POPULARITY
Categories
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and even a memo from JPMorgan Chase's CISO. We will discuss where Marshall feels like we should be pushing harder, where we've made some progress, and what to do about incentives. How do you convince a software supplier or service provider to prioritize security over features? This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them! Segment 2: Weekly Enterprise News In this week's enterprise security news, Agents replacing analysis is highly misunderstood only one funding round Orca acquires Opus to automate remediation OneDrive is updating to make BYOD worse? Companies are starting to regret replacing workers with AI Is venture capital hanging on by a thread (made of AI)? Potential disruption in the traditional vuln mgmt space! MCP is already looking like a dumpster fire from a security perspective malicious NPM packages and, IS ALCHEMY REAL? Segment 3: RSAC Conference 2025 Interviews Interview 1: Pluralsight Emerging technologies like AI and deepfakes have significantly complicated the threat landscape of today. As AI becomes more integrated into our lives, everyone - not just cybersecurity professionals - needs to develop security literacy skills to keep themselves, their organizations, and their loved ones safe. Luckily, there are countermeasures to spot and identify AI and deepfake-related threats in the wild. In this segment, Pluralsight's Director of Security and IT Ops Curriculum, Bri Frost, discusses how AI has changed the cybersecurity industry, how to spot AI and deepfakes in the wild, and the skills you should know to defend against these emerging threats. Pluralsight's AI Skills Report This segment is sponsored by Pluralsight. Visit https://securityweekly.com/pluralsightrsac to learn the skills you need to defend against the latest cyber threats! Interview 2: Radware Adversaries are rewriting the cybersecurity rules. Shifts in the threat landscape are being fueled by attackers with political and ideological agendas, more sophisticated attack tools, new coalitions of hacktivists, and the democratization of AI. Radware CTO David Aviv will discuss how companies must adapt their cyber defenses and lead in an evolving era of asymmetric warfare and AI-driven attacks. This segment is sponsored by Radware. Visit https://securityweekly.com/radwarersac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-407
Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and even a memo from JPMorgan Chase's CISO. We will discuss where Marshall feels like we should be pushing harder, where we've made some progress, and what to do about incentives. How do you convince a software supplier or service provider to prioritize security over features? This segment is sponsored by Fastly. Visit https://securityweekly.com/fastly to learn more about them! Segment 2: Weekly Enterprise News In this week's enterprise security news, Agents replacing analysis is highly misunderstood only one funding round Orca acquires Opus to automate remediation OneDrive is updating to make BYOD worse? Companies are starting to regret replacing workers with AI Is venture capital hanging on by a thread (made of AI)? Potential disruption in the traditional vuln mgmt space! MCP is already looking like a dumpster fire from a security perspective malicious NPM packages and, IS ALCHEMY REAL? Segment 3: RSAC Conference 2025 Interviews Interview 1: Pluralsight Emerging technologies like AI and deepfakes have significantly complicated the threat landscape of today. As AI becomes more integrated into our lives, everyone - not just cybersecurity professionals - needs to develop security literacy skills to keep themselves, their organizations, and their loved ones safe. Luckily, there are countermeasures to spot and identify AI and deepfake-related threats in the wild. In this segment, Pluralsight's Director of Security and IT Ops Curriculum, Bri Frost, discusses how AI has changed the cybersecurity industry, how to spot AI and deepfakes in the wild, and the skills you should know to defend against these emerging threats. Pluralsight's AI Skills Report This segment is sponsored by Pluralsight. Visit https://securityweekly.com/pluralsightrsac to learn the skills you need to defend against the latest cyber threats! Interview 2: Radware Adversaries are rewriting the cybersecurity rules. Shifts in the threat landscape are being fueled by attackers with political and ideological agendas, more sophisticated attack tools, new coalitions of hacktivists, and the democratization of AI. Radware CTO David Aviv will discuss how companies must adapt their cyber defenses and lead in an evolving era of asymmetric warfare and AI-driven attacks. This segment is sponsored by Radware. Visit https://securityweekly.com/radwarersac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-407
In this Chats on the Road to RSAC 2025, , Sean Martin and Marco Ciappelli connect with Tim Brown, Chief Information Security Officer at SolarWinds, to unpack the critical issues facing CISOs today—and why the role remains worth pursuing.Brown is participating in multiple sessions at RSAC Conference 2025, including the CISO Bootcamp and Cyber Leaders Forum. Both are closed-door conversations designed to surface real concerns in a confidential, supportive setting. These aren't theoretical discussions—they're rooted in hard-earned experience. Brown, who has faced high-profile scrutiny and legal fallout from a past incident at SolarWinds, brings a uniquely personal perspective to these sessions.He points out that fear and hesitation are keeping many deputy CISOs from stepping up into the top role. His message to them: don't be afraid of the position. Despite the weight of responsibility, the role offers real influence, the ability to shape enterprise architecture, and the opportunity to drive meaningful business decisions. Brown emphasizes the importance of community support and collective growth, noting that the cybersecurity industry—still relatively young—is maturing and finding its footing when it comes to accountability and resilience.Beyond leadership development, mental health and stress management are key themes in the Cyber Leaders Forum. Brown acknowledges the toll the job can take, even sharing that his own health suffered despite thinking he was managing stress well. This honest reflection opens the door for deeper conversations about personal well-being in high-pressure roles.He's also appearing at the Cloud Security Alliance Summit with Chris Hoff, Chief Security Officer at LastPass, where they'll discuss incident response and field questions from the audience. On Wednesday, Brown joins a breakfast session with Tactic and Hyperwise, guiding attendees through a crisis simulation based on lessons from the Sunburst attack. His focus? Helping others avoid being unprepared in a moment of chaos.From insider threat modeling to supply chain transparency and the challenges of monitoring runtime behavior, Brown is clear-eyed about where CISOs need to focus next.This episode isn't just a preview of conference sessions—it's a call to future security leaders to lean in, not back.___________Guest: Tim Brown, CISO, Solarwinds | On LinkedIn: https://www.linkedin.com/in/tim-brown-ciso/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974Akamai: https://itspm.ag/akamailbwcBlackCloak: https://itspm.ag/itspbcwebSandboxAQ: https://itspm.ag/sandboxaq-j2enArcher: https://itspm.ag/rsaarchwebDropzone AI: https://itspm.ag/dropzoneai-641ISACA: https://itspm.ag/isaca-96808ObjectFirst: https://itspm.ag/object-first-2gjlEdera: https://itspm.ag/edera-434868___________ResourcesRSAC Session: CLF Ask Me Anything Session with Tim Brown, CISO, SolarWinds: https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739404173721001x1MHRSAC Session: CISO Boot Camp Exclusive Fireside Chat with Tim Brown, CISO, SolarWinds: https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739403254724001isXhCSA Summit at RSAC 2025: Fireside Chat with Tim Brown and Chris Hoff: https://www.csasummitrsac.com/event/5b3547c2-c652-4f77-97de-5b094e746626/agenda?session=1452408b-c822-4664-87b8-38ce1276247bLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Welcome to the Data Security Decoded podcast by Rubrik Zero Labs. Join our host Caleb Tolin and Head of Rubrik Zero Labs Joe Hladik as they dive deep into the evolving landscape of cybersecurity, from incident response to emerging threats. Joe shares insights from two decades of experience, including his work on high-profile cases like the SolarWinds breach, and breaks down the complex relationship between nation-state actors and cybercrime. Learn about the challenges of data sprawl, identity management, and why treating identity as the new perimeter isn't as simple as it seems. Joe also shares insights into the new report from Rubrik Zero Labs, The State of Data Security: A Distributed Crisis. Whether you're a security practitioner or executive, this episode offers valuable perspectives on data security posture management and the future of threat detection.
Space Weather & Planetary Energy Update: Solar Winds, Magnetosphere, A Day of Shifts, Remembrance & Light RadianceIf you've been feeling waves of intensity—physical fatigue, sudden emotions, or expanded awareness—this episode brings clarity. Over the last 24 hours, Earth experienced unexpected solar storms with KP levels reaching 4 and 5, despite official forecasts predicting quiet skies. But as many energy sensitives know, something deeper is always at play.In this transmission, we explore what these geomagnetic surges really mean—how solar plasma, Light Codes, and the weakening of Earth's magnetosphere are not just planetary phenomena but part of a greater consciousness shift. We're in an active phase of ascension. These energetic waves are here to activate higher intelligence within you, flush old density, and support your nervous system in recalibrating to a new frequency.We also reflect on the symbolic weight of the Pope's passing and the stirring emotional ripple it may bring—an event that could mark a collective turning point. From sacred sorrow to cellular awakening, this moment invites us all to walk more gently, more presently, and more aligned with truth.This episode is a reminder: You are not broken. You are becoming. The shift is real—and you're right on time.
