POPULARITY
Ever heard the title "Vicar of Christ" tossed around and wondered, wait... what does that actually mean? Vicar - Why It’s a Big Deal) Patrick explains the Latin word "Vicarius." It basically means “second in command” or “chief steward.” Think: the right-hand man or the chief of staff... someone who acts with the authority of the king when the king’s not present. So, when Catholics say the Pope is the Vicar of Christ, they’re not saying he replaces Jesus. They're saying he represents Jesus on Earth as the one appointed to shepherd the Church in Christ’s name. From Simon to Peter Then we jump to the moment in Matthew 16. Jesus asks, “Who do you say I am?” and Simon (not known for being shy) replies, “You are the Christ!” Jesus blesses him, gives him a new name: “Peter” (from the Aramaic Cephas, meaning “rock”), and tells him: "I give you the keys to the Kingdom of Heaven. What you bind on earth shall be bound in heaven..." Translation: Peter is in charge. Not as a mere administrator, but as the earthly steward of Christ’s kingdom. Patrick makes it crystal clear: This is where the Vicar of Christ idea begins. Isaiah 22: Old Testament Prime Minister Patrick connects Matthew 16 to Isaiah 22, where a guy named Eliakim is appointed as the royal steward in the Davidic Kingdom. He's given a robe, a sash, and the keys of the house of David. Sound familiar? The verse literally says: "He shall open, and none shall shut; he shall shut, and none shall open." So, Peter’s role is like Eliakim’s: the one with real authority, not just among equals, but over the whole household. Christ Is the Head. The Pope Is His Vicar Christ is always the true head of the Church: ontologically and spiritually. But on Earth, He entrusted Peter (and his successors, the popes) to lead, guide, and protect the flock. So, when we say, “Vicar of Christ,” we’re affirming: -Biblical roots (Matthew 16 & Isaiah 22) -Historical continuity (Peter and beyond) -Spiritual authority (rooted in Jesus Himself) Bonus: Pope Fiction Patrick gives a plug for his book, Pope Fiction, which talks about this exact topic and busts myths left and right. (Worth a read if you're tired of TikTok theology.)
Genomineerd voor de ThrillZone Awards 2024 Uitgegeven door LuisterEffect Spreker: Eltjo Herder
W tym odcinku podcastu goszczę współtwórcę i współzarządzającego jednym z najlepszych narzędzi do zarządzania kancelarią prawną - i mam na myśli system Mecenas.iT - Krzysztofa Ogorzałka.Podczas naszej rozmowy mój wspaniały gość opowiadał o tym, jak powstał Mecenas.iT, czym się wyróżnia na polskim rynku prawniczym, dlaczego jest godnym zaufania partnerem dla kancelarii prawnej, itp.Ale to, co wydaje mi się najcenniejsze w naszej rozmowie, to wątek, który dotyczy tego, jak dokonać prawidłowego wyboru systemu do zarządzania kancelarią prawną, jak go wdrożyć i jak przełamywać problemy, które na początku korzystania z takiego narzędzia niechybnie się pojawią w każdej kancelarii.Jeśli nie korzystasz jeszcze z żadnego podobnego narzędzia, albo zamierzasz zmienić to, z którego obecnie korzystasz - bez względu na to, czy będzie to Mecenas.iT, czy np. Vicarius e-Kancelaria - powinieneś posłuchać tego, co radzi Krzysztof Ogorzałek - mój dzisiejszy gość. Z tego docinka podcastu dowiesz się również tego, co Krzysztof robi ważnego dla innych ludzi, dla ich zdrowia i bezpieczeństwa. Obiecuję, że będziesz zaskoczony!Zapraszam Cię więc do posłuchania tego odcinka podcastu W drodze do kancelarii!Rafał
Oleria, Vicarius, and Secret Double Octopus raise funding (NOTE: Secret Double Octopus is a real company that chose Secret Double Octopus as their name, I'm making none of this up). Rumors about Zscaler's next 9-digit acquisition, 2 new security vendors and demystifying public cybersecurity companies. Chrome gets AI features, security teams have TOO much data, and a new threat intel database from Wiz. Is bootstrapping a cybersecurity startup a realistic option? Finally, remember Furbies? NSA's furby docs just dropped, and they are HILARIOUS. Thanks to Jason Koebler from 404Media for that. Show Notes: https://securityweekly.com/esw-347
Oleria, Vicarius, and Secret Double Octopus raise funding (NOTE: Secret Double Octopus is a real company that chose Secret Double Octopus as their name, I'm making none of this up). Rumors about Zscaler's next 9-digit acquisition, 2 new security vendors and demystifying public cybersecurity companies. Chrome gets AI features, security teams have TOO much data, and a new threat intel database from Wiz. Is bootstrapping a cybersecurity startup a realistic option? Finally, remember Furbies? NSA's furby docs just dropped, and they are HILARIOUS. Thanks to Jason Koebler from 404Media for that. Show Notes: https://securityweekly.com/esw-347
We interview the co-founder and CTO of Fleet to understand why good, cross platform MDM/EMM has been such a challenge for so many years. Want good Windows device management? You're probably going to compromise on MacOS management. Ditto for Windows if you prioritize your Macs. Want good Linux device management? It doesn't exist. Hopefully, Fleet can change all that in 2024, as they aim to complete their support for all major platforms, using the open source OSQuery project as their base. Segment Resources: Zach's GitHub Zach's Conf42 DevSecOps Presentation on Securing the endpoint with open source software GopherCon 2022: Collect First, Ask Questions Later Glitches in the Matrix, or Taming Agent Chaos Oleria, Vicarius, and Secret Double Octopus raise funding (NOTE: Secret Double Octopus is a real company that chose Secret Double Octopus as their name, I'm making none of this up). Rumors about Zscaler's next 9-digit acquisition, 2 new security vendors and demystifying public cybersecurity companies. Chrome gets AI features, security teams have TOO much data, and a new threat intel database from Wiz. Is bootstrapping a cybersecurity startup a realistic option? Finally, remember Furbies? NSA's furby docs just dropped, and they are HILARIOUS. Thanks to Jason Koebler from 404Media for that. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-347
