecycle—preparation, detection, analysis, containment, eradication, recovery, and lessons learned—to develop your IT skills and master concepts important for the CompTIA exam. We discuss how having a solid plan, defined roles, and effective communication helps IT teams maintain clarity when systems fail. Tune in for real-world examples showing how SOC analysts escalate brute force attacks, how teams preserve evidence for forensics, and how incident debriefs lead to stronger security measures like multi-factor authentication. This episode is an essential part of your CompTIA study guide and technology education journey.We then turn to digital forensics and make it concrete. Legal hold, due process, and chain of custody aren't buzzwords—they're the difference between actionable findings and inadmissible claims. We break down the order of volatility, memory and disk acquisition, hashing, and write blockers, plus the reporting and e‑discovery steps that transform artifacts into a defensible narrative. If you've ever wondered when to pull the plug or why RAM matters, this segment gives you the why and the how.Finally, we zoom out to monitoring and the tools that power modern security operations. From Windows logs and Syslog to IDS, IPS, NetFlow, and packet capture with Wireshark, we show how each source fits the puzzle. We unpack SIEM fundamentals—log aggregation, normalization, correlation, alert tuning—and share strategies to beat alert fatigue without missing true positives. To round it out, we offer certification guidance across A+, Network+, Security+, and Tech+, helping you choose the right path whether you're SOC-bound or supporting compliance from another business unit.Subscribe for more practical cybersecurity breakdowns, share this with a teammate who needs a stronger IR playbook, and leave a review with your biggest monitoring or forensics question—we may feature it next time.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel's cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Texas sues smart TV manufacturers, alleging illegal surveillance. A fraudulent gift card locks an Apple user out of their digital life. Our guest is Doron Davidson from CyberProof Israel discussing agentic SOCs and agentic transformation of an MDR. Fat racks crack the stacks. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Doron Davidson, GM at CyberProof Israel, MD Security Operations, discussing agentic SOC and agentic transformation of an MDR. If you'd like to learn more be sure to check out CyberProof. Tune into the full conversation here. Selected Reading Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure (Live Threat Intelligence) IDF warns future cyberattacks may dwarf past threats (The Jerusalem Post) CISA reports active exploitation of critical Fortinet authentication bypass flaw (Beyond Machines) Hitachi Energy reports BlastRADIUS flaw in AFS, AFR and AFF Series product families (Beyond Machines) AI models are perfecting their hacking skills (Axios) AI Hackers Are Coming Dangerously Close to Beating Humans (WSJ) MITRE Extends D3FEND Ontology to Operational Technology Cybersecurity (Mitre) Texas sues biggest TV makers, alleging smart TVs spy on users without consent (Ars Technica) Locked out: How a gift card purchase destroyed an Apple account (Apple Insider) Racks of AI chips are too damn heavy (The Verge) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
This Week In Startups is made possible by:Vanta - https://www.vanta.com/twistNetSuite - https://www.netsuite.com/twistLemon.io - https://lemon.io/twist*Today's show: Domestic robots have never been hotter… so why is iRobot in so much trouble?!On TWiST, we're investigating the recent troubles facing the automated vacuum robot, Roomba. We've all seen these little discs sweeping up our friends' floors… but now the company behind them is running out of cash.What happened to iRobot, and would things have turned out differently if they had been sold to Amazon back in 2022?PLUS why Jason thinks you should spend your disposable income on investing… Is Alex still a journalist, and what does that actually mean for his portfolio?… Are founders and investors too cautious when it comes to signaling risk?… Why did all those internal Pipe documents leak online?… And MUCH MORE!Timestamps:(00:00) Why Jason loves Incentivizing New Ventures and Economic Strength Through Capital Formation!(09:48) Jason warns “no one is coming to help you with your job loss”; you're on your own!(10:21) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(13:05) Why Jason thinks laid-off HR folks should be starting their own “micro-funds"(14:13) Does Alex consider himself a journalist? Is it unethical for him to invest in companies? (Let's get INTO IT.)(16:02) You can't become complacent when you're in the lead!(20:03) Why you should use disposable “entertainment” income on investing(22:32) Netsuite - Get the free business guide Demystifying AI at https://www.netsuite.com/twist(23:36) $9B in new funds?! What is Lightspeed up to?(26:10) Is everyone too cautious about “signaling risk”?(28:39) Lemon.io - Get 15% off your first 4 weeks of developer time at https://Lemon.io/twist(31:21) How does Jason think those Pipe documents leaked? And WHY?(38:15) The critical importance of diversification(39:35) iRobot went BANKRUPT! Who killed the Roomba?(44:47) Are there ANY potential deals that would bother Jason? It's all about market share.(48:18) HuggingFace is moving major Reachy Minis! How open source turns everything upside down.(53:22) How Polymarket will decide when/if the AI bubble “bursts.”*Subscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.com/Check out the TWIST500: https://twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcp*Follow Lon:X: https://x.com/lons*Follow Alex:X: https://x.com/alexLinkedIn: https://www.linkedin.com/in/alexwilhelm/*Follow Jason:X: https://twitter.com/JasonLinkedIn: https://www.linkedin.com/in/jasoncalacanis/*Thank you to our partners:(10:21) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(22:32) Netsuite - Get the free business guide Demystifying AI at https://www.netsuite.com/twist(28:39) Lemon.io - Get 15% off your first 4 weeks of developer time at https://Lemon.io/twistGreat TWIST interviews: Will Guidarahttps://youtu.be/pvJa2pzuXWQEoghan McCabehttps://youtu.be/9dHN4YFkgv4Steve Huffmanhttps://podcasts.apple.com/us/podcast/reddit-ceo-steve-huffman-on-mod-revolt-building-a/id315114957?i=1000617333424Brian Cheskyhttps://podcasts.apple.com/ca/podcast/airbnb-ceo-brian-chesky-on-early-rejection-customer/id315114957?i=1000611761112Bob Moestahttps://youtu.be/y2UMzSqX94QAaron Leviehttps://podcasts.apple.com/ca/podcast/box-ceo-aaron-levie-breaks-down-box-ai-and-generative/id315114957?i=1000612384545Sophia Amorusohttps://podcasts.apple.com/ca/podcast/sophia-amoruso-on-branding-raising-a-fund-portfolio/id315114957?i=1000601352978Reid Hoffmanhttps://podcasts.apple.com/ca/podcast/reid-hoffman-on-ais-crescendo-moment-regulation-and/id315114957?i=1000612548498Frank Slootmanhttps://podcasts.apple.com/ca/podcast/snowflake-ceo-frank-slootman-on-moving-the-needle-win/id315114957?i=1000602560622
Skype of Cthulhu presents a Call of Cthulhu scenario. Curse of Nineveh by Mike Mason, Mark Latham, Scott Dorward, Paul Fricker, and Andrew Kenrick. July, 1925 London A visit to the British Museum yields new clues while an interview with a surviving member of the expedition suggests danger is shadowing the team. Dramatis Persone: Sean as the Keeper Edwin as Dame Agatha, Authoress Jonathan as Katherine "Kitty" Hall, Dilettante Steve as Connor Shaw, Archivist Max as Oswald Nickels, Big Game Hunter Gary as Heathcliff Hamilton, Military Officer Randall as Montgomery Helmsworth, Librarian Jim as Roger Schindler, Alienist Rachael as Maude Throckmorton, Adventuress Download Subcription Options Podcast statistics
Four enterprise AI leaders from Box, Snorkel AI, Sumo Logic, and Talkdesk peel away the hype and share battle-tested strategies for implementing agentic AI at scale.Topics Include:Carol Potts introduces panel featuring AI leaders from Box, Snorkel AI, Sumo Logic, and TalkdeskDiego Dugatkin explains Box serves 120,000 enterprise customers with 1.5 exabytes of secure cloud contentKui Jia shares Sumo Logic processes petabytes daily across 10 AWS regions for intelligent operationsYunjing Ma describes Talkdesk's evolution from contact center to customer experience automation through agentic AIDennis Panos positions Snorkel AI as leader in embedding human knowledge into data-centric applicationsDiego reveals Box uses AI internally for faster development and externally for metadata extraction automationKui explains security teams face overwhelming volumes, sometimes 1,000 signals daily, many AI-generated attacksSumo Logic announces SOC analyst agent in customer beta and query agent in general availabilityYunjing details Talkdesk's multi-agent hierarchy architecture powered by unified TalkDesk Data Cloud platformFour key areas identified: discovery of opportunities, building knowledge-powered agents, optimization, and measurementDennis emphasizes starting with trusted data foundation before adding generative AI capabilities to avoid hallucinationsDiego stresses governance importance: AI guardrails plus traditional data security create comprehensive protection frameworkKui warns POC-to-production gap requires intentional design: different latency, accuracy, and security requirements at scaleYunjing shares customer success: 80,000 daily calls, 11,000 documents, 97% accuracy despite complex compliance rulesKey success factors include prompt engineering optimization and real-time data processing mechanism improvementsDiego advises learning AI tools end-to-end: from ideation through functional demos without traditional prototyping delaysDennis recommends robust evaluation frameworks across system components, similar to software unit testing approachesYunjing reinforces data processing optimization and governance remain essential alongside exciting agentic AI capabilitiesKui urges immediate action: technology evolves rapidly, perfect solutions don't exist, customer focus builds trustFinal advice centers on treating AI as digital teammate, not replacement, enhancing productivity and creativityPlatform partnerships like AWS Bedrock solve heavy lifting, allowing teams to focus on core differentiatorsParticipants:Diego Dugatkin - Chief Product Officer, BoxDennis Panos - Head of Enterprise AI, SnorkelAIKui Jia - VP AI Engineering, Sumo LogicYunjing Ma - VP of Engineering, AI, TalkdeskModerator: Carol Potts - General Manager, ISV Sales Segment, North America, Amazon Web ServicesSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/
In this special episode of The Virtual CISO Moment, Greg Schaffer shares five cybersecurity predictions for 2026 grounded in real-world patterns — not hype. From the tightening of SOC 2 audits and the rise of “vibe coding” risks, to a coming shakeout in the vCISO market, influencer-driven security shaming, and the growing dangers of contractor misclassification, this episode explores the second-order consequences many organizations are already overlooking.If you're a business leader, CISO, or vCISO, this episode will challenge assumptions and help you see where governance failures quietly become security failures.
Got a question or comment? Message us here!Get an inside look at how weekly threat-intel briefings really work in a mature security program.