The U.S. government has renewed funding for the Common Vulnerabilities and Exposures (CVE) Program, a critical database for tracking cybersecurity flaws, just hours before its funding was set to expire. Established 25 years ago, the CVE program assigns unique identifiers to security vulnerabilities, facilitating consistent communication across the cybersecurity landscape. The renewal of funding comes amid concerns that without it, new vulnerabilities could go untracked, posing risks to national security and critical infrastructure. In response to the funding uncertainty, two initiatives emerged: the CVE Foundation, a nonprofit aimed at ensuring the program's independence, and the Global CVE Allocation System, a decentralized platform introduced by the European Union.In addition to the CVE funding situation, Oregon Senator Ron Wyden has blocked the nomination of Sean Planky to lead the Cybersecurity and Infrastructure Security Agency (CISA) due to the agency's refusal to release a crucial unclassified report from 2022. This report details security issues within U.S. telecommunications companies, which Wyden claims represent a multi-year cover-up of negligent cybersecurity practices. The senator argues that the public deserves access to this information, especially in light of recent cyber threats, including the SALT typhoon hack that compromised sensitive communications.The cybersecurity landscape is further complicated by significant layoffs at CISA, which could affect nearly 40% of its workforce, potentially weakening U.S. national security amid rising cyber threats. Recent cuts have already impacted critical personnel, including threat hunters, which could hinder the agency's ability to share vital threat intelligence with the private sector. Meanwhile, the Defense Digital Service at the Pentagon is facing a mass resignation of nearly all its staff, following pressure from the Department of Government Efficiency, which could effectively shut down the program designed to accelerate technology adoption during national security crises.On the technology front, OpenAI has released new AI reasoning models, O3 and O4 Mini, but notably did not provide a safety report for the new GPT-4.1 model, raising concerns about transparency and accountability in AI development. The lack of a safety report is particularly alarming as AI systems become more integrated into client-facing tools. Additionally, SolarWinds Corporation has been acquired by Ternerva Capital, prompting managed service providers (MSPs) to reassess their dependencies on SolarWinds products and consider the implications for product roadmaps and support guarantees. Four things to know today 00:00 From Panic to Pivot: U.S. Saves CVE Program at the Eleventh Hour04:17 A Cybersecurity Meltdown: One Senator Blocks, Another Leader Quits, and a Whole Pentagon Team Walks Out08:54 OpenAI Just Leveled Up AI Reasoning—But Left Out the Fine Print11:45 SolarWinds Is Private Again: What That Means for MSPs Watching the Roadmap Supported by: https://www.huntress.com/mspradio/ https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship Join Dave April 22nd to learn about Marketing in the AI Era. Signup here: https://hubs.la/Q03dwWqg0 All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Passwords are the original digital clutter—messy, overstuffed, and way too easy to forget. Like a junk drawer full of old keys and cables, we keep tossing more into them, hoping they'll somehow keep working. But what if it's time to throw the whole thing out? In this episode, Ron Eddings is joined by Collin Sweeney of ZKX Solutions and Dr. Chase Cunningham, a.k.a. “Dr. Zero Trust,” for a bold conversation on the future of authentication. From the failures of MFA to the promise of zero-knowledge proofs, the crew breaks down how we got stuck with broken access systems—and what it'll take to finally fix them. Whether it's SIM swapping, face IDs, or security keys on the battlefield, this is the real talk on identity security you don't want to miss. Impactful Moments: 00:00 – Introduction 03:45 – ZKX's origin: voice verification breakthrough 06:45 – Collin's “oh crap” SolarWinds realization 09:15 – Why MFA still fails in practice 13:15 – Zero-knowledge proofs explained with a coin 15:30 – How ZKPs reduce identity attack surfaces 17:45 – Making MFA faster, smarter, more human 20:00 – MFA fatigue and ice skating uphill 24:00 – Why people still cling to passwords 30:54 – Quantum fears vs real-world encryption limits Links: Connect with Collin Sweeney: https://www.linkedin.com/in/collin-sweeney-6ab6a5176/ Check out ZKX Solutions new product, Helix: zkxsolutions.com/helix Connect with Chase Cunningham: https://www.linkedin.com/in/dr-chase-cunningham/ Grab a copy of Chase Cunningham's book “vArIable: A Novel in the gAbrIel Series” here: www.amazon.com/vArIable-gAbrIel-Dr-Chase-Cunningham-ebook/dp/B0DVMWCWCD?ref_=ast_author_mp Check out Hacker Valley's upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord B
In this episode of SolarWinds TechPod, hosts Chrystal Taylor and Sean Sebring explore the key differences between monitoring and observability with guest Jeff Stewart, GVP of Product Management at SolarWinds. Observability goes beyond traditional monitoring, offering AI-driven insights and a holistic view of system health. Like understanding the anatomy of the body, observability reveals how IT systems are interconnected—where one issue can ripple across the entire environment. They discuss how businesses can leverage observability to reduce downtime, improve efficiency, and stay ahead in a rapidly evolving tech landscape. © 2025 SolarWinds Worldwide, LLC. All rights reserved
Michael Duffy, President Donald Trump's nominee for Undersecretary of Defense for Acquisition and Sustainment, has committed to reviewing the Pentagon's Cybersecurity Maturity Model Certification (CMMC) 2.0 if confirmed. This revamped program, effective since December, mandates that defense contractors handling controlled, unclassified information comply with specific cybersecurity standards to qualify for Department of Defense contracts. Concerns have been raised about the burden these regulations may impose on smaller firms, with a report indicating that over 50% of respondents felt unprepared for the program's requirements. Duffy aims to balance security needs with regulatory burdens, recognizing the vulnerability of small and medium-sized businesses in the face of cyber threats.In addition to the CMMC developments, the General Services Administration (GSA) is set to unveil significant changes to the Federal Risk Authorization Management Program (FedRAMP). The new plan for 2025 focuses on establishing standards and policies rather than approving cloud authorization packages, which previously extended the process for up to 11 months. The GSA intends to automate at least 80% of current requirements, allowing cloud service providers to demonstrate compliance more efficiently, while reducing reliance on external support services.Across the Atlantic, the UK government has announced a comprehensive cybersecurity and resilience bill aimed at strengthening defenses against cyber threats. This legislation will bring more firms under regulatory oversight, specifically targeting managed service providers (MSPs) that provide core IT services and have extensive access to client systems. The proposed regulations will enhance incident reporting requirements and empower the Information Commissioner's Office to proactively identify and mitigate cyber risks, setting higher expectations for cybersecurity practices among MSPs.The episode also discusses the implications of recent developments in AI and cybersecurity. With companies like SolarWinds, CloudFlare, and Red Hat enhancing their offerings, the integration of AI into business operations raises concerns about security and compliance. The ease of generating fake documents using AI tools poses a significant risk to industries reliant on document verification. As the landscape evolves, IT service providers must adapt by advising clients on updated compliance practices and strengthening their cybersecurity measures to address these emerging threats. Four things to know today 00:00 New Regulatory Shifts for MSPs: CMMC 2.0, FedRAMP Overhaul, and UK Cyber Security Bill05:21 CISA Cuts and Signal on Gov Devices: What Could Go Wrong?08:15 AI Solutions Everywhere! SolarWinds, Cloudflare, and Red Hat Go All In11:37 OpenAI's Image Generation Capabilities Raise Fraud Worries: How Businesses Should Respond Supported by: https://www.huntress.com/mspradio/https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship Join Dave April 22nd to learn about Marketing in the AI Era. Signup here: https://hubs.la/Q03dwWqg0 All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Episode Time Stamps 00:00 Going Linux #465 · Listener Feedback 01:35 Bill can breathe again 07:40 Reid: About the Lemur Pro 11:39 George from Tulsa: Learning the lesson again - buy hardware with Linux pre-installed 16:02 Guimar: Seeking advice on Linux 25:02 Roger: Microsoft news - Solar Winds 30:03 George: Commented on computer/monitor stands 33:13 George: On the M4 Mini 39:42 Harry: Shares his decision 41:26 Ambrose: About Linux kernel headers 50:18 Costas: The Ubuntu MATE installer 54:58 Gus: Comments on Snap packages 56:34 Ian: Remote access 58:05 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe 59:11 End
“HR Heretics†| How CPOs, CHROs, Founders, and Boards Build High Performing Companies
Nolan and Kelli welcome back friend of the pod David Hanrahan, who's just 60 days into his new role as CHRO at SolarWinds. The conversation kicks off with candid reflections on the Transform 2025 conference - the good, the bad, and what's missing from HR conferences today. They also dig into David's challenges and learnings transitioning to his new role, and a discussion on the changes coming for L&D initiatives.*Email us your questions or topics for Kelli & Nolan: hrheretics@turpentine.coFor coaching and advising inquire at https://kellidragovich.com/HR Heretics is a podcast from Turpentine.Support HR Heretics Sponsor:Metaview is the AI assistant for interviewing. Metaview completely removes the need for recruiters and hiring managers to take notes during interviews—because their AI is designed to take world-class interview notes for you. Team builders at companies like Brex, Hellofresh, and Quora say Metaview has changed the game—see the magic for yourself: https://www.metaview.ai/hereticsKEEP UP WITH DAVID, NOLAN + KELLI ON LINKEDINDavid: https://www.linkedin.com/in/davidhanrahan/Nolan: https://www.linkedin.com/in/nolan-church/Kelli: https://www.linkedin.com/in/kellidragovich/—LINKS:Solarwinds: https://www.solarwinds.com/—TIMESTAMPS:(00:00) Introduction(00:37) David's Take on Transform(03:33) The Grittiness of HR(05:42) Value of In-Person Relationships(08:50) Transform's Community Session(10:36) Blackjack, Craps, and the Games(11:28) David's New Role at SolarWinds(15:35) Sponsor: Metaview(17:29) G Suite vs Microsoft Outlook(18:00) Juggling New Job Responsibilities(20:35) Katie Burke's Self Reflection(22:18) Painful Changes and Lessons from Multiple CHRO Roles(25:03) The Weird Moment for L & D(28:55) Effective Leadership Development(33:41) David's BHAG: Leadership Development(35:29) Wrap This is a public episode. If you would like to discuss this with other subscribers or get access to bonus episodes, visit hrheretics.substack.com
SPHEREx wasn't alone on its recent launch to orbit aboard SpaceX's Falcon 9 rocket. NASA's PUNCH mission also hitched a ride.
From energy and wastewater treatment to communications, banking, and beyond, critical infrastructure are those assets, systems, and networks that support our daily lives. Any compromise to these resources, whether malicious or unintended, could have debilitating national security, economic, and public safety consequences. Yet, our critical infrastructure remains vulnerable. And in an era of rising geopolitical tensions, it is also an easy and attractive target for nation state attackers. Solar Winds and more recently Salt Typhoon are two of many examples. In this podcast, we explore the where's and why's of critical infrastructure vulnerability and associated compliance concerns, along with some strategies and best practices to improve critical infrastructure security and resilience.
Steve Satterwhite On Cyber is a Cybercrime Magazine Podcast series brought to you by Entelligence. In this episode, Steve Satterwhite, founder and CEO at Entelligence, joins host Paul John Spaulding and Tim Brown, CISO at Solarwinds, to discuss cybersecurity talent, diving into the skills gap faced by security leaders today and what can be done about it. An industry leader in delivering affordable, high value professional services to security-conscious enterprise and government organizations worldwide, Entelligence addresses the cyber skills gap by working as a seamless extension of each customer's organization, providing a set of customized services that include security readiness assessments, quick-start solution deployments, and longer-term resident expert engagements. Learn more about our sponsor at https://entelligence.com
Intel has appointed Lip Butan as its new CEO, effective March 18th, following a tumultuous period marked by a 54% drop in share prices and the ousting of former CEO Pat Gelsinger. Butan, a seasoned tech investor and former CEO of Keynes Design Systems, is expected to revitalize Intel's fortunes and navigate its controversial Foundry strategy aimed at expanding manufacturing capabilities. Investors reacted positively to his appointment, with Intel's stock price rising over 11% in after-hours trading. Butan's leadership is seen as crucial for Intel to compete in the semiconductor market, particularly in smartphone and AI chip sectors.In the realm of cybersecurity, SailPoint has expanded its Managed Service Provider program to make identity security solutions more accessible to smaller enterprises, addressing the increasing threats targeting vulnerable identities. This initiative allows businesses to onboard identity security as a fundamental function, focusing on entry-level use cases while providing pathways for future growth. Meanwhile, TeamViewer has launched its first integrated solution with One E, enhancing digital workspace experiences through improved device monitoring and secure remote connectivity.SolarWinds has announced its acquisition of Squadcast, a company specializing in incident response solutions, to bolster its capabilities in managing complex IT environments. This merger aims to streamline incident response and improve operational resilience for IT professionals. Additionally, Verizon Business has introduced a new security service called Trusted Connection, which enhances cybersecurity by implementing continuous verification of access to devices, networks, and cloud applications, addressing the significant risks posed by stolen credentials.A recent study by the Tao Center for Digital Journalism has raised concerns about the reliability of generative AI search tools, revealing that over 60% of citations provided by these tools are incorrect. This highlights the urgent need for better evaluation and citation practices in AI-powered searches. Furthermore, research from Harvard Business Review indicates that while AI can enhance executive decision-making, it requires active human engagement to avoid critical blind spots. The findings suggest that companies must find the right balance between human oversight and AI capabilities to optimize decision-making processes. Four things to know today 00:00 Intel Bets on New CEO Lip-Bu Tan—Will the Foundry Gamble Pay Off?04:47 Big Security Moves: SailPoint, SolarWinds, and Verizon Roll Out New Solutions—Here's What They Mean07:59 Think AI Search Is Reliable? 60% of Its Citations Are Wrong09:14 AI in the Boardroom? A New Study Says It's Helping—But Not Without Risks Supported by: https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship Event: : https://www.nerdiocon.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Take a Network Break! This week we’re joined by guest analyst Tom Hollingsworth of The Futurum Group. We start with red alerts from Broadcom on multiple vulnerabilities and an emergency patch from Cisco for its Webex platform. In tech news we discuss SolarWinds’ acquisition of Squadcast and how it fits into the SolarWinds portfolio, Aviatrix’s... Read more »
Take a Network Break! This week we’re joined by guest analyst Tom Hollingsworth of The Futurum Group. We start with red alerts from Broadcom on multiple vulnerabilities and an emergency patch from Cisco for its Webex platform. In tech news we discuss SolarWinds’ acquisition of Squadcast and how it fits into the SolarWinds portfolio, Aviatrix’s... Read more »
Take a Network Break! This week we’re joined by guest analyst Tom Hollingsworth of The Futurum Group. We start with red alerts from Broadcom on multiple vulnerabilities and an emergency patch from Cisco for its Webex platform. In tech news we discuss SolarWinds’ acquisition of Squadcast and how it fits into the SolarWinds portfolio, Aviatrix’s... Read more »
The Smart 7 is an award winning daily podcast that gives you everything you need to know in 7 minutes, at 7am, 7 days a week...With over 17 million downloads and consistently charting, including as No. 1 News Podcast on Spotify, we're a trusted source for people every day and the Sunday 7 won a Gold Award as “Best Conversation Starter” in the International Signal Podcast Awards If you're enjoying it, please follow, share, or even post a review, it all helps...Today's episode includes the following guests:GuestsEmma Pinchbeck - Chief Executive of the Climate Change CommitteeProfessor Piers Forster - Interim Chair of the Climate Change Committee Dr Emily Nurse - Head of Net Zero at the Climate Change Committee Will Guyatt - The Smart 7's Tech Guru Lily Allen - Musician and Podcaster Baroness Kidron - Independent Peer and Digital Rights AdvocateLord Hanson - Home Office Minister Steve Gooding - Director of the RAC Foundation Tara Stewart - Chair of the Charity, Spinal Research Uk Claire Trevedi - Pathfinder 2 Participant Niharika Agrawal - Software Engineer and the Project Manager at Intuitive Machines Molly Bannon - Project Manager at NASA's Johnson Space Centre Elena Charistoforos - Olive Farmer, Cyprus Nicholas Nieten - Soil engineer and Olive Farmer, CyprusContact us over at X or visit www.thesmart7.comPresented by Jamie East, written by Liam Thompson and produced by Daft Doris. Hosted on Acast. See acast.com/privacy for more information.