We interview the co-founder and CTO of Fleet to understand why good, cross platform MDM/EMM has been such a challenge for so many years. Want good Windows device management? You're probably going to compromise on MacOS management. Ditto for Windows if you prioritize your Macs. Want good Linux device management? It doesn't exist. Hopefully, Fleet can change all that in 2024, as they aim to complete their support for all major platforms, using the open source OSQuery project as their base. Segment Resources: Zach's GitHub Zach's Conf42 DevSecOps Presentation on Securing the endpoint with open source software GopherCon 2022: Collect First, Ask Questions Later Glitches in the Matrix, or Taming Agent Chaos Oleria, Vicarius, and Secret Double Octopus raise funding (NOTE: Secret Double Octopus is a real company that chose Secret Double Octopus as their name, I'm making none of this up). Rumors about Zscaler's next 9-digit acquisition, 2 new security vendors and demystifying public cybersecurity companies. Chrome gets AI features, security teams have TOO much data, and a new threat intel database from Wiz. Is bootstrapping a cybersecurity startup a realistic option? Finally, remember Furbies? NSA's furby docs just dropped, and they are HILARIOUS. Thanks to Jason Koebler from 404Media for that. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-347
Recently, Pope Francis sent a message of praise to the World Economic Forum and its founder, Klaus Schwab. The Vicar of the Roman Catholic Church did not mention anything about Christianity but instead, highlighted the role of the WEF in the global future. Could this be an endorsement for the worldwide replacement of legacy government and religious tenets that point to the Grand Imperial Cult of the Antichrist? We would be wise to recognize the patterns of domination and resist it before the Invisible Hand has us by the throat, Tonight on Ground Zero, Clyde Lewis talks with radio host, David Knight about VICARIUS FILII DEI - TOMORROW IS ANOTHER DOOMSDAY. Listen Live: https://groundzero.radio Archived Shows: https://aftermath.media
Zostaw świat za sobą i dołącz do Bibliotekarium. START 00:00:00 Filmotekarium i Zostaw świat za sobą 00:03:11 Słowne interludium 00:37:44 Piotr Wiśniewski - Vicarius (czyta Marek Sęk "Ivellios") 00:39:51 Słowne interludium 03:21:02 Sentymentalnik i serial Wakacje z duchami 03:22:11 Słowo na dobranoc 03:46:46
Welcome to another episode of Category Visionaries — the show that explores GTM stories from tech's most innovative B2B founders. In today's episode, we're speaking with Michael Assraf, CEO & Co-Founder of Vicarius, a vulnerability remediation platform that has raised $29 Million in funding. Here are the most interesting points from our conversation: Hands-On Leadership: Despite leading a company of 50 people, Michael still writes code, emphasizing the importance of staying connected to the product. Military Influence: Michael attributes much of his entrepreneurial drive and problem-solving skills to his experience in the Israeli military, where young people are given significant responsibilities. Founding Story: Vicarius was inspired by Michael's early fascination with computers and his co-founder's experience in cybersecurity. They aimed to solve big problems in vulnerability remediation. Product Overview: Vicarius Topia integrates vulnerability scanning, prioritization, remediation, and automation into a single platform, streamlining processes that are typically handled by multiple products. Community Focus: The V Society community is a growing initiative that invites IT admins and security engineers to collaborate and share vulnerability remediation strategies, moving towards a crowdsourced approach. PLG Strategy: Vicarius has embraced a Product-Led Growth (PLG) approach, focusing on making their product accessible and easy to use, with significant reliance on user feedback to continuously improve the product. // Sponsors: Front Lines — We help B2B tech companies launch, manage, and grow podcasts that drive demand, awareness, and thought leadership. www.FrontLines.io The Global Talent Co. — We help tech startups find, vet, hire, pay, and retain amazing marketing talent that costs 50-70% less than the US & Europe. www.GlobalTalent.co
In der Nachmittagsfolge sprechen wir heute mit Daniella Moll, Country Manager DACH von Sencrop, über die Finanzierungsrunde in Höhe von 18 Millionen US-Dollar. Sencrop hat mit 20.000 Wetterstationen das nach eigenen Angaben größte vernetzte agrarmeteorologische Datennetzwerk in Europa aufgebaut. Mit einer datengesteuerten Präzisions-Applikation ermöglicht das AgrarTech Startup mehr als 20.000 Landwirten eine pflanzenbezogene Sicht auf die ultralokalen Wetterbedingungen, Krankheits- und Schädlingsrisiken und ihren Bewässerungsbedarf. Sencrop versetzt Landwirte dadurch in die Lage, bessere pflanzenbauliche Entscheidungen zu treffen und so ihre Anbaurisiken zu verringern. Zu den deutschen Kunden des landwirtschaftlichen Tech-Startups zählen wichtige landwirtschaftliche Beratungsinstitutionen der Offizial- und Landberatungen, wie beispielsweise der Bio-Kartoffelverband Oberbayern, Beratungsring Ackerbau Rheinhessen/Pfalz, der Beratungsring Westküste in Schleswig-Holstein, die Universität Bonn und der Bio Innovation Park sowie führende Landmaschinenhandelsunternehmen wie NewTec, Landtechnik Steigra, das Technik Center Alpen (TCA) und mehrere Bewässerungsunternehmen. Sencrop wurde 2016 von Michael Bruniaux und Martin Ducroquet in Lille gegründet. Das französische Startup hat nun in einer Series-B-Finanzierungsrunde 18 Millionen US-Dollar eingesammelt. Der israelische Risikokapitalgeber JVP, der seit 1993 in über 150 Unternehmen investiert hat, darunter Inshur, Control Up, Earnix, Quali, Pyramid, Analytics, Morphisec, Centrical, Anyclip, Leadspace, Nanit, Teridion, 1touch.io, Agrint, Dealhub, Innovopro, Ionir, Opora, SecBI, Upsolver, Vicarius, Valid Network oder Wishi, übernimmt bei der Finanzierung den Lead. Insgesamt hat der VC aus Israel 1,6 Milliarden US-Dollar für die Portfoliounternehmen aufgebracht und 12 Börsengänge begleitet. IT Food, Stellar Impact, IRD Management, BPIfrance, Demeter IM und NCI Waterstart haben sich ebenfalls an der Serie B beteiligt. Mit dem frischen Kapital möchte Sencrop seine Mikroklimatechnologie in Nordamerika und auf den übrigen Weltmärkten einführen.