What if you could hire an army of AI security analysts that work 24/7 investigating alerts so your human team can focus on what actually matters? Edward Wu, founder and CEO of DropZone AI, joins The Audit crew to reveal how large language models are transforming security operations—and why the future of cyber defense looks more like a drone war than traditional SOC work. From his eight years at AttackIQ generating millions of security alerts (and the fatigue that came with them), Edward built DropZone to solve the problem he helped create: alert overload. This conversation goes deep on AI agents specializing in different security domains, the asymmetry problem between attackers and defenders, and why deepfakes might require us to use "safe words" before every Zoom call. What You'll Learn: How AI tier-1 analysts automate 90% of alert triage to find real threats faster Why attackers only need to be right once, but AI can level the playing field Real-world deepfake attacks hitting finance teams right now The societal implications of AI-driven social engineering at scale Whether superintelligence will unlock warp engines or just better spreadsheets If alert fatigue is crushing your security team, this episode delivers the blueprint for fighting back with AI. Hit subscribe for more conversations with security leaders who are actually building the future—not just talking about it. #cybersecurity #AIforCybersecurity #SOC #SecurityOperations #AlertFatigue #DropZoneAI #ThreatDetection #IncidentResponse #CyberDefense #SecurityAutomation
At the 2025 American Society of Hematology Annual Meeting & Exposition (ASH), CancerNetwork® sat down with a variety of researchers and clinicians to discuss potential advancements across hematologic oncology care. These experts shared their findings related to investigational therapeutic regimens and strategies that may prove impactful across different multiple myeloma, lymphoma, and leukemia populations. First, Krina K. Patel, MD, MSc, highlighted findings from the phase 2 iMMagine-1 study (NCT05396885) assessing treatment with anitocabtagene autoleucel (anito-cel) among patients with relapsed/refractory multiple myeloma. According to Patel, an associate professor in the Department of Lymphoma/Myeloma in the Division of Cancer Medicine at The University of Texas MD Anderson Cancer Center in Houston, Texas, the novel cellular therapy elicited an overall response rate (ORR) of 96% and a stringent complete response or CR rate of 74% among the evaluable patients. She also discussed how anito-cel's unique mechanism of action may show efficiency compared with other cellular therapy products while reducing the risk of cytokine release syndrome and other delayed toxicities. Next, Manali Kamdar, MD, spoke about data from a long-term follow-up phase 2/3 study (NCT03435796) based on the phase 3 TRANSFORM trial (NCT03575351) evaluating lisocabtagene maraleucel (liso-cel; Breyanzi) vs standard-of-care therapy for patients with relapsed/refractory large B-cell lymphoma (LBCL). Long-term follow-up showed that liso-cel continued to elicit improvements in progression-free survival and overall survival across this population. Kamdar, the clinical director of Lymphoma Services at the University of Colorado Anschutz School of Medicine, touched upon the patient subpopulations who are most suitable to receive liso-cel while emphasizing the agent's curative potential in the second-line setting. Finally, Wei Ying Jen, BM BCh, MA, MMed, MRCP, FRCPath, detailed results from the phase 1/2 SAVE trial (NCT05360160), which showed responses with an all-oral combination of revumenib (Revuforj), decitabine/cedazuridine (Inqovi), and venetoclax (Venclexta) for patients with newly diagnosed acute myeloid leukemia. Jen, an assistant professor in the Department of Leukemia in the Division of Cancer Medicine at The University of Texas MD Anderson Cancer Center in Houston, Texas, noted how an all-oral regimen may offer an “advantage” compared with standard intensive chemotherapy, which requires patients to travel to the hospital to undergo an infusion. References Patel K, Dhakal B, Kaur G, et al. Phase 2 registrational study of anitocabtagene autoleucel for the treatment of patients with relapsed and/or refractory multiple myeloma: updated results from iMMagine-1. Blood. 2025;146(suppl 1):256. doi:10.1182/blood-2025-256 Kamdar M, Solomon S, Arnason J, et al. Lisocabtagene maraleucel (liso-cel) versus standard of care (SOC) for second-line relapsed or refractory large B-cell lymphoma (LBCL): First Results from long-term follow-up of TRANSFORM. Blood. 2025;146(suppl 1):3710. doi.10.1182/blood-2025-3710 Jen WY, DiNardo CD, Short NJ, et al. Phase II study of the all-oral combination of revumenib (SNDX-5613) with decitabine/cedazuridine (ASTX727) and venetoclax (SAVE) in newly diagnosed AML. Blood. 2025;146(suppl 1):47. doi:10.1182/blood-2025-47
IonQ Vice President and GM of Quantum Platform Matthew Keesan joins BioTalk for a clear look at how they are advancing quantum computing from its home base in the BioHealth Capital Region. He shares the story of IonQ's Maryland roots and explains quantum computing in straightforward terms for listeners seeking a high-level understanding. The conversation moves into why biohealth leaders should track the hardware race, what distinguishes IonQ's approach, and how quantum is already being paired with AI to strengthen modeling and analysis. Keesan walks through early use cases showing traction today, challenges common myths about timelines, and shares which biohealth applications he expects to gain mainstream momentum by 2030. Editing and post-production work for this episode was provided by The Podcast Consultant (https://thepodcastconsultant.com). Matthew Keesan is Vice President and GM of Quantum Platform at IonQ and a member of the BHI Board. He joined IonQ in 2017 to lead the development of the company's Quantum OS, the software stack that controls IonQ's quantum computers. In 2021, he oversaw the launch of IonQ's Harmony systems on Amazon Braket, Microsoft Azure Quantum, and Google Cloud, making IonQ the first quantum hardware provider available across all three hyperscalers. He built IonQ's security function to meet commercial and government frameworks, including SOC 2, NIST 800-171, NIST 800-53, and ISO 27001, and established a globally distributed operations team managing IonQ's fleet of quantum computers across the United States and Europe. Before joining IonQ, Keesan served as CTO of the restaurant technology company Ando, which was acquired by Uber, and advised startups in manufacturing, e-commerce, and identity-as-a-service. He also helped create the technology behind the interactive HBO series Mosaic with Steven Soderbergh. He holds patents in quantum compilation, hybrid quantum computation, and quantum control automation, and has co-authored papers published in Nature and Physical Review A.
It's YOUR time to #EdUp with France Hoang, Founder & CEO, BoodleBoxIn this episode, sponsored by the 2026 InsightsEDU Conference in Fort Lauderdale, Florida, February 17-19,YOUR cohost is Dr. Susan Ray, Associate Professor of English, Delaware County Community CollegeYOUR host is Elvin FreytesHow does an AI platform resolve the tension between productivity & productive struggle by making human to AI collaboration transparent while keeping student work private?What happens when you build infrastructure with unlimited access to ChatGPT, Claude, Gemini & Perplexity with FERPA, SOC 2, GDPR & HIPAA certifications that anonymizes prompts & deletes data after 30 days?How does a portable AI toolkit allow students to build skills across courses & take their entire personalized system with them into their careers as a lifelong learning platform?Listen in to #EdUpThank YOU so much for tuning in. Join us on the next episode for YOUR time to EdUp!Connect with YOUR EdUp Team - Elvin Freytes & Dr. Joe Sallustio● Join YOUR EdUp community at The EdUp ExperienceWe make education YOUR business!P.S. Want to get early, ad-free access & exclusive leadership content to help support the show? Then subscribe today to lock in YOUR $5.99/m lifetime supporters rate! This offer ends December 31, 2025!
Send us a textCheck us out at: https://www.cisspcybertraining.com/Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkoutGet access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouvHeadlines about eight Chrome zero days aren't just noise—they're a prompt to act with precision. We open with the fastest, most reliable steps to reduce exposure: force updates with MDM, restart browsers to trigger patches, narrow to a hardened enterprise browser, and brief your SOC to tune EDR for active exploit patterns. You'll get a focused checklist that's quick to run and easy to defend to leadership.From there, we turn the lens to CISSP Domain 8 with five questions that teach more than they test. We explain why strict schema validation for JSON beats blanket escaping, and how misuse and abuse case analysis during requirements gives you the strongest assurance that security is built into design, not bolted on. We also break down supply chain risk in CI/CD with a practical recipe: software composition analysis, cryptographic signature checks, internal artifact repositories, and policy gates that block malicious or license-violating packages before they ship.Design flaws are the silent killers. We highlight a common mistake—putting sensitive business logic in the browser—and show how to move decisions server-side, validate every request, and protect against client tampering. Finally, we get tactical about containerized microservices: image signing plus runtime verification, read-only filesystems, minimal base images, and network policies that enforce least privilege. These are the controls that turn incident response into a manageable drill, not a firestorm.If you're preparing for the CISSP or leading an engineering team, you'll leave with strategies you can apply today: browser patching that sticks, threat modeling that finds real risks, SCA that calms your pipeline, and container security that proves runtime trust. Enjoyed this conversation? Subscribe, share with a teammate, and leave a quick review to help more people find it.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
On this episode of The Cybersecurity Defenders Podcast we speak with Alec Fenton, VP of Security Operations at Foresite Cybersecurity about his journey from SOC analyst to security leader.Alec Fenton is a seasoned Cyber Security professional with over 15 years of extensive experience across many IT domains. With a career spanning more than a decade, Alec has honed his expertise in addressing a broad spectrum of cybersecurity challenges, leveraging his analytical prowess and hands-on approach to leadership.Throughout his career, Alec has navigated the intricate landscape of IT security, working across various sectors including managed service providers and private companies. His tenure as an analyst in the cybersecurity space has not only equipped him with a deep understanding of emerging threats and vulnerabilities but has also shaped his leadership philosophy of "lead from the front."Alec's commitment to excellence and his unwavering dedication to staying ahead of the curve in the ever-evolving field of cybersecurity have earned him recognition as a trusted advisor and thought leader in the industry. When he's not immersed in the world of IT security, Alec enjoys spending time outdoors, and help coach his son's baseball/basketball teams.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
AI agents are moving fast, and security teams are scrambling to keep up.Join us as Heather Ceylan, SVP & Chief Information Security Officer at Box, who has spent the last several years leading security teams through rapid change from the explosive growth years at Zoom to her current work shaping Box's AI posture.Heather shares what it actually feels like to run security at a time when agents can be created in minutes, permissions matter more than ever, and governance committees are struggling to keep pace. She explains why treating agents as identities fundamentally changes the model, how MCP servers introduce new exposure points, and why her team is embedding AI directly into SOC work, design reviews, and vulnerability remediation.It's a grounded look at how a CISO makes sense of AI while everything around the role continues to shift.In this episode, you'll learn:Why agents need their own identities and permissions rather than inheriting access from the people who create themHow SOC teams can shift from constant alert triage to real threat hunting with the help of AI agentsHow AI can speed up vulnerability remediation by creating pull requests that engineers only need to review and mergeThings to listen for: (00:00) Meet Heather Ceylan(00:58) Career path from healthcare to Zoom to Box(03:58) Risks of AI agents accessing unstructured content(05:18) Why agent identity and permissions are the new priority(06:50) The challenge of discovering and governing ephemeral agents(08:16) How sandboxes and policies support safe experimentation(09:20) AI governance gaps and the need for dedicated ownership(13:10) Defining AI governance across technical and legal domains(16:17) The rise of MCP servers and new exposure points(18:05) Four AI bets transforming Box's SOC and security workflows(23:31) KPIs and measuring AI's impact on security teams(25:27) Resource trade-offs when adopting AI in security(27:58) Managing the complexity of model selection and trust(29:58) Should companies form dedicated AI security teams?
Got a question or comment? Message us here!A new zero-day is already under active exploitation. This week's SOC Brief breaks down the React2Shell vulnerability (CVE-2025-55182), how attackers moved within hours of disclosure, and what SOC teams need to do now to reduce exposure and stay ahead of fast-moving threats.
We're thrilled to welcome back Eva Hongyan Gao, Head of Product ESG at AMCS Group, a returning guest (episode 102) and a product leader in B2B SaaS, circular economy, and ESG, for a special episode on using LLMs securely inside the enterprise. Eva joins Matt and Moshe to offer a candid, hands-on look at how AI fits into enterprise toolkits, the challenges of data compliance, and the realities of integrating tools like Microsoft Copilot Studio within strict security frameworks.Eva brings deep experience building for demanding enterprise customers, where success is measured not just by innovation, but by strict ISO, SOC 2, and GDPR compliance. She shares what happens behind the scenes as product leaders and IT teams try to balance innovation, cost, and data protection, sometimes losing sleep over responsible tool usage and ever-climbing AI integration costs.Join Matt, Moshe, and Eva as they explore:Using AI tools in highly regulated, security-conscious B2B enterprise settingsThe compliance process: from ISO and SOC2 to GDPR and internal AI guidelinesWhy Microsoft Copilot is becoming the default LLM in enterprises, and what you still need to watch out forBuilding internal agents and chat interfaces to answer roadmap questions and handle stakeholder requestsLessons learned moving from over-engineered platforms to simpler, compliant AI toolsCreative AI workflows, including removing branded assets between Copilot and Figma and orchestrating information for various departmentsThe ongoing struggle: data redaction, internal transparency, and the limits of controlling generative modelsLLM orchestration: mixing old-school logic with new AI capabilities, and knowing when not to use AISecurity best practices and the importance of a trust-based compliance mindset across the organizationWhat happens when stakeholders use AI tools in ways product never expectedOpportunities for Copilot and DevOps to streamline maintenance, documentation, and stakeholder requestsThe future of AI in sustainability, product management, and business decision-makingAnd much more!Want to connect with Eva or learn more?LinkedIn https://www.linkedin.com/in/evagaodeYou can also connect with us and find more episodes:Product for Product Podcast: http://linkedin.com/company/product-for-product-podcastMatt Green: https://www.linkedin.com/in/mattgreenproductMoshe Mikanovsky: http://www.linkedin.com/in/mikanovskyNote: Any views mentioned in the podcast are the sole views of our hosts and guests, and do not represent the products mentioned in any way.Please leave us a review and feedback ⭐️⭐️⭐️⭐️⭐️
Skype of Cthulhu presents a Call of Cthulhu scenario. This is Our Home by Jim Phillips. September 22, 1976 Staten Island, New York City, New York Six strangers who reside at the same building are drawn together on one horrible night. Dramatis Persone: Jim as the Keeper of Arcane Lore Randall as Frank Romero, Electrical Engineer Meredith as Marsha Janelle, Waitress Steve as Trae Grier, Gas Station Attendant Edwin as Kevin Mazer, Chemistry Teacher Gary as Peter Michale, Ex Pro Quarterback Sean as Kirk Griffin, Actor Download Subcription Options Podcast statistics
Vjaceslavs Klimovs, Distinguished Engineer at CoreWeave, reflects on building security programs in AI infrastructure companies operating at massive scale. He explores how security observability must be the foundation of any program, how to ensure all security work connects to concrete threat models, and why AI agents will make previously tolerable security gaps completely unacceptable. Vjaceslavs also discusses CoreWeave's approach to host integrity from firmware to user space, the transition from SOC analysts to detection engineers, and building AI-first detection platforms. He shares insights on where LLMs excel in security operations, from customer questionnaires to forensic analysis, while emphasizing the continued need for deterministic controls in compliance-regulated environments. Topics discussed: The importance of security observability as the foundation for any security program, even before data is perfectly parsed. Why 40 to 50 percent of security work across the industry lacks connection to concrete threat models or meaningful risk reduction. The prioritization framework for detection over prevention in fast-moving environments due to lower organizational friction. How AI agents will expose previously tolerable security gaps like over-provisioned access, bearer tokens, and lack of source control. Building an AI-first detection platform with assistance for analysis, detection writing, and forensic investigations. The transition from traditional SOC analyst tiers to full-stack detection engineering with end-to-end ownership of verticals. Strategic use of LLMs for customer questionnaires, design doc refinement, and forensic analysis. Why authentication and authorization systems cannot rely on autonomous AI decision-making in compliance-regulated environments requiring strong accountability.