Take a Network Break! We start with some Red Alert vulnerabilities to get your blood pumping, and then dive into networking news. Cisco announces new data center switches with AMD Pensando DPUs that let you deploy security and other services directly on to the switch. Cisco ThousandEyes is previewing Traffic Insights, which correlates flow records... Read more »
Take a Network Break! We start with some Red Alert vulnerabilities to get your blood pumping, and then dive into networking news. Cisco announces new data center switches with AMD Pensando DPUs that let you deploy security and other services directly on to the switch. Cisco ThousandEyes is previewing Traffic Insights, which correlates flow records... Read more »
Take a Network Break! We start with some Red Alert vulnerabilities to get your blood pumping, and then dive into networking news. Cisco announces new data center switches with AMD Pensando DPUs that let you deploy security and other services directly on to the switch. Cisco ThousandEyes is previewing Traffic Insights, which correlates flow records... Read more »
In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of LimaCharlie's community Slack channel.Ransomware payments saw a significant drop in 2024, falling by 35% compared to the previous year. Law enforcement agencies have arrested a suspected core member of the 8Base ransomware group, marking a significant development in efforts to combat cybercrime. The XE Group, a financially motivated cybercrime organization, has shifted its tactics from traditional card-skimming attacks to more sophisticated supply chain compromises.Security researchers at watchTowr have demonstrated a supply chain attack technique that surpasses the scale and stealth of the infamous SolarWinds breach.A newly discovered cyber-espionage campaign is targeting government and military entities in South Asia, according to researchers at Unit 42.
Send us a textThis episode dives deep into the ramifications of the DOJ's move to halt the HPE-Juniper merger, questioning whether this action genuinely promotes competition or stifles innovation. We also explore staggering investments in AI from top tech companies and what these might mean for future growth and competition. • Discussion on the DOJ's lawsuit against the HPE-Juniper merger • Examination of potential market impacts of the merger • Insights into AWS's and Google's significant AI investments • Analysis of market expectations regarding AWS's recent revenue growth • Concerns surrounding SolarWinds and private equity acquisitions • Calls to action for listeners to engage with their thoughts on these topicsCheck out the Fortnightly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on Twitter: https://twitter.com/cables2cloudsFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj
A group of investors, led by Elon Musk's startup xAI and other backers, has made a $97.4 billion bid to take control of OpenAI, aiming to refocus the organization on open-source AI and safety amid rising tensions between Musk and OpenAI CEO Sam Altman over its shift to a for-profit model. Meanwhile, OpenAI is advancing its AI hardware strategy with plans to launch a custom-designed AI chip in 2024, fabricated by TSMC using 3-nanometer technology to reduce reliance on Nvidia. Initially deployed on a limited scale, the chip is designed to optimize AI model performance, with OpenAI's expanding chip team already working on future iterations with enhanced capabilities. This and more on The Rundown. Time Stamps: 0:00 - Welcome to the Rundown2:44 - Turn/River Capital Acquires SolarWinds5:21 - WEKA Restructure to Focus on AI9:23 - Cisco One Silicon Shows Big at Cisco Live EMEA12:50 - Hammerspace is Changing the AI Training Game17:31 - French President to Invest $112B in AI22:36 - Huawei Shows Revenue Growth Despite Ban26:49 - Sam Altman Says OpenAI is Not for Sale 33:06 - OpenAI to Take On NVIDIA with Proprietary Chip38:13 - The Weeks Ahead39:44 - Thanks for WatchingFollow Gestalt ITWebsite: https://www.GestaltIT.com/Twitter: https://www.twitter.com/GestaltITLinkedIn: https://www.linkedin.com/company/Gestalt-IT #Rundown, #AI, #ITNews, @SolarWinds, @WEKAIO, @Cisco, @CiscoNetworking, @Hammerspace_Inc, @Huawei, @OpenAI, @GestaltIT, @TechFieldDay, @DemitasseNZ, @SFoskett, @TheFuturumGroup, @TechstrongTV,
On this episode of The Founder's Sandbox, Brenda speaks with Chasity Lourde Wright. Chasity is inventor and founder of Infiltron Software Suite LLC. Infiltron operates in the cybersecurity space; a Service disabled-Veteran owned and women-owned small business. Infiltron offers quantum-resistant cybersecurity solutions for decentralized digital identity, digital assets, and AI governance, utilizing proprietary post-secure encryption. Its patented technology integrates AI, blockchain, and quantum-resistant encryption to provide advanced cyber resilience, compliance enforcement, and real-time threat mitigation across multiple industries, including aerospace & defense, fintech, smart cities, and EVs. Chasity, as inventor, speaks about her team and how creativity in the work place is necessary for enhancing innovation on really tough problems like Cybersecurity. As the CEO of Infiltron, Chasity Lourde Wright is also a former USAF Aerospace Engineer, Intel Officer, and Cybersecurity Instructor with extensive experience in cybersecurity, AI governance, and national security. She was part of the team that developed reconfiguration capabilities for the USAF C-130 and contributed to the creation of the CMMC framework since its inception in 2019. Additionally, she has engaged in high-level cybersecurity and AI governance initiatives, including industry collaborations, government advisory roles, and proprietary innovations in quantum-resistant encryption, AI security, and blockchain-based compliance solutions. Her expertise extends beyond participating in NIST challenges, encompassing leading-edge cybersecurity development, policy influence, and defense sector innovations. You can find out more about Chasity and Infiltron at: https://www.linkedin.com/in/infiltronsoftwaresuite/ https://infiltron.net/ Transcript: 00:04 Hi, I'm pleased to announce something very special to me, a new subscription-based service through Next Act Advisors that allows members exclusive access to personal industry insights and bespoke 00:32 corporate governance knowledge. This comes in the form of blogs, personal book recommendations, and early access to the founder's sandbox podcast episodes before they released to the public. If you want more white glove information on building your startup with information like what was in today's episode, sign up with the link in the show notes to enjoy being a special member of Next Act Advisors. 01:01 As a thank you to Founders Sandbox listeners, you can use code SANDBOX25 at checkout to enjoy 25% off your membership costs. Thank you. 01:19 Welcome back to the Founder's Sandbox. I am Brenda McCabe, your host of this monthly podcast in which I bring entrepreneurs, founders, corporate directors, and professional service providers who, like me, want to effectuate change in the world by building resilient, scalable, and purpose-driven companies. I like to recreate a fun sandbox environment with my guests. And we will touch on not only their purpose, 01:47 and what has driven them to create their own businesses. But also we're going to touch upon topics such as resilience, purpose-driven, and scalable sustainable growth. Today, I am absolutely delighted to have as my guest Chasity Wright. Welcome, Chasity. Hey. Thank you for having me. 02:13 Super excited to talk about how Infiltron has evolved and the lessons learned and how we're preparing to relaunch in 2025. Excellent. And it's perfect timing because I've known you for a couple of years now. Yeah. Right. So Chasity is CEO and founder of Infiltron Software Suite, a company that's headquartered out of Atlanta. 02:40 She is oftentimes in Los Angeles because she's working largely in the defense market and cyber security. So I wanted to have you on my podcast because you have gone further in building your business. So you and I met, I want to say back in 2022, you came out of the Women Founders Network cohort. 03:08 kind of very early stage. One of the events that I was a host of was the Thai So Cal Women's Fund. And you weren't yet ready for investing, but we struck up, I would say a friendship and I admire many things about you as, and we'll get into it in the podcast here, but you touch. 03:35 quite a few or check of quite a few boxes for my podcast. You says, so you are a woman owned veteran and women owned business. You are a veteran of the Air Force. You're in deep tech and you're by park and queer. And so there's many many boxes that you check and it was difficult to kind of hone in on what I really wanted to bring into the podcast today, but we're going to we're going to start from here. 04:05 I always like to ask my guests to start with kind of their origin story. I, when I first met you, right, in private conversations, got to hear your origin story and why you do what you do, what your firsthand experience while on missions, right, that really informed your aha moments to create infiltrant. 04:33 as a cybersecurity company. So tell us a bit about your origin story, Chasity. So, I mean, my origin story has, if you can imagine all of these different paths kind of streamlining into one path. So one of those paths would be a little black girl born in Georgia, still seeing dirt roads and... 05:01 being able to go to the country and work on a farm and, you know, just still having that connection to the past, you know, and not necessarily the past in a bad way. So athletic, played ball in college, went to Clark Atlanta University, you know, the HBCUs are a big hurrah right now, but they've always been one. 05:29 I grew up with one in my backyard, Fort Valley State, which is in Fort Valley, Georgia. So, you know, roughed it with the boys, played in the backyard with the boys, always been a boys girl, cousins, neighbor. We're all still close. We all still play sports when we meet. So it's like an adult play date, so to speak. But also, you know, 05:58 raised religiously, you know, I'm in Southern Baptist Church, two parent household, maybe lower middle class, but middle school was very transformative for me because they decided to mix in everybody. So it was my first time, you know, being in a more diverse population in school. 06:25 And, you know, music is a big thing for me as well. I DJ, I make music. That's the creative part of me. And I found a lot of people in deep tech to do something with music. So, yeah, so, you know, that's my like early years background. And then coming through, I decided to go into the Air Force. I actually took off between my junior and senior year at Clark Atlanta. 06:52 Um, there I was majoring in global leadership and management. Okay. And went in and I was in for eight years. I was an aerospace engineer, uh, got deployed several times, uh, to different places, and that kind of brings us to why Infiltron exists and, um, on one of those deployments, I was a part of a network takedown. 07:21 And it was, whoo. I mean, I don't mean to quote the pitch deck story, but it is what it is. I wrote it because that's the way it felt. It was catastrophic. So just imagine the city of Los Angeles losing power out of nowhere. The rail stops working, Sinai has no power, so all of the medical equipment is no longer working. 