Finally, in the Enterprise Security News, Securonix raises $1B in Vista-led round (it's like they ate a unicorn!), Salt Security becomes a Unicorn, has not been eaten (yet), Legit Security raises a totally legit $26.5M Series A, Vicarius and Calamu raise Series As ,Permit.io, KSOC, Titaniam, Canonic Security, Allure Security, and SecureThings all pick up seed funding! We look at Big Tech's cybersecurity funding and acquisitions, The rumor mill goes nuts over a Cisco/Splunk deal that's probably not happening (maybe?) Why are cybersecurity asset management startups so hot right now? New products, unhelpful legislation, a major acquisition, & of course a few squirrel stories! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw261
Finally, in the Enterprise Security News, Securonix raises $1B in Vista-led round (it's like they ate a unicorn!), Salt Security becomes a Unicorn, has not been eaten (yet), Legit Security raises a totally legit $26.5M Series A, Vicarius and Calamu raise Series As ,Permit.io, KSOC, Titaniam, Canonic Security, Allure Security, and SecureThings all pick up seed funding! We look at Big Tech's cybersecurity funding and acquisitions, The rumor mill goes nuts over a Cisco/Splunk deal that's probably not happening (maybe?) Why are cybersecurity asset management startups so hot right now? New products, unhelpful legislation, a major acquisition, & of course a few squirrel stories! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw261
This week, we welcome Mitja Kolsek, Founder, CEO at ACROS Security, to talk about 0patch - Security Patching That Doesn't Make Your Life Miserable! In the next segment, we welcome Vikram Asnani, Sr Director Solution Architecture at CyberGRX, to discuss Changing the TPCRM Game W/ Cyber Risk Intelligence Tools! In the Enterprise Security News, Securonix raises $1B in Vista-led round (it's like they ate a unicorn!), Salt Security becomes a Unicorn, has not been eaten (yet), Legit Security raises a totally legit $26.5M Series A, Vicarius and Calamu raise Series As,Permit.io, KSOC, Titaniam, Canonic Security, Allure Security, and SecureThings all pick up seed funding! We look at Big Tech's cybersecurity funding and acquisitions, The rumor mill goes nuts over a Cisco/Splunk deal that's probably not happening (maybe?) Why are cybersecurity asset management startups so hot right now? New products, unhelpful legislation, a major acquisition, & of course a few squirrel stories! Show Notes: https://securityweekly.com/esw261 Segment Resources: 0patch Blog with many posts on vulnerabilities and patches we make https://blog.0patch.com/ 0patch FAQ https://0patch.zendesk.com/hc/en-us/categories/200441471 https://www.cybergrx.com/resources/research-and-insights/blog/beyond-risk-management-how-cyber-risk-intelligence-tools-are-changing-the-tpcrm-game Visit https://securityweekly.com/cybergrx to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Mitja Kolsek, Founder, CEO at ACROS Security, to talk about 0patch - Security Patching That Doesn't Make Your Life Miserable! In the next segment, we welcome Vikram Asnani, Sr Director Solution Architecture at CyberGRX, to discuss Changing the TPCRM Game W/ Cyber Risk Intelligence Tools! In the Enterprise Security News, Securonix raises $1B in Vista-led round (it's like they ate a unicorn!), Salt Security becomes a Unicorn, has not been eaten (yet), Legit Security raises a totally legit $26.5M Series A, Vicarius and Calamu raise Series As,Permit.io, KSOC, Titaniam, Canonic Security, Allure Security, and SecureThings all pick up seed funding! We look at Big Tech's cybersecurity funding and acquisitions, The rumor mill goes nuts over a Cisco/Splunk deal that's probably not happening (maybe?) Why are cybersecurity asset management startups so hot right now? New products, unhelpful legislation, a major acquisition, & of course a few squirrel stories! Show Notes: https://securityweekly.com/esw261 Segment Resources: 0patch Blog with many posts on vulnerabilities and patches we make https://blog.0patch.com/ 0patch FAQ https://0patch.zendesk.com/hc/en-us/categories/200441471 https://www.cybergrx.com/resources/research-and-insights/blog/beyond-risk-management-how-cyber-risk-intelligence-tools-are-changing-the-tpcrm-game Visit https://securityweekly.com/cybergrx to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Hola a todos una semana más, en este episodio os traemos de nuevo todas nuestras secciones ya habituales como "A que hemos jugado" y "Diario de desarrollo". Y en el apartado de actualidad hablamos de que NIntendo nos traerá una nueva consola para antes de 2030 Vicarius Vision cambia de nombre por imposición de Activision-Blizzard. Y esta semana continuamos el debate con lo bueno de Nintendo "la vieja guardia y los nombres nuevos dentro de la empresa". Pasad un buen fin de semana y hasta la semana que viene. Síguenos en nuestras redes sociales como Bloozerial Games. Twitter: @bloozerial Instagram: Bloozerial Games
Vicario: Del latin Vicarius. Es cuando una persona sustituye a otra por tiempo indefinido o determinado para ejercer sus funciones en todo o por parte delegada pero nunca por carácter propio. Es una palabra llana. ¡Continua aquí en Construye Tu Léxico! --- Send in a voice message: https://anchor.fm/construye-tu-lexico/message
This week, in the Enterprise Security News, Beyond Security partners with Vicarius, Amazon’s Parler removal and what it means for cloud confidence, Kount sold to Equifax, McAfee vs Crowdstrike, Jumpcloud raises some funds, Red Hat Acquires StackRox, and SolarWinds warnings of weak security and more. In the second segment, we talk Asset Management, Could this be the year we get a better handle on discovering and managing assets? In the final segment, we welcome Chris Blask from Unisys for an interview! Show Notes: https://securityweekly.com/esw213 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, in the Enterprise Security News, Beyond Security partners with Vicarius, Amazon’s Parler removal and what it means for cloud confidence, Kount sold to Equifax, McAfee vs Crowdstrike, Jumpcloud raises some funds, Red Hat Acquires StackRox, and SolarWinds warnings of weak security and more. In the second segment, we talk Asset Management, Could this be the year we get a better handle on discovering and managing assets? In the final segment, we welcome Chris Blask from Unisys for an interview! Show Notes: https://securityweekly.com/esw213 Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Beyond Security partners with Vicarius, Amazon’s Parler removal and what it means for Cloud onfidence, Kount sold to Equifax, McAfee vs Crowdstrike, JumpCloud raises some funds, Red Hat acquires StackRox, and SolarWinds warnings of weak security and more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw213
This week, Beyond Security partners with Vicarius, Amazon’s Parler removal and what it means for Cloud onfidence, Kount sold to Equifax, McAfee vs Crowdstrike, JumpCloud raises some funds, Red Hat acquires StackRox, and SolarWinds warnings of weak security and more! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw213
This week, Clayton Fields & Michael Assraf from Vicarius join us to discuss The Good, The Bad and The Ugly sides of Automated Vulnerability Remediation! Ming Chow on Infosec Careers, Data Privacy, the Cloud Solution (or not), and DevOps! In the Security News, Nissan Source Code Leaked Online, Ticketmaster fined $10 million for breaking into rival’s systems, The Great iPwn, The Great Suspender, the Shady Zero-Day Sales Game, create your own encryption in Python, and using Google to hack Google! Show Notes: https://securityweekly.com/psw679 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Clayton Fields & Michael Assraf from Vicarius join us to discuss The Good, The Bad and The Ugly sides of Automated Vulnerability Remediation! Ming Chow on Infosec Careers, Data Privacy, the Cloud Solution (or not), and DevOps! In the Security News, Nissan Source Code Leaked Online, Ticketmaster fined $10 million for breaking into rival’s systems, The Great iPwn, The Great Suspender, the Shady Zero-Day Sales Game, create your own encryption in Python, and using Google to hack Google! Show Notes: https://securityweekly.com/psw679 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
The way we identify, prioritize, and mitigate software vulnerabilities was built in the reverse order. Why did it happen? Could a new remediation strategy finally form an alliance between IT and security teams? This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw679
The way we identify, prioritize, and mitigate software vulnerabilities was built in the reverse order. Why did it happen? Could a new remediation strategy finally form an alliance between IT and security teams? This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw679