Got a question or comment? Message us here!In this #SecureAF episode, Tanner and Dylan share real-world IR stories, common attack vectors, SOC fatigue during holiday PTO, and the #1 thing every organization should do before stepping away for the season. If you've ever wondered why cyber incidents always seem to hit when everyone is off work, this one explains it.
In this CPQ Podcast episode, host Frank Sohn talks with Andreas Westling, CEO and co-founder of Ignize, about how modern AI pricing and CPQ help B2B manufacturers increase EBIT, improve price fairness, and react faster to market volatility. Drawing on more than 20 years of pricing experience, including his time as CEO of Navetti (acquired by Vendavo). Andreas explains why pricing fundamentals haven't changed, but the way manufacturers execute pricing has transformed. He also shares how Ignize supports mid-market and enterprise manufacturers with complex, multinational pricing operations that require both speed and precision. Andreas introduces Ignize's concept of Generative Precision Pricing (GPP) and the role of the Ignizer, a modern engine that turns pricing expertise into data-driven, explainable recommendations. You'll also hear how Ignize integrates with CRM systems such as Salesforce and Microsoft Dynamics, ERP systems including SAP, Oracle, and legacy platforms, and CPQ solutions like Tacton to deliver consistent, value-based pricing across the commercial stack. We discuss why black-box AI pricing often fails in B2B manufacturing, and why explainability and transparency are essential to earn trust from pricing teams, product managers, sales, and customers. Andreas also outlines what manufacturers can expect from an Ignize implementation. From 8–12 week quick-start value phases to broader enterprise rollouts, and how modern pricing platforms help companies navigate tariffs, commodity swings, currency shifts, and other forms of market disruption. Ignize also operates on an enterprise-grade security foundation, backed by ISO 27001:2013 certification and SOC 2 Type II compliance, ensuring that sensitive pricing and commercial data is handled with the highest standards of information security and compliance. If you're interested in CPQ, B2B pricing, or how AI can strengthen price quality, win rates, and overall financial performance, this episode is for you.
DailyCyber The Truth About Cyber Security with Brandon Krieger
Ask Me Anything: vCISO Strategy, IR, and Cyber Leadership | DailyCyber 281 ~ Watch Now ~In this AMA edition of DailyCyber, I answer questions cybersecurity leaders face every day — from rebuilding income after a layoff to navigating account compromise scenarios.This episode is packed with insights on mindset, leadership, communication, and technical decision-making.
In this episode of This Week in NoCode + AI, I sit down with Michelle, the co-founder and CEO of Flint, to talk about one of the wildest ideas we've seen in web tech lately: an autonomous website that optimizes itself in real time.Michelle shares her journey from software engineer at Warp to leading growth and marketing, and eventually co-founding Flint. We get into how she validated the idea within days, how she approached finding the right co-founder, and what it actually takes to build AI native products today.If you're a builder, founder, or AI-curious maker, this episode is full of lessons on moving fast, talking to users early, and understanding how AI can reshape how we build for the web.What you'll learn:• How autonomous websites work (and why they matter)• Flint's early validation process and customer feedback• Michelle's path from engineering → growth → founder• How to find a co-founder you trust• Real examples of Flint adapting and improving sites in real time• What the future of AI-driven web experiences could look likeTry Flint: https://www.tryflint.com/Follow Michelle: https://x.com/michlimlim
Security used to be a headache. Now it is a growth engine.In this episode of IT Visionaries, host Chris Brandt sits down with Taylor Hersom, Founder and CEO of Eden Data and former CISO, to break down how fast growing companies can turn cybersecurity and compliance into a true competitive advantage. Taylor explains why frameworks like SOC 2, ISO 27001, and emerging AI standards such as ISO 42001 are becoming essential for winning enterprise business. He also shares how to future proof controls, connect compliance work to real business goals, and avoid the costly pitfalls that stall companies during scale.Taylor also highlights the biggest blind spots in AI security, including model training risks, improper data handling, and the challenges created by relying on free AI tools. If you are building a SaaS product or selling into large companies, this conversation shows how trust, transparency, and strong security practices directly drive revenue. Key Moments: 00:00 — The Hidden Risks of Scattered Company Data04:11 — Why Early-Stage Teams Lose Control of Security08:22 — Compliance Becomes a Competitive Advantage12:33 — SOC 2 vs ISO 27001: What Founders Need to Know16:44 — Framework Overload and How to Navigate It20:55 — Mapping Security Controls to Business Objectives25:06 — The Gap Between Compliance Audits and Real Threats29:17 — Startup Security Blind Spots That Lead to Breaches33:28 — Rising AI Risks Leaders Aren't Preparing For37:39 — Building Customer Trust Through Transparency41:50 — Protecting AI Models and Sensitive Customer Data46:01 — Why Free AI Tools Create Hidden Data Exposure50:12 — Automating Security Controls for Scale54:23 — Continuous Compliance Beats Annual Audits58:34 — Final Takeaways on Security, Trust, and Growth -- This episode of IT Visionaries is brought to you by Meter - the company building better networks. Businesses today are frustrated with outdated providers, rigid pricing, and fragmented tools. Meter changes that with a single integrated solution that covers everything wired, wireless, and even cellular networking. They design the hardware, write the firmware, build the software, and manage it all so your team doesn't have to.That means you get fast, secure, and scalable connectivity without the complexity of juggling multiple providers. Thanks to meter for sponsoring. Go to meter.com/itv to book a demo.---IT Visionaries is made by the team at Mission.org. Learn more about our media studio and network of podcasts at mission.org. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Send us a textCheck us out at: https://www.cisspcybertraining.com/Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkoutGet access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouvA headline about hacked nanny cams is more than a cautionary tale—it's a mirror for how easily convenience eclipses security. We start with the Korean IP camera case to highlight simple, high-impact steps anyone can take: change default credentials, use unique passwords, turn off remote access unless you truly need it, and keep firmware current. Then we ask the harder question: how do you prove security works when the stakes are higher than a living room feed?Shifting into CISSP Domain 6, we break down audit readiness, independence, and risk-based assurance. If you're eyeing ISO 27001, the smartest first move is an internal audit program aligned with the standard's control objectives. It validates design and operating effectiveness before an external auditor walks in, and it surfaces the documentation and evidence gaps that slow teams down. We also unpack governance: when boards want independent assurance, the audit function should report outside IT. Self-assessments still help, but they don't replace a real audit.Risk should lead, not scanner severity. Consider a “medium” vulnerability on a critical payment system that demands authenticated access and precise timing. Rather than knee-jerk patching or dismissal, a structured risk analysis weighs business impact, likelihood, and compensating controls like monitoring and segregation of duties. That approach drives better prioritization and stronger outcomes.For ongoing evaluation, snapshots alone aren't enough. Instead of doubling costly SOC 2s, blend risk-based self-assessments, targeted internal audits, and continuous monitoring to maximize coverage and value. And when your cloud provider won't allow pen tests on shared PaaS, you can still gain assurance: request SOC 2 Type II, ISO 27001, and pen test summaries under NDA, then map their scope and results to your control requirements and risk appetite. Close gaps with compensating controls and a clear shared responsibility matrix.If you're preparing for the CISSP or modernizing your assurance program, this conversation will help you cut noise, focus effort, and build confidence where it counts. Subscribe, share with a teammate who handles audits, and leave a review to tell us what assurance challenge you want solved next.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
This Week In Startups is made possible by:LinkedIn Ads - http://linkedin.com/thisweekinstartupsVanta - https://www.vanta.com/twistPilot - https://pilot.com/twistToday's show: Did you know there's actually a shortage of US bricklayers? It's TRUE! So feel free to marvel at Monumental's brick-laying robots. They're not putting anyone out of work, but filling a much-needed gap.Join Alex and Monumental founder/CEO Salar al Khafaji for a deep-dive on how the startup is making construction robots play nice together by maintaining separate “zones” of operation, why Salar thinks startups need to focus on truly complex, real-world problems to truly blossom, and the secrets of fundraising in Europe.PLUS Alex chats with Seasats CEO Mike Flanigan about designing the next generation of autonomous marine crafts. (That is to say, ocean drones.) From their home base in San Diego, the company is trying to get completely independent of all Chinese parts. Find out how it's going, how they're overcoming the “wildly negative” ROI on maritime tech, and why we have so few defenses against tiny, agile drones.All that AND Jason takes some of YOUR Founder Questions.Timestamps:(03:23) How Monumental determined what kinds of robots construction sites need the most(06:49) How maintaining “zones” ensure that the robots all play nice with one another(07:52) There's a shortage of bricklayers, so Monumental's NOT taking anyone's job(9:16) LinkedIn Ads: Start converting your B2B audience into high quality leads today. Launch your first campaign and get $250 FREE when you spend at least $250. Go to http://linkedin.com/thisweekinstartups to claim your credit.(13:21) Why startups need to tackle large-scale, complex, real-world problems to really grow(15:44) Why Monumental is building in The Netherlands, and running pilots in the UK(19:07) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(20:44) Why construction is unique among applications for automation and robots(26:01) Salar argues that fundraising in Europe is not as hard as you may have heard(27:55) We don't just need housing, we need BEAUTIFUL housing(31:11) Pilot - Visit https://www.pilot.com/twist and get $1,200 off your first year. (33:25) How the Scout autonomous boat challenge inspired Seasats(35:28) Trying to make drones into an “iPhone Style” project(37:39) Why Seasats is focused on endurance and staying power more than launches(39:15) The complexities of working with fuel cells(42:27) The importance of beautiful design even when working on government technology(45:51) Why they're building Seasats in beautiful San Diego, CA(47:29) The challenge of getting entirely free from Chinese components(53:52) “The Power of Small Things Has Changed”(55:18) The “wildly negative” ROI on most humanoid robotics companies also applies to maritime tech(59:09) Why there are so few defense nets against people with tiny but agile drones(01:02:32) FOUNDER Q's: Is a founder working 24/7 a red flag?(01:10:11) How bad is it to use VC money to pay off credit cards?(01:12:49) A look at Cursor's unique recruitment strategy.(01:19:57) Should young VCs go to startup conferences?Subscribe to the TWiST500 newsletter: https://ticker.thisweekinstartups.com/Check out the TWIST500: https://twist500.comSubscribe to This Week in Startups on Apple: https://rb.gy/v19fcp*Follow Lon:X: https://x.com/lons*Follow Alex:X: https://x.com/alexLinkedIn: https://www.linkedin.com/in/alexwilhelm/*Thank you to our partners:(9:16) LinkedIn Ads: Start converting your B2B audience into high quality leads today. Launch your first campaign and get $250 FREE when you spend at least $250. Go to http://linkedin.com/thisweekinstartups to claim your credit.(19:07) Vanta - Get $1000 off your SOC 2 at https://www.vanta.com/twist(31:11) Pilot - Visit https://www.pilot.com/twist and get $1,200 off your first year.