07:49 The internet's completely gone and not rebooting like it normally would. Your energy grid is down. That is what I experienced in one of those deployments. And I was a part of Iraqi freedom and Afghanistan. I was a part of both of those wars. And when we came, you know, we got everything back. Thank God we were smart enough to ship. 08:19 brand new equipment. Okay, you know, so you know, we weren't able to get there. Yeah. I mean, I mean, that's part of our job. We're engineers. And when you're in the middle of nowhere, there's no calling HP. There's no calling Cisco. Like you got to know how to do what needs to be done. There was there was a lot of makeshifting. I can be I came out of Air Force, I could be a mechanical engineer to 08:45 because we had to figure out how to make components on the fly. It was just so many things. Innovation, right? Like you had to be innovative. You had to be adapt quickly while keeping the mission as a focus. So just imagine something that catastrophic and something similar has happened. I feel like Colonial Pipeline was something that is known now in the US for sure. 09:15 that had similar elements of what we experienced in being deployed. Yeah, and that was two years back. And SolarWinds is another one. I generally refer to those because people generally gasp, even non-technical people, because they know how damaging it was. So we can reuse. Normally, when the equipment goes down, 09:44 Unplug, right? Plug back in. Reboot. Yeah, reboot. But that was not happening. And what we found out in the debrief was that quantum was used. So quantum simplistically is about frequencies in this context. It's about frequencies. And frequencies matter in so many aspects of life, from spirituality all the way through tech like what Infotron has. So... 10:14 What they did was they basically zeroed out the frequencies of our satellite communications. And I believe that they created some frequencies that damaged other equipment. So these are things that again we found out in the debrief. And I wasn't really able to talk to that probably when we met because I wasn't sure if it was unclassified yet. 10:42 But as soon as Biden started talking about quantum initiative, which was back in 2022, when we were in, I was like, everything's hitting it the right time because we were literally in Techstars LA space. And Biden pushed the quantum initiative. And I'm like, see, told you, because a lot of people, a lot of people doubted what I was saying because of the year that I said it had happened. And as. 11:09 we started to grow out our team. There are other veterans on our team from different branches. And of course we war story swap all the time. And those other two people work for like NSA and they did kind of the same thing, telecommunications. And I'm telling the pitch desk story and they're sitting there like, yep, yep. That happened to us too. And I'm like, when? 11:38 And they're saying different years. So at that point, we understood it. It happened more than once. So that's why Infiltronic. So what's Infiltronic? So let's bring it back to, Yeah. So you leave, you leave service after eight years after also experiencing that. I still feel like I'm a part of it because I do consult them still. Right. So it'd be great. So. 12:08 And once in the Air Force forever? Always. Well, I really would have been in Space Force. Yes. Yeah. Well, you heard that here on the Founder Sandbox. The next, yes. So for my listeners, again, you check a lot of boxes. Deep tech, women in STEM. What is it exactly that? 12:37 your suite of services. All right. So Info-Trans software, right, has two patents now. And on your landing page, it says, our patented solutions, solutions utilize adaptive artificial intelligence, advanced quantum encryption and blockchain technology to deliver real-time cybersecurity for a wide array of applications. Later on, we'll get into smart cities, but 13:06 including the internet of things, smart devices, legacy systems, hybrid data, signals and devices. All pretty, pretty understandable, but what is it that Infiltrion software is able to do that others are not? So we're able to create a easier way for businesses to migrate their devices. 13:36 and their software, so their applications that they use, maybe they've developed them themselves, we provide a way for them to easily migrate those entities over into a more quantum-proofed infrastructure. So we created what we've trademarked as quantum encapsulation. So just imagine something being encapsulated. And basically we've created, 14:05 a brand new method of leveraging quantum, the AI, we leverage it for the pro-activeness. So in lieu of just waiting for threats to happen to our clients, we go look for the threat. So we want to go be where the bad guys are and find out and bring that information back and update the solution in real time to provide protection for all of our clients in real time. 14:33 That's how we leverage the AI. The blockchain is kind of leveraged to kind of make sure that people, things like devices, aren't on networks that shouldn't be. So it's kind of, I mean, we use it for what blockchain was pretty much basically developed for, and that's a ledger. So keeping up with the transactions of what's happening. 15:03 in a client's infrastructure. Fantastic. So it's largely a B2B business, yours, right? We do. We have B2B, but we've been approached several times here recently by consumers. Because now, because of the biometric protection aspect of our solution using the quantum encapsulation, we can protect, say, 15:32 Halle Berry from deep fake, being deep faked, or, you know, protecting her likeness from being used without her knowledge in movies, CGI'd into movies. So it's kind of getting a little bit more consumerish as we iterate, right? Yeah, and we were briefly speaking before the podcast recording, Chasity and I, and... 15:59 I've known her for years. She's a very private person, would not allow photographs. So I told my producer, I'm certain Whitney Chastity's not going to be sending us a picture, but you said yes, that you might, because you do have biometric, artificial intelligence, safeguards that can actually discover deep fakes, right? Yes, yes. Yep, if it didn't come from us, if it wasn't checked back from us, 16:29 It wasn't approved by the person. So it's kind of pretty much that simple. Amazing. Well, later on in the show notes, we will have how to contact you at Enfield Tron. So you are in the startup ecosystem. Again, you travel a lot. You're between Washington DC, Atlanta, Los Angeles, and actually the Bay Area. Yeah, the Bay Area. Right. So. 16:58 Revenue can be elusive, right? How? Especially in tech, and especially in these really large markets that I call deep tech. Deep tech and leading edge, bleeding edge, right? People don't know what they're actually buying, right? Or what they don't even, they probably don't even know that they have a need, right? What's been your strategy at Infiltron to keep the revenue flowing while maintaining also a pretty playful, innovative culture? 17:27 You talked about your team and so talk, that's kind of two questions. So how have you kept revenue coming, right? While not going out for dilutive funding yet, but tell us a little bit about how, what's your business model? So the business model in itself is set up for B2B and we also have a licensing element there. So if they, for instance, 17:56 a Fortune 500 company who has a cyber team, right? They have an internal cyber team. If they want to license out the patents that we have and kind of customize it or create or build off of those, use it as a baseline for what they need for their systems, we offer that as well. But let me just put it out there. But back to your question, how do we keep it fun? So the team... 18:25 The original team members, should I say. So we met about seven years ago at a place called the Gathering Spot in Atlanta. So the Gathering Spot is a community and they just opened one in LA and I do go to the one in LA too when I'm there. But it's a community of people, creatives from creative people to deep tech people like myself and everything in between. 18:55 We went to a black tech event at the gathering spot and found ourselves not being able to get into the actual room. So we ended up, because they have a bar and everything at the gathering spot. It's a social club too. It has a club aspect to it too, but you can network there, have meetings there, meet all types of people. I mean known people, I mean it's a great 19:25 great concept, shout out to Ryan. But we found ourselves at the bar, and we're looking at each other. We knew each other because we had been introduced by the Hellbrella person, Tracy. Yes, yes. Because they had done some things for her with a previous startup that she had, development-wise. So we're all sitting at the bar, and we're looking at each other like, but we're the real tech people. 19:55 We do it. It's like we don't really take people. Um, we can't even get in there. We like, we know the organizers and personally and everything. So let's start a company. Well, what we did was we launched, um, what we launched kit labs. And it was literally right down the street from the 20:23 and connect to the community. So we had, it's not far from the AUC and the AUC is where Morris Brown, Morehouse, Spelman and Clark Atlanta are. Got it. So a lot of times you would come in there and find some of the founders, cause this was founded by myself and like six or seven other black tech founders. The ones that were outside. Drinking like, you know. 20:53 That's where we had that conversation. You know, the conversation started at the bar, being outside of that first Black Tech meetup, so to speak, with Joey Womack, who is a part of Goody Nation, who we did get a 50K grant from back in 2020 through Google for Startups. Let me just say this so much. We were so interconnected. I mean, Atlanta is Wakanda. Don't let anybody tell you anything different. 21:21 It's definitely Wakanda. But literally, not even a mile away from the Gathering Spot, we opened up Kit Labs. It's a smart lab where we can tinker with stuff. We're engineers. We're tech people. We need something. We need a makerspace. We don't necessarily need a space that is compared. The Gathering Spot was a little bit more buttoned up. 21:46 And then what we needed, we needed to be able to throw things and make things. We had everything from like 3d printers to, um, VR, AR headsets. I mean, you, anything in tech. Innovative fun. It was in, is in that lab. Um, but that's where around today. So we dissolved it. So it's been dissolved. What one of, one of the founders, he unfortunately transitioned. Um, 22:15 So, you know, and he was kind of like the pillar of it. And it kept going for a while, but it was just a lot of people like myself, it was two female founders, Dr. Nashley Cephas, who herself is from Jackson, Mississippi. I'm shouting out everybody, right? She's from Jackson, Mississippi, and she bought 10 acres in downtown Jackson, Mississippi and started a nonprofit called Bean Pad. And he basically took the concept of what we were doing at Kit Labs and brought it to our hometown. So. 22:44 Um, and it's so funny. She actually founded it on my birthday. So I was like, okay, I can dig that. Um, uh, but, but no, but we're still connected. Everybody still works with each other. You know, if I have to come in and do some things around cyber for a contract or, you know, commercial or whatever client that they have, I do like we, we all kind of still work together on each other's things. So that has allowed you to bring in some revenues, right? 23:14 through its service context. Yeah. Oh, for sure. For sure. Consultant wise, cause they're like, I think people may look at Infotron and think that there's not a human touch piece there, but if you're dealing with me, there's always gonna be a human touch point there because we have to consult the client. We can't assume, you know, we cannot assume. 23:41 what you need, we have to actually have a conversation with our clients throughout the process, even after we possibly have set up the platform for you, trained your people on it, there still needs to be an element of communication, human communication, right? But the team, we've been working together for about seven years. Yes. 24:10 Infiltron has been around for five, going on six years now. So, you know, I mean, respect, mutual respect, we're still kids at heart. I mean, we grew up wanting to be engineers. So, you really can't take the light of innovation out of an engineer unless they're just at the point of not wanting to do it anymore. So we're always, what I've found is most people in any engineering discipline are very, 24:39 curious and forward thinking. So we, and we kind of, we're kind of like a community. We are community and not kind of like, but we are community of folks that contribute to each other's, you know, projects. Yeah. Mm-hmm. And not just, not just business-wise, but personally, like we, I mean, we've been around each other for almost a decade, so. 25:04 there's been kids born and like I just said, one of our founders transitioned, like we've been through some things together that have brought us closer together. And you can, I believe when you have a team like that, and we're all diverse, you know, we have a team like that that cultivates innovation, for sure. You know, I've had a few guests to my podcast and I also write about this, 25:35 Creativity is only possible or it's greatly possible when you create a fun environment and make games out of things and have, right? And set up teams. So I think a shout out to you and what you've set up at Infiltron and in its earlier rendering at Kit Labs, just creating an environment that allows for what ifs, right? Is key. There are a lot of what ifs in cyber. 26:04 I bet you there. So I have a boatload of questions here. One is, before we get into your fundraising path, again, I mentioned earlier you have two patents that have been issued. What is post-quantum encryption technology in layman language? Post. 26:32 Quantum encryption technology. So there is definitely confusion out there that has been addressed. And because there is a difference between post secure quantum and encryption. There's a difference. So. Excellent. 