In this world of countless vulnerabilities, we need to find a way to identify threats. Prioritizing known vulnerabilities is a step in the right direction but definitely not enough. There is a need for a customized identifying threat process. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw678
In this world of countless vulnerabilities, we need to find a way to identify threats. Prioritizing known vulnerabilities is a step in the right direction but definitely not enough. There is a need for a customized identifying threat process. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw678
This week, Vicarius' very own Roi Cohen and Shani Dodge join us to kick off the show with a technical segment titled "Generating Threat Insights Using Data Science"! Then, Harry SverdLove from ZScaler joins us for a technical segment on "Securing The Enterprise Software Supply Chain"! In the Security News, How suspected Russian hackers outed their massive cyberattack, Millions of Unpatched IoT, OT Devices Threaten Critical Infrastructure, Zodiac Killer Cipher Solved, a Security Researcher states ‘solarwinds123’ Password Left Firm Vulnerable in 2019, Why the Weakest Links Matter, and a 26-Year-Old Turns ‘Mistake’ of Being Added to an Honors Geometry Class to Becoming a Rocket Scientist! Show Notes: https://securityweekly.com/psw678 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://securityweekly.com/edgewise to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Vicarius' very own Roi Cohen and Shani Dodge join us to kick off the show with a technical segment titled "Generating Threat Insights Using Data Science"! Then, Harry SverdLove from ZScaler joins us for a technical segment on "Securing The Enterprise Software Supply Chain"! In the Security News, How suspected Russian hackers outed their massive cyberattack, Millions of Unpatched IoT, OT Devices Threaten Critical Infrastructure, Zodiac Killer Cipher Solved, a Security Researcher states ‘solarwinds123’ Password Left Firm Vulnerable in 2019, Why the Weakest Links Matter, and a 26-Year-Old Turns ‘Mistake’ of Being Added to an Honors Geometry Class to Becoming a Rocket Scientist! Show Notes: https://securityweekly.com/psw678 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://securityweekly.com/edgewise to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
More computers, more software, and faster development cycles lead to more vulnerabilities. The security and IT teams are put under immense pressure to tackle the growing number of vulnerabilities with the same old tools that can’t keep up with the requirements. New technologies emerged to bridge that gap and allow the security team to solve the whole problem, end-to-end, in a seamless manner. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw676
More computers, more software, and faster development cycles lead to more vulnerabilities. The security and IT teams are put under immense pressure to tackle the growing number of vulnerabilities with the same old tools that can’t keep up with the requirements. New technologies emerged to bridge that gap and allow the security team to solve the whole problem, end-to-end, in a seamless manner. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw676
This week, Vicarius' very own Roi Cohen and Gilad Lev join us to kick off the show with a technical segment titled "From Chaos to Topia"! Jeff Capone from SecureCircle joins us for an interview on zero trust data security! Ed Skoudis returns to talk to us about the Holiday Hack Challenge! Then, in the Security News, Thousands of unsecured medical records were exposed online, Advanced Persistent Threat Actors Targeting U.S. Think Tanks, WarGames for real: How one 1983 exercise nearly triggered WWIII , The Supreme Court will hear its first big CFAA case, TrickBoot feature allows TrickBot to run UEFI attacks, and Cyber Command deployed personnel to Estonia to protect elections against Russian threat! Show Notes: https://securityweekly.com/psw676 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://securityweekly.com/securecircle to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, Vicarius' very own Roi Cohen and Gilad Lev join us to kick off the show with a technical segment titled "From Chaos to Topia"! Jeff Capone from SecureCircle joins us for an interview on zero trust data security! Ed Skoudis returns to talk to us about the Holiday Hack Challenge! Then, in the Security News, Thousands of unsecured medical records were exposed online, Advanced Persistent Threat Actors Targeting U.S. Think Tanks, WarGames for real: How one 1983 exercise nearly triggered WWIII , The Supreme Court will hear its first big CFAA case, TrickBoot feature allows TrickBot to run UEFI attacks, and Cyber Command deployed personnel to Estonia to protect elections against Russian threat! Show Notes: https://securityweekly.com/psw676 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://securityweekly.com/securecircle to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Vulnerability prioritization has traditionally relied on CVSS scores and other subjective measurements (e.g. asset tagging) that don't factor in internal context. A new approach integrates asset context and application activity to derive rich, internal data. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw208
This week in the Enterprise Security News, Why Companies Should Outsource Cybersecurity During COVID and Beyond, Sectigo Adds Five PKI DevOps Integrations, a Drupal vulnerability press statement from ExtraHop, Palo Alto Networks launches Industry’s first 5G-Native Security offering, And Passwords exposed for almost 50,000 vulnerable Fortinet VPNs! We discuss Which Multifactor Authentication is the Right One with Matt Barnett, Chief Strategist at SEVN-X!, and then we gain some insights into Sharpening CVSS with Asset Context, with Clayton Fields and Michael Assraf of Vicarius! Show Notes: https://securityweekly.com/esw208 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Vulnerability prioritization has traditionally relied on CVSS scores and other subjective measurements (e.g. asset tagging) that don't factor in internal context. A new approach integrates asset context and application activity to derive rich, internal data. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw208
This week in the Enterprise Security News, Why Companies Should Outsource Cybersecurity During COVID and Beyond, Sectigo Adds Five PKI DevOps Integrations, a Drupal vulnerability press statement from ExtraHop, Palo Alto Networks launches Industry’s first 5G-Native Security offering, And Passwords exposed for almost 50,000 vulnerable Fortinet VPNs! We discuss Which Multifactor Authentication is the Right One with Matt Barnett, Chief Strategist at SEVN-X!, and then we gain some insights into Sharpening CVSS with Asset Context, with Clayton Fields and Michael Assraf of Vicarius! Show Notes: https://securityweekly.com/esw208 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Secure Circle: For a true Zero-Trust environment, it isn’t enough to think about data in cloud services and SaaS applications, we also must protect, control and audit data that egresses form these services onto endpoints. - How do you protect data that egresses from your cloud services (i.e., Github, Workday, SalesForce, Box, OneDrive)? - Do you control access to your data after it egresses from your cloud services? This segment is sponsored by SecureCircle. Visit https://securityweekly.com/securecircle to learn more about them! Vicarius: Pentesting is littered with politics, bias reporting, and human error. So how do you clean up the trash? A former IDF engineer shares how his stint as a pentester changed the way he thinks about it - and ultimately led to the development of a new technology. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Start your free trial today, visit: https://www.vicarius.io/sign/up Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw206