What Security Congress Reveals About the State of CybersecurityThis discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioners, certification holders, chapter leaders, and future professionals to exchange ideas on the issues shaping the field today. Themes That Stand OutAI remains a central point of attention. France notes that organizations are grappling not only with adoption but with the shift in speed it introduces. Sessions highlight how analysts are beginning to work alongside automated systems that sift through massive data sets and surface early indicators of compromise. Rather than replacing entry-level roles, AI changes how they operate and accelerates the decision-making path. Quantum computing receives a growing share of focus as well. Attendees hear about timelines, standards emerging from NIST, and what preparedness looks like as cryptographic models shift. Identity-based attacks and authorization failures also surface throughout the program. With machine-driven compromises becoming easier to scale, the community explores new defenses, stronger controls, and the practical realities of machine-to-machine trust. Operational technology, zero trust, and machine-speed threats create additional urgency around modernizing security operations centers and rethinking human-to-machine workflows. A Place for Every Stage of the CareerFrance describes Security Congress as a cross-section of the profession: entry-level newcomers, certification candidates, hands-on practitioners, and CISOs who attend for leadership development. Workshops explore communication, business alignment, and critical thinking skills that help professionals grow beyond technical execution and into more strategic responsibilities. Looking Ahead to the Next CongressThe next ISC2 Security Congress will be held in October in the Denver/Aurora area. France expects AI and quantum to remain key themes, along with contributions shaped by the call-for-papers process. What keeps the event relevant each year is the mix of education, networking, community stories, and real-world problem-solving that attendees bring with them.The ISC2 Security Congress 2025 is a hybrid event taking place from October 28 to 30, 2025 Coverage provided by ITSPmagazineGUEST:Jon France, Chief Information Security Officer at ISC2 | On LinkedIn: https://www.linkedin.com/in/jonfrance/HOST:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comFollow our ISC2 Security Congress coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/isc2-security-congress-2025Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageISC2 Security Congress: https://www.isc2.orgNIST Post-Quantum Cryptography Standards: https://csrc.nist.gov/projects/post-quantum-cryptographyISC2 Chapters: https://www.isc2.org/chaptersWant to share an Event Briefing as part of our event coverage? Learn More
It's 1960s Tulsa, Oklahoma, it's Greasers versus Soc's, it's poor versus rich, it's murder and poetry, and it's a ton of future stars. We welcome back my sister Anne Jones to talk about her favorite movie. Starring C. Thomas Howell, Matt Dillon, Ralph Macchio, Patrick Swayze, Rob Lowe, Diane Lane, Emilio Estevez, Tom Cruise, and Leif Garrett. Written by Kathleen Rowell from S.E. Hinton's novel. Directed by Francis Ford Coppola. This is a reposting of a recent episode without any copyright issues, to get past YouTube's blocker.
What Security Congress Reveals About the State of CybersecurityThis discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioners, certification holders, chapter leaders, and future professionals to exchange ideas on the issues shaping the field today. Themes That Stand OutAI remains a central point of attention. France notes that organizations are grappling not only with adoption but with the shift in speed it introduces. Sessions highlight how analysts are beginning to work alongside automated systems that sift through massive data sets and surface early indicators of compromise. Rather than replacing entry-level roles, AI changes how they operate and accelerates the decision-making path. Quantum computing receives a growing share of focus as well. Attendees hear about timelines, standards emerging from NIST, and what preparedness looks like as cryptographic models shift. Identity-based attacks and authorization failures also surface throughout the program. With machine-driven compromises becoming easier to scale, the community explores new defenses, stronger controls, and the practical realities of machine-to-machine trust. Operational technology, zero trust, and machine-speed threats create additional urgency around modernizing security operations centers and rethinking human-to-machine workflows. A Place for Every Stage of the CareerFrance describes Security Congress as a cross-section of the profession: entry-level newcomers, certification candidates, hands-on practitioners, and CISOs who attend for leadership development. Workshops explore communication, business alignment, and critical thinking skills that help professionals grow beyond technical execution and into more strategic responsibilities. Looking Ahead to the Next CongressThe next ISC2 Security Congress will be held in October in the Denver/Aurora area. France expects AI and quantum to remain key themes, along with contributions shaped by the call-for-papers process. What keeps the event relevant each year is the mix of education, networking, community stories, and real-world problem-solving that attendees bring with them.The ISC2 Security Congress 2025 is a hybrid event taking place from October 28 to 30, 2025 Coverage provided by ITSPmagazineGUEST:Jon France, Chief Information Security Officer at ISC2 | On LinkedIn: https://www.linkedin.com/in/jonfrance/HOST:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comFollow our ISC2 Security Congress coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/isc2-security-congress-2025Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageISC2 Security Congress: https://www.isc2.orgNIST Post-Quantum Cryptography Standards: https://csrc.nist.gov/projects/post-quantum-cryptographyISC2 Chapters: https://www.isc2.org/chaptersWant to share an Event Briefing as part of our event coverage? Learn More
Many small and mid-size businesses breathe a sigh of relief once they earn a compliance certification, but the work doesn't stop there. Certifications like SOC 2, ISO, or CMMC aren't one-time milestones. They're ongoing commitments that require fresh evidence, updated controls, and regular monitoring.In this episode, Marie Joseph, Manager of Compliance Advisory at Trava, breaks down the reality of maintaining compliance over time. She discusses why frameworks evolve and how managed compliance services can take the stress off your team's plate. Plus, she shares common mistakes businesses make during recertification and how to stay audit ready all year long.Key takeaways:How compliance frameworks evolve and why it mattersCommon mistakes companies make before audits and how to avoid themHow managed compliance services free up your team's time One of the top tips Marie shared in this episode for staying proactive and organized with compliance is using a Compliance Calendar. You can download a free copy today—based on the same calendar Marie uses every day to manage SOC 2, ISO 27001, CMMC, NIST, and other frameworks: https://travasecurity.com/pod-compliance-calendarEpisode highlights:(00:00) Compliance: What happens after you get certified?(02:32) Framework changes and renewals(05:17) Why compliance is never “done”(09:14) The audit mistake SMBs make most oftenConnect with the host:Jara Rowe's LinkedIn - @jararoweConnect with the guest:Marie Joseph's LinkedIn - https://www.linkedin.com/in/marie-joseph-a81394143/ Connect with Trava:Website - www.travasecurity.comBlog - www.travasecurity.com/learn-with-trava/blogLinkedIn - @travasecurityYouTube - @travasecurity
What is the future of MDR?In this episode of the mnemonic security podcast, Robby is joined by Migjen Hakaj from mnemonic's Innovation & Emerging Technologies Department and Amine Besson, wearing many hats including Detection Engineering & Threat Hunting SIG Chair at FIRST, Detection Engineering Tech Lead at the European Commission, and Threat Detection & Response Expert at the EU CyberNet.They've joined forces by collecting their shared extensive experience with security monitoring, and published a popular three-part blog series on what Managed Detection and Response (MDR) really is on a deep level, where they examine the past, present, and future challenges within the field.In their conversation they talk about the evolution of the SOC space, what main forms of security operations they are seeing today, and why they believe the SOC needs to change.They also explain why it's hard to define what MDR really is today, the main value proposition of MDR providers, and what the next big differentiators for MDR providers will be. As well as in what ways they've seen that the industry has matured over the last few years, where the industry needs radical change, and where AI SOC has a place and where its main challenges lie.Interested in more? Visit their blog series:The Present and Future of Managed Detection and Response: https://detect.fyi/the-present-and-future-of-managed-detection-and-response-01a72088e6f6The missing link in MDR. Spoiler, it starts with a Detection Engineering framework: https://detect.fyi/the-missing-link-in-mdr-spoiler-it-starts-with-a-detection-engineering-framework-5f836347c92fBeyond Detections : Scaling Analysis & Response to keep MDR relevant: https://detect.fyi/beyond-detections-scaling-analysis-response-to-keep-mdr-relevant-592285d0fd25Send us a text
Featuring an interview with Dr Priyanka Sharma, including the following topics: T-DXd versus trastuzumab emtansine for high-risk HER2-positive primary breast cancer with residual invasive disease after neoadjuvant therapy: Interim analysis of the DESTINY-Breast05 trial (0:00) Geyer C et al. Trastuzumab deruxtecan (T-DXd) vs trastuzumab emtansine (T-DM1) in patients (pts) with high-risk human epidermal growth factor receptor 2–positive (HER2+) primary breast cancer (BC) with residual invasive disease after neoadjuvant therapy (tx): Interim analysis of DESTINY-Breast05. ESMO 2025;Abstract LBA1. DESTINY-Breast11 trial: Neoadjuvant T-DXd alone or followed by paclitaxel/trastuzumab/pertuzumab for high-risk HER2-positive localized breast cancer (5:42) Harbeck N et al. DESTINY-Breast11: Neoadjuvant trastuzumab deruxtecan alone (T-DXd) or followed by paclitaxel + trastuzumab + pertuzumab (T-DXd-THP) vs SOC for high-risk HER2+ early breast cancer (eBC). ESMO 2025;Abstract 291O. Trastuzumab deruxtecan (T-DXd) and pertuzumab versus a taxane, trastuzumab and pertuzumab for HER2-positive advanced or metastatic breast cancer: Additional analyses of the DESTINY-Breast09 trial (10:00) Loibl S et al. Trastuzumab deruxtecan (T-DXd) + pertuzumab (P) vs taxane + trastuzumab + pertuzumab (THP) for patients (pts) with HER2+ advanced/metastatic breast cancer (a/mBC): Additional analyses of DESTINY-Breast09 in key subgroups of interest. ESMO 2025;Abstract LBA18. CME information and select publications
Got a question or comment? Message us here!This week's #SOCBrief dives into the FortiWeb zero-day that's letting attackers create admin accounts with a single unauthenticated HTTP request. With exploitation spiking and Fortinet pushing out a quiet fix, SOC teams are under pressure to lock down configs, audit firewalls, and patch fast. We break down what happened, who's affected, and how to defend before attackers pivot deeper into your network.Support the showWatch full episodes at youtube.com/@aliascybersecurity.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.