27:02 Post quantum encryption, it is designed to protect data from quantum computers. So. And that's done through the encapsulation? For us, that is how we provide the protection, the encryption. That is the quantum encapsulation is a method of encryption with Involtron. So the current encryption. So you have things like RSA. 27:32 elliptical curve, which elliptical curve is more widely used and kind of being marketed as quantum encryption. It is, it is, it's on the list of quantum protections, right, or quantum methods of encryption protection. So companies like Okta use ECC a lot. But what's happening is that quantum computers are being built now. Yes. Like right now, there's no... Yeah, the cost is going down. 28:02 Yeah, there's no waiting five years from now. Like I urge anyone under the sound of my voice to prepare now for quantum computer attacks. The same thing that I describe happening to us when we were deployed, it's gonna happen. And again, I alluded to feeling like 28:33 situations like Colonial Pipeline and SolarWinds were, I feel like they were tests because there were so many different elements of what we saw in the deployment that happened in those two cases. Yeah, because I'm sitting there and think it's like 2020, 2021, 2019 actually, it started. I think this didn't know, but. 28:59 And it's still going like 20, SolarWinds was still going, the last time I checked SolarWinds was still unraveling. Like it's still, still going. But back to the question. So for us, quantum encapsulation for us is breakthrough. So NIST has had these challenges, right? Where they put out bidding for companies, 29:27 researchers, because a lot of people that are in the quantum space, whether it's physics, mechanics, are generally found in academia. They're not at Infiltron. They're not at QED. They're just not there, right? It's very far in between, and we generally have to lure them. Or we have to do something like partner with them on... 29:53 grants, like the STTR grants. Like that's the only way, generally the only way that we can probably connect with the academia or pierce them and have them work with us. And they usually through that take all the funding, but it's, you're still. Exposed, right? You're exposed, but you're also getting the expertise that you possibly need and can't rightly find in the freelancing world. Yeah. So it generally works out in the long run. 30:23 Um, but so our encapsulation is a, is a breakthrough method because I look at it like this, NIST is holding these challenges and nothing against NIST. We're connected. I contribute to NIST and everything, but they are holding these challenges. And basically they're telling the hackers what people are going to the framework. 30:49 what people are gonna have to adhere to when they create their quantum algorithms to protect their devices and data. You know, you're giving away the secret ingredients. So like, even if they don't know specifically your algorithm, they know what you've based it off of. And that gives it like a tiny thread can unravel a whole t-shirt, right? So I look at it like that. So... 31:15 And even before, you know, we were already developing things before NIST put out these challenges. We are in alignment. We can adhere and do it here to the framework that they're putting out because, you know, you have the DOD space who definitely follows their framework, especially when it comes to the risk management framework. So they're going to follow NIST regardless. They're going to follow their framework, whatever they put out about cybersecurity protection. 31:44 The DOD space and all of its agencies are gonna follow that. However, being in the cybersecurity space every day, seeing what is happening and knowing that you've given some clues, some contextual clues to the malicious hackers about what you're using as a baseline to build your algorithms will, guess what? What we have is not that. Like we are... 32:12 One of the things that differentiates us right now, because I'm sure as quantum cybersecurity continues to grow legs, so to speak, people are gonna start using the more, less susceptible to hacks by quantum computers method. So you have things like multivariate hash code. So these are some of the 32:40 quantum properties that you can use that are not generally hackable by a quantum computer. They won't be hackable by a quantum computer. So we leveraged some of that. It was like, if I'm built, I looked at it like this, I've been in cyber, I've been in tech for almost 20 years. I know I don't look it. I get it all the time. You don't have to say it. I've been in tech for almost 20 years. I've been, and when I was in the air force, we call it InfoSec. It's the same thing. And that dates me. 33:08 If I say, if you hear somebody say InfoSec, trust me, they've been in cybersecurity for at least 20 plus years. So, but it's cybersecurity, that's what it is. And I've seen the changes and I've paid my dues too. Like I didn't, when I got out of the Air Force, I was just, side note, like I cut grass and loved it. I would go back and do it if I can make these results. So then like, it's very, it's very fulfilling. Don't let anybody fool you. Like I love, but I like being outside, but. 33:38 Um, my first tech job though, I literally went through the phone book. Cause this is like still, you know, internet was not quite what it is now, of course, but it was like still growing. And I went through the yellow pages and went through the aerospace companies and called all of them and was like, Hey, let's just get out of the air force, look for a job. I don't care if it's an intern or co-op and L3 L3 before they merged with Harris. Uh, 34:08 they created me a co-op. And, but again, still in touch with, cause you know, L3 is a huge government contracting company, right? And in the satellite communication space, cause they're in line with my background. And so I've seen it all. I've seen the changes of InfoSec into cybersecurity. And now we're entering a new frontier with quantum cybersecurity. So I've been here, 34:37 maybe at the latter part of the info set, but definitely through the cybersecurity and here for and to forge some guidelines and pathways in the quantum cybersecurity space with Inflotron. So when you know Inflotron was founded in 2019, I was like, okay, if I'm gonna start 35:03 something new in cyber and we hadn't even gotten to the quantum piece yet. They hadn't even gotten to me yet. Like it started like I was getting downloads. Yeah. Because I'm, I always, I'm a reader. I wake up looking at cyber news and just staying in the know because I need to know what's going on so I can protect my clients, whether that was me in a government contracting position or me as a consultant in my businesses. So. 35:33 I need to know what's going on. And if I'm going to build something new, why am I going to build it with compromised parts? Right. That's a great way to describe it. Yeah. Forget the tech. It didn't make logical sense. If I'm going to build something new, a SaaS product that's going to integrate and be flexible and adaptable and proactive. 36:01 Why would I use RSA encryption when I know what's coming? Got it. That will be one of the snippets that I share in my YouTube channel as well as the podcast. That is excellent. Why build something with compromised parts? Frontier technology, quantum cybersecurity is what Epfiltron is about. 36:30 Next generation. Talk to me a little bit more for us, less tech savvy listeners about the use of Infiltron in a SelleGov's program for smart cities. That kind of brings it more home and more tangible. How is technology used for smart cities? So first, SelleGov through leading cities. Yes. 36:59 It connects companies like ours with municipalities to tackle urban challenges. So for us, it's infrastructure, security, and sustainability. So we were a finalist in leading cities global competition back in 2021. And we've worked through them. You know, we've been able to work with city leaders to secure IOT systems and critical infrastructure. 37:28 And quick shout out to Michael Lake. Okay. He's the founder of Leading Cities, amazing guy. Another keep in touch, answer the email quickly person. He's based in Boston, but he's built a very supportive ecosystem. So shout out to Michael Lake. But as a part of this program, 37:56 We're offering smart cities our enhanced quantum vulnerability assessment. And this is to help the smart city leaders identify areas that need better quantum protections now. We've just had a session on November the 11th, Veterans Day. And the second one is coming up December the 5th. So you. 38:24 If you're a smart city leader or see so small, medium, large enterprise, no matter what market you in, you're in, definitely tap in. You can register for it on the leading city's website or on our website at Infotron.net. Yeah, that's on December 9, 2024 at 1pm. Is that Eastern? December 5th. December 5th? No, it's the 9th, because I have it here. And that's my cousin's birthday. So yeah, it's December 9th. 38:53 Did you get to influence those dates? Yeah. So let's jump into your startup. You've taken in very little dilutive funding. How much money have you raised to date? And how have you, what is the next phase, right? In terms of outreach for fundraising. So we've raised 120K and that was through Techstars, LA Space. 39:23 Still counting. I do not take a salary. I could take one, but I'm just, it's the long game for me. And I still consult. Don't let these people tell you not to quit your job and be an entrepreneur. Don't let people do that. Especially if you have a family. Don't let these people, don't let these people try to guilt you or shame you because you still have a job while you're building your startup. Don't let, don't do it. 39:53 Because I do have a company that I started called Right Tech Solutions and we still, that's why I said I still feel like I'm in the Air Force because I still consult them. So I can, you know, the revenue that we do and we've hit 500K in revenue. So you know, I could easily take a salary, right? But I just, it's the long game for me. It's the global expansion. 40:22 um, you know, more IP and patents, uh, protections, right? Because we do have global count clients. And, um, one of the things that I wanted to make sure of before we even took on the clients was that we had legal backing there. So IP trademarks, um, at least patent, at least the application is pending, but you know, like I want to, I want to, I want it to at least have that. And we have great attorneys. Um, shout out to Malika Tyson. 40:52 and Matthew and Dorian who have, they took over because I had a, I had an attorney, IP attorney that would, had her own boutique firm and then she had to go back, you know, she just couldn't do the entrepreneurship, it's not for everybody, but we still stay in contact as well. But she introduced me to McAndrews, they're based out of Chicago. 41:20 And they are the legal team for Impletron. I always tell them that when we're on calls, like you are the legal team. Like, yeah, anything that I need from them legal, legal wise, they do it. I literally just sent a partnership NDA over to Malekka this morning and she just sent it back to me. So like, that's not IP and trademark, right? But they do, they do it. And I always tell them how much I appreciate them because... 41:49 IP and trademarks are not free and they're not inexpensive. So, and then imagine, you know, we have one pending now in Japan. We just got one in Canada. So yeah, like it's expensive, you know, it's expensive. So a lot of the funding that we get now is going to be allocated to pay them, you know, even though they work with us. But it's going to be paying them. 42:18 doing some iterations, we have a partnership where there's some hardware that's gonna be involved. We're definitely tapping into the hardware. So we'll be forging our way there because people like things they can touch. SaaS isn't necessarily something that you can touch, although put it into a platform makes it a little bit more tangible for people, visual at least. So in the- 42:48 Yeah, I mean, hardware has always been a part of the vision. FBGAs, we have another colleague of mine, he has developed a cryptocurrency mining machine, and it leverages quantum. So it's mining at exponential speeds, right? Because generally what quantum does is speeds things up. It speeds exactly, in simplified terms. 43:18 Definitely still going after Sivers traditional government contracts globally. We participated in Fintech down in the Bahamas last October. Cause we are in the Fintech space and there's a lot of similarities between Fintech and Space Tech. Because when you're talking about fault zeros and being able to detect anomalies. 43:46 both of those markets need that and they need it quick. So we've been able to, yeah, like we've been able to leverage some of the things that we're learning in both of those for each other. So we've been able to participate in some conferences. We actually getting ready to go to Barbados in January for Fintech Islands, I'll be speaking about 44:14 the kind of the intersection of the quantum age and what's coming in respect to the fintech space, cryptocurrency, web three, traditional finance and AI, because we do leverage AI. And we've been in the AI space, Impletron has been in the AI space from the beginning. One of our advisors is an AI evangelist at AWS. I did say her name earlier on this podcast, but. 44:42 She's amazing. She's a Georgia Tech grad. We do have a few Georgia Tech people on the team, but she's amazing. And I'm able to tap her. I've been able to tap her because she was one of the Kit founders. So I've been able to tap her about AI and machine learning very early on. So all of the LLMs and the SLMs that everybody's kind of talking about, we've been doing. 