This week, we welcome Trevor Welsh, Global Security Strategist at Chronicle, to discuss Getting Google Scale Threat Detection With Chronicle Detect! In the Enterprise News, Radware Announces Expanded Elastic Scalability and Resiliency for its Virtual DDoS Protection in AWS, Neustar Agrees to Buy Verisign’s Public DNS Service, Auto-Scaling Network Visibility in AWS Cloud, Palo Alto Networks introduces Enterprise Data Loss Prevention, New Kasada API protects from botnet attacks and targeted fraud, and more! In our final segment, we have two pre-recorded interviews with Jeff Capone of SecureCircle, and Roi Cohen of Vicarius! Show Notes: https://securityweekly.com/esw206 Visit https://securityweekly.com/chronicle to learn more about them! Visit https://securityweekly.com/securecircle to learn more about them! Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome Trevor Welsh, Global Security Strategist at Chronicle, to discuss Getting Google Scale Threat Detection With Chronicle Detect! In the Enterprise News, Radware Announces Expanded Elastic Scalability and Resiliency for its Virtual DDoS Protection in AWS, Neustar Agrees to Buy Verisign’s Public DNS Service, Auto-Scaling Network Visibility in AWS Cloud, Palo Alto Networks introduces Enterprise Data Loss Prevention, New Kasada API protects from botnet attacks and targeted fraud, and more! In our final segment, we have two pre-recorded interviews with Jeff Capone of SecureCircle, and Roi Cohen of Vicarius! Show Notes: https://securityweekly.com/esw206 Visit https://securityweekly.com/chronicle to learn more about them! Visit https://securityweekly.com/securecircle to learn more about them! Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Secure Circle: For a true Zero-Trust environment, it isn’t enough to think about data in cloud services and SaaS applications, we also must protect, control and audit data that egresses form these services onto endpoints. - How do you protect data that egresses from your cloud services (i.e., Github, Workday, SalesForce, Box, OneDrive)? - Do you control access to your data after it egresses from your cloud services? This segment is sponsored by SecureCircle. Visit https://securityweekly.com/securecircle to learn more about them! Vicarius: Pentesting is littered with politics, bias reporting, and human error. So how do you clean up the trash? A former IDF engineer shares how his stint as a pentester changed the way he thinks about it - and ultimately led to the development of a new technology. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Start your free trial today, visit: https://www.vicarius.io/sign/up Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw206
Only integrating vulnerability characteristics to determine risk leaves half the prioritization canvas empty. Observing and analyzing user interaction and other surrounding software characteristics provide the rich contextual clues to complete the picture. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw672
This week, we welcome back Shani Dodge and Roi Cohen from Vicarius to apply what we learned in the previous segment and actually prioritize our vulnerabilities and remediation the right way. Paul Battista, CEO & Founder of Polarity joins us in the following segment to show us how to use and customize augmented reality to speed up security analysis! In the Security News, the KashmirBlack botnet is behind attacks on CMSs such as WordPress, Joomla, and Drupal, Cybercriminals are Coming After Your Coffee, irrigation systems and door openers are vulnerable to attacks, if you have Oracle WebLogic exposed to the Internet you are likely already pwned, who needs Internet Explorer any longer? and why isn't MFA more popular?! Show Notes: https://wiki.securityweekly.com/psw672 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://securityweekly.com/polarity to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Only integrating vulnerability characteristics to determine risk leaves half the prioritization canvas empty. Observing and analyzing user interaction and other surrounding software characteristics provide the rich contextual clues to complete the picture. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw672
This week, we welcome back Shani Dodge and Roi Cohen from Vicarius to apply what we learned in the previous segment and actually prioritize our vulnerabilities and remediation the right way. Paul Battista, CEO & Founder of Polarity joins us in the following segment to show us how to use and customize augmented reality to speed up security analysis! In the Security News, the KashmirBlack botnet is behind attacks on CMSs such as WordPress, Joomla, and Drupal, Cybercriminals are Coming After Your Coffee, irrigation systems and door openers are vulnerable to attacks, if you have Oracle WebLogic exposed to the Internet you are likely already pwned, who needs Internet Explorer any longer? and why isn't MFA more popular?! Show Notes: https://wiki.securityweekly.com/psw672 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://securityweekly.com/polarity to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Software vulnerabilities are exploding in growth at an unprecedented rate, and security teams are struggling to stay afloat. Lifebuoys (i.e. CVSS base scores) aren’t doing much to save them, either. A new advancement in threat prioritization offers relief, integrating the vulnerabilities’ surrounding characteristics to identify the most severe risks. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw670
This week, we welcome back Shani Dodge and Roi Cohen from Vicarius, to present their segment on Vulnerabilities entitled Prioritize This, Prioritize That, Prioritize with Context! In our second segment, we welcome Patrick Garrity, VP of Operations at Blumira, to talk about Democratizing and Saasifying Security Operations! In the Security News, Microsoft Uses Trademark Law to Disrupt Trickbot Botnet, Barnes & Noble cyber incident could expose customer shipping addresses and order history, Zoom Rolls Out End-to-End Encryption After Setbacks, Google Warns of Severe 'BleedingTooth' Low to Medium risk vulnerabilities, Windows TCP/IP Remote Code Execution vulnerability, and a Prison video visitation system exposed calls between inmates and lawyers! Show Notes: https://wiki.securityweekly.com/psw670 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Software vulnerabilities are exploding in growth at an unprecedented rate, and security teams are struggling to stay afloat. Lifebuoys (i.e. CVSS base scores) aren’t doing much to save them, either. A new advancement in threat prioritization offers relief, integrating the vulnerabilities’ surrounding characteristics to identify the most severe risks. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw670
This week, we welcome back Shani Dodge and Roi Cohen from Vicarius, to present their segment on Vulnerabilities entitled Prioritize This, Prioritize That, Prioritize with Context! In our second segment, we welcome Patrick Garrity, VP of Operations at Blumira, to talk about Democratizing and Saasifying Security Operations! In the Security News, Microsoft Uses Trademark Law to Disrupt Trickbot Botnet, Barnes & Noble cyber incident could expose customer shipping addresses and order history, Zoom Rolls Out End-to-End Encryption After Setbacks, Google Warns of Severe 'BleedingTooth' Low to Medium risk vulnerabilities, Windows TCP/IP Remote Code Execution vulnerability, and a Prison video visitation system exposed calls between inmates and lawyers! Show Notes: https://wiki.securityweekly.com/psw670 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome we welcome David Asraf, C++ Developer at Vicarius, and Roi Cohen, Co-Founder & VP Sales at Vicarius, to discuss The Patchless Horseman! In our second segment, we welcome back Sumedh Thakar, President and Chief Product Officer at Qualys, to talk about Building Security Into the DevOps Lifecycle! In the Security News, Cisco Patches Critical Vulnerability in Jabber for Windows, Expert found multiple critical issues in MoFi routers, TeamTNT Gains Full Remote Takeover of Cloud Instances, Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks, Former NSA chief General Keith Alexander is now on Amazon’s board, and the Legality of Security Research is to be Decided in a US Supreme Court Case! Show Notes: https://wiki.securityweekly.com/psw666 Visit https://securityweekly.com/qualys to learn more about them! Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome we welcome David Asraf, C++ Developer at Vicarius, and Roi Cohen, Co-Founder & VP Sales at Vicarius, to discuss The Patchless Horseman! In our second segment, we welcome back Sumedh Thakar, President and Chief Product Officer at Qualys, to talk about Building Security Into the DevOps Lifecycle! In the Security News, Cisco Patches Critical Vulnerability in Jabber for Windows, Expert found multiple critical issues in MoFi routers, TeamTNT Gains Full Remote Takeover of Cloud Instances, Bluetooth Bug Opens Devices to Man-in-the-Middle Attacks, Former NSA chief General Keith Alexander is now on Amazon’s board, and the Legality of Security Research is to be Decided in a US Supreme Court Case! Show Notes: https://wiki.securityweekly.com/psw666 Visit https://securityweekly.com/qualys to learn more about them! Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Every time you deploy a patch nothing has ever gone wrong, right? Most of us have been burned by deploying a patch, causing downtime in your environment, getting in trouble with users and management for causing an outage and having to back out a patch, then re-deploy. The team at Vicarious has a way to apply in-memory virtual patches that mitigate exploitation and do not require binaries to be altered. Tune-in for the full description and demo! This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw666