In this episode of Gangland Wire, host Gary Jenkins sits down with former FBI agent Séamus McElearney, author of Flipping Capo, for a deep dive into one of the most remarkable Mafia investigations and how he took down the DeCavalcante Family. McElearney recounts his unlikely path from the world of banking to the FBI, driven by a lifelong fascination with law enforcement. Despite being told he didn't have the “right background,” he pushed forward—eventually landing in New York's Organized Crime Squad C-10, where he investigated both the Bonanno and DeCavalcante crime families. He describes the rare and demanding experience of working two Mafia families at once, and the teamwork required to dismantle them from the inside out. As the conversation turns to his book, Flipping Capo, McElearney explains the years-long process of writing it and the rigorous FBI review needed to ensure no sensitive investigative techniques were revealed. He shares early memories of notorious boss Joe Massino, and the high-stakes surveillance and arrests that defined his career. A major focus of the episode is the arrest and flipping of Anthony Capo, a feared DeCavalcante soldier—and the first made member of that family ever to cooperate with the government. McElearney walks listeners through the tension of that operation, his calculated approach to treating Capo with respect, and the psychological tightrope that ultimately persuaded Capo to talk. That single decision triggered a domino effect of cooperation that helped bring down the New Jersey mob family many believe inspired The Sopranos. Gary and Séamus dive into the proffer process, cooperation agreements, and the behind-the-scenes strategies used to turn high-level mobsters. McElearney also draws comparisons between real mob figures and the fictional world of The Sopranos, revealing how much of the hit series was grounded in the actual cases he worked. The interview closes with McElearney's reflections on how organized crime continues to evolve. While today's mob may look different from the one he battled in the '90s, he stresses that the methods—and the money—still flow. His candid insights offer a rare look into the changing face of the American Mafia and the ongoing fight to contain it. Listen now on Apple Podcasts, Spotify, YouTube, or your favorite podcast app. 2:26 Seamus’ FBI Journey 6:26 Inside the DeCavalcante Family 9:05 The Process of Flipping 10:27 Comparing Families 12:30 The First Cooperation 17:43 The Proffer Process 25:03 Protecting Cooperators 27:44 The Murder of Joseph Canigliaro 29:42 Life on Trial 30:28 The Real Sopranos 39:43 Leading the Columbo Squad 44:15 Major Arrests and Cases 50:57 Final Thoughts and Stories Hit me up on Venmo for a cup of coffee or a shot and a beer @ganglandwire Click here to “buy me a cup of coffee” To go to the store or make a donation or rent Ballot Theft: Burglary, Murder, Coverup, click here To rent ‘Brothers against Brothers’ or ‘Gangland Wire,’ the documentaries click here. To purchase one of my books, click here. Transcript [0:00]Well, hey, welcome all you wiretappers. Good to be back here in studio of Gangland Wire. This is Gary Jenkins, retired Kansas City Police Intelligence Unit detective. [0:07]Welcome to Gangland Wire [0:07]I have a former FBI agent as my guest today. And, you know, I love having these FBI agents on. I’ve had a lot of them on and I worked with a lot of the guys and they’re really good guy. Everyone I ever met and worked with was a really good guy. Now they got their deadhead just like we did. But these aggressive guys are the ones that write books and I’ve got one on today. Seamus McElherney. Welcome, Seamus. Thank you. It’s great to be here. All right. Well, an Irish name now working on the Italian mob, huh? How come you weren’t working on the Westie? So they were maybe gone by the time you came around. There’s no such thing. [0:47]Oh, yeah. You got your code. You Irish guys got your code, too. All right, Seamus, you got a book, Killing, or Killing, Flipping Capo. I want to see it back up over your shoulder there. Really interesting book, guys. He flipped a guy named Anthony Capo. And he really took down the real Sopranos, if you will. So Seamus, tell us a little about how you got started with the FBI, your early career. Okay. When I got out of school, I really didn’t know what to do. And I got into banking and I just decided that was really not for me. And I got lucky where I got to meet an FBI agent. and I was just so fascinated by the work. It seemed like every day was different. You know, one day you could meet a CEO and another day you could be doing surveillance. It just, the job just seemed really interesting. [1:38]Like fascinating to me. So I decided to try to become an agent. And I was constantly told, Shane, you should never become an agent. You didn’t have the background for it. And one, one, a motto in life to me is persistence beats resistance. And I was just determined to become an agent. And back then in the late 1990s, it was a long process and it took me close to two years to actually become an agent. And I was selected to go down to training and I was very fortunate to be selected to go down to training. Now it was your first office back up in New York and the, one of the organized crime squads, or did you go out into boonies and then come back? I actually was born and raised in New York, and I was fortunate to be selected to be sent back to New York. So my first squad, I was sent back to the city, back to 26 Federal Plaza, [2:26]Seamus’ FBI Journey [2:24]and I was assigned to a squad called C-10. And C-10 was an organized crime squad, which was responsible for the Bonanno family, and then later became the DeCavocanti family as well, which I can explain to you yeah yeah we’ll get we’ll get deep into that now now let’s let me ask you a little bit about the book tell the guys a little bit about the process of writing a book from your fbi experiences. [2:47]It’s a long process. First of all, I was contacted by someone who was interested [2:55]Writing a Book [2:53]in writing a book based upon my career. People had encouraged me to write a book because I had a very successful career. And when you work organized crime, it’s never just about you. It’s about the people that you work with, right? It’s definitely a team. It’s never just one person. I had great supervisors. I had great teammates. I had a great partner. And so I was approached to write a book. So then I had no idea. So there was an agent, a famous agent, an undercover agent named Jack Garcia. So I kind of really leaned on him to kind of learn how to write a book. And it’s a long process. You have to get an agent, the publisher, a co-author I had. And then when you finally have all that, and you do have the manuscript ready to be written, you have to send it down to the FBI. And that is a long process. The FBI, in this instance, probably took over a year for them to review the book because what they want to make sure is you’re not revealing any investigative techniques. Fortunately for me, a lot of the information that is in the book is public information because of all the trials that I did. Interesting. Yeah, it is. It is quite a I know it was quite a process. [4:00]Now, the banana squad, you work in a banana squad. You know, we know a little bit about the banana squad. [4:07]Was Joe Pacino the boss when you first came in? Yes, he was. And I actually had the pleasure of arresting Joe as well. Ah, interesting. I did a show on Joe. He’s a really interesting guy. I know my friend, who was at the banana squad, I think just before you were, and he talked a lot of, to me personally, he won’t go on the show, but he talked a lot about Joe Massino. He said, actually, saw him in the courtroom one time later on, he hadn’t seen him in several years. And, and Joe looked across the courtroom. He said, Doug, how are you doing? He said, Joe was that kind of guy. He was real personal. He was. [4:44]Yeah, so when I first got to the squad, the supervisor at the time was a gentleman named Jack Steubing, and he had the thought process to go after Joe and his money. So there was two accountants that were assigned to a squad at that time. It was Kimberly McCaffrey and Jeff Solette, and they were targeted to go after Joe and his money. And it was a very successful case. And when we arrested Joe, I think it was in January of 2003, I believe it was, I was assigned to be part of that arrest team. Interesting. You know, McCaffrey and Sled are going to be talking about that case out at the Mob Museum sometime in the near future. I can’t remember exactly when it is. And it was a hell of a case. I think it just happened, actually. Oh, did it? Okay. I actually just spoke to Jeff, so I think it just happened about a week or two ago. Okay. Yeah, I tried to get him to come on the show, and I think maybe he was committed to doing something else, and I didn’t keep after him. And I don’t like to pester people, you know. [5:44]And Fensell was the one that said, you got to get Jeff Sillett. You got to get Jeff Sillett. When I looked into that money angle of it, that was pretty interesting about how they were laundering their money through the parking lots and just millions. And when he gave up, like $10 million or something? I mean, it’s unbelievable. Yes. And that’s that’s one of the reasons why I wrote the book is because I don’t think the public or the press really put this together where that squad, C-10, is a very unique squad where we were dismantling the two families at the same time. Half the family was working the Bonanno family and half the family was working the Cavalcanti family. So it’s a very unique squad during that six or seven year time period where we were dismantling two families at the same time. [6:26]Inside the DeCavalcanti Family [6:26]Interesting and and that gets us into the dekavocante family i could always struggle with that name for some reason but that’s all right guys know i butcher these names all the time. [6:37]Forgive me guys anyhow so you ended up working on the dekavocante family down in new jersey now that you know that’s unusual how did that come about we got we got a new jersey branch of the fbi down there too, Yes, we do. So what happened was I went to training in February of 1998. The case actually starts in January of 1998, where an individual named Ralph Guarino was the mastermind behind this, but he had the idea of robbing the World Trade Center. So he had three people that actually tried to execute that plan. They did rob the World Trade Center, but when they came out, they took their mask off and they were identified by the cameras that were actually there. So those individuals were actually arrested pretty quickly. I think two were arrested that day. The third person, I think, fled to New Mexico and was found pretty quickly. Ralph was smart enough to know that he was going to be apprehended pretty quickly. So he reached out to an agent named George Hanna, a legendary agent within the office, and George was able to convince him to become a proactive witness, meaning he would make consensual recordings. That was in January of 1998. I think it was January 14th. [7:51]Approximately nine days later, there was a murder of an individual named Joseph Canigliaro. Who was a ruthless DeKalocanti associate assigned to a wheelchair. How he got in a wheelchair was back in the 70s, a DeKalocanti soldier and him went to go collect money from a loan shark victim. And the story goes that Jim Gallo, James Gallo, actually shot Joseph Canigliaro by accident and paralyzed him. No hard feelings. It was just the course of doing their business back then. But he was paralyzed from the 70s to the 90s. He was a ruthless individual. though. And the reason that they killed him is his crew around him had him killed. They actually killed him because he was such a ruthless person and who would extort people and just really was a bad person. There were stories that he would call people over to him in his wheelchair and shoot them. So a ruthless guy. And he was killed in, I think, January 23rd of 1998. [8:50]So that’s how this case starts. Ralph Guarino, as I said, became a proactive witness. When you have a proactive witness. You just don’t know where they’re going to go. What I mean by that is you would direct him through mob associates and many guys, and you’re trying to gather evidence on tape. [9:05]The Process of Flipping [9:06]Where Ralph Guarino led us was the Brooklyn faction of the DeCavalcanti family, namely Anthony Capo, Anthony Rotondo, Vincent Palermo. [9:17]Joseph Scalfani, a whole host of DeCavalcanti people that were located in Brooklyn. And that’s how we start to build this case. Now, granted, I was just in training at that time in February of 1998. I don’t get sent back to New York until May of 1998. And from May of 1998 until December of 1998, they put you through a rotation, meaning I go through the operations center, I go through surveillance, and then I finally get assigned to C-10 in December of 1998. At that point in time, Jeff and Kim are already on the squad, so they’re operating the case against Messino. I come to the squad, and the Decalvo Canty case has now started. So I’m assigned to the Decalvo Canty portion of the squad to work them. And as I said, that’s why we’re working two parallel cases at the time. One is against the Bananos, the other is against the Jersey family. And we operate, Ralph, proactively from January 1998 up until the first set of indictments, which was in December of 1999. So compare and contrast the Banano family structure and how they operated in [10:27]Comparing Families [10:24]a DeCavocante family structure and how they operate. Were they exactly the same or were there some differences? [10:31]They’re into the same types of the rackets that the Waldemar people are into, but I would say related to the Decalvo Canty family, since they’re based in Jersey, they really had a control of the unions out there. There was two unions that they basically controlled, Local 394, which was the labor union, and they also started their own union, which was the asbestos union, which was Local 1030. [10:53]And those were controlled by the Decalvo Canty family, so that was the bread and butter of the Decalvo Canty family. So, as I said, the first set, you know, we operated Ralph proactively for almost close to two years. And then in December of 1999, we executed our first set of arrests because there was whispers that Ralph, why wasn’t he arrested yet? Where he was the mastermind behind the World Trade Center being robbed, but he hasn’t been picked up yet. So there was whispers that he might be cooperating with the government. And for his safety, that’s why we took him off off the street and we executed our first round of arrest in December of 1999. [11:33]I’m a relatively new agent. I’d only been on the squad now for a year and we arrested 39 people that day. I get assigned to arrest Anthony Capo, who’s a soldier within the Decavacanti family based out of Staten Island. And I was really surprised by that because, as I said, I was just an agent for about a year. Usually when you’re a new agent, you’re assigned to the back, you know, like we are security. I was even surprised that I was going to be on a team. And I was fortunate enough to be the team leader, which is very surprising to me. And the case was out of the Southern District of New York. And in New York, just for the public, there is two districts. There’s a Southern District of New York and the Eastern District of New York. And the Eastern District of New York also had charges on Anthony Capo as well. So for my arrest team, I had members from the Eastern District of New York as well. There was a separate squad that was looking into Anthony Capo there. [12:30]The First Cooperation [12:27]So I got the ticket to arrest Anthony Capo in December of 1999. And that’s how this case starts. [12:33]Interesting. Now, nobody’s ever flipped out of the DeCavocante family before, I believe. It’s been a pretty tight family, really rigidly controlled by this Richie the Boot. I mean, he’s a fearsome, fearsome guy. I mean, you did not want to get crossways with him. And a smaller, tighter family, it seems to me like, than the New York families. That was right. Well, like up and up until that point, up until that point and unbeknownst to me that no made member in the DeKalbacanti family had ever cooperated with the government before. [13:08]So I had watched George Hanna, how he operated Ralph Guarino for those two years, and he always treated him with respect. And prior to going to arrest Anthony Capo, Anthony Capo had had a reputation of being an extremely violent person, hated by law enforcement and even hated by a lot of people within the mob. But I was going I wasn’t going to let that, you know, use that against him. I was going to treat him with respect regardless. Right. I didn’t know I didn’t know him. I never dealt with him before. And I would basically before I went to go arrest him, I was going to study everything about him, learn everything about him. And I was going to use the approach of treating him with respect and using some mind chess when I was going to arrest him. What I mean by that is I was going to learn everything charges about him, everything about his family. I wanted him to know that I knew him like the back of my hand from head to toe, the start of the book to the end of the book. [14:02]And when I went to arrest him, I remember when we went to his house, he wasn’t there. So all the planning that you do related to going into an arrest, the checks that you do, he’s at the house, you knock on his door, and guess what? He’s not there. So his wife basically tells us that he’s at his mom’s house. So then that throws all the planning out the window, and now we go to his mom’s house. And when I met him, you know, I saw that he had a relationship with his parents, which, you know, it gives me a different perspective from what I heard from him. Interesting. And that says something about him, that’s for sure. So everything that I heard of this violent person and hated person, the way he treated law enforcement, he wasn’t that way with me. [14:49]So when I get him in the car and I start to read him his rights and start to ask him questions, every question that I would ask him, I already had the answer to, like, your date of birth, social security number. And