45:11 Like even as small as we are, we've been. 45:16 Yeah, so, Chasity, how can my listeners contact or get information about Infotron? So, yeah, of course the website. So, infiltron.net. You can follow us on all of our socials at Infotron Software Suite. It might be, I think on Twitter is Infotron app. We wanted to keep it short. 45:41 And then, or you can email us at mfultronapp at gmail.com. And I know people are gonna be like, why you use Gmail? That's another filter. And that's an email that everybody on the team can look at and not be bombarded with, cause spam and it's just, everybody has their own email address, but. So you probably, it's a test environment for all of you. 46:09 beautiful quantum encryption that you're working on. Yes. And that's it all. One better way to start. Yeah, Gmail, right? Google knows a lot more about us than we'd like them to. Oh, Google knows everything. That's tough. Even when you turn location off. Oh, Instagram. I just posted something about Instagram. So Instagram's new. They just updated their policy maybe a month ago, maybe. 46:38 Okay. Whether you want to or not, they now have access to your photos, your GPS location, everything even if you say no, even if you turn it off, they still contract. 47:00 Just putting it out there guys. Yeah. So if you do platform. So there's cause to the platform. Right? Yes. Thank you. All right. We're coming down to the section of the podcast where I like to ask each of my guests what the following three words mean to you. Because this is what I do with my consulting business. 47:24 In addition to my podcast, I work with founders that are really building resilient, purpose-driven and scalable businesses. What's resilience mean to you, Chasity? Man, that's a word that I use. Uh, I mean, I'm, I mean, you gotta think about it. I'm black trying to raise money. It's hard for black people to raise money on top of that. I've been, you know, um, I've come face to face with people that didn't believe that I wrote my own patents. Like. 47:53 you know, as if black people didn't invent a lot of things, like that we still use today. Like, come on. I mean, it's just the truth. Resilience. Resilience for me is bending, but never breaking. Bending, but never breaking. Yeah. It's about, you know, adapting to challenges. I just mentioned some and facing them. Like you can't, you can't, and I'm about to sound 48:23 run from the pain, you gotta run towards it. So you can come out stronger on the other side. And it's not necessarily about survival, it's transformation. That's transformation. It's transformation. And that transformation is preparing you for what's next. And you'll be standing taller than you were before. Amazing, thank you. Purpose-driven, what's a purpose-driven? 48:53 Enterprises or? Yeah. I'm a visionary. So like, there's a lot of founders that I've met. If I have the opportunity to get close to them or kind of hear them speak about what they're building to include myself, because I do talk to myself about the things that I'm building. I counsel myself. I'm sure my ancestors are around me. 49:23 Purpose is, it should be intentional. I think that it's kind of interchangeable for me. But in the context of the question that you asked on purpose driven enterprise, so it's the heartbeat in what we build here at Infotron. I can definitely say that. It's creating meaningful solutions that solve real problems. And in solving those real problems, 49:52 you're still staying true to the mission. I still bring the aspect of the military into Infiltron. We are mission focused. We have fun. We do all the fun things, right? Because again, that cultivates innovation too. And it keeps it spicy. You need to let things be spicy because in a regular deglar cybersecurity job, you're probably bored. Like. 50:19 I mean, let's just be real. Like you're probably bored. You're probably looking at Excel spreadsheets and creating a report by hand from that. Like it's boring. Like, but you know, it's also making moves that matter. And it's solving problems that for me leave a legacy and just never losing sight of why we started in the first place. 50:48 So never lives in sight. Excellent. What about scalable? So how does- That's one of those BC's favorite words. That's right. Because that's what they want to see. How will you scale? That's right. I mean, I'm an investor too guys. Don't get it twisted. Like, I think that was a question that I did ask with one of the investors I had. Like, how are you going to get over that challenge? Like, before I give you this money. 51:18 Scalable. So growth, like we can think about growth in so many different ways, like growth, personal growth, because if you embark on the entrepreneur trick, you are going to be, and need to be open to growth. To me, entrepreneurship is a spiritual journey. Beautiful. 51:45 about the Southern Baptist roots, but I'm not spiritual. I'm a yoga, meditating, put my feet in the sand, grass grounding person nowadays, but still bringing that element of praying. And it's all the same to me. They just changed the name of God, right? Just that's my perspective, but growth isn't just about getting. 52:14 bigger. It's about getting better. And me speaking about the personal aspect, that is what growth is. It might not feel good, you know, while it's happening. But, you know, once you get through it and you can get in a reflective mindset and look back with what you just came through and be grateful, like find gratitude in it, you know. 52:43 That's how I look at growth. It's expanding mindfully and staying grounded in your values and making sure that every step that you take going forward strengthens the foundation that you've already built. And it's... 53:11 Like I said, it's moving with intention. And while you're moving with intention, you're also preserving the quality and the vision that define you. Which goes back to purpose-driven. Yes, thank you. Last question, Chasity. Did you have fun in the sandbox? Oh yeah, I mean, it's you. You know, we already have a great rapport. 53:38 I'll say this, one of my favorite memories of you is when you brought Ty to the table to kind of see if they were, could invest in Infiltron and it was too early. But we had to sign an NDA, it was some type of contract, but it was during Mercury retrograde. You said it before I said it, I was like, I wonder if she's onto this type. 54:05 Cause I wasn't going to sign it. I was going to try to delay it as much as possible, but you're like, no, let's wait, let's wait. So after Mercer, that's your great. Well, I was like, oh, these are this. She's my people. And I was like, and I think I responded like, let's wait five days. So it is no, it's like clear. So, um, that's a little fighter for me with you. Oh, I love it. I love it. Generally hear that in business. No, no. 54:32 And the Founder Sandbox again is a pretty eclectic podcast, bringing in deep tech founders like Chasity Wright that are on the frontier, bringing in what the future, will, it's the future's here. It's here. That's right. So to my listeners, if you like this episode with Chasity Wright, CEO and founder of Infiltron, sign up for the monthly release of 55:01 this podcast where founders, business owners, corporate directors, and professional service providers share their own experiences on building with strong governance, a resilient, scalable, and purpose-driven company to make profits for good. So signing off for this month, thank you, Chasity. Thank you, Brenda, so much. I hope to see you soon.
Amazon has reported better-than-expected earnings for the fourth quarter of 2024, with a significant increase in net income attributed to cost-cutting measures and strength in its cloud business. Despite this positive performance, the company provided disappointing guidance for the current quarter, projecting sales that fall short of analysts' expectations. Amazon Web Services (AWS) continues to be a dominant player in the cloud market, but its growth rate of 19% lags behind competitors that are experiencing growth rates above 30%. This slower growth raises concerns about AWS's position in the increasingly competitive landscape of AI workloads.The labor market is showing signs of cooling, with recent revisions indicating a slower decline in job growth than previously anticipated. The tech sector added nearly 7,000 jobs in January, but the tech unemployment rate has risen slightly to 2.9%. A survey revealed that over 75% of businesses are struggling to meet their IT talent needs, particularly in areas like machine learning and cybersecurity. This has led many companies to focus on upskilling existing employees to address the talent shortage.In the small business sector, transactions rose by 5% in 2024, with a notable increase in technology-related acquisitions. Despite inflation and rising costs, demand for stable, recession-resilient businesses is growing, prompting brokers to predict an increase in seller financing amid tight lending conditions. The surge in technology transactions indicates a strong interest in IT services and software firms, which may be well-positioned for growth and acquisitions in the current market environment.Microsoft's Copilot Plus PCs have struggled to gain traction in the market, with disappointing sales figures attributed to high prices and a lack of compelling applications. Consumers are not actively seeking AI features, highlighting a disconnect between marketing efforts and real-world demand. This situation underscores the broader challenges of AI adoption, as companies like Microsoft work to clarify the value of their products in a competitive landscape. Four things to know today 00:00 Tech Talent in Demand as Companies Struggle to Fill AI and Cloud Roles05:33 Copilot+ PCs Struggle as Shoppers Say ‘No Thanks' to AI Upgrades06:55 Amazon's Profits Jump, But Is AWS Falling Behind in the AI Cloud Race?09:13 SolarWinds Sells for $4.4B—And N-Able Might Be Next Supported by: https://www.huntress.com/mspradio/ Event: https://nerdiocon.com/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Send us a textUnlock the secrets to safeguarding your cloud storage from becoming a cyber attack vector in our latest episode of the CISSP Cyber Training Podcast with Shon Gerber. Discover how neglected AWS S3 buckets can pose significant threats akin to the notorious SolarWinds attack. Shon breaks down the importance of auditing and access controls while providing strategic guidance aligned with domain 6.1 of the CISSP to fortify your knowledge for the exam. This episode promises to equip you with the essential tools to protect your cloud infrastructure and maintain robust security practices.Transitioning to security testing, we explore various methodologies and the vital role they play in incident readiness and data integrity. From vulnerability assessments to penetration testing and the collaborative efforts of red, blue, and purple teams, Shon sheds light on the automation of these processes to enhance efficacy. We also demystify SOC 1 and SOC 2 reports and discuss their criticality in vendor risk management and regulatory compliance. With insights into audit standards like ISO 27001 and PCI DSS, this episode is your comprehensive guide to understanding and applying security measures across diverse sectors.Gain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Countering adversaries in the cyber domain requires the Navy to harness information at the speed of technological innovation. During AFCEA West in San Diego, California, Vice Adm. Craig Clapperton, commander of U.S. Fleet Cyber Command and Navy Space Command, discussed how he is approaching the evolving landscape of cyber threats and developing strategies to counter them in his dual-hat role. From recent cyber incidents like SolarWinds and Volt Typhoon, to the role of emerging technologies like AI, Clapperton dives into the complexities of modern cyber warfare and explains how he's eyeing collaboration with industry partners and allies, recruiting top cyber talent and staying ahead of adversaries in a rapidly changing digital environment.
In this episode of Tiny Show and Tell Us, we cover an aurora-like phenomenon — STEVE (Strong Thermal Emission Velocity Enhancement) — and how citizen science led to its discovery and unforgettable name. Then we talk about convergent evolution in tenrecs, a fascinating family of animals endemic to Madagascar. Some look identical to hedgehogs, some are similar to opossums, and others look like moles. We need your stories — they're what make these bonus episodes possible! Write in to tinymatters@acs.org *or fill out this form* with your favorite science fact or science news story for a chance to be featured in a future episode and win a Tiny Matters mug!A transcript and references for this episode can be found at acs.org/tinymatters.