Every time you deploy a patch nothing has ever gone wrong, right? Most of us have been burned by deploying a patch, causing downtime in your environment, getting in trouble with users and management for causing an outage and having to back out a patch, then re-deploy. The team at Vicarious has a way to apply in-memory virtual patches that mitigate exploitation and do not require binaries to be altered. Tune-in for the full description and demo! This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw666
The growth in software vulnerability exploitation creates a need for better prediction capabilities. Over time, there have been shifts in the ways of discovering vulnerabilities in binary code. Research and development of new tools enables security pros to adopt innovative techniques to scale the process. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw664
The growth in software vulnerability exploitation creates a need for better prediction capabilities. Over time, there have been shifts in the ways of discovering vulnerabilities in binary code. Research and development of new tools enables security pros to adopt innovative techniques to scale the process. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw664
This week, first we talk Security News! We'll be discussing how a Google Researcher Reported 3 Flaws in Apache Web Server Software, Medical Data Leaked on GitHub Due to Developer Errors, Experts hacked 28,000 unsecured printers to raise awareness of printer security issues, Tesla Is Cracking Down On Performance-Enhancing Hacks For The Model 3, Former Uber CSO Charged Over Alleged Breach Cover-Up, and Researchers Sound Alarm Over Malicious AWS Community AMIs! In our second segment, we air two pre recorded interviews from Security Weekly's Virtual Hacker Summer Camp, with Ferruh Mavituna, CEO of Netsparker, and Paul Battista, CEO and Founder of Polarity! In our final segment, we air one more pre recorded interview with Roi Cohen, Co-Founder and VP of Sales at Vicarius, and Shani Dodge, C++ Developer at Vicarius, discussing Predicting Vulnerabilities in Compiled Code! Show Notes: https://wiki.securityweekly.com/psw664 Visit https://securityweekly.com/vicarius to learn more about them! Take the Polarity Challenge! Get your free community edition by visiting: www.polarity.io/sw Visit https://securityweekly.com/netsparker to get a trial of the best dynamic application scanning solution on the market! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, first we talk Security News! We'll be discussing how a Google Researcher Reported 3 Flaws in Apache Web Server Software, Medical Data Leaked on GitHub Due to Developer Errors, Experts hacked 28,000 unsecured printers to raise awareness of printer security issues, Tesla Is Cracking Down On Performance-Enhancing Hacks For The Model 3, Former Uber CSO Charged Over Alleged Breach Cover-Up, and Researchers Sound Alarm Over Malicious AWS Community AMIs! In our second segment, we air two pre recorded interviews from Security Weekly's Virtual Hacker Summer Camp, with Ferruh Mavituna, CEO of Netsparker, and Paul Battista, CEO and Founder of Polarity! In our final segment, we air one more pre recorded interview with Roi Cohen, Co-Founder and VP of Sales at Vicarius, and Shani Dodge, C++ Developer at Vicarius, discussing Predicting Vulnerabilities in Compiled Code! Show Notes: https://wiki.securityweekly.com/psw664 Visit https://securityweekly.com/vicarius to learn more about them! Take the Polarity Challenge! Get your free community edition by visiting: www.polarity.io/sw Visit https://securityweekly.com/netsparker to get a trial of the best dynamic application scanning solution on the market! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
It s not uncommon to find the traditional vulnerability assessment report buried under the CISO family picture, compliance books, and his latest blood pressure test. These reports highlight the never-ending battle between security and IT about what s more important: risks to servers and endpoints, or keeping the environment up-to-date and secured. There are even problems within the ranks of each unit. Dysfunctional processes, lack of efficient communication, and rudimentary tools put even more pressure on the CIO and CISO. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw662
It s not uncommon to find the traditional vulnerability assessment report buried under the CISO family picture, compliance books, and his latest blood pressure test. These reports highlight the never-ending battle between security and IT about what s more important: risks to servers and endpoints, or keeping the environment up-to-date and secured. There are even problems within the ranks of each unit. Dysfunctional processes, lack of efficient communication, and rudimentary tools put even more pressure on the CIO and CISO. This segment is sponsored by Vicarius. Visit https://securityweekly.com/vicarius to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://wiki.securityweekly.com/psw662
This week, we welcome back Mike Nichols, Head of Product at Elastic Security, to discuss Why Elastic Is Making Endpoint Security 'Free And Open'! In our second segment, it's the Security News! We'll be talking about how Amazon Alexa One-Click Attack Can Divulge Personal Data, Researcher Publishes Patch Bypass for vBulletin 0-Day, Threat actors managed to control 23% of Tor Exit nodes, a Half a Million IoT Passwords were Leaked, Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment, and a Zoom zero-day flaw allows code execution on victim's Windows machine! In our final segment, we air a pre recorded interview with Michael Assraf, CEO and Co-Founder at Vicarius, to talk about Vulnerability Rich - Contextually Blind! Show Notes: https://wiki.securityweekly.com/psw662 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://securityweekly.com/elastic to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
This week, we welcome back Mike Nichols, Head of Product at Elastic Security, to discuss Why Elastic Is Making Endpoint Security 'Free And Open'! In our second segment, it's the Security News! We'll be talking about how Amazon Alexa One-Click Attack Can Divulge Personal Data, Researcher Publishes Patch Bypass for vBulletin 0-Day, Threat actors managed to control 23% of Tor Exit nodes, a Half a Million IoT Passwords were Leaked, Hackers Are Exploiting a 5-Alarm Bug in Networking Equipment, and a Zoom zero-day flaw allows code execution on victim's Windows machine! In our final segment, we air a pre recorded interview with Michael Assraf, CEO and Co-Founder at Vicarius, to talk about Vulnerability Rich - Contextually Blind! Show Notes: https://wiki.securityweekly.com/psw662 Visit https://securityweekly.com/vicarius to learn more about them! Visit https://securityweekly.com/elastic to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Visit https://securityweekly.com/acm to sign up for a demo or buy our AI Hunter! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly
Rozmawiam dzisiaj z panią mec. Jolantą Fiedeń, warszawskim radcą prawnym.Pani Mecenas jest wyjątkowym prawnikiem. Podchodzi bowiem do wykonywania swojego zawodu i do swoich klientów z bardzo dużą dozą empatii. A jednym z kluczowych elementów jej sukcesów jest wyjątkowa, przemyślana i świadoma komunikacja. Mnie samego tematyka ta niezwykle interesuje. Uważam komunikację za jeden z najważniejszych elementów promocyjnych w kancelarii, a także kluczowy składnik budowania kultury organizacyjnej.Z panią Jolantą Fiedeń rozmawiamy zatem między innymi o tym, czym w swojej istocie jest komunikacja, dlaczego jest tak bardzo ważna, co jest przyczyną nieporozumień, jakie są warstwy komunikacji z klientem i jakie mają znaczenie, jak ważne dla prawidłowej komunikacji są określone cechy osobowości, czym w swojej istocie jest relacja, dlaczego dbałość o siebie samego jest niezwykle ważna dla komunikacji. Z naszej rozmowy dowiesz się również, jak znaleźć sens w wykonywaniu zawodu prawnika.Zanim posłuchasz mojej rozmowy z Jolantą Fiedeń, wcześniej posłuchasz kolejnego odcinka PoPrawnika Kasi, czyli Katarzyna Solga o organizacji kancelarii prawnej. W tym odcinku Kasia opowiada na przykładzie własnej kancelarii o tym, jak motywować pracowników do uzupełniania danych w programie do zarządzania kancelarią prawną. Chyba w każdej kancelarii taki problem występuje - jestem pewien, że się ze mną zgodzisz. Posłuchaj zatem, co na ten temat ma do powiedzenia Kasia Solga. Nawiasem mówiąc, jeśli już na tapecie jest program do zarządzania kancelarią prawną, to zdecydowanie polecam Ci program Vicarius e-kancelaria - w moim przekonaniu jedyny warty uwagi system tego typu, nie tylko pod względem rozwiązań ale również wyjątkowej obsługi klienta.A zatem najpierw PoPrawnik Kasi Solgi a następnie pani mec. Jolanta Fiedeń. A ja dodam że podcast "W drodze do kancelarii" jest z radością wspierany przez słoneczny i najlepszy web.lex. Zapraszam!