then he would invoke his right to counsel, and then you’re not allowed to ask him any more questions. So what I would do is I would let the mind game start then. And I would ask him, you know, tell him about the charges that he had at that point in time. He was only charged with a conspiracy to murder Charlie Maggiore, who was an acting panel boss of the Decalvo Canty family. At that time, that point in time, they had three panel bosses. It was Charlie Maggiore, Jimmy Palermo and Vincent Palermo. Vincent Palermo was known as the stronger personality and really known as the acting boss. And they wanted to kill Charlie Maggiore. So he was charged with that. conspiracy to murder. And he was also charged with, I believe, stock fraud or it was mail fraud that would lead to stock fraud. So when I would question him, I would tell him, since he already invoked his right to counsel, don’t say anything, just listen to me. For an example, I would say your plan was to murder Charles Majuri. Your plan was to ring his doorbell and shoot him right there with James Gallo, Joe Macella. But you guys didn’t do that because there was a cop on the block. So instead of just doing a ring and run, you guys were going to ring and shoot him, right? [16:17]And now you’ve got to think, I told him, don’t say anything. Just listen to what I just said, right? Because I can’t have him answer any questions. And this wasn’t a question. This was a statement. Yeah. So that gives him food for thought, because you got to think, how would I know that? He doesn’t know at that point in time, this is an indictment. How do I know that? He doesn’t know who the cooperator is. He doesn’t know who made a recording. So I’m just throwing this at him. And this is the first time he’s hearing this. So it’s got to make him think, like, what else does this agent know? And I did this with the other charges as well. And then I would just throw these little tidbits at him. And then I would speak to the driver. How are you doing this? just give him food for thought. And then we just developed a bond that day, just talking sports back and forth. He actually was a cowboy fan. I’m a Steeler fan. So we have that little intensity going back and forth about that. And then we just developed a bond that day. I think that was the first time that he had an interaction with law enforcement, where it was more of a respect thing, as opposed to someone yelling at him or being contentious with him. I don’t think he’s ever or experienced that before. [17:27]Also because of his delivery as well, right? You know, it works both ways where you can, he can have his delivery really angry and that could, you know, provoke law enforcement to be angry towards him too. [17:43]The Proffer Process [17:40]So I think that helped it that way that day. And then just throughout the whole day. And I think one of the things that I do talk about within the book is just explaining processes to people, which is generally, I haven’t seen that done in a book before about how pretrial works. So what is pretrial? How cooperation works? How trial works? So I think there’s a lot of tidbits within the book that kind of explain things like that. Even some crimes, too. Like everyone hears what loan sharking is. I go into detail as to what loan sharking is and how it really works, because it’s a very profitable way to make money. So we have our day together. And, you know, then I had to meet his stepfather. I think he had heard that I treated his stepfather with respect. And then approximately a week later, I get a call from his lawyer and I basically almost fell out of my chair when his lawyer said he wanted to cooperate. [18:37]I bet. And then, yeah. And, you know, keep in mind, I’ve only been on the job for a year and I immediately call the assistant who is a seasoned assistant. Maria Barton, what was her name? And she’s really concerned, like, what did I say? Right. So I told her in these situations, less is more. I just told her I was going to call you. That’s all I said. I didn’t say anything else. Didn’t promise anything at all. I said I was going to call you. So, you know, that started with the process and then you go through a proffer. So I explained what the proffer is and how that process works. Interesting. Yeah. A proffer, guys is is like a kind of agreement you know and you you have to be totally open and admit to every crime you ever did and and we’ll cover you but to a certain point the basis you’ll lie down the basics. [19:31]Right. So what, you know, what we kind of like call it is queen for a day, right? Where you come in, we can’t use your words against you unless you lie to us, right? If you were, if you were to lie to us and then go, go to trial and, you know, we could, if you were to take the stand, we could, we could use it against you. But as long as you come in and you tell us the truth and you tell us everything, all the crimes that you’ve done. And the beauty of the mob is when they do a crime, they never do a crime alone, right? They involve a lot of people within a crime. So that’s the beauty of that. So when we have our first proffer, you know, in time, you only have a short amount of time to actually speak about this because you can only be away from jail for a certain amount of time right before the bad guys start to realize that something might be up. Right. So he comes in. And even even before that, on his on his way back, when we’re taking him back to 26 Federal Plaza, one of the things that he tells us is and it makes sense when we went to his house, he wasn’t there. He was at his mom’s house in the car ride back. He throws a little shot at me and he goes, we knew you were coming. [20:33]Meaning that there was a leak. They got a leak. Yeah. Right. So then when we have the first proffer, he explains the leak to us. And it appears allegedly there was a court reporter within the Southern District that was feeding them information. So that’s not good. And then in the proffer, he tells us about two murders. So, and there might be the bodies, a body might be buried up in Phil Lamella, who was a DeCalvo County soldier, up in Marlboro, New York. So that’s the first thing that he tells us. So these are jewels to us, right? He tells us about a leak. He tells us about two murders. Bodies might be buried. So we have to huddle and we have to decide, is he telling us the truth or not? We all decide that he’s telling us the truth. The proper takes place with George Hanna, as I mentioned him before. Kenny McCabe, a legendary Southern District investigator, and me. And in these situations, again, I’m a new agent. Less is more. I don’t want to say something stupid. So I kind of keep my mouth shut, right? And just listen. So that went really well. And that kind of started this whole process. So now, as we said before, you have… No one cooperated in 100 plus years of this family. And now we have the first [21:49]A Spiral of Cooperation [21:48]made member to cooperate. And basically, Anthony starts a spiral effect of cooperation. [21:56]After he where he reported to in the family at that particular time, since he was such a violent person and hard to control within the family himself. Well, he reported to Vincent Palermo, who was the acting panel boss out of that panel that I talked about, but viewed as the acting boss because of his strong personality. So you have Anthony cooperating. He reports to the acting boss. So from our perspective, our perspective, that’s golden, right? Because now Vinny is going to have to make a decision. Is he going to cooperate or not? And then about three months later, guess what? Vinny decides to cooperate. So now we have a soldier and we have the acting boss who’s going to cooperate. So we go from no one in a hundred years to basically two people in three months. [22:45]Then we have an associate, Victor DiChiro, decides to cooperate. So we go and we arrest him. So now we have three people in four months. So we take all their information, and they have to plead guilty, and they get a cooperation agreement. I explain all that. And when you have a cooperation agreement, as I mentioned before, Anthony was initially arrested for conspiracy to murder, and I believe it was stock fraud. When he pleads guilty, he has to plead guilty to all his crimes that he committed throughout his entire life. Off the top of my head, I remember he pled guilty to two murders. [23:23]11 murder conspiracies, boatload of extortions, and basically every other crime you could think of. And then the same thing with Vinny and Victor. We take all their information, and then we have our next series of indictments. So the first series was 39 indictments. And then the second series of indictments is in October of 2000, October 19th, which we just we just passed the 25th anniversary of that. And that was known as the hierarchy arrest, where we arrested the official boss, John Riggi. We arrested the two other panel bosses, Charlie Maggiore and Jimmy Palermo. We arrested the consigliere, Steve Vitabli, a bunch of captains and soldiers. So that’s a significant arrest, right? So now, as you know, when you have an arrest, there’s trials, there’s plea negotiations. So now we arrested 39 people plus another 13. We’re already up to like 50 something like something people out of that arrest. We get a little shockwave in the sense is that there’s an associate named Frank Scarabino. Frank Scarabino comes forward one day and tells us that there’s a contract on Anthony Capo’s family and Anthony Capo. [24:43]And also, there’s a contract on law enforcement. They want to go back to the old Sicilian ways and basically send a message. So, you know, that’s basically a little bit of a jolt where now we have to try to move Capo’s family. [25:03]Protecting Cooperators [24:59]And Capo’s in prison. He’s defenseless. And I explain all that. People have this sense of you go into the witness security program, you get a whole new life and you’re off and having a great time. They don’t realize that there are prisons within the United States that you have to go to prison. So I can’t say where the prisons are, but I kind of explain that process of how the WITSEC program works, which is run by the marshals. So that’s in that’s in the book as well. Yeah, they have a whole prisons that are just for people in WITSEC. I heard about a guy that said he was in one out west somewhere. Yeah. So and, you know, for those prisons, it’s not like you have to prove yourself. They’re all doing the same time. So they’re basically just trying to do their time and try to get out and get into the next phase of the WoodSec program. So that was kind of a jolt, right? So now we have Frank Scarabino cooperate. So now we have another person. So it’s the list is just getting more and more now. You got to stop taking cooperators and start putting people in jail for the rest of their life, man. [26:03]So it got to after that, we had like two more people cooperate. So we went from having nobody to having seven people cooperate in this period. And it’s interesting. And I know we’re going to go back and forth, but we went from 100 years of having no one to having seven people during this three year period. And since that time period, no other members have cooperated since. So we’ve started the clock again. I think we’re at 25 years plus again since no one cooperated during that period. And I mentioned the murder that we started this case, Joseph Canigliaro. So he was the guy that was in the wheelchair. So as I said, they wanted to kill him because he just tortured his crew. We were able, one of the guys who was initially arrested as part of the December 1999 arrest, he sees everybody’s, he is deciding to cooperate with the government. So he decides to cooperate. His name is Tommy DeTora. So Tommy DeTora decides to cooperate. He’s out on bail. So since he’s out on bail, we decide, let’s make him make a consensual recording. And he makes one of the best consensual recordings the Bureau has ever made. He gets everyone involved in that murder together. [27:28]And they talk about the murder from A to Z. It’s a priceless consensual recording that we used at trial. And it just, you know, one of the things that does stick in my mind is the shooter was Marty Lewis, who got a life sentence. [27:44]The Murder of Joseph Canigliaro [27:45]Marty Lewis is describing when he shot him. And he’s like, I shot him like five or six times in his car. Right. And then Marty Lewis gets out of the car. Joseph Canigliaro drives away, gets to the top of the block in Brooklyn, puts a signal on, put a signal on. And drove the traffic laws, drives to Joseph Wrightson’s house. A guy who was part of the murder conspiracy honks his horn for Joseph Wrightson to come downstairs. So can you imagine Joseph Wrightson looking down the window seeing the guy that’s supposed to be dead right now and telling him to get in the car to go to the hospital with him? [28:32]Unfortunately, when they go to the hospital one of the things that does happen is joseph brightson has uh unfortunately an nyp detective cop who’s a cousin and involves him in this as well and the cop takes shells from the car and he becomes he gets locked up by us as well they all go to trial they get convicted and. [28:55]You know, we also arrested a Genevieve’s captain related to the leak. So in total, I think the numbers were 71 defendants were convicted, 11 murders were solved, seven trials transpired. You know, as everyone knows, you have the arrest, but then you have the trials, right? And I know that from December 2002 up until November of 2003 was the year that I was on trial. There was three trials that I had, and then there was another trial. There was two trials that one was a mistrial. Then we had another trial. So during that one year, we had a year of trials, and the biggest trial I had went on for two months. [29:42]Life on Trial [29:38]So I basically had a year of no life where it was just trials. And as you know yourself, when you have trial, it’s not just you just show up at trial. You have trial prep beforehand. And then when you’re actually on trial every day, it’s 20, it’s 24, seven, you have a trial, you have trial, then at night you have to prep a witness. So there’s just constant stuff throughout the day. Yeah, really? It’s a, it’s a long, boring process for you guys. [30:05]You know, these are like what we would say the real Sopranos, you know, the Sopranos, Tom Soprano, and that’s kind of based on this New Jersey family. I tell you, that Soprano, so much of it was ripped from real life. I don’t know. They interviewed you for details. They interviewed some agents and looked some court cases in order to write those scripts. I know that. And in particular, I think of the gay member that was killed. [30:28]The Real Sopranos [30:27]You know, you guys had that down there. So there’s a lot of references in your book or things in the book that the guys will say, oh, yeah, they did that in the Sopranos. Can you tell us about some of them? [30:37]Well, the thing that was great, especially for trial, is in March of 1999, the show starts in January of 1999. And we have a consensual recording in March where we have DeCavocanti members talking about the show and them saying, saying, this is you, this is you, and this is you, which was priceless for trial. Right. It’s like a jury’s going to hear that. And even during the trial, the judge had to give the jury instructions about the show to make sure that it wouldn’t sway their decision. Then if you watch the show, the first season, the official boss in the show dies of stomach cancer. In real life, that’s happened in real life. In June of 1997, Jake Amari was the acting boss of the Decaval Canty family. He dies of stomach cancer. So that’s a… [31:40]It’s a part of the show right there. Then I know everyone sees the strip club, right? Well, the acting boss, as I told you at the time, Vincent Palermo, he had a strip club in Queens, Wiggles. [31:53]So there’s a similarity there. Then they have the meat market that they go to, right, back and forth in the show. That’s a real meat market. I don’t want to say the name of the real meat market here, but there is a real type of meat market there. We discussed the union angle, the two unions that they have. So there’s so many scams related to the unions. There’s the no show job, right, where you don’t have to show up to work. There’s the no work job where you come, but you don’t have to do any work at all. [32:26]Back then, what it was called was they had union halls, right, where you actually had to show up early in the morning. There’d be a line of people, and you would show up. It was called the shape up. and you would wait online and hopefully that you would get work that day. Well, the DeCable Cante members, they wouldn’t show up early and wait online. They would show up whenever they want and they would cut the line and they would get work. So these were their types of unions that they had. Then, as you mentioned, there was the gay angle too. So on the DeCable Cante real side, there was a guy named John D’Amato. And John D’Amato basically made himself the acting boss when John Riggie went to jail in the early 1990s. John D’Amato was part, was very close to John Gotti. There was a murder. It’s probably the most indictable murder in mob history called the murder of Fred Weiss. John Gotti wanted Fred Weiss killed because John Gotti thought that Fred Weiss was cooperating with the government. all because Fred Weiss switched lawyers. [33:35]He was paranoid that Fred Weiss was cooperating. So it became a race to kill Fred Weiss. So you had two mob families trying to kill him, the Decalvo Canty family and the Gambino family. So in total, I think either 15 people at least have either pled guilty or have been convicted of that murder. That murder happened on 9-11-1989, a horrible day, right? So, where I’m going is that happened in 89. In 1990, 1991, John D’Amato becomes the acting boss of the family. So, now he’s the acting boss of the DeKalb Alcanti family. John D’Amato had a girlfriend. His girlfriend starts to tell Anthony Capo that John D’Amato is going to sex clubs with her and they’re having sex with men. So this is this is brought to Anthony Capo’s attention. And he has to tell his superiors that we have a gay acting boss representing our family. And in his eyes, this cannot happen. Right. So he brings it to Vincent Palermo, brings it to Rudy Ferron, and the superiors that this is what’s happening. And they decide that he has to be killed. Now, also what he was doing was, and you speak to Anthony Rotondo, who also cooperated with the government. [34:58]John DeMotta was also stealing money from the family. He was borrowing money from the other families, telling him that it was for the DeCalbacanti family, but it was really to cover his game of the gambling losses that he was incurring. So those are two things that he was doing. Right. He was he was if you ask Anthony Rotondo, he says he was killed because of the gambling that he was incurring the losses. And if he asks Anthony Capo, he was killed because it was looking bad for our family, for their family, that he was a gay acting boss. And at that time, it wasn’t acceptable. Times have changed. But back then, it wasn’t an acceptable thing. And that’s similar to the show. There’s a gay angle within the show as well. [35:41]The Gay Angle in the Mob [35:42]Interesting. It’s the real Sopranos. I remember I watched that show, even going back and watch some of them every once in a while. And I just think, wow, that’s real. So, so even though the director says no one was speaking to them, it’s kind of ironic that there are a lot of like similarities between the show and real life. Yeah. And especially down there in New Jersey and, and, and their connection to the Bonanno family or to a New York, the New York families. And then also, and then also within the show is, is, is the stock stood. There’s also stocks. Oh yeah, the stock fraud. Yeah. They did a boiler room or something. And they were pumping and dumping stocks and Tony was making money out of that. So, yeah, that’s I’d forget. And then from and in real life, Bill Abrama was like the wizard of Wall Street. [36:37]So interesting. Well, you’ve had quite, quite a career. What do you think about New York organized crime now that today, you know, we just had quack, quack, Ruggiero, Ruggiero’s son and some other guys that were connected to families indicted for gambling. He’s got my gambling fraud. I haven’t really studied it yet. It is like they had some rig gambling games, which is common. Like in Kansas city, when I was working this, they would have, they would bring in guys who would love to gamble and had money businessmen. And then they’d, they’d play them for sure. They would cheat them and take a bunch of money from them. This was much more sophisticated, but that’s a, that’s a story that’s been going on a long time. You think that Bob is on a comeback from that? Ha, ha, ha, ha. [37:24]The mob has been around for 125 years. They’re not going to go away. Okay. They get smarter and they adapt. And it’s like, I haven’t read the indictment from head to toe, but they’ve used some, you know, sophisticated investigative techniques just to kind of con people. So they’re getting better, right? So some of the techniques that they use when you hear, it’s like some of the things that I saw where the poker tables that they use, the tables that they use were able to see the card. So they use some pretty, you know, slick techniques, you know, and then like some of the glasses or the contact lenses. So, you know, they’re not going to go away. They’re just going to keep on trying to rebuild. That’s why you have to continue to put resources towards them. Yeah. I think what people don’t understand for these mob guys, it’s if they don’t get out and go into legitimate business selling real estate or something like that. It’s it’s a constant scam a constant hustle every day to figure out another way to make money because they don’t have a paycheck coming in and so they got to figure out a way to make money and they got to make it fast and they got to make it big and in a short period of time it’s just constant every day every time they walk by knew a drug addict one time as a professional burglar and he said every time he’s in recovery he said every time i’ll buy a pharmacy he said in my mind I’m figuring out how to take that pharmacy off. So that’s the way these mob guys are. [38:52]And sports betting has been a staple of theirs forever. Oh, yeah. Oh, yeah. And the apps are getting into them a little bit, but I see what’s going on now. Also, we had these players, Trailblazers coach and a couple, three players, are now helping people rig the bets. And you go to the apps, and you bet a bunch of money on some guy who’s going to have a bad day. And then he just doesn’t show up to work. You end up being the supervisor of the Columbo squad, I see. Same as after that DeCavoconte case, and you spent all that time, you ended up getting promoted to a supervisor and you must’ve been good because they kept you right there in New York and gave you another mob squad. I know one agent here in Kansas City that was promoted and he kept the one squad here, as they called it. [39:43]Leading the Columbo Squad [39:40]And that was really unusual. Usually it’d be somebody in from out of town. So that says something about you. So tell us about your experiences doing that. [39:48]Well, after we did this case, which was about six years, I was requested to go down to run the Columbo squad. And at that time, I think the Columbo squad had eight supervisors in eight years. I really thought I was too young to be a supervisor because I only had six years on. So I was basically voluntold, I would say, to go down there. And guys, that is young. I want to tell you something. I’ve seen a lot of different Bob squad supervisors come through here in Kansas City. And and they were all you know like 20 year agents 15 18 year agents that came from somewhere else so yeah so you know again I thought I was just way too young to be a supervisor as I said I was just on the job for about six years and I was voluntold to go down there yeah and I said if I’m going to go down there there’s a couple of things just based upon what I saw a I’m not a yes man and two the squad needs some sort of stability so I went down there and I was able to stay there I was there from actually December of 2004 all the way up until June of 2013. [40:51]So we at that time when I first got there we really didn’t have a lot of cases going trying to go on so I was able to change the tactics right because I think juries had changed at that point in time where instead of having a historical witness just go on to stand and tell things, now we had shows out there, right? You had NCIS where the whole DNA-type stuff came in, so I had to change our approach, and proactive witnesses making consensual recordings were the way to go. And I think during a seven-year time period, our squad. [41:24]Did an amazing job. Now it went from C10. I went, the squad went down to, it became C38. And we made probably 1,800 recordings in a seven and a half year time period. So, which is an amazing amount of recordings. So, a lot of transcriptions too. A lot of transcriptions. And I, you know, a three-hour tape could take you a day to listen to because you’re just trying to find that little piece of information. Yeah. Because a lot of it is just talk, right? Yeah. So I think our first big case was in June of 2008. And we took down the acting boss, a bunch of captains. And that’s when things really started to take off. We had a violent soldier cooperate named Joseph Compatiello. And, you know, we talk about proffers. His first proffer, he comes in and he basically tells us that there are three bodies buried right next to each other. So the layman would think, OK, they’re right next to each other. They weren’t right next to each other they were about 1.1 miles apart from each other. [42:28]And you could be in your your room there and we’re trying to find a body it’s really hard to find so we were actually able to find two of the bodies one of the bodies was a guy named while Bill Cattullo he was the under boss of the Colombo family we found him in Formingdale Long Island he was behind a berm we were out there for about eight days and each day you know I’m getting pressure from my superiors. We’re going to find something because there’s a lot of press out there. There was another victim named Cormone Gargano who was buried. He was killed in 1994 and buried out there. Unfortunately, there was a new building built. [43:06]And we could not find him there, but he was initially killed at a body shop in Brooklyn, and they buried him in Brooklyn, and then they decided to dig him up and bring him out to Long Island. So we went back to the body shop. What the Colombo family used to do, though, is they used to kill you, bury you, and put lime on top of the body. What lime does is it kills the smell, but preserves the body. Oh, I didn’t realize that. I thought it was supposed to deteriorate the body too. I think most people bought that. So good information. So, so when we found wall of bill, basically from his, from his hips up were intact. Oh, And when related to Cormier Gargano, because they had killed him in the body shop and then dug him up and brought him out to Long Island. We went back to the shop and figuring, let’s see if we can actually see if there’s any parts of him there. And there actually were. And we’re able to get DNA and tie it back and confirm it was him. [44:15]Major Arrests and Cases [44:12]So that’s how that dismantling of the Colombo family started. And then just to fast forward a little bit in January 2011, we have I spearhead the largest FBI mob arrest where we arrested 127 people that day across the states and also went to Italy, too, to take down people. [44:32]And after that, the Bureau decides to reduce the resources dedicated to organized crime. And I then get the Bonanno family back. So C-10 merges back into my squad. And then I have the Bananos, the Columbos, and the Decafacanthes as well. So now I have all three families back. And I basically run that for another two years. And I guess my last official act as a supervisor is related to Goodfellas, where Jimmy Burke had buried a body in his basement. We saw a 43-year-old cold case murder where he killed an individual named Paul Katz, buried him in his basement. And when he went away for the point shaving, the Boston College point shaving case, well, he killed him in 1969, buried him in his basement. Then he goes to jail in the 80s. He gets fearful that the cops that he had on his payroll back in the 60s were going to talk. So he decides to have our witness at the time, Gaspar Valenti, who came forward back in the 80s, moved the body with Vincent S. Our son so they move the body but again they’re not professional so pieces are going to be back there so in 2013 we go back and we dig and we actually find pieces of paul cats and we tie that to dna to his son to his son and we confirm that it was him. [45:57]So that was my last official act as a supervisor. Talk about art, art, imitating life again, you know, in the Goodfellas, they dug up a body. In the Sopranos, they dug up a body. I think I saw another show where they dug up a body. One of them, they were like, man, this smells. [46:13]I mean, can you imagine that going back and having to dig up a body? And then, you know, and, you know, they’re just wearing t-shirts and jeans and maybe leather gloves. And they’d have to deal with all that stuff and put it in some kind of a bag can take it somewhere else oh my god you know i have a question while bill cutello that this guy was part of the the hit team that took him out do you remember anything about right i’m trying to remember i’ve read this story once he was kind of like more of a peacemaker and and if i remember right you remember what the deal was with him well back like what happens is in the early 1990s there’s a colombo war right you have the persicos versus the arena faction and one thing about the Colombos and the Persicos, they never forget. So in the early 1990s, while Bill Cotullo was on the arena side, and as I said, there was a war where approximately 13 people were killed. In the late 1990s, Ali Persico was going to be going to jail, and while Bill Cotullo thought that Ali was going to go to jail and that he would take over the family, Ali didn’t want that to happen. So basically while Vilcunzulo thought he was getting the keys to the kingdom and they were going to kill him. [47:28]And what they did is they lured him to Dino Saraceno’s house in Brooklyn and Dino Calabro lured him into the basement and shot him in the back of the head. And we had all these guys then decide to cooperate. As I said, Joe Caves was the first person to cooperate. Dino Calabro cooperated. [47:48]Sebi Saraceno cooperated. So we had a whole host of people cooperate and we were able to dismantle the Colombo family. And I’ve been extremely blessed to be part of teams that have dismantled three families, Bananos, the Columbos, and the D. Calacanti family. So, you know, as I said, and it’s never just one person. It’s always teammates, partners, and also other supervisors that I’ve had. Yeah, interesting. Yeah, it does take a lot of people to take those down. When you’re writing books, you try to make sure everybody gets a little bit of credit. Yeah. And, you know, I think, you know, the thing that was that was, you know, crazy when related to the recovery of Wild Bill is we had our evidence response team out there. And, you know, the witness takes us out there to show us where he thinks the bodies are buried. And related to Wild Bill, it was in the back of a field. And he kept on saying it was behind a berm. So we took him back there and he showed us where he thought it was. So we had our evidence response team dig. And they basically dug us an Olympic-sized pool. [48:57]We could not find him. So there was two other sites that we were trying to look at because Richie Greaves was supposed to be next to the train tracks. And as I mentioned, Cormac Gargano was next to a building that had been replaced. So my squad, actually our squad, C-38, decides, Seamus, do you mind if we get some shovels? So I was like, sure. So there was, because we were just looking at each other at the time. So my team, Vincent D’Agostino, they’re pretty close by. He got some shovels and came back. And there was like six of us. And we just started digging ourselves. So we dug in one area, nothing. Then another agent basically said, let’s dig over here. [49:38]And sure enough, like talk about, you know, I always say hard work leads to good luck. We started digging and then we found the white stuff. We found the line and jackpot. It was while Bill, he was hogtied face down with his feet up. And as soon as I saw the white stuff and then I saw, you know, like his foot, then we stopped and I said, let me go get the professionals. I ran over, I drove over, and I got the team leader from ERT. She got in the car. And, you know, of course, she’s very excited. I was like, you know, we F.M. got him, you know. And so I drove her back over there. And that’s when you kind of contain the crime scene. And we were able to find him. But, you know, it was our squad that found him. And then, as I said before, then, you know, our squad decides to go back to the body shop. And we found remnants of Carmine Gargano there. So the squad just did an amazing job but really we basically found two bodies ourselves you know and i think in my career i’ve been extremely blessed to find five you know which is just crazy well that’s not something those accountants and lawyers and stuff were trained for you need to get those former cops out there on those shovels and digging for bodies. [50:57]Final Thoughts and Stories [50:57]Well interesting this this has really been fun seamus any any other stories you can think of You want to you want to just want to tell just busting to make sure people know that’s in this book. I tell you what, guys, this is an interesting book. It’s it’s, you know, as I said, those kinds of stories and the procedures and how FBI works. There’s there’s a lot of stories in there. I don’t want to give to give the book away. You know, there’s a lot of stories even. Yeah. You know, there’s an even during that year of trials. There’s plenty of stories there. There was a blackout that that year, too. So there’s a lot of stories related to that. You know, even even the trials, there’s a lot of things that came up at trial. So I don’t want to give to give those stories away. But I think it’s a good read. As I said, I think it’s one of the few books that actually explains things because, you know, I think the public hears these words, but they don’t know what these words mean. And I just think it’s important that they do know what it means, because there’s a lot of things that go on behind the scenes, especially with the jury. Right. You know, the jury only sees what they see. There’s a lot of things that go on when the jury leaves the room between the government, the judge and also the defense attorney. So I try to bring to shed some light related to that as well. [52:13]Interesting. Well, Seamus McElherney. And the book is Flipping Capo. That’s Anthony Capo. The first guy to be flipped in the Cavalcante family ever, which led to a cascade of other mob guys flipping, didn’t it? [52:32]Sure did. Just like in a Bonanno family, you know, they start flipping there. And it just, I didn’t know where it was ever going to end. Finally, it ended. [52:41]It sure did. Well, I have to say, it’s been great to meet you. I wish you continued success. And this has been a lot of fun. All right. Yeah, it’s been great to have you on Seamus. Thanks a lot. Don’t forget, I like to ride motorcycles. So when you’re out on the streets there and you’re a big F-150, watch out for those little motorcycles when you’re out. If you have a problem with PTSD and you’ve been in the service, be sure and go to the VA website. They’ll help with your drugs and alcohol problem if you’ve got that problem or gambling. If not, you can go to Anthony Ruggiano. He’s a counselor down in Florida. He’s got a hotline on his website. If you’ve got a problem with gambling, most states will have, if you have gambling, most states will have a hotline number to call. Just have to search around for it. You know, I’ve always got stuff to sell. I got my books. I got my movies. They’re all on Amazon. I got links down below in the show notes and just go to my Amazon sales page and you can figure out what to do. I really appreciate y’all tuning in and we’ll keep coming back and doing this. Thanks guys.
The US and allies sanction Russian bulletproof hosting providers. The White House looks to sue states over AI regulations. The US Border Patrol flags citizens' “suspicious” travel patterns. Lawmakers seek to strengthen the SEC's cybersecurity posture. A new Android banking trojan captures content from end-to-end encrypted apps. A hidden browser API raises security concerns. Fortinet patches a zero-day. A Philippine former mayor gets life in prison for scam center human trafficking. Our guest is Cliff Crosland, CEO and Co-founder at Scanner.dev, discussing why security data lakes are ideal for AI in the SOC. Green energy gets hijacked for a blockchain side-hustle. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Cliff Crosland, CEO and Co-founder at Scanner.dev, discussing why security data lakes are ideal for AI in the SOC. Listen to Cliff's full conversation here. Selected Reading Russian bulletproof hosting provider sanctioned over ransomware ties (Bleeping Computer) White House drafts order directing Justice Department to sue states that pass AI regulations (Washington Post) Border Patrol is monitoring US drivers and detaining those with 'suspicious' travel patterns (Associated Press) Lawmakers reintroduce bill to bolster cybersecurity at Securities and Exchange Commission (The Record) Multi-threat Android malware Sturnus steals Signal, WhatsApp messages (Bleeping Computer) Hidden API in Comet AI browser raises security red flags for enterprises (CSO Online) Eternidade Stealer Trojan Fuels Aggressive Brazil Cybercrime (Infosecurity Magazine) Fortinet Patches Actively Exploited FortiWeb Zero Day Flaw (HIPAA Journal) Ex-Philippine mayor Alice Guo given life sentence for human trafficking (Reuters) Wind farm worker sentenced after turning turbines into a secret crypto mine (Bitdefender) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode, I was lucky enough to interview Andy Kochanowski, founder and CEO of Alerify, a data center based in Harrisburg, Pennsylvania. Andy shares his journey from a 30-year career in corporate America, including service in the Navy, to taking the leap into entrepreneurship. He explains how Alerify serves a niche market of small and medium-sized businesses seeking secure, localized data storage through co-location and virtual private cloud solutions, providing a personal, hands-on approach that sets them apart from the hyperscale public cloud providers.Andy also dives into the process of acquiring and revitalizing Alerify, from conducting meticulous due diligence to investing in infrastructure improvements, achieving SOC 2 compliance, and building a strong local network. He discusses early client wins, including iHeart Media, and shares his approach to leveraging AI at the edge for private, secure data processing. Along the way, he offers advice for aspiring business owners about finding the right opportunity, valuing culture alignment, and starting local before scaling. Tune in to Andy's story as he highlights the blend of strategic planning, technical expertise, and human connection that drives his company's growth in this episode of The First Customer!Guest Info:Alerifyhttps://www.alerify.com/Andy Kochanowski's LinkedInhttps://www.linkedin.com/in/andrew-p-kochanowski-ph-d/Connect with Jay on LinkedInhttps://www.linkedin.com/in/jayaigner/The First Customer Youtube Channelhttps://www.youtube.com/@thefirstcustomerpodcastThe First Customer podcast websitehttps://www.firstcustomerpodcast.comFollow The First Customer on LinkedInhttp://www.linkedin.com/company/the-first-customer-podcast/
*Are we finally reaching Peak eVTOL? Jason and Alex on Joby's big Abu Dhabi moves and Archer's purchase of LA's Hawthorne Airport.On a PACKED Monday TWiST, Jason is BACK from MENA and Tokyo. Hear tales from his whirlwind trips launching new Founder University satellite programs… and find out why construction and fintech are BOOMING across the Middle East.PLUS Ramp raised $300M… here's why Alex calls the round “pretty baller.” We question why AI companies are growing SO MUCH FOUNDER than their SaaS counterparts. We're digging into the Problem with Dropbox.AND we're saying goodbye to KitKat, the beloved SF bodega cat who was reportedly run over by a Waymo. Here's why Jason's not too broken up about it (but he's JUST JOKING!)
Marco Rodrigues was born and raised in Canada, but now lives in the Bay Area. His tech genesis was around the time when the internet came out, when he spent an entire summer indoors, worrying his mother. He eventually attended university in Toronto, and went to work for Juniper Networks. Past that, he went towards the startup world - running product teams, and taking part in the ownership and selling of solutions and service offerings. Outside of tech, he is married with twin girls in the Naval Cadet Core. He is a big hockey nut, rooting for the Edmonton Oilers, and enjoys taking his kids to hockey rinks all over the world.Marco spent many years watching his teams drown in data and tooling. The situations were more complex, but the outcomes weren't getting better. He started to consider the advent of AI, and asked the question - how do we solve these sorts of problems with an agentic SOC platform?This is the creation story of Exaforce.SponsorsIncogniNordProtectVentionCodeCrafters helps you become a better engineer by building real-world, production-grade projects. Learn hands-on by creating your own Git, Redis, HTTP server, SQLite, or DNS server from scratch. Sign up for free today using this link and enjoy 40% off.Full ScalePaddle.comSema SoftwarePropelAuthPostmanMeilisearchLinkshttps://www.exaforce.com/https://www.linkedin.com/in/marcorodrigues1/Our Sponsors:* Check out Incogni: https://incogni.com/codestory* Check out NordVPN: https://nordprotect.com/codestorySupport this podcast at — https://redcircle.com/code-story-insights-from-startup-tech-leaders/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
How do you establish trust in an AI SOC, especially in a regulated environment? Grant Oviatt, Head of SOC at Prophet Security and a former SOC leader at Mandiant and Red Canary, tackles this head-on as a self-proclaimed "AI skeptic". Grant shared that after 15 years of being "scared to death" by high-false-positive AI, modern LLMs have changed the game .The key to trust lies in two pillars: explainability (is the decision reasonable?) and traceability (can you audit the entire data trail, including all 40-50 queries?) . Grant talks about yje critical architectural components for regulated industries, including single-tenancy , bring-your-own-cloud (BYOC) for data sovereignty , and model portability.In this episode we will be comparing AI SOC to traditional MDRs and talking about real-world "bake-off" results where an AI SOC had 99.3% agreement with a human team on 12,000 alerts but was 11x faster, with an average investigation time of just four minutes .Guest Socials - Grant's Linkedin Podcast Twitter - @CloudSecPod If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels:-Cloud Security Podcast- Youtube- Cloud Security Newsletter If you are interested in AI Cybersecurity, you can check out our sister podcast - AI Security Podcast(00:00) Introduction(02:00) Who is Grant Oviatt?(02:30) How to Establish Trust in an AI SOC for Regulated Environments(03:45) Explainability vs. Traceability: The Two Pillars of Trust(06:00) The "Hard SOC Life": Pre-AI vs. AI SOC(09:00) From AI Skeptic to AI SOC Founder: What Changed? (10:50) The "Aha!" Moment: Breaking Problems into Bite-Sized Pieces(12:30) What Regulated Bodies Expect from an AI SOC(13:30) Data Management: The Key for Regulated Industries (PII/PHI) (14:40) Why Point-in-Time Queries are Safer than a SIEM (15:10) Bring-Your-Own-Cloud (BYOC) for Financial Services (16:20) Single-Tenant Architecture & No Training on Customer Data (17:40) Bring-Your-Own-Model: The Rise of Model Portability (19:20) AI SOC vs. MDR: Can it Replace Your Provider? (19:50) The 4-Minute Investigation: Speed & Custom Detections (21:20) The Reality of Building Your Own AI SOC (Build vs. Buy)(23:10) Managing Model Drift & Updates(24:30) Why Prophet Avoids MCPs: The Lack of Auditability (26:10) How Far Can AI SOC Go? (Analysis vs. Threat Hunting)(27:40) The Future: From "Human in the Loop" to "Manager in the Loop" (28:20) Do We Still Need a Human in the Loop? (95% Auto-Closed) (29:20) The Red Lines: What AI Shouldn't Automate (Yet) (30:20) The Problem with "Creative" AI Remediation(33:10) What AI SOC is Not Ready For (Risk Appetite)(35:00) Gaining Confidence: The 12,000 Alert Bake-Off (99.3% Agreement) (37:40) Fun Questions: Iron Mans, Texas BBQ & SeafoodThank you to Prophet Security for sponsoring this episode.
Richardson Dackam, a solo developer known for rapidly creating AI-first SaaS products, shared insights into his development process during a recent episode of the Business of Tech. Dackam emphasizes the importance of identifying manageable problems that can be solved quickly, which he refers to as "done for you ideas." His approach involves extensive research to create a Product Requirement Document (PRD) and context engineering for AI agents, enabling him to build prototypes in a matter of hours or days. He leverages various services, such as Magic Link for authentication and Superbase for databases, to streamline his workflow.Dackam's success is exemplified by his application, 8nodes, which serves as a workflow generator for N8n, currently attracting around 500 users. He utilizes multiple distribution channels, including his YouTube channel and contributions to AI communities, to promote his tools. Although 8nodes is not yet generating revenue, Dackam is focused on improving the product's speed, which he identifies as a critical pain point for users. He tracks user engagement metrics daily to inform his optimization efforts.The episode also addresses the balance between rapid prototyping and maintaining product reliability and compliance. Dackam asserts that he builds with an SOC 2 compliance mindset, ensuring that user data is handled securely. He discusses the challenges of scalability and uptime, noting that he relies on services like AWS and Vercel to manage these aspects effectively. By separating his landing page from the application, he ensures that marketing efforts remain uninterrupted even if the app experiences downtime.For Managed Service Providers (MSPs) and IT service leaders, Dackam's approach highlights the potential for rapid development cycles while maintaining a focus on security and compliance. His insights into the challenges of integrating AI into business processes underscore the need for organizations to understand their workflows before adopting automation solutions. As businesses navigate the complexities of AI deployment, the emphasis on iterative improvement and user feedback can inform strategies for successful product development and market fit.
Send us a textMeet Rapid7's Deral Heiland—a self-described “visual historian” who balances high-tech research with hands-on artifacts from Roman coins to Civil War relics