Some recent threads on CheckMates worth further discussion.Properly defining the Internet within a security policy, let's discuss!NAT TipAnyDesk - on DHS Compliant versionsk182752: Harmony Endpoint Client blocks AnyDeskvpnconfig alternativeR81.20 High CPU being reported by Solarwinds and TOPsk101878: CPView Utilitysk178566: Skyline Deploymentsk92402: How to query utilization of individual CPU cores via SNMP2M DNS Queries Per DaySingle Domain SolutionIntroducing CheckMatesAI
Tim Brown is the CISO at Solarwinds. In this episode, he joins host David Braue to discuss how the role of the CISO is evolving, including the importance of global cyber regulations, the 2020 Solarwinds breach, how that experience impacted his role, and more. SecurityScorecard is the leading security rating company, used by more than 2,500 top companies. To learn more about our sponsor, visit https://securityscorecard.com
CIO's face what Jeff McCullough, VP of Sales at NetAlly, describes as the CIO Agenda, a term or a challenge originally described by Gartner. “I use the term or have somewhat borrowed the term to talk about what I think are the top challenges that CIOs face, as well as their top priorities. it's really about balance. How do customers balance the priorities that they have, what are the things that they're most focused on achieving, the business goals that they have while handling the challenges, the things headwinds, the things that slow down their progress, that are obstacles for them to overcome in achieving their business objectives? The CIO agenda is balancing the priorities and the challenges and ultimately helping customers, especially executive level customers, with the solutions they need to address both.” Jeff is a 25-year veteran in IT channel sales whose resume includes leadership roles at SolarWinds, NetApp, and HP Inc. Jeff also serves as a founding advisory board member of the Sales Community, the leading social network for global tech sales professionals. In this podcast, we learn about the challenges CIOs face and how NetAlly is moving to help enterprise customers tackle those challenges and win. Driving product diversification to enter new IT verticals and increase partner revenue. Jeff plans to fuel customer growth opportunities for managed service providers by demonstrating the value of on-site network and edge security assessments. NetAlly offers products that validate and troubleshoot vitally important wired and wireless networks. Visit www.NetAlly.com
Brian Goldfarb is the Senior Vice President and Chief Marketing Officer at SolarWinds. After earning his A.B. in Computer Science and Economics from Duke University, Brian initially explored a career on Wall Street but soon transitioned to product management at Microsoft, marking the start of his two-decade journey in the tech industry. At Google, Brian played a key role in launching the Cloud Platform. He later led platform marketing at Salesforce, and before joining SolarWinds, he served as CMO at both Splunk and Tenable. Now, after nearly a year with SolarWinds, Brian oversees the company's global marketing strategy, covering its industry-leading observability, database, and service management solutions.SolarWinds is a leading IT management software provider that helps businesses monitor and manage their IT infrastructure, applications, and networks. Known for its user-friendly and scalable solutions, SolarWinds serves a broad range of industries, focusing on identifying and resolving IT challenges. SolarWinds continues to deliver solutions that empower IT professionals to maintain reliable and secure environments.In today's show, Alan and Brian dive into cybersecurity, discussing SolarWinds and the solutions they offer. They examine the major cybersecurity incident that impacted both the company and the industry and how SolarWinds successfully recovered from it. Additionally, they explore what marketing looks like at SolarWinds, how the role of CMO has evolved, and what we should consider about the future of this role.In this episode, you'll learn:Insights for successfully recovering from a massive cyberattackTips for creating a strong marketing structureThe profile of the modern CMO and how it has evolvedKey Highlights:[01:15] Brush with fame on a game show[03:08] Career path to CMO at SolarWinds[05:29] Story behind Kubernetes [07:23] Scope of SolarWinds[10:39] Recovering from a massive cyberattack[14:25] How marketing is structured at SolarWinds[15:52] What CMO role should be focused on[17:56] How the CMO role interacts with the rest of the team [21:20] “Lack of novelty is not a bad thing”[27:30] An experience from your past that defines you[30:24] Advice to your younger self[31:36] A topic that you and other marketers need to learn more about[33:11] Trends or subcultures others should follow[36:30] OOH Advertising's impact internally [37:30] Largest opportunity or threat to marketers todayLooking for more?Visit our website for the full show notes, links to resources mentioned in this episode, and ways to connect with the guest! Become a member today and listen ad-free, visit https://plus.acast.com/s/marketingtoday. Hosted on Acast. See acast.com/privacy for more information.
International law enforcement takes down the MATRIX messaging platform. SailPoint discloses a critical vulnerability in its IdentityIQ platform. A Solana library has been backdoored. SolarWinds discloses a critical vulnerability in its Platform product. Researchers identify 16 zero-day vulnerabilities in Fuji Electric's remote monitoring software. Cisco urges users to patch a decade-old vulnerability. CISA warns of active exploitation of Zyxel firewall devices. A critical XSS vulnerability has been identified in MobSF. Google's December 2024 Android security update addresses 14 high-severity vulnerabilities. The Federal Trade Commission settles with data brokers over alleged consent violations. On today's CertByte segment, Chris Hare and Dan Neville break down a question targeting the A+ Core (220-1101) Exam 1 certification. A vodka company gets iced by ransomware. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K's suite of industry-leading certification resources, and a study tip to help you achieve the professional certifications you need to fast-track your career growth in IT, cyber security, or project management. This week, Chris is joined by Dan Neville breaking down a question targeting the A+ Core (220-1101) Exam 1 certification. Today's question comes from N2K's CompTIA® A+ Core Exam 1 Practice Test (Core Exam 2 Practice Test is also available on our site). Have a question that you'd like to see covered? Email us at certbyte@n2k.com. Check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers. Additional sources: www.comptia.org Selected Reading International Operation Dismantles MATRIX: A Sophisticated Encrypted Messaging Service (SOCRadar) German Police Shutter Country's Largest Dark Web Market (Infosecurity Magazine) 10/10 directory traversal bug hits SailPoint's IdentityIQ (The Register) Solana Web3.js Library Backdoored in Supply Chain Attack (SecurityWeek) SolarWinds Platform XSS Vulnerability Let Attackers Inject Malicious Code (Cyber Security News) 16 Zero-Days Uncovered in Fuji Electric Monitoring Software (GovInfo Security) Cisco Urges Immediate Patch for Decade-Old WebVPN Vulnerability (Hackread) VulnerabilitiesCISA Warns of Zyxel Firewall Vulnerability Exploited in Attacks (SecurityWeek) U.S. CISA adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog (SecurityAffairs) MobSF XSS Vulnerability Let Attackers Inject Malicious Scripts (GB Hacker) Android's December 2024 Security Update Patches 14 Vulnerabilities (SecurityWeek) FTC accuses data brokers of improperly selling location info (The Register) Vodka Giant Stoli Files for Bankruptcy After Ransomware Attack (Infosecurity Magazine) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Negotiate Anything: Negotiation | Persuasion | Influence | Sales | Leadership | Conflict Management
Want to share your thoughts? Fill out our listener form Request A Customized Workshop For Your Company Join us for an insightful episode of "Negotiate Anything" with host Kwame Christian and guest Jennifer Zador, General Counsel at PlanSource. Jennifer shares her unique experiences navigating high-stakes negotiations during cybersecurity crises, including the infamous SolarWinds incident. She provides invaluable tips on maintaining confidence, clear communication, and self-care under pressure, drawing from her extensive career and personal life. This episode is a must-listen for anyone looking to improve their negotiation skills, especially in the context of crisis management. What will be covered: The SolarWinds cybersecurity crisis and its impact on business and government clients. The importance of clear, concise, and transparent communication in high-stakes negotiations. Self-care practices that help maintain mental and emotional stability during crises. Follow Jennifer Zador on LinkedIn Contact ANI Request A Customized Workshop For Your Company Follow Kwame Christian on LinkedIn The Ultimate Negotiation Guide Click here to buy your copy of How To Have Difficult Conversations About Race! Click here to buy your copy of Finding Confidence in Conflict: How to Negotiate Anything and Live Your Best Life! What's in it for you? Exclusive Advice: Gain insights from top negotiation experts. Community Support: Connect with a like-minded community focused on growth. Personal & Professional Growth: Unlock strategies to enhance every aspect of your life. You deserve to negotiate more of the best things in life, and now you can! Don't wait—be the first in line to experience this game-changing resource.