Rozmawiam dzisiaj z panią mec. Jolantą Fiedeń, warszawskim radcą prawnym.Pani Mecenas jest wyjątkowym prawnikiem. Podchodzi bowiem do wykonywania swojego zawodu i do swoich klientów z bardzo dużą dozą empatii. A jednym z kluczowych elementów jej sukcesów jest wyjątkowa, przemyślana i świadoma komunikacja. Mnie samego tematyka ta niezwykle interesuje. Uważam komunikację za jeden z najważniejszych elementów promocyjnych w kancelarii, a także kluczowy składnik budowania kultury organizacyjnej.Z panią Jolantą Fiedeń rozmawiamy zatem między innymi o tym, czym w swojej istocie jest komunikacja, dlaczego jest tak bardzo ważna, co jest przyczyną nieporozumień, jakie są warstwy komunikacji z klientem i jakie mają znaczenie, jak ważne dla prawidłowej komunikacji są określone cechy osobowości, czym w swojej istocie jest relacja, dlaczego dbałość o siebie samego jest niezwykle ważna dla komunikacji. Z naszej rozmowy dowiesz się również, jak znaleźć sens w wykonywaniu zawodu prawnika.Zanim posłuchasz mojej rozmowy z Jolantą Fiedeń, wcześniej posłuchasz kolejnego odcinka PoPrawnika Kasi, czyli Katarzyna Solga o organizacji kancelarii prawnej. W tym odcinku Kasia opowiada na przykładzie własnej kancelarii o tym, jak motywować pracowników do uzupełniania danych w programie do zarządzania kancelarią prawną. Chyba w każdej kancelarii taki problem występuje - jestem pewien, że się ze mną zgodzisz. Posłuchaj zatem, co na ten temat ma do powiedzenia Kasia Solga. Nawiasem mówiąc, jeśli już na tapecie jest program do zarządzania kancelarią prawną, to zdecydowanie polecam Ci program Vicarius e-kancelaria - w moim przekonaniu jedyny warty uwagi system tego typu, nie tylko pod względem rozwiązań ale również wyjątkowej obsługi klienta.A zatem najpierw PoPrawnik Kasi Solgi a następnie pani mec. Jolanta Fiedeń. A ja dodam że podcast "W drodze do kancelarii" jest z radością wspierany przez słoneczny i najlepszy web.lex. Zapraszam!
Gościem tego odcinka podcastu jest pan mecenas Łukasz Bąk, który w ramach swojej praktyki specjalizuje się w bardzo wąskiej i bardzo hermetycznej branży. Razem z moim gościem rozmawiamy o autentyczności w zawodzie adwokata, emocjach i o znaczeniu osobowości, o strategii budowania kancelarii, zaletach strategi opartej na bardzo wąskiej specjalizacji, o wyzwaniach organizacyjnych, które stoją przed właścicielem kancelarii, promocji kancelarii oraz kompetencjach. Poruszamy również to, na co swoją uwagę zwracają klienci, jak prowadzić bloga w wąskiej tematyce i wąskiej branży, oraz tematykę sprzedaży usług prawnych i co jest kluczem do dobrej sprzedaży. Mecenas Łukasz Bąk zdradził również jaką ma radę dla początkujących prawników i początkujących kancelarii prawnych i dlaczego dlaczego każdy prawnik powinien dużo czytać. Rozmawiamy też dużo o tym, dlaczego program do zarządzania kancelarią prawną Vicarius wspiera rozwój kancelarii.Wcześniej jednak, zgodnie z tradycją, szczypta doświadczenia z zakresu organizacji kancelarii. A więc cykl PoPranik Kasi. Tym razem Katarzyna Solga opowie nam jak na początku prowadzenia kancelarii prawnej zrobić sobie system do obsługi kancelarii.Podcast W drodze do kancelarii jest z radością wspierany przez słoneczny web.lex :) Zapraszam!
Gościem tego odcinka podcastu jest pan mecenas Łukasz Bąk, który w ramach swojej praktyki specjalizuje się w bardzo wąskiej i bardzo hermetycznej branży. Razem z moim gościem rozmawiamy o autentyczności w zawodzie adwokata, emocjach i o znaczeniu osobowości, o strategii budowania kancelarii, zaletach strategi opartej na bardzo wąskiej specjalizacji, o wyzwaniach organizacyjnych, które stoją przed właścicielem kancelarii, promocji kancelarii oraz kompetencjach. Poruszamy również to, na co swoją uwagę zwracają klienci, jak prowadzić bloga w wąskiej tematyce i wąskiej branży, oraz tematykę sprzedaży usług prawnych i co jest kluczem do dobrej sprzedaży. Mecenas Łukasz Bąk zdradził również jaką ma radę dla początkujących prawników i początkujących kancelarii prawnych i dlaczego dlaczego każdy prawnik powinien dużo czytać. Rozmawiamy też dużo o tym, dlaczego program do zarządzania kancelarią prawną Vicarius wspiera rozwój kancelarii.Wcześniej jednak, zgodnie z tradycją, szczypta doświadczenia z zakresu organizacji kancelarii. A więc cykl PoPranik Kasi. Tym razem Katarzyna Solga opowie nam jak na początku prowadzenia kancelarii prawnej zrobić sobie system do obsługi kancelarii.Podcast W drodze do kancelarii jest z radością wspierany przez słoneczny web.lex :) Zapraszam!
Vicarius aus Lorsch im Interview bei "Musik von Hier": - Seine Musik ist befreiend, kraftvoll, mitreißend - Hat bei einem DJ Auftritt sein Getränk über den Mixer verschüttet und 30 Minuten warten müssen bis endlich Ersatz kam
W kancelariach prawnych czas jest towarem deficytowym. Jednak często jest tak, że ręce pełne roboty i praca ponad godziny pracy wynikają z nienajlepszej organizacji samej pracy. Z nieodpowiednich nawyków. Czy … ze zbyt niskich stawek. Powodów na pewno jest wiele.Mądrze zaimplementowany program do zarządzania kancelarią prawną, może każdemu z nas zaoszczędzić cenne minuty.I o tym właśnie, o oszczędzaniu czasu przy wykorzystaniu programu do zarządzania kancelarią prawną, rozmawiam dziś ze swoim gościem panem Michałem Olszewskim - współwłaścicielem firmy tworzącej w moim przekonaniu najlepszy program do obsługi kancelarii prawnej online - Vicarius e-Kancelaria. Jakie korzyści niesie ze sobą jeszcze wdrożenie programu do zarządzania kancelarią prawną? Ułatwienie komunikacji z klientami, czy wewnątrz zespołu. Ułatwienie renegocjacji stawek czy choćby ustalenie ich prawidłowej wysokości. Rozeznanie się w systemie własnej kancelarii i uporządkowanie tego dobrze naoliwionego mechanizmu. Itd...Zachęcam Cię gorąco do posłuchania tego odcinka podcastu. Niestety z powodów technicznych ucięta została końcówka naszej rozmowy. Bardzo ciekawe jej fragmenty nie zostały zapisane. Ale może to i dobrze, gdyż będzie to dodatkową motywacją dla mnie, aby ponownie z Michałem Olszewskim się spotkać i jeszcze porozmawiać o innych korzyściach płynących z faktu wdrożenia do kancelarii systemu do zarządzania kancelarią prawną online - Vicarius e-Kancelaria.Odcinek 38 podcastu jest wyjątkowo wspierany właśnie przez program Vicarius e-kancelaria, którego wersję próbną, znajdziesz na stronie www.vicarius-e-kancelaria.pl
W kancelariach prawnych czas jest towarem deficytowym. Jednak często jest tak, że ręce pełne roboty i praca ponad godziny pracy wynikają z nienajlepszej organizacji samej pracy. Z nieodpowiednich nawyków. Czy … ze zbyt niskich stawek. Powodów na pewno jest wiele.Mądrze zaimplementowany program do zarządzania kancelarią prawną, może każdemu z nas zaoszczędzić cenne minuty.I o tym właśnie, o oszczędzaniu czasu przy wykorzystaniu programu do zarządzania kancelarią prawną, rozmawiam dziś ze swoim gościem panem Michałem Olszewskim - współwłaścicielem firmy tworzącej w moim przekonaniu najlepszy program do obsługi kancelarii prawnej online - Vicarius e-Kancelaria. Jakie korzyści niesie ze sobą jeszcze wdrożenie programu do zarządzania kancelarią prawną? Ułatwienie komunikacji z klientami, czy wewnątrz zespołu. Ułatwienie renegocjacji stawek czy choćby ustalenie ich prawidłowej wysokości. Rozeznanie się w systemie własnej kancelarii i uporządkowanie tego dobrze naoliwionego mechanizmu. Itd...Zachęcam Cię gorąco do posłuchania tego odcinka podcastu. Niestety z powodów technicznych ucięta została końcówka naszej rozmowy. Bardzo ciekawe jej fragmenty nie zostały zapisane. Ale może to i dobrze, gdyż będzie to dodatkową motywacją dla mnie, aby ponownie z Michałem Olszewskim się spotkać i jeszcze porozmawiać o innych korzyściach płynących z faktu wdrożenia do kancelarii systemu do zarządzania kancelarią prawną online - Vicarius e-Kancelaria.Odcinek 38 podcastu jest wyjątkowo wspierany właśnie przez program Vicarius e-kancelaria, którego wersję próbną, znajdziesz na stronie www.vicarius-e-kancelaria.pl
Dziś wywiad ze mną! Wywiad przeprowadzony przez Michała Olszewskiego dla kancelarii, które korzystają z programu do zarządzania kancelarią prawną online - VICARIUS e-Kancelaria. Michał Olszewski jest twórcą i pomysłodawcą tego programu. O czym rozmawiamy? Czym jest web.lex , jakie są różnice w prowadzeniu bloga prawniczego dziś a kilka lat temu, czy warto jeszcze prowadzić prawniczy blog, o blogu w kontekście etycznego zakazu reklamy, jak planują swoją przyszłość młodzi prawnicy, jak wygląda blogowanie prawnicze USA i innych krajach, oraz innych ciekawych rzeczach :) Zapraszam!
Dziś wywiad ze mną! Wywiad przeprowadzony przez Michała Olszewskiego dla kancelarii, które korzystają z programu do zarządzania kancelarią prawną online - VICARIUS e-Kancelaria. Michał Olszewski jest twórcą i pomysłodawcą tego programu. O czym rozmawiamy? Czym jest web.lex , jakie są różnice w prowadzeniu bloga prawniczego dziś a kilka lat temu, czy warto jeszcze prowadzić prawniczy blog, o blogu w kontekście etycznego zakazu reklamy, jak planują swoją przyszłość młodzi prawnicy, jak wygląda blogowanie prawnicze USA i innych krajach, oraz innych ciekawych rzeczach :) Zapraszam!
Heidelberg Catechism, Lord's Day 5
W tym odcinku podcastu W drodze do kancelarii posłuchasz wywiad z panem Michałem Olszewskim, współtwórcą programu do zarządzania kancelarią prawną on-line: Vicarius e-kancelaria. O czym rozmawiamy? Między innymi o bezpieczeństwie danych w kancelarii, czy i do czego w kancelarii przydaje się system do zarządzania, o zgodnościach z rodo, o bezpieczeństwie systemu Vicarius, na jakich urządzeniach Vicarius działa, o zaletach rozwiązań chmurowych, w jaki sposób system do zarządzania kancelarią pozwala na wycenę usługi, jak rozpocząć przygodę z Vicariusem. Możesz też posłuchać tego, jaką radę dla początkującyh prawników ma mój rozmówca. Serdecznie Cię zapraszam! Dodam, że podcast W drodze do kancelarii jest z radością wspierany przez web.lex! :)
W tym odcinku podcastu W drodze do kancelarii posłuchasz wywiad z panem Michałem Olszewskim, współtwórcą programu do zarządzania kancelarią prawną on-line: Vicarius e-kancelaria. O czym rozmawiamy? Między innymi o bezpieczeństwie danych w kancelarii, czy i do czego w kancelarii przydaje się system do zarządzania, o zgodnościach z rodo, o bezpieczeństwie systemu Vicarius, na jakich urządzeniach Vicarius działa, o zaletach rozwiązań chmurowych, w jaki sposób system do zarządzania kancelarią pozwala na wycenę usługi, jak rozpocząć przygodę z Vicariusem. Możesz też posłuchać tego, jaką radę dla początkującyh prawników ma mój rozmówca. Serdecznie Cię zapraszam! Dodam, że podcast W drodze do kancelarii jest z radością wspierany przez web.lex! :)
Recorded on August 2nd, 2018 Two people making music on the fly… Bugs In The Basement creates improvised musical journeys from an array of vintage and handmade instruments to modern technologies. Recorded live from our basement studio in the Pacific Northwest, each week we experiment in the process of making exploratory music and soundscapes. Unmixed, unedited and unapologetic. www.bugsinthebasement.com