Apple proposes 45-day maximum certificate life. SEC fines four companies for downplaying their SolarWinds attack severity. Google adds 5 new features to Messenger including inappropriate content. Does AI-driven local device-side filtering resolve the encryption dilemma forever? The very nice looking "Session" messenger leaves Australia for Switzerland. Another quick look at the question of the EU's software liability moves. Fake North Korean employees WERE found to install backdoor malware. How to speed up an SSD without using SpinRite. Using ChatGPT to review and suggest improvements in code. And Internet governance has been trying to move the Internet to IPv6 for the past 25 years, but the Internet just doesn't want to go. Why not? And will it ever? Show Notes - https://www.grc.com/sn/SN-998-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT e-e.com/twit threatlocker.com for Security Now 1password.com/securitynow
Apple proposes 45-day maximum certificate life. SEC fines four companies for downplaying their SolarWinds attack severity. Google adds 5 new features to Messenger including inappropriate content. Does AI-driven local device-side filtering resolve the encryption dilemma forever? The very nice looking "Session" messenger leaves Australia for Switzerland. Another quick look at the question of the EU's software liability moves. Fake North Korean employees WERE found to install backdoor malware. How to speed up an SSD without using SpinRite. Using ChatGPT to review and suggest improvements in code. And Internet governance has been trying to move the Internet to IPv6 for the past 25 years, but the Internet just doesn't want to go. Why not? And will it ever? Show Notes - https://www.grc.com/sn/SN-998-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT e-e.com/twit threatlocker.com for Security Now 1password.com/securitynow
Apple proposes 45-day maximum certificate life. SEC fines four companies for downplaying their SolarWinds attack severity. Google adds 5 new features to Messenger including inappropriate content. Does AI-driven local device-side filtering resolve the encryption dilemma forever? The very nice looking "Session" messenger leaves Australia for Switzerland. Another quick look at the question of the EU's software liability moves. Fake North Korean employees WERE found to install backdoor malware. How to speed up an SSD without using SpinRite. Using ChatGPT to review and suggest improvements in code. And Internet governance has been trying to move the Internet to IPv6 for the past 25 years, but the Internet just doesn't want to go. Why not? And will it ever? Show Notes - https://www.grc.com/sn/SN-998-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT e-e.com/twit threatlocker.com for Security Now 1password.com/securitynow
Apple proposes 45-day maximum certificate life. SEC fines four companies for downplaying their SolarWinds attack severity. Google adds 5 new features to Messenger including inappropriate content. Does AI-driven local device-side filtering resolve the encryption dilemma forever? The very nice looking "Session" messenger leaves Australia for Switzerland. Another quick look at the question of the EU's software liability moves. Fake North Korean employees WERE found to install backdoor malware. How to speed up an SSD without using SpinRite. Using ChatGPT to review and suggest improvements in code. And Internet governance has been trying to move the Internet to IPv6 for the past 25 years, but the Internet just doesn't want to go. Why not? And will it ever? Show Notes - https://www.grc.com/sn/SN-998-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT e-e.com/twit threatlocker.com for Security Now 1password.com/securitynow
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Delta's Lawsuit, SEC Penalties, and Fortinet's Zero-Day Exploit In this episode, hosts Jerry Bell and Andrew Kellett discuss current cybersecurity issues, starting with Delta Air Lines' $500 million lawsuit against CrowdStrike over an IT outage and data breach. They explore SEC penalties imposed on tech companies for downplaying the SolarWinds hack's impact, followed by an … Continue reading Select Defensive Security Podcast Episode 284 →
NotLockBit mimics its namesake while targeting macOS. Symantec uncovers popular mobile apps with hardcoded credentials. Avast releases a Mallox ransomware decryptor. Akira ransomware reverts to tactics tried and true. Lawmakers ask the DOJ to prosecute tax prep firms for privacy violations. The SEC levies fines for misleading disclosures following the SolarWinds breach. Software liability remains a sticky issue. Updated guidance reiterates the feds' commitment to the Traffic Light Protocol. A task force has cybersecurity recommendations for the next U.S. president. Today's guest is Jérôme Segura, Sr. Director of Research at Malwarebytes, sharing their work on "Scammers advertise fake AppleCare+ service via GitHub repos." Warrantless surveillance, powered by your favorite apps. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today's guest is Jérôme Segura, Sr. Director of Research at Malwarebytes, sharing their work on "Scammers advertise fake AppleCare+ service via GitHub repos." You can learn more about this research here. Selected Reading NotLockBit Ransomware Can Target macOS Devices (SecurityWeek) Millions of iOS and Android Users at Risk as Popular Apps Expose Cloud Keys (Hackread) Mallox Ransomware Flaw Let Victims Recover Files Without Ransom Payment (Cyber Security News) Akira ransomware pivots back to double extortion, C++ code (SC Media) Lawmakers ask DOJ to prosecute tax prep firms for sharing customer data with big tech (The Record) SEC fines four companies $7M for 'misleading cyber disclosures' regarding SolarWinds hack (TechCrunch) The struggle for software liability: Inside a ‘very, very, very hard problem' (The Record) US Government Pledges to Cyber Threat Sharing Via TLP Protocol (Infosecurity Magazine) Task force unveils cyber recommendations for the next president (CyberScoop) The Global Surveillance Free-for-All in Mobile Ad Data (Krebs on Security) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: SEC fines tech firms for downplaying the Solarwinds hacks Anonymous Sudan still looks and quacks like a Russian duck Apple proposes max 10 day TLS certificate life Oopsie! Microsoft loses a bunch of cloud logs Veeam and Fortinet are bad and should feel bad North Koreans are good (at hacking) And much, much more. This week's episode is sponsored by Proofpoint. Chief Strategy Officer Ryan Kalember joins to talk about their work keeping up with prolific threat actor SocGholish. This episode is also available on Youtube. Show notes Four cyber companies fined for SolarWinds disclosure failures U.S. charges Sudanese men with running powerful cyberattack-for-hire gang Hacker Charged With Seeking to Kill Using Cyberattacks on Hospitals | WIRED Risky Biz News: Anonymous Sudan's Russia Links Are (Still) Obvious Microsoft confirms partial loss of security log data on multiple platforms | Cybersecurity Dive Risky Biz News: Apple wants to reduce the lifespan of TLS certificates to 10 days Encrypted Chat App ‘Session' Leaves Australia After Visit From Police Crypto platform Radiant Capital says $50 million in digital coins stolen following account compromises North Korean hackers use newly discovered Linux malware to raid ATMs - Ars Technica Brazil Arrests ‘USDoD,' Hacker in FBI Infragard Breach – Krebs on Security Here's how SIM swap in alleged bitcoin pump-and-dump scheme worked - Ars Technica Critical Veeam CVE actively exploited in ransomware attacks | Cybersecurity Dive FortiGate admins report active exploitation 0-day. Vendor isn't talking. - Ars Technica Hackers reportedly impersonate cyber firm ESET to target organizations in Israel The latest in North Korea's fake IT worker scheme: Extorting the employers
The SolarWinds have returned to haunt four cybersecurity companies who tried to hide their breaches and ended up with their trousers around their ankles, and North Korea succeeds in getting one of its IT workers hired... but what's their plan?All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley and Carole Theriault.Warning: This podcast may contain nuts, adult themes, and rude language.Episode links:SolarWinds Sunburst supply chain attack - Wikipedia.Rep. Katie Porter slams SolarWinds for its poor passwords - Twitter.SEC Charges Four Companies With Misleading Cyber Disclosures - SEC.Western firm hacked by North Korean cybercriminal hired as remote IT worker - Computing.Engaging with a Remote Workforce: Statistics and Strategies for Success - Government Events.67% Of U.S. Employers To Lose Employees To Remote Work In 2024 - Forbes.A company's remote-working hire turns out to be in North Korea. He tried to hold it to ransom - Business Insider.US company accidentally hires North Korean for remote work, gets blackmailed when they try to fire him - IBTimes.Watch “Undercover: Exposing the Far Right” - Channel 4.Undercover film exposing UK far-right activists pulled from London festival - The Guardian.Kermode and Mayo's Take - YouTube.The Fear of God: 25 Years of the Exorcist – BBC iPlayer.Smashing Security merchandise (t-shirts, mugs, stickers and stuff)Sponsored by:1Password Extended Access Management – Secure every sign-in for every app on every device.Vanta – Expand the scope of your security program with market-leading compliance automation… while saving time and money. Smashing Security listeners get $1000...
This week’s Network Break discusses a CISA warning that a serious SolarWinds vulnerability is being exploited, Microsoft turns the tables by discovering a MacOS vulnerability, and Amazon invests in small modular nuclear reactors to meet growing power demands and reduce carbon output. T-Mobile releases a new device using the 5G Reduced Capacity spec, Palo Alto... Read more »
Authorities arrest over 200 Chinese nationals in Sri Lanka over financial scams. Officials in Finland take down an online drug market. Cisco investigates an alleged data breach. A major apparel provider suffers a data breach. Oracle's latest patch update includes 35 critical issues. Microsoft has patched several high-severity vulnerabilities. The NCSC's new boss calls for global collaboration to fight cybercrime. CISA warns of critical vulnerabilities affecting software from Microsoft, Mozilla, and SolarWinds.Hackers steal data from Verizon's push-to-talk (PTT) system. On our CertByte segment, Chris Hare is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K's Microsoft Azure Administrator (AZ-104) Practice Test. Robot vacuums go rogue. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CertByte Segment Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from our suite of industry-leading content and a study tip to help you achieve the professional certifications you need to fast-track your career growth. In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K's Microsoft Azure Administrator (AZ-104) Practice Test. Candidates for the Microsoft Azure Administrator exam are Azure Administrators who manage cloud services that span storage, security, networking, and compute cloud capabilities. Candidates should be proficient in using PowerShell, the Command Line Interface, Azure Portal, ARM templates, operating systems, virtualization, cloud infrastructure, storage structures, and networking. Have a question that you'd like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K's full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers. Reference: Microsoft Azure Blog > Virtual Machines > Gain business insights using Power BI reports for Azure Backup Selected Reading Sri Lankan Police Arrest Over 200 Chinese Scammers (BankInfo Security) Finnish Customs closed down the Sipulitie marketplace on the encrypted Tor network (Finnish Customs) Cisco investigates breach after stolen data for sale on hacking forum (Bleeping Computer) Varsity Brands Data Breach Impacts 65,000 People (SecurityWeek) Oracle October 2024 Critical Patch Update Addresses 198 CVEs (Security Boulevard) Microsoft Patches Vulnerabilities in Power Platform, Imagine Cup Site (SecurityWeek) 'Nationally significant' cyberattacks are surging, warns the UK's new cyber chief (The Record) CISA Warns of Three Vulnerabilities Actively Exploited in the Wild (Cyber Security News) Hackers Advertise Stolen Verizon Push-to-Talk ‘Call Logs' (404 Media) Hackers took over robovacs to chase pets and yell slurs (The Verge) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
The FBI and CISA dismiss false claims of compromised voter registration data. The State Department accuses RT of running global covert influence operations. Chinese hackers are suspected of targeting a Pacific Islands diplomatic organization. A look at Apple's Private Cloud Compute system. 23andMe will pay $30 million to settle a lawsuit over a 2023 data breach. SolarWinds releases patches for vulnerabilities in its Access Rights Manager. Browser kiosk mode frustrates users into giving up credentials. Brian Krebs reveals the threat of growing online “harm communities.” Our guest is Elliot Ward, Senior Security Researcher at Snyk, sharing insights on prompt injection attacks. How theoretical is the Dead Internet Theory? Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Elliot Ward, Senior Security Researcher at Snyk, sharing insights on their recent work "Agent Hijacking: the true impact of prompt injection attacks." Selected Reading FBI tells public to ignore false claims of hacked voter data (Bleeping Computer) Russia's RT news agency has ‘cyber operational capabilities,' assists in military procurement, State Dept says (The Record) The Dark Nexus Between Harm Groups and ‘The Com' (Krebs on Security) China suspected of hacking diplomatic body for Pacific islands region (The Record) Apple Intelligence Promises Better AI Privacy. Here's How It Actually Works (WIRED) Apple seeks to drop its lawsuit against Israeli spyware pioneer NSO (Washington Post) 23andMe settles data breach lawsuit for $30 million (Reuters) SolarWinds Patches Critical Vulnerability in Access Rights Manager (SecurityWeek) Malware locks browser in kiosk mode to steal Google credentials (Bleeping Computer) Is anyone out there? (Prospect Magazine) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
The fallout from the SolarWinds intrusion took a new turn with the U.S. Securities and Exchange Commission's (SEC) decision to file a cybersecurity-related enforcement action against the SolarWinds corporation and its Chief Information Security Officer (CISO), Timothy G. Brown, in October of 2023. But In July, District Court Judge Paul A. Engelmayer dismissed a number of charges in the SEC's complaint against SolarWinds and Brown. To talk about this significant development in the case, Stephanie Pell, Lawfare Senior Editor and Brookings Fellow, sat down with Shoba Pillay, a partner at Jenner & Block and a former federal prosecutor, and Jennifer Lee, also a partner at Jenner & Block and a former Assistant Director in the SEC's Division of Enforcement. They discussed the court's rationale for allowing some charges to stand, while dismissing others, what stood out most in the dismissal of the case, and how this case may shape the SEC's cybersecurity enforcement actions in the future.To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also support Lawfare by making a one-time donation at https://givebutter.com/c/trumptrials.Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
President Biden meets with leaders of the largest economies at the G7 Summit in Italy where they'll discuss the world's most pressing issues including the wars in Ukraine and Gaza. Mediators are working to close a ceasefire deal in Gaza after Hamas proposed amendments to the US backed proposal. And, Microsoft's president is testifying before the House Homeland Security Committee as ProPublica publishes an investigation into the company's security practices around 2020's SolarWinds cyber hack.Want more comprehensive analysis of the most important news of the day, plus a little fun? Subscribe to the Up First newsletter.Today's episode of Up First was edited by Roberta Rampton, Hannah Bloch, Alice Woelfle, and Mohamad ElBardicy. It was produced by Ziad Buchh, Ben Abrams and Lindsay Totty. Our technical director is Zac Coleman, with engineering support from Arthur Laurent.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy