Practice of allowing people or entities, generally
POPULARITY
Marin Ištvanić is a partner at Inspire Brands, a boutique agency focused on paid social ads, primarily on Facebook and Instagram. He has personally spent over $150 million on Facebook ads for clients and internal brands, successfully scaling Inspire's own brand to $30 million in revenue by their third year.In this episode of DTC Pod, Marin shares his insights on growing brands profitably through paid social. He discusses the importance of achieving product-market fit, crafting compelling offers, and understanding unit economics. Marin also details his agency's creative testing process and how to efficiently scale winning ad angles from static images to videos to landing pages.Interact with other DTC experts and access our monthly fireside chats with industry leaders on DTC Pod Slack.On this episode of DTC Pod, we cover:1. Achieving Product-Market Fit2. Scaling Brands through Facebook Ads3. Product Differentiation4. How to Craft a Compelling Offer5. Subscription Products and Pricing Strategies6. Landing Pages for Facebook Ads7. Advertorials and Third-Party Content for Ads8. Whitelisting and Leveraging External Trust in Ads9. Ad Format Mix and Budget Allocation10. Advantage+ Campaigns and AI11. Scaling Ad Creative Production12. Testing Ad Variations and HooksTimestamps00:00 Marin's background and joining Inspire Brands 04:48 Importance of product-market fit and differentiation 06:50 Creating demand vs picking an established market10:34 What makes an effective offer and how to craft one12:41 Subscription models and free trial strategies16:59 $1K/day spend as indicator of product-market fit 18:36 Choosing the right landing page for your product 25:07 Whitelisting strategies and organic-looking content27:48 Typical budget allocation across ad formats30:29 Facebook's Advantage+ campaigns and AI features 33:23 Strategies for scaling ad creative24:44 Final tips: know your numbers and when to spendShow notes powered by CastmagicPast guests & brands on DTC Pod include Gilt, PopSugar, Glossier, MadeIN, Prose, Bala, P.volve, Ritual, Bite, Oura, Levels, General Mills, Mid Day Squares, Prose, Arrae, Olipop, Ghia, Rosaluna, Form, Uncle Studios & many more. Additional episodes you might like:• #175 Ariel Vaisbort - How OLIPOP Runs Influencer, Community, & Affiliate Growth• #184 Jake Karls, Midday Squares - Turning Your Brand Into The Influencer With Content• #205 Kasey Stewart: Suckerz- - Powering Your Launch With 300 Million Organic Views• #219 JT Barnett: The TikTok Masterclass For Brands• #223 Lauren Kleinman: The PR & Affiliate Marketing Playbook• #243 Kian Golzari - Source & Develop Products Like The World's Best Brands-----Have any questions about the show or topics you'd like us to explore further?Shoot us a DM; we'd love to hear from you.Want the weekly TL;DR of tips delivered to your mailbox?Check out our newsletter here.Projects the DTC Pod team is working on:DTCetc - all our favorite brands on the internetOlivea - the extra virgin olive oil & hydroxytyrosol supplementCastmagic - AI Workspace for ContentFollow us for content, clips, giveaways, & updates!DTCPod InstagramDTCPod TwitterDTCPod TikTokMarin Ištvanić - Partner at Inspire BrandsBlaine Bolus - Co-Founder of CastmagicRamon Berrios - Co-Founder of Castmagic
AppLovin - Reach your ideal customers in mobile games across diverse genres, with 150M+ U.S. daily active users. Apply for AppLovin's Ecommerce Beta
Wie lässt sich ein Netzwerk effektiv vor Schadsoftware schützen? Torsten Valentin setzt bei SecuLution auf das Application-Whitelisting-Prinzip. Im Gegensatz zu klassischen Antivirus-Lösungen werden dabei nur erlaubte Programme ausgeführt. Wie das funktioniert und warum es sicherer ist, erklärt der Gründer im Gespräch mit „heise meets …“.
Enjoying the Ecommerce Coffee Break Podcast? Here are a few ways to grow your business: https://ecommercecoffeebreak.com/level-up/ ---In today's episode, we dive into why the influencer marketing landscape has evolved beyond simple paid or organic approaches. Joining us is Danil Saliukov, CEO & co-founder of Insense, who explains how combining both strategies creates maximum impact, with particular focus on the growing importance of "whitelisting" - running ads through influencer handles. The discussion covers finding the right content creators, crafting effective briefs, and leveraging TikTok Shop not just as a sales channel but as a powerful product discovery platform that can complement existing e-commerce platforms like Amazon and Shopify. Special offer for our listeners: Book a demo with Insense to claim your $200 bonus at https://hubs.la/Q039VGYJ0 Topics discussed in this episode: Why influencer marketing is no longer just paid or organic – it's both. How whitelisting influencers in ads boosts performance. What makes UGC scalable and impactful in paid campaigns. Why clear, focused briefs lead to better content. How to find the right creators based on your goals. Why TikTok Shop changes the game for product discovery. How gifting filters top influencers with low risk. Why TikTok content can spike Amazon sales indirectly. What to pay influencers – pricing models that work. Why channel diversification is key to brand survival. Links & Resources Book a call to claim your $200 bonus: https://hubs.la/Q039VGYJ0 Website: https://insense.pro/ LinkedIn: https://www.linkedin.com/in/danil-saliukov/ X/Twitter: https://x.com/DanilSalukov Get access to more free resources by visiting the show notes athttps://tinyurl.com/yt3jvj4j MORE RESOURCES Store Optimization Beginners Guide: Instant PDF Download! It's FREE.
Traditional Kink Negotiations are impractical, give a false sense of safety, encourage evasive behaviour and tell you very little if nothing about shared, common desires. I will present a radically more effective approach to simplify kink scene and relationship negotiation, facilitate massive connection and the creation of shared meaning, and make negotiations actually fun and enjoyable for a change. Tags: Ds, Tool, Negotiation, Hypnokink Find the Episode Notes at the Website (https://thewordsmithspeaks.com) in the Resources Folder. Additional FREE Scripts, Classes, Templates, Printables, PDF's and full podcast episodes as audio downloads. Definitely check it out.
We were wrong, Manifest V3 is a big deal. Scott and Wes sit down with Oliver Dunk from Google to dive into the intricate world of Chrome Extensions development. From dissecting Manifest V3 to exploring the evolving landscape of browser security and extension reviews, this conversation covers the present and future of browser customization. Show Notes 00:00 Welcome to Syntax! 00:32 Who is Oliver Dunk? 02:00 Brought to you by Sentry. 03:17 Manifest V3. 08:59 How many rules can you add? 09:56 What even is a rule? 10:52 Is Google trying to kill ad blockers? 13:56 What are the bad guys doing with Chrome extensions? 15:17 Can a browser extension access HTTP-only cookies? 16:06 Is Chrome reviewing all of these extensions? 19:06 Is there a way to side-step Google's review process? Reddit Thread, The real threat of Manifest V3 20:32 Do you see the negative chatter? 21:18 Service workers - how do do you access the DOM? 23:32 Do you think we'll see more DOM APIs in service workers? 25:58 Do you have a favorite Chrome extension? 28:33 Has Google ever explored something comparable to Boost? SidePanel 33:09 Let's talk about the development stack. 35:54 1Password and Chrome. 38:39 What is the best way to debug an extension? YouTube Chrome for Developers 40:33 Manifest V3 and the web request blocking API. 41:57 Known tracking payloads. 44:04 Do you think there is a path forward that makes ad-block developers happy? 44:45 Do you run an ad blocker? 45:20 Whitelisting and opt-ins. 46:38 What's your tech setup? 47:18 What do you do to stay up to date? 47:51 Sick Picks + Shameless Plugs. 51:47 Wait, is Safari adopting V3 as well? Sick Picks Oliver: Defunctland YouTube, LEMMiNO YouTube Shameless Plugs Oliver: Chrome Extensions Getting Started, WebExtension Playground Hit us up on Socials! Syntax: X Instagram Tiktok LinkedIn Threads Wes: X Instagram Tiktok LinkedIn Threads Scott:X Instagram Tiktok LinkedIn Threads Randy: X Instagram YouTube Threads
Episode brought to you by Trend & Finaloop.Join 15k founders and marketers & get our pod highlights delivered directly to your inbox with the DTC Pod Newsletter!On this episode of DTC pod we cover:Monitoring affiliates regularly for compliance.Preference for historical partnerships and familiarity.Meeting with affiliates and ensuring transparency.Asking for referrals and recommendations from other brands.Benefits and challenges of affiliate marketing for brands.Optimizing strategies and working with affiliates who add value.Creating effective landing pages and reducing attribution leakage.Timestamps4:20 Brand growth, affiliate strategy, initial setup.5:10 Affiliate marketing popular, but brands frustrated.8:51 Independent media buyers bring valuable expertise. Large or small creators offer loyal audiences.12:42 Influencers demand upfront fees for branded content. Instead, opt for performance-based payments.18:30 Custom discount codes, tracking links, attribution, platforms.19:29 Monitoring platforms, optimizing traffic, adjusting payouts.23:29 Importance of many creatives, leveraging brand, optimizing landing pages for affiliates.30:02 “Affiliate credits lost, but exclusive offers help.”32:27 Media buyers rely on affiliates for insights. Content affiliates less important but provide incentives.35:20 Different responsibilities: media buyer, affiliate, guidelines.40:00 Affiliate compliance is challenging, human errors inevitable.43:38 Marketplaces for cash back include student, executive, and medical worker focus. Coupon-based cash back not preferred. Incentivized traffic uses rewards for desired actions.45:57 Affiliate monitoring: historical partnerships, transparency, referrals.49:48 Whitelisting is important for improving brands' conversion rates and ad performance.Shownotes powered by Castmagic
To Subscribe to DTC Newsletter - https://dtcnews.link/signup Hello and welcome to DTC Podcast, I'm Eric Dyck. Today we're going deep on Creator Whitelisting with Ed Staples, director of media for DTC Darling brand The Farmer's Dog, and Caroline Levere founder and COO of GrapevineAI, which provides high performance whitelisted social campaigns at scale and on demand. Get whitelisting! https://grapevine.ai If you're looking for incremental scale, from new, unique touchpoints in the social feed, it's time to consider whitelisting with creators. Anyone who's done this knows how much work goes into building campaigns this way, which is why Grapevine's end-to-end service is so attractive to Ed, and the Farmer's Dog. You'll hear all about how Ed builds out his creator campaigns on Grapevine The Power of Comparison campaigns from 3rd parties How white listed campaigns produce higher AOV and LTV Why creator content is critical in our “creative as targeting” world And lots more. Caroline Levere is a co-founder and COO of GrapevineAI, where she works with 150+ brands to provide them with third-party voice content to advertise on paid social channels and help drive CPA efficiencies. You can get in touch with Caroline to share your thoughts and continue the conversation - @crlevere on Instagram / hello@grapevine.ai Timestamps: 00:00 - Introduction 01:15 - The power of whitelisting in DTC marketing 08:20 - Leveraging influencer-driven content for success 12:30 - Optimizing creative strategies for different platforms 20:50 - Balancing AI and human-driven advertising approaches Hashtags: #DTCMarketing #Whitelisting #InfluencerMarketing #AIinAdvertising #DirectToConsumer #GrapevineAI #TheFarmersDog #MarketingStrategy #DigitalMarketing #Podcast Subscribe to DTC Newsletter - https://dtcnews.link/signup Advertise on DTC - https://dtcnews.link/advertise Work with Pilothouse - https://dtcnews.link/pilothouse Follow us on Instagram & Twitter - @dtcnewsletter Watch this interview on YouTube - https://dtcnews.link/video
On this episode, I talk about the importance of whitelisting in general and specifically in support of Retail Velocity support. "Whitelisting is the process of an influencer granting a brand permission to access their social media accounts, assuming paid promotional control of their handles."
Mein Gast heute: Daniel Buhmann arbeitet als Principal Systems Engineer und Expert für Operational Technology & IoT bei Fortinet. Mit mehr als 15 Jahren Erfahrung in der industriellen Cybersicherheit arbeitet er eng mit Kunden und Partnern zusammen, um Sicherheitslösungen entsprechend ihren Bedürfnissen zu entwerfen und dabei die Anforderungen und Einschränkungen industrieller Umgebungen zu berücksichtigen. Wir reden gemeinsam über die Endpoint Security bei Legacy Geräten, Whitelisting vs Sandboxing, die Herausforderungen bei der Umsetzung, häufige Fehler und die Zukunft EDR.Fortinet OT: https://www.fortinet.com/ot
Mein Gast heute: Daniel Buhmann arbeitet als Principal Systems Engineer und Expert für Operational Technology & IoT bei Fortinet. Mit mehr als 15 Jahren Erfahrung in der industriellen Cybersicherheit arbeitet er eng mit Kunden und Partnern zusammen, um Sicherheitslösungen entsprechend ihren Bedürfnissen zu entwerfen und dabei die Anforderungen und Einschränkungen industrieller Umgebungen zu berücksichtigen. Wir reden gemeinsam über die Endpoint Security bei Legacy Geräten, Whitelisting vs Sandboxing, die Herausforderungen bei der Umsetzung, häufige Fehler und die Zukunft EDR.Fortinet OT: https://www.fortinet.com/ot
Mein Gast heute: Daniel Buhmann arbeitet als Principal Systems Engineer und Expert für Operational Technology & IoT bei Fortinet. Mit mehr als 15 Jahren Erfahrung in der industriellen Cybersicherheit arbeitet er eng mit Kunden und Partnern zusammen, um Sicherheitslösungen entsprechend ihren Bedürfnissen zu entwerfen und dabei die Anforderungen und Einschränkungen industrieller Umgebungen zu berücksichtigen. Wir reden gemeinsam über die Endpoint Security bei Legacy Geräten, Whitelisting vs Sandboxing, die Herausforderungen bei der Umsetzung, häufige Fehler und die Zukunft EDR.Fortinet OT: https://www.fortinet.com/ot
Episode brought to you by Trend & Finaloop.On this episode of DTC POD, Marshall joins Blaine to dive into the world of affiliate marketing. Here's what you'll learn:Strategies in setting up an effective affiliate program, including identifying target customers, partners, and commission rates and networking options.Common mistakes made in affiliate marketing, the right partner mix, and low-value publishers who can negatively impact the program.The role of influencers in affiliate marketing, how to find them, and how they can drive interest and promote brands.How affiliate marketing has evolved over the years, from being deal and coupon-focused to including content production and influencers, and how tech has expanded its reach.How affiliate marketing is a cost-effective and performance-based way for brands to connect with third-party partners and drive sales, & how multiple affiliates can influence a single sale.Creating an Effective Affiliate Strategy:"We want to try to get in those articles because if you're looking for maybe best betting and you type in what is the best betting to Google, that first article is going to get a lot of traffic. And if you are able to be in that article, you're going to get a lot of traffic to your site in return." — Marhsall Nyman 00:10:09Performance PR: Forging Relationships and Getting Editors Interested:"It really takes a lot more than just setting it up in the platform. I think that's probably the biggest misconception that I get from people when I talk to them that have an affiliate program. We set it up, nothing's happening. Yeah, nothing's happening because you haven't gone out and done anything. You have to go out, you have to forge relationships with these publishers and get them interested and excited about your brand." — Marhsall Nyman 00:15:09Shownotes powered by castmagic Episode brought to you by Finaloop, the real-time accounting service trusted by hundreds of DTC Brands. Try Finaloop free - no credit card required. Visit finaloop.com/dtcpod and get 14 days free and a 2-month P&L within 24 hours. Past guests & brands on DTC Pod include Gilt, PopSugar, Glossier, MadeIN, Prose, Bala, P.volve, Ritual, Bite, Oura, Levels, General Mills, Mid Day Squares, Prose, Arrae, Olipop, Ghia, Rosaluna, Form, Uncle Studios & many more.Additional episodes you might like:• #175 Ariel Vaisbort - How OLIPOP Runs Influencer, Community, & Affiliate Growth• #184 Jake Karls, Midday Squares - Turning Your Brand Into The Influencer With Content• #205 Kasey Stewart: Suckerz- - Powering Your Launch With 300 Million Organic Views• #219 JT Barnett: The TikTok Masterclass For Brands• #223 Lauren Kleinman: The PR & Affiliate Marketing Playbook• #243 Kian Golzari - Source & Develop Products Like The World's Best Brands-----Have any questions about the show or topics you'd like us to explore further?Shoot us a DM; we'd love to hear from you.Want the weekly TL;DR of tips delivered to your mailbox?Check out our newsletter hereFollow us for content, clips, giveaways, & updates!DTCPod InstagramDTCPod TwitterDTCPod TikTokMarshall Nyman - Founder of NYMO & Co.Ramon Berrios - CEO of Trend.ioBlaine Bolus - Co-Founder of Seated
It's essential to stand up and take necessary actions against harassment in the workplace. Employees have the right to feel safe and positive, both mentally and physically, where they work. This can be especially harrowing when the harassment takes place in a judge's chambers. This week's episode of the Tech Savvy Lawyer podcast features Aliza Shatzman, president and founder of the Legal Accountability Project. She joined us today to talk about using technology to hold federal judges accountable for their behavior toward their clerks. Aliza is an attorney and an advocate based in Washington, DC, who writes and speaks about judicial accountability. In March 2022, Aliza submitted written testimony for a House Judiciary Subcommittee hearingabout the lack of workplace protections for judiciary employees, detailing her personal experience with harassment and retaliation by a former DC Superior Court judge. This led Aliza to create The Legal Accountability Project. As President of The Legal Accountability Project, Aliza's mission is to ensure that law clerks have positive clerkship experiences while extending support and resources to those who do not. Through data collection, analysis, programming, and partnerships with law schools and other stakeholders, Aliza is quantifying the scope of harassment, discrimination, and diversity issues in the courts, and using the results to craft effective solutions. Join Aliza and me as we discuss the following three questions and more! 01. What programs are you using to collect, manage, and utilize all this information and how do you use computer engineers to assist you? 02. How did you find the appropriate engineers to assist you? And why did you not create the database for LAP yourself? 03. What are three ways you're being mindful of the customer when using technology? So it doesn't seem that to the user that it's just a soulless process? In our conversation, we cover: [00.09] Tech setup – Starting the conversation, we dive into a quick look at Aliza's current tech setup and her background. [06.47] Whitelisting system – Aliza explains the whitelisting system and how it operates in the legal accountability project. [08.47] Lack of reporting—Aliza explains why attorneys are reluctant to report any type of mistreatment in the clerkship. [13.03] A safe space – Aliza explains how they are maintaining transparency in their program and the outcomes of it. [18.06] Security: Aliza demonstrates how they protect data from breaches and their data privacy policy. [25.51] Vetting process – Aliza shares the vetting process to get her engineers and the importance of them understanding the project and being responsive. [30.00] Aliza's experience – At the end of our discussion, Aliza shares her experience with harassment and gender discrimination when she was a law clerk and how she empowers the new generation to speak publicly. Resources Connect with Aliza LinkedIn - linkedin.com/in/aliza-shatzman-58b55223/ Website - legalaccountabilityproject.org/ Twitter - twitter.com/AlizaShatzman Equipment Mentioned in the Podcast ● MacBook Air - apple.com/macbook-air/ ● iPhone xs - gsmarena.com/apple_iphone_xs-9318.php ● iPod – ● Webcam - elgato.com/en/facecam - logitech.com/en-us/products/webcams.html ● Microphone - bluemic.com/en-us/products/yeti/ Software & Services Mentioned in the Podcast ● AWS cloud storage - aws.amazon.com/products/storage/
A new type of whitelisting is showing incredible results, but can it help you make 2023 your best year ever?In this episode, Jordan West talks about a new kind of whitelisting that they tested at upGrowth Commerce and the insane results that it produced. Listen and learn in this episode!Key takeaways from this episode:Whitelisting is where an influencer grants you to use their profile to run ads with. This can be incredibly powerful.The idea of this new kind of whitelisting is to use these profiles not just to run regular ads but to run an ad through an article on a third-party website.Some of the scalable results seen on upGrowth Commerce with this kind of Whitelisting are: 69 purchases at $9.84 per purchase.A CPM of $8.77Cost Per Click at $0.56ROAS of 14.43Get the latest strategies, tips, and case studies sent to you weekly by signing up for the free Secrets to Scaling Newsletter. Also, get first access to our Founder-Only Slack channel, our CMO Dashboard to plan out your marketing efforts and so. much. more.Join the Beta:https://www.secrets.upgrowthcommerce.com/This month's sponsor is twik: your personal shopper prediction expert.As the world's only one-click autonomous personalization engine, twik reorganizes product collections and navigation for each user. No Code, No setup & No maintenance is required.Visit twik.io to learn how you too can boost conversion rates & store revenue. Promo Code: 'UPGROWTH'After adding the app, go to Twik's 'Settings' tab and 'UPGROWTH' as a coupon. This will extend your trial period with 30 more days of unlimited usage. This offer is only available to the first 500 listeners redeeming the coupon.We love our podcast community and listeners so much that we have decided to offer a free eCommerce Growth Plan for your brand! To learn more and how we can help, click here: upgrowthcommerce.com/grow Join our community and connect with other eCommerce brand owners and marketers! https://www.facebook.com/groups/secretstoscalingpodcast
Brands that don't adapt their influencer strategies miss out on new customers while also paying for content that very few people see. Listen in as we dive into everything you need to know about whitelisting. [00:31] The definition of whitelisting [01:36] Difference between whitelisting & boosting posts [02:38] Why majority are interested in whitelisting [06:34] Kynship's whitelisting success stories [09:05] Practical steps to take to get started with whitelisting [10:47] Metrics to look out for when seeking Whitelisting partnership success [14:55] Lookalike audiences vs Broad audience targeting [17:48] Examples of failed whitelisting partnerships Cody Wittick: Twitter Taylor Lagace: Twitter
What you think will work may not always work and what worked before may not work anymore. It is important to move fast and test everything necessary to see what sticks.In this episode, Jordan West and Tim Keen talk about what is working in 2022 and the fundamentals that brands are not trying these days.Listen and learn in this episode!KEY TAKEAWAYS FROM THIS EPISODEDon't worry about the algorithm. Have good creatives and do what other brands aren't doing.Do whitelisting - running ads through non-brand handles.You need to do one of two things or both-- build a relationship with an influencer or create media pages of your own.Bring up whitelisting early in the conversation when building a relationship.It doesn't matter how big their page or following is. The point is it doesn't look like the brand's handle.People don't come to Instagram to look at ads. They want to look at content that they are interested in.Some of the landing pages that you can do are 5 Reasons Why, Sales Pages with FAQs and reviews, and Quizzes TikTok-style ads or User-generated content are working best.The brands doing well and scaling on Facebook have native-looking content.Throw everything at the wall and test what sticks.Be willing to test, which means testing something that is not necessarily your favorite thing.Be willing to do whatever the account needs. Don't stick to what you think is going to work.Recommended App:Molocohttps://www.moloco.com Today's Guest:Tim Keen is a co-founder and the CEO of Loop Club, a marketing agency dedicated to helping businesses and startups become more efficient and profitable.Connect and learn more about Tim Keen here: LinkedIn: https://www.linkedin.com/in/tim-keen This month's sponsor is OneLab Group, an Oracle NetSuite Partner who specializes in DTC companies. They simplify the complex when it comes to building a scalable digital operations platform. Visit www.onelabgroup.com to connect with them now. We love our podcast community and listeners so much that we have decided to offer a free eCommerce Growth Plan for your brand! To learn more and how we can help, click here: upgrowthcommerce.com/grow Join our community and connect with other eCommerce brand owners and marketers! https://www.facebook.com/groups/secretstoscalingpodcast...
Brands are constantly on the lookout for the next marketing technique. From using organic social to paid media, there's one thing every brand would love to improve: the ROI.As much as influencer marketing and working with creators is a growing trend for most eCommerce brands, there are still plenty of options to create brand awareness, drive traffic back to websites or landing pages, and build a community.One such technique, often referred to as whitelisting, creator licensing, or creator listing (really, various terms mean the same thing here), has shown to be beneficial for particular brands. ... (READ MORE)
If there is any topic that throws creators through a loop and sends brands into a spiral... its usage. We are breaking down our interactions in both brand and creator spaces to give you the need to knows about all things organic and paid ad usage. From definitions and expectations to rates and contracting necessities, we've got you covered.Timestamps: [0:22] Let's talk usage. [4:10] You always need a contract. [5:03] Why do influencers think they can charge for usage? [7:22] Usage on a site. [11:44] Paid ads usage. [13:00] Whitelisting. [15:24] Spark ads. [19:03] UGC/Usage and perpetuity. [21:02] Takeaways. --Find Harley:IG: @theharleyjordanWebsite: theharleyjordan.comFind Sonia:IG: @Sonia.ElyssWebsite: www.soniaelyss.comJoin the Lip Service Community: https://winno.app/soniaelyssFollow The Brand Meet Creator Podcast: Rate, Review, Subscribe & Share: podcasts.apple.com/us/podcast/brand-meet-creator
Savannah Sanchez and Dara Denney discuss what influencer whitelisting is and how to utilize it to increase your ROAS. We discuss how to negotiate pricing with creators, how to create long-term relationships with creators, and the performance differences on Facebook vs TikTok for influencer whitelisting.
On this episode, I talk about whitelisting and why you need to get involved! I reference this article.
eCommerce Uncensored - Email Marketing | Facebook Ads | Social Media Marketing
In this episode, the guys dive into their experience with whitelisting Facebook ads. Whitelisting in marketing means working with influencers to utilize their social accounts to promote your products. The guys talk about the benefit of having personalized ads, the power of an influencer's video, and the benefit of promoting through their social pages. […] The post EU261: How to Use Whitelisting to Get More Facebook Ads Sales appeared first on eCommerce Uncensored.
The total market-cap of NFT has hit $18 billion in 2022 - but most of these value are illiquid and NFTs sit idly in wallets. NFTFi (@NFTfi) unlocks the liquidity of these NFTs by allowing owners to take NFT-collateralized loans. Till date, they have facilitated $128 million over 7000 loans. In this episode, NFTFi co-founder, Steven Young shares with us: Why is unlocking NFT liquidity necessary and how can it help floor prices? What are the risks involved for lenders and borrowers? Why is NFTFi's peer-to-peer model the most optimal for NFT-backed loans? Host: Jason Choi @mrjasonchoi . Not financial advice. ------------ Timestamps ------------- (00:00:00) – Introduction (00:00:27) – Background of NFTfi's Founders (00:04:17) – Beginning of NFTfi (00:06:53) – Projects eligible as collateral (00:08:15) – Different loan durations and common use-cases (00:14:30) – Liquidation on Loans (00:19:21) – NFTfi as an execution platform for Liquidity Provision DAOs (00:21:20) – Whitelisting criteria of NFT projects (00:24:50) – NFTfi's competitors and different models (00:32:14) – Types of lenders and borrowers (00:36:27) – Future of NFTfi ----------- Sponsors ------------- PARASWAP is the best place to trade your tokens and get the best price in DeFi today. Get started on https://paraswap.io/blockcrunch CoinFLEX is the Home of Crypto Yield for passive capital and active traders to earn and trade crypto. Explore yields up to 100% APR with CoinFLEX's simple AMM+ product: https://coinflex.com/amm ----------- More Resources -----------— Steven Young's Twitter: https://twitter.com/stephen_yo?lang=en NFTFi's Website: https://www.nftfi.com/ NFTFi's Discord: https://t.co/O9hrCgWiL7 ------------ Disclosures ------------- Disclaimer: Jason Choi is a General Partner at Spartan Capital, a subsidiary of The Spartan Group. All opinions expressed by Jason and podcast guests are solely their own opinions and do not reflect the opinion of The Spartan Group and any of its subsidiaries
The Facebook Disrupter: Facebook Ads Top 100 Advertiser | Business Development, DTC, Lead-Gen & SAAS
Best Practices for Influencer Marketing, Whitelisting, Seeding AND SO MUCH MORE... from folks who've driven over 9figures in revenue from Influencer efforts Featuring Taylor Lagace & Barry Hott Taylor Lagace: All Things Influencer Marketing | Co-CEO @Kynshipco Barry Hott: Social ads since '08, over $600 million managed. Ad guy for @RanchWater (acq'd by Diageo). Helping brands grow. Warning: All my takes are HottTakes
Sonia Elyss and I dive into the one add-on that pushed my rates from a side hustle to a full time income as a content creator: usage. From whitelisting to fair rates to contracting, you know we have a lot to say here.Resources:Upstarter Podcast Network:www.upstarterpods.comInstagram: Upstarter Podcast NetworkTimestamps: [1:24] Usage - how can companies use your content? [3:22] Creators need to be more careful when signing contracts. [9:08] When should ad periods be discussed? Before or after? [11:16] What is your go-to pricing? [15:40] Whitelisting. [18:27] Organic usage - what is it? [24:09 Average branded content reach? --LINKS:Find Harley:IG: @theharleyjordanWebsite: https://www.millennialescape.com/Find Sonia:IG: @Sonia.elyssWebsite: https://www.soniaelyss.com/Follow The Brand Meet Creator Podcast: Rate, Review, Subscribe & Share: https://podcasts.apple.com/us/podcast/brand-meet-creator/id1609505183
In this episode, Richard talks to Ben Jenkins, Senior Solutions Engineer at ThreatLocker. ThreatLocker is an application whitelisting, ring-fencing and data storage control platform that protects businesses from malicious and misuse software. They talk about what ThreatLocker offers MSPs, what zero trust means, and how to deploy the software for better cybersecurity. Ben explains what elevation control and data storage control are, and the tools ThreatLocker integrates with. Richard and Ben discuss why MSPs shouldn't rely solely on antivirus and how antivirus whitelisting works as well as usability vs security. They look at how ThreatLocker is licenced, the subscription options, partner programmes and why they don't work with SMBs. Plus, Ben shares the resources he uses to stay up to date with the current situation in cybersecurity and the broader IT industry, and who inspires him in business and life. Mentioned in This Episode Slack:https://slack.com/intl/en-gb/ ( https://slack.com/intl/en-gb/) Splunk:https://www.splunk.com/ ( https://www.splunk.com/) AppBlock for Android:https://www.appblock.app/ ( https://www.appblock.app/) Freedom for iOS:https://freedom.to/freedom-for-ios ( https://freedom.to/freedom-for-ios) RSS Feed Reader: Pockethttps://getpocket.com/en/ ( https://getpocket.com/en/) Backup Tool: Veeamhttps://www.veeam.com/vm-backup-recovery-replication-software.html ( https://www.veeam.com/vm-backup-recovery-replication-software.html) Channel E2E:https://www.channele2e.com/ ( https://www.channele2e.com/) The Registerhttps://www.theregister.com/ ( https://www.theregister.com/) The Verge:https://www.theverge.com/ ( https://www.theverge.com/) The Bleeping Computer:https://www.bleepingcomputer.com/ ( https://www.bleepingcomputer.com/) MSP sub-Reddit:https://www.reddit.com/r/msp/ ( https://www.reddit.com/r/msp/)
Today, we're going to continue with phone tips, phone automation tips and ways to make yourself work way faster using your cell phone. Now we've done quite a few episodes that have to do with this, and we'll have the links to those in the show notes for you because you know the phone is with you all the time, and there's no reason you can't use it to keep your business flowing, and keep the speed of reacting to customers and prospects. So that's why we do these things. Screw The Commute Podcast Show Notes Episode 549 How To Automate Your Business - https://screwthecommute.com/automatefree/ Internet Marketing Training Center - https://imtcva.org/ Higher Education Webinar – https://screwthecommute.com/webinars See Tom's Stuff – https://linktr.ee/antionandassociates 00:23 Tom's introduction to Phone Tips 04:08 Whitelisting emails on the iPhone mail app 05:10 Call Forwarding 06:21 Turn on or off Location Services 08:27 Organize Notes Using Tags 09:52 Full Page Screen Shots 11:54 Battery 13:03 How to Retrieve Deleted Text Messages on iPhone (iOS 15 Update) 15:15 Copy and paste text or graphic Entrepreneurial Resources Mentioned in This Podcast Higher Education Webinar - https://screwthecommute.com/webinars Screw The Commute - https://screwthecommute.com/ Screw The Commute Podcast App - https://screwthecommute.com/app/ College Ripoff Quiz - https://imtcva.org/quiz Know a young person for our Youth Episode Series? Send an email to Tom! - orders@antion.com Have a Roku box? Find Tom's Public Speaking Channel there! - https://channelstore.roku.com/details/267358/the-public-speaking-channel How To Automate Your Business - https://screwthecommute.com/automatefree/ Internet Marketing Retreat and Joint Venture Program - https://greatinternetmarketingtraining.com/ KickStartCart - http://www.kickstartcart.com/ Copywriting901 - https://copywriting901.com/ Disabilities Page - https://imtcva.org/disabilities/ Email Tom: Tom@ScrewTheCommute.com Internet Marketing Training Center - https://imtcva.org/ Related Episodes Cell Phone Automation - https://screwthecommute.com/367/ Cell Phone Automation - https://screwthecommute.com/415/ Smartphone Tips - https://screwthecommute.com/472/ Cell Phone & Tablet Automation - https://screwthecommute.com/508/ Cell Phone Tips - https://screwthecommute.com/528/ Michael Grace - https://screwthecommute.com/548/ More Entrepreneurial Resources for Home Based Business, Lifestyle Business, Passive Income, Professional Speaking and Online Business I discovered a great new headline / subject line / subheading generator that will actually analyze which headlines and subject lines are best for your market. I negotiated a deal with the developer of this revolutionary and inexpensive software. Oh, and it's good on Mac and PC. Go here: http://jvz1.com/c/41743/183906 The Wordpress Ecourse. Learn how to Make World Class Websites for $20 or less. https://screwthecommute.com/wordpressecourse/ Join our Private Facebook Group! One week trial for only a buck and then $37 a month, or save a ton with one payment of $297 for a year. Click the image to see all the details and sign up or go to https://www.greatinternetmarketing.com/screwthecommute/ After you sign up, check your email for instructions on getting in the group.
JOIN THE DEGEN DEN: https://patreon.com/degenden/In this episode, I go over top early NFT projects that we don't know a *whole* lot about yet but that I think have big potential for various reasons. Find out what these NFT projects are and why they attracted my interest!All My NFT Videos:► My NFT Playlist: https://youtube.com/playlist?list=PLH...17 Ways to Get FREE Crypto:► Watch Now: https://youtu.be/appoHHsB5eM
More on what works in 2022 for E-Commerce, we need to learn how to successfully take advantage of influencer marketing as it is still one of the most effective ways of marketing this year.In this episode, Jordan shares a special advertising technique that a lot of people are not yet using yet. Whitelisting is a technique that can combine the power and reach of influencers outside of your paid advertising.Listen up, enjoy, and learn!KEY TAKEAWAYS FROM THIS EPISODEYou can use a third-party app or tool to be able to gain access to the influencer's account and use their reach.Start small. Start by just requesting page access or partner access.Influencer whitelisting is not going away, it's an incredible way to be able to use that halo effect of that influencer onto your brand.Let the influencers know that you are going to send out ads that they already approve.The most important factor to get an e-mail opened is the sender's name.Book quick wins appointment here:https://www.mindfulmarketing.co/quickwinsConnect with Jordan here:LinkedIn: https://www.linkedin.com/in/jordan-west-marketer/This month's sponsor is KnoCommerce - the first survey platform built for eCommerce brands. Gain insight on everything from marketing attribution to purchase motivation, while leveraging your customer data for enhanced personalization.Start for free at https://knocommerce.com/pages/mmWe love our podcast community and listeners so much that we have decided to offer a free eCommerce Growth Plan for your brand! To learn more and how we can help, click here:https://mindfulmarketing.co/growthplan-applyIf you've been paying attention and your brand is ready to GROW, apply now to be the one new brand we take on this month!https://mindfulmarketing.co/apply
My NFT collection was whitelisted on Wax within a week. If I knew what I share today, I would have been whitelisted in about 48 hours. https://neftyblocks.com/c/dtropicvibes/drops/90830 (Claim Your NFT Here!) Twitter: https://twitter.com/TropicVibes (@TropicVibes) Email: mail[at]niftybusiness.co NFT 101 Episodes: https://niftybusiness.co/episode/web-3-0-explain-so-simple-even-congress-should-understand (#35 - Web 3.0 Explained) https://niftybusiness.co/episode/10-reason-to-buy-nfts-besides-making-money (#29 - 10 Reasons to Buy NFTs) https://niftybusiness.co/episode/nifty-words-nft-verbiage (#7 - NFT Words & Verbiage) https://niftybusiness.co/episode/nifty-words-nft-verbiage-part-ii (#46 - NFT Words & Verbiage Part II)
What's one way to adjust your rates for 2022? Adjust your rates for whitelisting!Definition: Whitelisting means an influencer grants a brand partner advertising permission to your Facebook Page or Instagram account.Brands can create and pay for Facebook and Instagram ads that run from the Instagram's handle.3 Best Practices for Whitelisting: Both brands and influencers need to communicate and discuss: · How long is whitelisting for? · Does it go beyond the term of the campaign? · Has the brand or PR team provided step by step directions to grand whitelisting on Facebook business manager? Put it in the contract The length of term of whitelisting should be laid out in the contract. If the brand agrees to pay you more for whitelisting, make sure your adjusted rate is in the contract.Make sure you trust the brand, PR agency, Influencer Agency, etc.FYI – you don't need to provide your username or password to any agency or entity requesting whitelisting access. You allow whitelisting access through Facebook Business Manager. You brand partner typically sends step by step directions on how to set it up on Facebook Busienss Manager.
The easiest way to create NFTs is by using the Wax Atomic Hub. However, not all NFTs are created equal. Whitelisting, becoming verified, and building an audience/community is actually more difficult than learning the technical elements of NFTs. Today we discuss the process. Source: https://www.youtube.com/watch?v=0NmmF9lJBlU (Creating Wax NFTs) (Beginner Tutorial) https://youtu.be/yTkaTr6mgS8 (How To Make Solana NFTs) (Beginner Tutorial) Twitter: https://twitter.com/TropicVibes (@TropicVibes) Email: mail[at]niftybusiness.co NFT 101 Episodes: https://niftybusiness.co/episode/web-3-0-explain-so-simple-even-congress-should-understand (#35 - Web 3.0 Explained) https://niftybusiness.co/episode/10-reason-to-buy-nfts-besides-making-money (#29 - 10 Reasons to Buy NFTs) https://niftybusiness.co/episode/nifty-words-nft-verbiage (#7 - NFT Words & Verbiage) https://niftybusiness.co/episode/nifty-words-nft-verbiage-part-ii (#46 - NFT Words & Verbiage Part II)
Newsletter MensilMente Qui #shopify #ecommerce #amazonfba #emailmarketing #tutorial __________
Watch this IGEL Tech-Tips Tuesday video to learn how to download, install and configure the IGEL OSC Appliance. Presented by Sebastian Perusat, IGEL Community FELLOW.In this video, Sebastien will teach you how to:00:00 Introduction 02:00 Download the Appliance04:00 Import the OVA into your Hypervisor06:40 Configuration EULA06:45 Local IP Address07:55 Check availability08:50 Change the Keyboard Layout09:25 Configure the DHCP Server10:30 Check DHCP settings11:00 Changing the Webserver Password12:00 Upload the Image15:30 Troubleshooting Status16:20 Test the conversion17:30 Change the deployment mode unattended18:10 Black and Whitelisting of Mac Addresses18:40 Your own DHCP ServerHost: Andy WhitesideCo-host: Chris FeeneyCo-host: Seb Perusat
Welcome to The Nonlinear Library, where we use Text-to-Speech software to convert the best writing from the Rationalist and EA communities into audio. This is: Worrying about the Vase: Whitelisting , published by Alex Turner on the AI Alignment Forum. Suppose a designer wants an RL agent to achieve some goal, like moving a box from one side of a room to the other. Sometimes the most effective way to achieve the goal involves doing something unrelated and destructive to the rest of the environment, like knocking over a vase of water that is in its path. If the agent is given a reward only for moving the box, it will probably knock over the vase. Amodei et al., Concrete Problems in AI Safety Side effect avoidance is a major open problem in AI safety. I present a robust, transferable, easily- and more safely-trainable, partially reward hacking-resistant impact measure. TurnTrout, Worrying about the Vase: Whitelisting An impact measure is a means by which change in the world may be evaluated and penalized; such a measure is not a replacement for a utility function, but rather an additional precaution thus overlaid. While I'm fairly confident that whitelisting contributes meaningfully to short- and mid-term AI safety, I remain skeptical of its robustness to scale. Should several challenges be overcome, whitelisting may indeed be helpful for excluding swathes of unfriendly AIs from the outcome space. 1 Furthermore, the approach allows easy shaping of agent behavior in a wide range of situations. Segments of this post are lifted from my paper, whose latest revision may be found here; for Python code, look no further than this repository. For brevity, some relevant details are omitted. Summary Be careful what you wish for. In effect, side effect avoidance aims to decrease how careful we have to be with our wishes. For example, asking for help filling a cauldron with water shouldn't result in this: However, we just can't enumerate all the bad things that the agent could do. How do we avoid these extreme over-optimizations robustly? Several impact measures have been proposed, including state distance, which we could define as, say, total particle displacement. This could be measured either naively (with respect to the original state) or counterfactually (with respect to the expected outcome had the agent taken no action). These approaches have some problems: Making up for bad things it prevents with other negative side effects. Imagine an agent which cures cancer, yet kills an equal number of people to keep overall impact low. Not being customizable before deployment. Not being adaptable after deployment. Not being easily computable. Not allowing generative previews, eliminating a means of safely previewing agent preferences (see latent space whitelisting below). Being dominated by random effects throughout the universe at-large; note that nothing about particle distance dictates that it be related to anything happening on planet Earth. Equally penalizing breaking and fixing vases (due to the symmetry of the above metric): For example, the agent would be equally penalized for breaking a vase and for preventing a vase from being broken, though the first action is clearly worse. This leads to “overcompensation” (“offsetting“) behaviors: when rewarded for preventing the vase from being broken, an agent with a low impact penalty rescues the vase, collects the reward, and then breaks the vase anyway (to get back to the default outcome). Victoria Krakovna, Measuring and Avoiding Side Effects Using Reachability Not actually measuring impact in a meaningful way. Whitelisting falls prey to none of these. However, other problems remain, and certain new challenges have arisen; these, and the assumptions made by whitelisting, will be discussed. Rare LEAKED footage of Mickey trying to catch up on his alignment theory after instantiating an unfriendly genie [colorized, 2050]. 2 So, What's Whitelisting? To achieve robust side effect avoidance with ...
Subscribe to DTC Newsletter - https://dtcnews.link/signup Hello and Welcome to DTC Podcast, I'm Eric Dyck, today we're brushing up with DTC Icon, and friend Josh Elizetxe, from Snow Oral Care. Josh has been relentlessly growing Snow across all dimensions, expanding his product lines to electric toothbrushes, toothpaste, as well as toothpaste for children, and even dental insurance. This brilliant podcast shines with deep insights on The tactics Snow's using to make this Q4 the biggest bundling year ever. Try before you buy, and how Snow's putting their money where their mouth is, literally. Whitelisting, dark posting, and how to create an interference pattern rather than one wave. Then we go deep on what Josh would do differently if he were building Snow again today….the answer might surprise you... Subscribe to DTC Newsletter - https://dtcnews.link/signup Advertise on DTC - https://dtcnews.link/advertise Work with Pilothouse - https://dtcnews.link/pilothouse Follow us on Instagram & Twitter - @dtcnewsletter Watch this interview on YouTube - https://dtcnews.link/video
Shlomi Levin, Co-founder and CTO of Perception Point discusses how you can safeguard your organization from cyberattacks like phishing and spoofing and also provides some details around how attackers tried to leverage the Salesforce Mass Email service to carry out an attack.
In this episode I go deep into Application Whitelisting with Corey Munson and Devin Bergin of PC Matic. I also talk about some upcoming technical add-ons to the Podcast and talk about this weeks news items that highlight the need to make sure you are protecting your kids and older relatives from the myriad of cyber threats targeting these groups. Feel free to email me with comments or questions to Darren@thecyburguy.com or darren@cybursmart.com. Thank you very much for listening.
In this week's episode of The Hunting Influence Podcast, Aaron is joined by Ucef Kaawach, Founder and CEO of B. Easy Social. Ucef discusses his entrepreneurship journey from a young age where he pursued drop shipping for his clothing brand, flipping items on Kijiji/eBay, and starting his own Amazon FBA Business where he generated over $100,000 in revenue after only one year. Ucef also discusses all things influencer marketing, such as how to find the best influencers and what things to look for, his advice for managing paid campaigns and negotiating with influencers, the biggest misconceptions of the Influencer Marketing industry as well as his experiences working with large influencers such as Floyd Mayweather and Kendall Jenner, and why Influencer Marketing is considered word of mouth on steroids.
"We push as hard as we can to get as much content as possible from influencers" — Ed Hodge MiHigh - Australia's #1 infrared sauna blanket - reached $1 million in revenue in 4 months, continuing to rapidly expand ever since. So, how'd they do it? In this jam-packed episode, Megaphone Director Max Hertan sits down with MiHigh Co-founder, Ed Hodge. Ed explains how MiHigh leveraged a pre-sale campaign to guarantee success, discusses the advantages of launching with a single-SKU store, shares some of his complex criteria for finding a successful product, and truckloads more. Full of actionable value, the boys talk about: — Dealing with a high AOV of $700 — Using the 80/20 method in business processes — Creative testing on FB as the main driver of sales — Influencer qualification processes — Going international from the outset — Omnichannel marketing to build credibility HELPFUL TOOLS MENTIONED: — Grin (influencer marketing for e-commerce) — Borderless (3PL) — Influee — Common Thread Collective (Twitter) We hope you enjoy the conversation! Keen to join the discussion? Join our Facebook community: MegaMinds (E-commerce growth community). We'd love to hear from you! You can also message Max Hertan and Ed Hodge on Instagram. Thinking about getting some advice on how to scale your business? Get in touch with Megaphone for a free strategy session.
#21. One major mistake microinfluencers make is not charging brands for whitelisting and usage rights. In this episode, influencer marketing expert Justin Moore, founder of Creator Wizard and Trending Family, demystifies these terms and explains why you should charge an additional fee for whitelisting and licensing - as well as how to price your sponsored content. We discuss other influencer FAQs including how to negotiate unpaid brand pitches into paid partnerships; whether or not to share your rates on a media kit; and how to improve organic reach on Instagram. Have questions about the episode or want to comment? Tag or DM @channelyourinfluence on Instagram.To connect with host Diane Taha go to instagram.com/stylecontext.To connect with guest Justin Moore go to instagram.com/creatorwizard.You can also find Justin at the following:https://www.youtube.com/c/creatorwizardhttps://twitter.com/justinmooretfamJoin Justin's Facebook group for influencers: https://branddealintel.com/Music:Say Good Night by Joakim Karud @joakimkarudMusic provided by Free Music for Vlogs youtu.be/tdSn9l_HzFE
Whitelisting and blocklisting are tried and true elements of the computer industry. In this episode our hosts define whitelisting and blocklisting and the pros and cons of either, with lots of examples from the real world. We discuss fuzzy entities, the scaling problem, layered defenses, and the trouble with active attackers.
In this episode, we are doing a deep dive into what you should be CTRL + F'ing in your collaboration contracts. Here are the four main things we look out for, and more insight into what these things ACTUALLY mean. We wish we knew these things in the beginning, so we hope this helps! Content usage, perpetual rights, and whitelisting ads.... OH MY! Danielle's Instagram: @shestyledwhatAllysa's Instagram: @fashionablysurfedPodcast Instagram: @theinfluencecommunityClubhouse: The Influence CommunityFacebook Group: THE INFLUENCE COMMUNITYAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
Email marketing. Now, you can make a lot of money with quality email marketing, and that's the way I've done it for 27 years now. But still to this day, with all the fancy social media and text and messenger marketing, people at my level make virtually all our money through email. Now, in this Part one episode, I'm going to cover the mechanics and some of the theories of email marketing. And next Monday, I'm going to cover the extremely important issue of subject lines. Screw The Commute Podcast Show Notes Episode 454 KickStartCart - http://www.KickStartCart.com How To Automate Your Business - https://screwthecommute.com/automatefree/ Internet Marketing Training Center - https://imtcva.org/ Higher Education Webinar – https://screwthecommute.com/webinars See Tom's Stuff – https://linktr.ee/antionandassociates 03:33 Tom's introduction to Email Marketing Part 1 06:00 Autoresponder email marketing 07:16 Overriding principles 09:04 Don't send UCE (otherwise known as spam) 12:33 Emailing from business cards 14:47 Spam triggers 20:58 Single opt-in vs Double opt-in 22:00 Email formats 30:25 Subject lines Entrepreneurial Resources Mentioned in This Podcast Higher Education Webinar - https://screwthecommute.com/webinars Screw The Commute - https://screwthecommute.com/ Screw The Commute Podcast App - https://screwthecommute.com/app/ College Ripoff Quiz - https://imtcva.org/quiz Know a young person for our Youth Episode Series? Send an email to Tom! - orders@antion.com Have a Roku box? Find Tom's Public Speaking Channel there! - https://channelstore.roku.com/details/267358/the-public-speaking-channel How To Automate Your Business - https://screwthecommute.com/automatefree/ Internet Marketing Retreat and Joint Venture Program - https://greatinternetmarketingtraining.com/ Disabilities page - https://imtcva.org/disabilities/ Pro Speaking - https://screwthecommute.com/prospeaking/ CAN SPAM ACT - https://www.ftc.gov/tips-advice/business-center/guidance/can-spam-act-compliance-guide-business Spam Trigger Words - https://prospect.io/blog/455-email-spam-trigger-words-avoid-2018/ Whitelisting - https://screwthecommute.com/whitelist/ Internet Marketing Training Center - https://imtcva.org/ Related Episodes Shopping Carts - https://screwthecommute.com/10/ Email Marketing - https://screwthecommute.com/34/ Paul Ace - https://screwthecommute.com/453/ More Entrepreneurial Resources for Home Based Business, Lifestyle Business, Passive Income, Professional Speaking and Online Business I discovered a great new headline / subject line / subheading generator that will actually analyze which headlines and subject lines are best for your market. I negotiated a deal with the developer of this revolutionary and inexpensive software. Oh, and it's good on Mac and PC. Go here: http://jvz1.com/c/41743/183906 The Wordpress Ecourse. Learn how to Make World Class Websites for $20 or less. https://screwthecommute.com/wordpressecourse/ Join our Private Facebook Group! One week trial for only a buck and then $37 a month, or save a ton with one payment of $297 for a year. Click the image to see all the details and sign up or go to https://www.greatinternetmarketing.com/screwthecommute/ After you sign up, check your email for instructions on getting in the group.
On today’s mini-sode, we’ll be defining what is whitelisting and we’ll be sharing our opinions about whitelisting for content creators and brands.Definition: Whitelisting means an influencer grants a brand partner advertising permission to your Facebook Page or Instagram account.Brands can create and pay for Facebook and Instagram ads that run from the Instagram’s handle.Why would brands want to whitelisting influencer content?· Whitelisting allows brands further influencer content. Instead of an influencer’s post being seen on the feed just 24-48 hours, a brand can put paid dollars behind that photo, video, or story to be seen past when the piece of content goes live.· Brands can target the post to people who don’t even follow the influencer. · Brands can also make minor edits to the influencer’s post – so adjusting the copy (or caption) for example is something a brand can choose to do.· Brands can use the influencer’s authentic voice – to further connect with potential audiences or customers.Why would influencers be open to whitelisting?· You can charge more. You can increase your base rate if the brand asks you for one month, 3 months, 6 months, or more to whitelisting your content. In our previous podcast episode about the Collectively report, about 50% of marketers spend less than $10,000 per month to amplify content. · You may benefit from extended reach. Since whitelisting helps brands tap into wider audiences, your account may show up on other people’s newsfeeds who aren’t following you. · You develop relationships with the brand/team. Think about it, a brand team thinks your face, your personality, your brand can represent their brand and business. That’s huge. A brand sees you as more than someone who can post a photo. A brand knows you can deliver high quality content that can be used for ads.Follow Emma on Instagram: @emmasedition | Pinterest: @emmaseditionFollow Maddy on Instagram: @madcrayy | Pinterest: @madcrayyFollow the Content Creatives Podcast: @contentcreativespodcastJoin the Content Creatives Podcast Facebook Group!
EP37: Today Influencer Coach Kahlea Nicole is joining me for the episode! We are talking all about Usage, Exclusivity, and Whitelisting when it come to brand collaborations and how you could be missing out on a Ton of cash in your pocket if you aren’t charging for these things. Grab a pen and a notebook & let’s jump in! Get EARLY access to Kahlea’s Self-guided course, Network to Net-worth, NOW by clicking the link below! https://kahleanicole.mykajabi.com/a/46126/fP8hDs4A If you sign up via this link, you will also get my Pastel Pop preset for free! Be sure to give Kahlea a follow too while you’re at it! https://instagram.com/kahleanicolee?igshid=1ft4q97s68qsp Follow Along: www.instagram.com/josie.bullard www.instagram.com/behindthefeedpodcast Questions? Email us at behindthefeedpodcast@gmail.com
In dieser spannenden Folge Digitalisierungsfieber präsentiert Euch IT- und Datenschutzexperte Andreas Kunz, ein Thema mit dem Ihr die IT-Sicherheit unter einer Minute auf das nächste Level hebt! Sie wollen auch zukünftig digital handlungsfähig sein und auch weiterhin DSGVO-konform agieren? Dann registrieren Sie sich jetzt unter https://andreaskunz.it für Ihr persönliches kostenfreies Online Beratungsgespräch!
On the show today is Taylor Lagace who is the co-founder of Kynship, an influencer marketing agency. I wanted to bring him on because unlike a lot of others in the influencer marketing space, Taylor actually knows his stuff. He's actually been there and done that. In fact, he's basically helped pioneer many of the cutting-edge strategies that brands are using successfully today.You'll hear about Taylor's thoughts on micro-influencers vs larger influencers, how they approach sourcing influencers and structuring deals, and their unique influencer whitelisting strategy that will blow your mind.More on Taylor: @taylorlagace on Twitter Kynship Sponsored by SparkLoop — the referral tool for newsletters. Hundreds of smart newsletter creators use SparkLoop to get more, high-quality email subscribers on autopilot. Get started in 5 minutes and start a free 30-day trial → sparkloop.app/eim
“When working with creators and influencers, you want to have a really structured and optimized process for content creation.” @jadesai94 #DTCPOD“Most campaigns should look to drive brand awareness and create content. Those are the only things that are guaranteed.” @jadesai94 #DTCPOD“Lifestyle content is great because it allows an audience to make the connection that they can see themselves using the product.” @jadesai94 #DTCPOD“Consider creating content for different stages of your customer journey.” @jadesai94 #DTCPOD“A strong, professionally created testimonial by a create could be the difference of someone watching an ad for a second vs five seconds. That could make all the difference in conversion.” @jadesai94 #DTCPODWe Speak About:[00:30] Why you need templates in your influencer campaign strategy[01:45] How to run a successful lifestyle content campaign[02:55] What you will get out of a product shot campaign[03:55] A campaign that will help you get more followers for your brand[04:40] Testimonial campaigns and why they are so good for your brand[05:25] Creating a campaign to map out your entire customer journey[06:45] A campaign idea that engages your audience to buy for their friends and family[07:35] The bare minimum campaign strategy you should be running with creatorsWorking with influencers is more than just sending out a product and getting them to take a photoAt Trend, we’re always talking about the importance of adding structure to your influencer campaigns. So today, we’re going over some structured campaigns you can create.These ideas are different types of campaigns you can run with influencers.We’re going through six different campaign ideas and offering a bare minimum framework that you can use right now. The content you receive from these campaigns is sure to improve your content calendar.By using this framework you will be able to create different themes around the content you create. As a brand, you will also be able to improve the stories you can create with your content.Stay tuned as we run through various influencer campaign ideas, discuss the goals you should set for them, and talk about how to use the deliverables to grow your brand.If you’d like to learn more about Trend and our influencer marketing platform for influencers and brands visit trend.io. You can also follow us for tips on growing your following and running successful campaigns on Instagram and LinkedIn.Mentioned Links:Set up a free Trend campaign and get access to templates for your next creator campaign:https://app.trend.io/signup
26 – IAM - Application Whitelisting
“Influencer marketing and creator marketing is a lot more than just sending creators product and having them post.” @jadesai94 #DTCPOD“The fastest way to level up your content is by delivering creators a strong creative brief.” @jadesai94 #DTCPOD“In your creative brief, you want to include three to four brand values and three to four product benefits that you want the creator influencer to mention.” @jadesai94 #DTCPOD“If the content didn’t meet your expectations, it’s okay to provide feedback. Just make sure that it’s constructive and actionable.” @jadesai94 #DTCPOD“You need to have firm beliefs on why you are choosing certain creators for a campaign. Is it because of their content, audience, a combination of both?” @jadesai94 #DTCPODWe Speak About:[01:10] The wrong way to think about creator and influencer marketing[01:45] The most important thing you should do to level up creator content[02:15] Checklist for making the best creative brief[03:50] How to get creators excited about working with your brand[05:15] The products you should send to creators[06:00] Rules for effective communication with creators and influencers[06:45] How to make sure you get the best content from creators[07:35] The one thing you need to make sure to tell creatorsLevel up your creator and influencer marketing campaigns in five easy stepsWhen influencer marketing got its start, it was very much the Wild West. Most brands were just sending product and waiting for influencers to post.Now, there is much more involved in the process.If you really want to get the most out of influencer marketing, you are going to need to do more than just send product to an influencer or creator.That part is important, but it’s also important that you get the most mileage out of your campaign. This means focusing on the content as much as picking the creator with the right audience.Focusing on the content can allow you to get more value out of influencer marketing. You can repurpose content in ads, social media, your website, emails, and more.This content usually performs much better than in-house content so getting this right can add big benefits to your marketing strategy down the line.The road to better content from creators starts with a strong style guide. You need to tell creators how you want the content shot, what shouldn’t be included, and provide great examples.If you don’t have great examples, pick up some photos from Unsplash, do a quick search on Google images, or share screenshots from a brand whose content you enjoy.Looking for more tips?Stay tuned to this episode as we dive into further detail about the style guide and offer four more tips to follow to maximize the value of working with creators and influencers.If you’d like to learn more about Trend and our influencer marketing platform for influencers and brands visit trend.io. You can also follow us for tips on growing your following and running successful campaigns on Instagram and LinkedIn.Mentioned Links:DTC POD episode on whitelisting and dark posting: https://trend.io/blog/influencer-whitelisting-dark-posting-podcast
“If you’re looking to scale user-generated content and influencer-generated content, Trend can help you do it at $100 per creator.” @jadesai94 #DTCPOD“To run a successful creator or influencer campaign, you want to make sure you pick creators and influencers that fit your brand.” @jadesai94 #DTCPOD“The reason creator and influencer content works so well is that it often looks native to the platform. It doesn’t look like it’s coming from a brand.” @jadesai94 #DTCPOD“By using custom brand content in ads from creators and influencers on Trend, Mizzen+Main was able to increase ROAS by 2.7x.” @jadesai94 #DTCPOD“Don’t just stop at generating the post from a creator or influencer. Use that content on your website, emails, social, and ads to get more mileage out of your partnerships.” @jadesai94 #DTCPODWe Speak About:[01:20] What parts of Mizzen+Main’s creator strategy we are going to cover[01:30] How Mizzen+Main activates creators and influencers[03:00] How to pick the right creators and influencers for your brand[03:40] Where Mizzen+Main is using custom brand content by creators[04:20] Why creator and influencer content will perform better than your own content[05:00] Where else to use user-generated content and influencer-generated content[05:50] Why all of your ad content should use UGC and IGC[07:10] Breaking down Mizzen+Main’s whitelisting strategy and results[08:15] What Mizzen+Main did after whitelisting to get even more results[09:30] How to start replicating Mizzen+Main’s content strategyHow Mizzen+Main increased purchases by 2.3x and return on ad spend by 2.7x with custom creator contentToday, we are breaking down Mizzen+Main’s winning creator strategy that’s increased purchases and boosted ad performance. Mizzen+Main has run campaigns on Trend, so we’re excited to break down their strategy.For context, Mizzen+Main is a clothing brand that specializes in performance fabric menswear. Mizzen+Main’s strategy for activating creators and influencers has helped boost conversions and stay top of mind for consumers.There are two big reasons Mizzen+Main has been so successful in working with creators and influencers:They make sure to pick creators and influencers that fit in with their brand.They make sure to get the most mileage out of these partnerships, using influencer-generated content in multiple ways.Continuing to get more mileage out of creator content is key in generating a return on your investment. You can’t just rely on an influencer’s post to make you money.Stay tuned as we cover where Mizzen+Main activates creators, how they pick the right ones, where they use the custom brand content they get, and what results they have generated.If you’d like to learn more about Trend and our influencer marketing platform for influencers and brands visit trend.io. You can also follow us for tips on growing your following and running successful campaigns on Instagram and LinkedIn.Mentioned Links:Mizzen+Main’s website: https://www.mizzenandmain.com/Facebook ads library: https://www.facebook.com/ads/library/Trend breaks down Mizzen+Main’s creator and influencer strategy in a blog post: https://trend.io/blog/mizzen-and-main-dtc-marketing-micro-influencersMizzen+Main dark posting case study: https://www.facebook.com/business/success/mizzen-and-main
“If you want to get even more mileage out of influencer and creator partnerships, you should try whitelisting and dark posting.” @jadesai94 #DTCPOD“Return on ad spend can go up by 20% when using whitelisting and dark posting.” @jadesai94 #DTCPOD“A big benefit of whitelisting and dark posting is that you are essentially adding new audiences you can use in ads.” @jadesai94 #DTCPOD“Receiving access to an influencer’s business manager on Facebook also allows you to create lookalike audiences from their existing audience.” @jadesai94 #DTCPOD“You want to run a campaign with 10, 20, or even 30 influencers and creators so you can get a good idea on what content performs best organically.” @jadesai94 #DTCPODWe Speak About:[01:05] What is influencer whitelisting[02:00] What is influencer dark posting[03:15] Why to do whitelisting and dark posting[05:30] How to convince influencers and creators to whitelisting and dark posting[05:45] How whitelisting and dark posting allows you to build new audiences in ads[07:30] How to set up influencer whitelisting and dark posting (for influencers + brands)[10:05] Incentives to offer influencers and creators for whitelisting and dark posting[10:45] How to pick the best content to whitelist[13:00] How to pick the best content for dark posting[13:40] One of the best ways to use dark posting to generate ROIEverything you need to know about influencer whitelisting and dark postingWhitelisting and dark posting can be a great way to get extra mileage out of your content. It allows you to run ads with influencer content through an influencer’s account.Instagram users can see someone else’s post for about 24-48 hours in their organic feed. For stories, it’s only 24 hours. Once a post is gone from the organic feed, it’s doesn’t receive very many views.You need a strategy in place to maximize the dollars you spend on influencer marketing. That’s where whitelisting and dark posting comes in.Working with an influencer’s business account on Facebook also gives brands access to their audience. This allows brands to create lookalike audiences from creator accounts on Instagram.Before you get started with whitelisting though, you need to get the creator to agree to do it. There are a few different offers you can make focused on exposure and money.Stay tuned as we cover how to get your whitelisting and dark posting set up, how to help influencers set up their Facebook business manager, and how to pick the best content for this.If you’d like to learn more about Trend and our influencer marketing platform for influencers and brands visit trend.io. You can also follow us for tips on growing your following and running successful campaigns on Instagram and LinkedIn.Mentioned Links:Guide on how to set up whitelisting (for influencers and brands): https://www.lumanu.com/post/how-to-guide-influencer-whitelisting
Featuring Mac Enright, Marketing and Growth Manager at LumanuWorking and growing alongside inspiring Lumanu executives, Mac took on roles at Lumanu ranging from Client Success intern to Sales Engineer to his current position as Marketing & Growth Manager.Lumanu delivers simple, secure, and seamless technology solutions that foster powerful partnerships between creators and brands.Episode quote:“So you can create a creator ad from the creator’s handle without having the creator actually post for you organically or create a sponsored post. Once you get their permissions through the whitelisting process that we talked about, you’re able to create these influencer ads from those handles using any content that you want, whether the influencer sends you images to post...you can do all of that right in your ad account.” Mac Enright from LumanuVisit the episode page to learn more.
Not getting the results you want with your influencer campaigns? We’re here to help! Step 1. Sign up for our Flywheel Challenge (Only a few spots left and closing the doors on Saturday for REALS.) Step 2. Listen to our conversation with Roger Figueiredo the VP of Marketing and Sales Development for hashtag paid, a leading platform for executing influencer campaigns. We pick Roger’s brain on all things influencer marketing, take a peek at the highlights below:
“A repeatable, standardized process can go a long way to making sure you have an effective and efficient campaign.” @jhcjr_ #DTCPOD“Finding creators for your campaign is one of the most crucial steps to campaign success.” @jhcjr_ #DTCPOD“It’s not enough to just include a checkmark that a creator is willing to join your campaign. Don’t forget things like shipping info, content rights, whitelisting, etc.” @jadesai94 #DTCPOD“You should ship your product immediately once you agree to terms with a creator.” @jadesai94 #DTCPOD“Don’t make your relationships with creators transactional. Focus on making long-term relationships that will benefit your brand.” @jhcjr_ #DTCODWe Speak About:[01:20] What a standardized process can do for influencer campaigns [02:10] How you can find creators and influencers[03:30] Treating your creator flow like a sales funnel[04:15] How to track and manage creators[07:00] The steps you need in your creator flow[09:30] How to negotiate the right way with creators[11:05] The importance of deadlines for creators[12:30] When you should pay creatorsToday, Jamie Catanach, head of customer success for Trend, joins the show. Trend is the leading destination for brands looking to work with creators and produce high-quality content.Have a strong plan in place with influencers and creatorsA great process is key in any business activity. This is especially true for working with influencers and creators.Executing a strong plan for creators starts with finding the right creators. You should have both inbound and outbound strategies to source creators and influencers.Think of your creator flow as a sales funnel. You need to have different sources to your sales funnel and have your steps mapped out.Once you decide to start working with creators, make sure you are tracking your partnerships. Use either Google Sheets or an AirTable. If you want a better way to track and manage creators, use Trend.It’s important to stay organized in this process. Organization is more important the more creators you work with.You need more steps than just a checkmark if a creator agrees to work with youJust like a sales or marketing funnel, your creator flow should have steps too.It isn’t enough to just mark that a creator or influencer has agreed to work with you.You should also have space for shipping information, content rights, and deadlines for creators on your tracking document.If you don’t want to track all of this on your own, Trend can help keep these steps organized for you.If you are interested in whitelisting content (running ads through a creator’s account), make sure you ask for this upfront.Whenever you are negotiating with creators and influencers, make sure your conversation is not just transactional. You want to build real relationships.By building real relationships, you are building brand equity with creators. Brand equity with creators can lead to creators talking about your product without you paying later down the line.Stay tuned as Jamie also covers how you should pay creators, and offers some tips to make relationships less transactional.If you’d like to learn more about Trend and our influencer marketing platform for influencers and brands visit trend.io. You can also follow us for tips on growing your following and running successful campaigns on Instagram and LinkedIn.
“Campaign guidelines mean setting the right expectations and setting yourself up for success.” @jhcjr_ #DTCPOD“Let the creator craft the message to their audience themselves.” @jhcjr_ #DTCPOD“You need content for your business to stay relevant.” @jhcjr_ #DTCPOD“Let your creator know what the campaign should and shouldn’t do.” @jhcjr_ #DTCPOD“Working with creators is great for going after tried-and-true audiences or testing out new audiences.” @jhcjr_ #DTCPODWe speak about:[02:00] The essential elements of campaign guidelines [06:00] Helpful guidelines for creators[12:35] Working with creators to test out new audiences [15:10] How to put together your style guide when you’re just beginning [17:45] The ideal timeline for your campaign [21:50] Jamie’s final advice to ensure a successful campaign Today, Jamie Catanach, head of customer success for Trend, joins the show. Trend is the leading destination for brands looking to work with creators and produce high-quality content.The Basic Elements of Influencer Campaign GuidelinesCampaign guidelines are a critical piece to the success of an influencer campaign. Have a plan from the start! The goal with campaign guidelines is to set the expectations for creators upfront.Creators will be basing their content off of the campaign guidelines. You want to provide as much detail as possible here. Also, you want to be clear and communicate exactly what you are looking for.Make sure that the creators know upfront that you intend to have the rights to their content afterward. If you are on Trend, our platform will manage this aspect for you.You should be upfront about a timeline for your creator. When reaching out to creators, a timeline should be clearly communicated and confirmed with the creator.Make sure that the creator understands what products they will be receiving. Also, share talking points around your brand and the products that you’re sending.Your creator should be creative about the caption that they provide. However, you should provide five to ten bullet points about the brand and the product. Then, your creator can reference some of those things in their caption. The Style Guide Is A Critical Element of Your Campaign The style guide is where you describe the type of content that you are looking for. Make sure you communicate the kind of digital aspects you are looking for the creator to create.When communicating guidelines, be as specific as possible. Should the creator be outside, indoors, in nature, with their family? This type of information is critical when communicating the kind of content you are looking for from creators. Lastly, don’t hesitate to provide examples. If you see some great content on Pinterest, don’t be afraid to share it with your creator. If you like bright warm photos, find creators with that type of content. Stay tuned as Jamie explains how to create a style guide when you’re just in the beginning stages of content creation. Plus, Jamie reveals what to consider when figuring out your campaign timeline. If you’d like to learn more about Trend and our influencer marketing platform for influencers and brands visit trend.io. You can also follow us for tips on growing your following and running successful campaigns on Instagram and LinkedIn.
Welcome! Craig discusses problems that businesses can face when using VPNs and why you should be looking to a Zero-trust network if you are running a business today. For more tech tips, news, and updates, visit - CraigPeterson.com --- Traders set to don virtual reality headsets in their home offices What's on Your Enterprise Network? You Might Be Surprised Malware Attacks Declined But Became More Evasive in Q2 One of this year’s most severe Windows bugs is now under active exploit The VPN is dying, long live zero trust Shopify's Employee Data Theft Underscores Risk of Rogue Insiders Microsoft boots apps out of Azure used by China-sponsored hackers WannaCry Has IoT in Its Crosshairs Love in the time of Zoom: Why we’re in the midst of a dating revolution --- Automated Machine-Generated Transcript: Craig Peterson: [00:00:00] What is going on with malware? There've been some major changes just over the last few months. That's what we're going to talk about right now. What do you need to watch out for? What should you be doing in your business as well as your home? Hey, you're listening to Craig Peterson. We know that they're here. I have been a lot of attacks over the years. That's what we're trying to stop. Isn't it with our businesses, with our home users? That's why we buy antivirus software or why we have a firewall at the edge. Maybe we even upgraded your firewall. You got rid of that piece of junk that was provided by your internet service providers. Most of them are frankly, pieces of junk, maybe you're lucky and have a great internet service provider that is giving you really what you need. I have yet, by the way, to see any of those internet service providers out there, that are really giving you what you need. So there is a lot to consider here when we're talking about preventing and preventing malware. What we have found is that malware attacks declined this year in the second quarter, but here's what's happening. Right? They are getting through more. Historically, we had things that have hit us that have been various types of malware. I remember when I first got nailed back in 91. I had a Unix server that I was running, as you probably know, I've been using Unix since the early eighties, 81, 82. I was using Unix, and I had my own Unix machines because I was helping to develop the protocols that later on became the internet about a decade or more later. The Unix world was on rather an open world. Was everybody on the internet was pretty friendly. Most people were involved in research, either government research or businesses doing research online, a lot of smart people and we actually had some fun back in the days', puns, and everything. We weren't that worried about security, unlike today, where security really is a top of mind thing for so many people. We weren't worried about who's going to do this to me or that to me. I had a Unix server that I was using, actually at a few of them that I was using for my business. Now, one of those servers was running emails, a program called Sendmail. That's still around today. It was the email package that was ruling the internet back at the time. I got nailed with something called a worm. It was the Morris Worm. In fact, it got onto my computer through no act of my own. I didn't click on anything. It got onto my computer because it came through the internet. That was back in the days when we really didn't have much in the line of firewalls so it just talked to my mail server. One of these days we'll have to tell some stories about how we really trusted everybody back then. You could query to see if an email address was good. You could get onto the machine and say, Hey guy, I noticed that you had this problem so I went in and fixed it for you, and here's what I did. Much, much different world back then. But that's how malware used to spread. It was something, it was just kind of automated. It went out and they just checked everybody's machine to checked firewalls, to see what they were to see if they were open. We've been doing that for a very long time, haven't, we? We have been nailed with it. That's what the viruses were and are still. Where it gets onto your computer. Maybe you installed some software that you shouldn't have, and that software now takes over part of your computer. It affects other files. It might be something that's part of a Word macro or an Excel macro. And it now spreads through your sharing of that file and other people opening it. Worms are like what I got nailed with, just start crawling around through the internet. So they run some software on your machine and that looks for other machines and today things have changed again. They are changing pretty frequently out there. What we have seen so far here in 2020 is a decrease in malware detections. Now, just because there's been a decrease in malware detections, I don't want you to think that the threat has diminished because it hasn't. But the signature-based antivirus system is real problems. Now, what's a signature-based antivirus system. That's any antivirus software, like your McAfee's like your Norton's, the Symantec stuff, any antivirus software, that is working like your body's immune system. What happens with your body's immune system? You get a virus and you're your body says, okay, what's going on here? It starts to multiply. Eventually, the body figures it out. It develops antibodies for it. So the next time it sees that particular virus, you're likely to be pretty much immune from it. Your body's going to say, Whoa, that's a virus and it goes in and kills it pretty darn quickly. That's the whole idea behind trying to stop the WuHan virus that is spreading out there. How do we stop it while we stop it, by just developing antibodies? Right? That's herd immunity. We could also develop antibodies by an antivirus shot that is designed to stop that virus from spreading and prevents you from coming down with COVID-19 symptoms. In the computer world, it's much the same as most of the software signature-based antivirus software is exactly the same as the way your body's immune system has been working. In many, many ways. Here's what happens. Someone gets infected with a virus and they reported to Symantec or Norton, or maybe the software reported itself. Usually, it's a third party that reports that and they look at it and they say, okay, so what does this virus look like? There is in this program the developers' names embedded or the name of the hacker group is embedded in it. So we are going to now say any piece of software that it has this hacker group's name in it, we're going to ban. Right? It recognizes it. So when the file comes onto your computer your computer looks at it. It looks at the signatures. These are called signatures. To say, okay, how does it match? Or it doesn't match at all and it might be through a string that's somewhere embedded in there. So it might be through a name. It might be through a number of other things. That's signature-based. The malware, that was not detectable by signature-based antivirus systems jumped 12%. In the second quarter of 2020. That is amazing. Amazing, absolutely amazing. Seven in 10 attacks that organizations encountered in the second quarter this year. In fact, involved malware designed to circumvent anti-virus signatures. Most cyber-attacks last year and this is probably going to be true in 2020 as well as we get into the fourth quarter. But most cyberattacks in 2019 came about without malware. That means that there were hackers behind this. We're going to talk about that. What's going on some of the data also from CrowdStrike and what they have found CrowdStrike is an anti-malware anti-hacker company. They've got a lot of great people working for them as well. What they have found. It's like the bad old days of hacking and they're back on us right now. So make sure you stick around. Cause we're going to get into that when we get back. And of course, we got a whole lot more, including a major windows bug that's now under exploit and how does this all fit together? You are listening to Craig Peterson. --- More stories and tech updates at: www.craigpeterson.com Don't miss an episode from Craig. Subscribe and give us a rating: www.craigpeterson.com/itunes Follow me on Twitter for the latest in tech at: www.twitter.com/craigpeterson For questions, call or text: 855-385-5553
Welcome to Sponsored Post Podcast: Behind-the-Lens of How Influential Content is Made. Sponsored Post Podcast is hosted by Justin Moore, Founder & CEO of Trending Family. In each episode, Justin discusses the exciting and complex world of influencer marketing. In S3E4 of Sponsored Post Podcast, Justin Moore talks about Usage Rights. Should I let a brand run Paid Media or use Whitelisting on my Facebook or Instagram? What are Dark Posts? Learn more about what to do if a brand wants specific terms for usage rights/paid media/whitelisting in the brand deal or sponsorship. Creators: Get insider tips on how to grow your business & diversify your income...plus a free Pricing Checklist: https://creatorwizard.ck.page/pricingchecklist Contact Trending Family: hello@trendingfamily.com
What is application whitelisting? Why is it needed? How can application whitelisting improve your internal MSP security as well as that of your clients? Join our guest Corey Munson as he describes the many advantages to a whitelisting security approach to protect MSPs and clients alike, especially amidst rapidly emerging trends such as BYOD and remote work. MSP Zone Guest: Corey Munson, vice president of sales at PC Matic
EP 86: Whitelisting and Influencer Marketing with Hashtag Paid’s Phil Jacobson In Episode 86, Tyler and Jon dive into Shopify's new app: Shop. Tyler goes deeper into the potential battle with Amazon that Shopify is setting into motion with their new app by providing services that will impact a significant portion of the eCommerce ecosystem. With advantages like local listings and no extra charges to merchants, the Shop app has great potential. Moving forward Tyler introduces Phil Jacobson, the VP of Product and Growth at Hashtag Paid. Phil describes Hashtag Paid as a market place for businesses to get in touch with creators as well as an innovator in providing marketing tools for businesses. He goes on to highlight the importance of working with creators to build legitimate brand relationships anchored in relevance as opposed to commission. This relationship is discussed in greater depth when factoring in the authentic experience Phil strives for when working with brands at Hashtag Paid as he details with how some of their best customers are leveraging whitelisting. Phil discusses the need for authenticity and goes on to outline some of the common mistakes brands are making when working with influencers and implementing their own whitelisting campaigns. After wrapping up the interview, Jon brings us Words of Twisdom from @CleverTap that remind business leaders to focus on the value their products bring their customers. Have you subscribed and left us a review yet? If not, please do- it's super helpful in enabling other marketing leaders to discover the pod! By the way- is there anything we can do for you? Shoot an email to info@fidelitasdevelopment.com if there is and we'll do our best to help! Timestamps 00:34 - Intro 00:44 - In The News: Shopify’s New App, Shop 06:15 - Interview with Phil Jacobson 06:31 - Hashtag Paid 07:25 - Creator Whitelisting 08:55 - Creators vs. Influencers 12:29 - Whitelisting in Different Industries 14:29 - Can Whitelisting be Used as a Work-around for Facebook's Ad Policies? 15:23 - Tracking Metrics with Third Party Creators 16:55 - The Potential Competition of Facebook Ad Manager Implementing Influencer Management 19:36 - Could Facebook be Interested in Acquiring Hashtag Paid? 20:20 - Brand + Creator Relationships 22:01 - Channels Brands are Integrating with Whitelisting 25:14 - Common Influencer Marketing and Whitelisting Mistakes 29:12 - What Successful Whitelisting Campaigns are Doing 30:29 - The importance of 3rd Party Review Platforms for Hashtag Paid's Own Marketing 32:33 - Changes to Come in eCommerce 37:02 - Phil's Take On Shopify's new Shop App and its Potential to Compete with Amazon 45:30 - Key Take-away 48:48 - Words of Twisdom 49:00 - Outro Featured Guests | Phil Jacobson Phil Jacobson What's In the News New App for Shopify Lion’s Share Marketing Podcast Learn More About Tyler & Jon www.tylersickmeyer.com Need Marketing Help? www.FidelitasDevelopment.com Music Intro Music – Colony House – Buy “2:20” on iTunes Outro Music – Skillet – Buy “Lions” on iTunes
Udi Wertheimer is a skeptic on most blockchain tokens. False marketing annoys him, he thinks Ethereum is fundamentally a bad investment, and the new DeFi movement is not decentralized at all. Show Notes: Living through the silliness of the 2017 crypto bubble How Udi thinks about the space then vs now Ethereum’s problems, comparing ETH then vs now DeFi is mostly centralized, comparing Tether to MakerDAO & Bitmex liquidations What if DAI was built on Bitcoin What is Liquid, why couldn’t ETH be built as a Bitcoin Sidechain Decentralization of sidechains vs native blockchains Chances of heavy regulation on ETH projects What would have to change to make Udi bullish on ETH Brad’s thesis on Cryptocurrencies in general The average investor has gambling tendencies mass adoption discussion, Paypal vs Bitcoin UX Macro discussion. Green new currency and modern monetary theory What it’s like living in Israel What Udi did before Bitcoin Politics discussion, Trump’s impact. Fairness in crypto - BTC is not equally distributed but that’s normal Risks involved in mixing Bitcoin Whitelisting bitcoin, blacklisting bitcoin and how that can void anonymity Udi’s advice to noobs Gambling with Altcoins and managing risk Will Udi join the Tron army? ETH predictions Reckless Review Podcast Twitter Find Udi’s Telegram Channels here: VR Bitcoin Meetup Group - Learn From & Network With Bitcoiners VR Udi’s Pro-Ethereum Alerts Check out Udi’s TedTalk ---- Produced by Brad Mills - Twitter, Hamilton - YouTube, Jason Sanderson - Podcast Tech Other Credits: bitconnect theme by schmoyoho, graphics by CryptoScamHub, Magic Internet Money inspired by u/mavensbot, invention of bitcoin & all cryptocurrencies by satoshi nakamoto. --- Brad Mills is a partner at Xsquared Ventures. All opinions expressed by Brad & his guests do not reflect the opinions of Xsquared Ventures or Xsquared Ventures Management. Investing in cryptocurrencies is high risk and can get you rekt, do not treat any opinion expressed on this show as investment advice, but only as an expression of Brad’s opinion. This podcast is for informational purposes only. Do not attempt to HODL without doing your research first.
Welcome to Sponsored Post Podcast: Behind-the-Lens of How Influential Content is Made. Sponsored Post Podcast is hosted by Justin Moore, Founder & CEO of Trending Family. In each episode, Justin sits down with influencers and industry professionals to discuss the exciting and complex world of influencer marketing. In this episode, Justin Moore, Founder & CEO of Trending Family, interviews David Herrmann, President of Herrmann Digital. Together they discuss paid social, and how utilizing microinfluencers can allow for more content production. Learn more! Trending Family's Website: https://www.trendingfamily.com/ Trending Family's LinkedIn: https://www.linkedin.com/company/trending-family Justin Moore's LinkedIn: https://www.linkedin.com/in/justinnmoore/ David Herrmann's LinkedIn: https://www.linkedin.com/in/herrmanndavid/ Contact Trending Family: hello@trendingfamily.com
In this episode, Fred Cobb explains Whitelisting and Blacklisting, the process used to control what applications and websites employees can connect to. Companies that don't place limitations on employee access have a greater risk of experiencing a breach and are more likely to have a widespread outbreak. Some business leaders may feel placing limitations on employees will dampen morale. Fred explains why these limitations are important and can minimize the impact of cyber-attacks.
Release Notes include our periodic updates that highlight the recent product improvements we’ve made, so you can easily stay up-to-date on what’s new. We’ve had some major updates and bug fixes to make selling your plugins and themes way easier! Here’s what we worked on between June – Sept 2019: White Label mode and URL […]
IT Manager Podcast (DE, german) - IT-Begriffe einfach und verständlich erklärt
Kontakt: Ingo Lücker, ingo.luecker@itleague.de Heute dreht sich alles um das Thema: „Was ist eigentlich Application Whitelisting?“ Beim Application Whitelisting handelt es sich um ein Verfahren, mit dem man die Ausführung nicht autorisierter oder schädlichen Applikationen auf einem IT-System oder in einem Netzwerk verhindert. Das erreicht man, indem man eine Positivliste, die sogenannten Whitelist erstellt. Auf dieser Whitelist werden alle Anwendungen aufgeführt, die auf einem Gerät oder einem System laufen dürfen. Sprich, solange eine Anwendung nicht explizit in der Whitelist eingetragen ist, ist jegliche Kommunikation oder Interaktion über diese Anwendung untersagt. Grundsätzlich bestehen Whitelisting-Produkte aus zwei Komponenten: Die erste Komponente ist ein Softwaremodul, der sogenannte Agent. Dieser wird auf allen Systemen installiert, die von der Whitelisting-Lösung geschützt werden sollen. Nach der Installation fängt der Agent alle Startversuche ab und prüft die betreffende Applikation anhand der Whitelist, ob diese in der Whitelist aufgeführt ist oder nicht. Um hier eine fälschungssichere Authentifizierung zu gewährleisten, setzt man ein Hash-Verfahren ein. Bei diesem Verfahren werden Prüfsumme ermittelt und miteinander verglichen. Beim Whitelisting generiert der Agent aus den Binärdaten der zu startenden Anwendungen einen Hash, sprich eine Prüfsumme. Diese Prüfsumme wird mit der Prüfsumme auf der Whitelist verglichen. Ist die Anwendung mit der dazugehörigen Prüfsumme nicht auf der Whitelist gelistet, wird die Ausführung der Software verweigert. Die zweite Komponente ist eine Software, die zum Ausstellen von Anwendungs- und Richtlinien-Zertifikaten (sogenannten App-Certs) zuständig ist. App-Certs sind elektronische Ausweise für Software und Anwendungen. Sie analysieren, welche Komponenten zu welchen vertrauenswürdigen Applikationen gehören und ordnen diese entsprechend zu. Außerdem kann man mit ihnen Sicherheitsregeln definieren, die die Whitelisting-Software auf den zu schützenden Systemen anwenden soll. Wo lassen sich nun Application-Whitelisting Produkte konkret einsetzen? Application-Whitelisting Produkte kommen in den unterschiedlichsten Bereichen der IT zum Einsatz. Zu den möglichen Einsatzszenarien zählen unter anderem: Firewalls werden oftmals über eine Whitelist konfiguriert. So können nur die definierten und in der Whitelist aufgeführten Kommunikationsziele über die Firewall hinweg kommunizieren, alle anderen Verbindungswünsche werden unterbunden. Ebenso kann Application-Whitelisting beim Endgeräteschutz eingesetzt werden. Hier können Endgeräte lediglich die Applikationen ausführen, die in der Whitelist aufgelistet sind. Ein weiteres Anwendungsgebiet des Application- Whitelistings ist der Jugendschutz. Über die Whitelist lässt sich ein Internetzugang so konfigurieren, dass für bestimmte User nur die in der Liste geführten Ziele aufrufbar sind. Auch E-Mail-Systeme können über eine Whitelist gesteuert werden. So können nur E-Mails von vertrauenswürdigen Absendern empfangen werden. Allerdings werden die zuvor genannten Einsatzszenarien in der Praxis von unterschiedlichen Seiten kritisiert. Beispielsweise erfordert das Application Whitelisting die Pflege von Datensätzen. Das bedeutet, die Whitelist muss dynamisch sein. In Anbetracht der Vielzahl von Programmen, Apps, Betriebssystemen und Servern kann sich die Verwaltung von Application Whitelists als schwierig erweisen. Der Aufwand lohnt sich hauptsächlich für Anbieter von Antivirenprogramme, Firewalls und weiteren Sicherheitsprogrammen. Nichtsdestotrotz kann Application Whitelisting bei folgenden Aspekten helfen: Schutz vor Schadsoftware wie Viren, Trojanern oder Ransomware, dem Schutz vor noch unbekannter Schadsoftware (Zero-Day-Exploits), dem Schutz vor Schadsoftware, die über vorhandene Sicherheitslücken eingedrungen ist und Schutz vor DLL-Injection Angriffen sowie Schutz vor Angriffen durch eigenes Personal im internen Netz Wir kommen nun zum Ende unseres Podcasts. Alles in allem kann man sagen, dass mit Application-Whitelisting-Lösung Ihre Systeme und Netzwerke nicht mehr mit Schadsoftware infiziert oder durch eigenes Personal angegriffen werden können. Die daraus resultierenden Schäden entfallen und auch aufwändige Neuinstallationen sind dann Schnee von gestern. Außerdem erfüllen Sie durch den Einsatz von Whitelisting-Produkten die gesetzlichen Anforderungen. Kurzum: Application Whitelisting reduziert Ausfälle, erhöht die Stabilität und Produktivität.
Episode 120: X World Is Coming! SYNOPSIS: X World is coming, and Tony Gray, chair of the AUC, joins the podcast to talk about this winter’s southern hemisphere spectacular. YOUR HOSTS: Tom Bridge, Partner, Technolutionary LLC [@tbridge] Marcus Ransom, Senior Apple Systems Engineer, CompNow [@marcusransom] Charles Edge, Director of Marketplace, Jamf [@cedge318] PRESENTING SPONSOR: VMWARE WORKSPACE ONE VMware Workspace ONE empowers you with full macOS lifecycle management. Get past the hassles of legacy imaging with faster modern onboarding. Easily deliver all your native Mac app packages as well as SaaS and virtual Windows apps, and empower users with one-click single sign on. Stay on top of your security needs with complete encryption management and rich conditional access. The recognized industry leading unified endpoint management solution is your one stop for all Apple devices and apps. Learn more at www.workspaceone.com LISTEN! LINKS & NOTES X World YouTube X World Conference macOS 10.14.5 beta 2, Kernel Extension Notarization, UAMDM, Whitelisting and You – Tom Bridge Macs move closer to compulsory notarization – Howard Oakley Notarizing Automator applications – Rich Trouton Adding Notarization to X Code builds – Tim Perfitt Adding App Notarization For Macs To Your Build Train – Charles Edge How does notarization affect your own apps and scripts? – Howard Oakley SUPPORTING SPONSORS Start a 30-day no-string-attached trial of SimpleMDM today! Use code MACADMINS at checkout, good for 50% off your first month of a Mac mini subscription! PATREON SPONSORS The Mac Admins Podcast has launched a Patreon Campaign! Our named patrons this month include Randy Wong, Chad Swartwout, Jonathan Spiva, William Smith, Justin Holt, Weldon Dodd, Jon Brown, Randy Wong, Dan Collings, Jason Dettbarn and Seb Nash. Thanks everyone! MAC ADMINS PODCAST COMMUNITY CALENDAR, SPONSORED BY WATCHMAN MONITORING Conference Sites Event Name Location Dates Cost ACEs Conference Kansas City, MO 5-6 June 2019 $699 (Basic Event Ticket) MacDeployment Conference Calgary, Canada 10-11 June 2019 CAD$249 Early Bird until 10 May MacDevOps:YVR Vancouver, Canada 12-14 June, 2019 $275CAD – $495CAD X World Sydney, NSW, Australia 26-28 June 2019 $699 AUD Early Bird MacAdmins Conference State College, PA 9-12 July 2019 $649 Early Bird until 13 May MacTech Conference Los Angeles, CA 15-18 October 2019 $999 Early Bird til 28 June Jamf Nation User Conference Minneapolis, MN 12-14 November 2019 $799 Early Bird Rate ($699 for EDU) Meetups Event Name Location Dates Cost San Diego Mac Admins Karl Strauss, Downtown SD 8 May 2019, 6:00 p.m. PT Free MacDeployment Meetup New Central Library, Ideas Lab – 800 3 St SE, Calgary, Canada 8 May 2019, 6:00 p.m. MT Free Edmonton Mac Admins Meetup United Nurses of Alberta – 11150 Jasper Ave NW, Edmonton, Canada 9 May 2019, 6:30 p.m. MT Free MacBrained Toronto LoyaltyOne Atrium 20 June 2019, 6:00 p.m. ET Free RATE US ON ITUNES! Rate Us On Apple Podcasts! SPONSOR MAC ADMINS PODCAST! If you’re interested in sponsoring the Mac Admins Podcast, please email podcast@macadmins.org for more information. SOCIAL MEDIA Get the latest about the Mac Admins Podcast, follow us on Twitter! We’re @MacAdmPodcast!
IT Manager Podcast (DE, german) - IT-Begriffe einfach und verständlich erklärt
Unterstützt von DeskCenter Solutions AG Manuel Schick können Sie unter der E-Mail-Adresse m.schick@deskcenter.com erreichen. Darüber hinaus können Interessenten an dem Webcasts teilnehmen: https://www.deskcenter.com/eventkategorie/webinar/ Unter diesem Link findet man regelmäßig die aktuellen Termine der Webinare. Auf der DMEA (09.-11-04.) in Berlin findet man den DeskCenter Solutions AG Stand D-108 in Halle 1.2. Hier ist auch noch ein Link dazu: https://www.deskcenter.com/events/dmea-april-2019-in-berlin/ Sie wollen selbst mal in einem Interview dabei sein oder eine Episode unterstützen? Dann schreiben Sie uns gerne eine E-Mail. ingo.luecker@itleague.de I: Herzlich willkommen, liebe IT-Profis, zu einer neuen Folge des IT-Manager Podcasts! Heute zu Gast im Interview ist Manuel Schick von der DeskCenter Solutions AG zum Thema MDM, EMM, auch unter anderem bekannt als eine Abkürzung für Mobile Device Management, sozusagen die einfache und zentrale Verwaltung von mobilen Endgeräten, könnte man es subsumieren. Herr Schick, herzlich willkommen zum heutigen Podcast hier! Erzählen Sie doch ein wenig über sich, damit die IT-Profis, die uns gerade zu hören, ein besseres Bild von Ihnen bekommen. B: Ja. Vielen Dank für die Einladung zum IT-Manager Podcast! Mein Name ist Manuel Schick, meine erste Berührung mit der IT-Welt hatte ich bereits 1996, wo man mit etwas Glück das Internet mit einem schnellen 56K-Modem erreichen konnte. Da Lächeln die Leute heute, weil da erreicht man ja mit jedem Smartphone deutlich höhere Raten. PCs haben mich von Anfang an fasziniert. Nach meiner Ausbildung zum Fachinformatiker Systemintegration hatte ich die großartige Möglichkeit erhalten, Kindern und Jugendlichen in Schulen die IT-Welt näher zu bringen, fliegendes Klassenzimmer, digitale Schultaschen oder Schulverwaltungen auch ans Netz zu bringen. Um ein wenig zu nennen von den Projekten, die ich hatte. Nach einem Jahrzehnt ging es dann weiter im Bereich Security bei der Firma Sophos. Aus meiner Wahrnehmung wird das Thema Sicherheit oft nicht so tief durchdacht oder durchdrängt, und das passiert oft dann, dass man sich damit tiefer beschäftigt, wenn eigentlich das Kind in den Brunnen gefallen ist und man einen Vorfall hat, und dann wird hektisch reagiert, man muss ja heute auch Meldungen machen nach Gesetzeslage, und dann kommt oft auch die Ablehnung zu bestimmten Themen oder Neuerungen, aus Angst. Danach bin ich dann in ein relativ neues IT-Thema gewechselt, MDM, EEM, oder UEM, wie man das auch immer nennen mag, wo man das Thema hat, sich mit mobilen Geräten zu beschäftigen. Da habe ich angefangen bei einem Hersteller im Support, um zu verstehen, wie Technologien funktionieren, mit welchen Herausforderungen, Problemen sich IT-Admins beschäftigen müssen, damit sie das richtig im Unternehmen/ mobile Geräte als Arbeitsgeräte einsetzen können. Danach bin ich dann in das MDM-Consulting gewechselt und bin heute auch im Produktmanagement bei der Firma DeskCenter Solutions AG tätig. Das hat die großartige Möglichkeit, dass ich mich auch mit dem Produkt anders auseinandersetzen kann, dass ich aus den Erfahrungen mit den Admins ein Stück weit auch das Produkt positionieren kann, Schwerpunkte definieren kann, auf was das ausgerichtet ist, und eben so da auch einen gewissen Einfluss nehmen kann, wie das Hauptziel für DeskCenter, das UEM, erreicht werden kann, dass wir zwei Welten zusammenführen im Management, die klassische Welt und die mobilen Geräte. Ja. I: Ja. Okay. Cool! In Ihrer Vorstellung sind ja dann doch tatsächlich sehr viele Abkürzungen eben genannt worden. Also ich hatte es ja auch eingangs schon zum Thema gesagt, MDM, EMM, UEM. Wofür stehen diese Abkürzungen? Was muss sich der Hörer darunter vorstellen? B: Okay. Angefangen hat alles mit dem Begriff MDM, zurückblickend, Mobile Device Management, auf Deutsch mobile Geräteverwaltung, da geht es im ersten Schritt darum, das sind ja/ so dass mobile Geräte im Alltag oder auch im Business-Alltag genutzt werden, Smartphones hat ja fast jeder heute, und der Chef will es dienstlich nutzen und auch der Mitarbeiter, und der erste Schritt ist einfach, es geht darum, dass man so eine Art Inventar von dem Gerät haben will, dass man also eine mobile Geräteverwaltung braucht für diese Geräte. Die werden dann dort registriert und dann kann man erst mal sehen, was ist das für ein Gerät, was da im Einsatz ist, welche Apps sind da drauf, solche Daten sammelt man da im ersten Schritt. In einem weiteren Schritt geht es dann darum, Mobile Application Management, MAM, dass man eben auch aus einer Suite heraus mobiler Lösungen Apps installieren, deinstallieren oder auch sogar verbieten oder explizit erlauben kann mit Black- und Whitelisting. Dann ein nächster Schritt ist auch, dass natürlich Mobile Content Management, MCM, dass man eben auch im Außendienst vielleicht nicht nur Daten mitnehmen will auf einem Gerät, sondern auf aktuelle Daten im Unternehmen zurückgreifen will, dass da aktuelle Lizenzangaben liegen mit Softwarepreisen, dass man die auch on-the-fly direkt abholen kann, und da ist es wichtig, dass auf diesen Geräten auch der Zugriff gesteuert wird, dass man dann ein Identity und Access Management hat für den User, dass man sehen kann, welche Geräte mit welchen Sicherheitsregeln (Werten? #00:05:21-7#) in das Unternehmen auf Daten zugreifen wollen. Und jetzt zum Schluss sind wir an dem höchsten Punkt der Entwicklung, dass wir eine einheitliche Verwaltungssoftware wollen von der klassischen Welt, den PCs, Desktops, Laptops, und der mobilen Welt, dass wir das in einer Oberfläche zusammengefasst haben wollen. Das wird dann UEM, Unified Endpoint Management genannt. Und ich denke, da kommen in Zukunft auch noch so persönliche Sachen dazu, die wir heute noch im Privatbereich nutzen, in Kleidungsstücken, Brillen, Uhren, aber auch das denke ich wird kurzfristig auch im Arbeitsalltag Einzug erhalten. Vielleicht nicht in der Form, wie wir das heute können, sondern dass dann in einer Brille vielleicht so ein Weg ist, wie man im Lager bestimmte Sachen schneller finden kann. Ja. I: Okay. Das hört sich ja sehr umfangreich an, aber mal sehr schön dargestellt, auch wie es im Prinzip den Weg vom klassischen MDM für das nur Mobile Device Management über diese einzelnen Bereiche, Segmente, bis hin zum UEM ja gefunden hat. Sie können unseren Hörern ja sicherlich am besten mal auch erzählen, welche Vor- und Nachteile bilden denn eigentlich der Einsatz solcher MDM- beziehungsweise EMM-Lösungen? B: Nachteil ist, denke ich, wenn man das nicht einsetzt, dann hat man schon Schwierigkeiten, überhaupt den Gesetzen konform zu bleiben. Da gibt es ja die DSGVO-Verordnung seit letztem Jahr, nach der ist man ja verpflichtet, dass eben Geräte in einer bestimmten Zeit, entweder habe ich die verloren oder gestohlen bekommen, inhaltlich löschen können muss. Da geht es ja um Userdaten, die da drauf sein können. Und das ist ganz abstrakt, schon einfach nur eine E-Mail-Adresse vom Kollegen oder von einem Kunden, und das hat ja fast jeder auf dem Telefon drauf, oder im Telefonbuch die Telefonnummer. Das kann ich mit einer solchen MDM-Lösung als Administrator eines Unternehmens gewährleisten, dass ich diese Geräte inhaltsmäßig auf Factory Reset zurücksetzen kann, aus der Ferne, in einer sehr kurzen Zeit von wenigen Minuten. Und dann technisch ist es ja so, da ist ein klarer Vorteil, das sind ja mobile Endgeräte, die wurden primär als Verbrauchergerät entwickelt, die waren ja eigentlich Consumer-Ware für Privatleute, als sie rauskamen, und jetzt ist das Ziel, da sie ja immer mehr und tiefer Einzug erhalten in die Businesswelt, dass man die auch managen können muss aus der Sicht von einem Administrator, und hier gibt es jetzt eben verschiedene Ansätze, das ist ja so, dass man bestimmte Compliance-Richtlinien erfüllen muss in einem Unternehmen, dass da bestimmte Daten drauf sein dürfen oder nicht, auch Apps, und dass man da nicht will, dass zum Beispiel private und dienstliche Daten auch vermischt werden. Und hier gibt es eben verschiedene Ansätze, die eine MDM-Lösung in Zusammenarbeit mit den Technologien, die die Betriebssystemhersteller von den mobilen Geräten zur Verfügung stellen, zusammenzuarbeiten. Wir haben ja einmal als Technologie von Apple das DEP und VPP und Android Enterprise, wo wir einfach Schutzmechanismen hinterlegt haben, dass wir in der MDM-Software konfigurieren können, dass der User weniger Admin-Rechte hat oder auch ein Telefon nicht mehr resetten kann, dass diese Funktionen ausgeblendet werden, und dass er sich in dieser MDM-Software auch nicht deregistrieren kann. Das ist also so, dass hier das Augenmerk darauf gerichtet werden kann, dass der Administrator wie bei dem PC seiner Aufgabe nachkommen kann, diese mobilen Geräte sicher zu verwalten und einzustellen, dass es eben Arbeitsgeräte sind und weniger Spielzeug in Anführungszeichen oder Geräte, die man sich als User customizen kann. Weil ja einfach Sicherheit auch ein wichtiges Thema ist oder Herausforderung, diese zu gewährleisten, dass man eben Kontrolle hat auf Daten auf den Geräten. Ich denke, das ist ein sehr umfangreiches Thema, es gibt auch verschiedene Lösungen, und was eine MDM im allgemeinen macht, sie kann vorhandene Lösungen, die beim Kunden da sind im Bereich E-Mail-Server, VPN, einfach von den Einstellungen auf die Geräte mit Parametern darstellen, dass wir die dort ablegen können, einmalig, und der User im besten Fall nur noch sein Passwort eingibt, um dann bestimmte Dienste abrufen zu können. Ja. Das passt. I: Ja. Perfekt. Hört sich dann ja doch sehr komplex an, und auch wenn Sie vorhin sagten, es gibt eigentlich keine Nachteile bei solchen Sachen, würde ich dann immer anführen, es kostet zwar Geld und Zeit, aber ansonsten bringt einem natürlich so eine Lösung wirklich auch nur Vorteile, um sauber und sicher auch das Ganze konfiguriert und eingesetzt zu haben. Woher nehmen Sie denn eigentlich die Erkenntnisse für diese umfangreichen Lösungen? B: Für mich ist MDM, seit ich da eingestiegen bin, ein sehr spannendes Thema, weil die Geräte immer mehr Einzug in unseren Alltag haben und das losgelöste Arbeiten von Ort und Zeit möglich machen in unserer Welt, die dadurch smarter wird. Bei der Firma DeskCenter arbeite ich im Produktmanagement sehr eng mit der Entwicklung zusammen, habe da immer Zugriff auf die neuen Features und Funktionen, die auch von den Betriebssystemherstellern kommen, sodass ich da im regen Austausch bin, und denke, dass wir so auch die Welt der Administratoren mit dem Tool vereinfachen können, einfach smarter zu machen und vieles zu automatisieren. I: Das heißt, Sie haben da ein eigenes Tool von DeskCenter Mobile im Einsatz, mit dem Sie halt Ihren Kunden dann helfen können? B: Genau. I: Okay. Gibt es besondere Tipps zu dem Thema? B: Das Thema MDM ist sehr umfangreich und das birgt natürlich auch verschiedene Fallstricke, wenn man das anfängt einzuführen und sich Gedanken macht. Ich denke, wichtig ist auf Kundenseite, sich zu überlegen, welche Ziele habe ich als Kunde, was muss ich aus Unternehmenssicht oder aus Sicht von der Sicherheit erreichen, und dann mit einem Anbieter ins Rennen zu gehen, weil sonst wird das sehr schwierig, weil es einfach sehr viele Möglichkeiten gibt, was man damit machen kann, deswegen muss man einfach am besten Use Cases mitbringen, was man aus der eigenen Sicht erreichen möchte. I: Ja, klar. Gerade use-case-basiert kann man natürlich solche Themen immer am besten angehen und umsetzen dann auch. Gibt es denn zu diesem Thema, das machen wir immer ganz gerne, Buchempfehlungen, die Sie nennen können? B: Leider nein. Da sich die IT-Welt so schnell wandelt und gerade im Mobile-Bereich, da gibt es eigentlich ständig Neuerungen auch vom Betriebssystem, Apple bringt ja Neuerungen raus und Google auch, da gibt es halt Möglichkeiten, dass man sich vielleicht versucht, um diese in Erfahrung zu bringen, bei den entsprechenden Developer-Seiten zu registrieren, oder manchmal eine gute Beratung ist besser als ein Buch. I: Ja, das stimmt natürlich. Das kenne ich auch aus der Erfahrung sehr gut. Wie können denn die Zuhörer, wenn sie jetzt mehr zu diesem Thema erfahren wollen, wie können die Zuhörer dann mehr dazu erfahren beziehungsweise Sie erreichen, gibt es da irgendwas, Kontaktdaten oder gibt es da eventuell auch Veranstaltungen, wo im Prinzip die Zuhörer sich das dort mal näher anhören und anschauen können? B: Ja, gerne. Also man kann mich gerne über die Firmendaten kontaktieren per E-Mail oder per Telefonnummer. Das andere ist, wir bieten auch Webcasts zu dem Thema MDM aktuell an oder auch auf einer kommenden Messe besuchen, also wir sind jetzt zum Beispiel auf der DMEA in Berlin im April vertreten mit einem Stand, einfach vorbeikommen, Hallo sagen, ins Gespräch kommen. I: Ja. Super! Dann werden wir natürlich Ihre Kontaktdaten und auch die Infos mal zu dem Webcast und zu den Veranstaltungen mit in die Show Notes reinnehmen, dann fällt es unseren Zuhörern einfacher, darauf zuzugreifen. Vielen Dank auf jeden Fall, Herr Schick, für dieses tolle Interview mit Ihnen zu dem Thema!
Whitelisting is a good idea - but not easy to make happen! Richard talks to Aaron Margosis about his work making it easier to use AppLocker to implement whitelisting on Windows, a set of scripts and tools named by Chris Jackson as AaronLocker. Aaron talks about implementing the whitelisting strategies outlined in the NSA whitepaper on the subject, making it easier to maintain the whitelist when apps need to be updated. Admins can choose how locked down to make a machine, providing flexibility around updates while still blocking the primary malware vectors - check it out!
In today’s podcast, we hear that ICANN has warned of a DNS hijacking wave, and is urging widespread DNSSEC adoption. Security firms see Iran as a particularly active DNS hijacker. A B0r0nt0k ransomware outbreak infests Linux servers, but Windows users might be at risk as well. A request for whitelisting in the Firefox certificate store arouses controversy. Technology Review raises questions about blockchain security. Bots keep people from getting consular appointments, and people don’t like it. And telling minotaurs from unicorns. Rick Howard from Palo Alto Networks with tips on moving data to the cloud. For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_25.html Support our show
Key Points From This Episode:How Christian came to study both Medieval History and Computer Science.Learn more about Christian’s unique PhD in German Mysticism.Christian shares his unique passion for global cyber security theory.Are their links between Medieval history and what is happening with the internet today?Discover more about the balkanization of the internet and net neutrality.Parallels between Medieval social connections and internet social connections.Christian’s view on open source and how the ModSecurity Project fits into that.Christian explains how a firewall works and the two main types of firewall.Top five things that might make traffic look malicious or none malicious.Whitelisting, blacklisting and IP addresses: Can they really be trusted?E-voting: Why Switzerland is going all in while the rest of the world backs out.Is it possible to fully secure identification in an E-voting system?Why the world appears to be falling back on a physical verification process.Christian walks us through what an E-voting process looks like.Learn more about Christian’s strategies for reverse proxy and D-DOS.And much more!
Get all the latest Windows 10 Security guidance from industry expert Tom Degreef. He talks about the new capabilities of Windows 1809 (aka Windows 10 October Update), modern whitelisting, and much more.
Control what gets onto your PCs! Richard chats with Sami Laiho about the latest thinking around application whitelisting. For years we've worked from the blacklist model of allowing anything onto PCs and running anti-malware software to remove the bad stuff. But there's so much bad stuff today, it's impossible to keep up. Whitelisting has gotten simpler with better versions of AppLocker and approaches that allow you to more easily control what applications live on PCs. And it defeats the vast majority of malware right out of the gate!
New time, see RBG, Facebook vs Jefferson, AI and Humans, Humans as AI, Humans as resources, Mistrust of tech, AI better then humans medical addition, space mission, CFCs found, and much more with Miles and Lyle.Time Split to the Nanosecond Is Precisely What Wall Street WantsFacebook Flags Declaration of Independence as Hate SpeechWhitelisting - WikipediaBlack sheep - WikipediaQuotations on the Jefferson MemorialBox CEO Aaron Levie says mistrust of Google and Facebook could spreadThe rise of 'pseudo-AI': how tech firms quietly use humans to do bots' workThe Turk - WikipediaChinese AI beats 15 doctors in tumor diagnosis competitionDawn's Latest Orbit Reveals Dramatic New Views of Occator CraterDawn Mission | CeresSources of banned CFCs found through their advertising
In this podcast, Rahul Kashyap(@RCKashyap) talks about the state of security, technology, and business crossroad on Security and the mindset of a security led technologist. He sheds some light on past, present, and future security risks discussed some common leadership concerns, and how a technologist could circumvent that. This podcast is a must for all technologists and wannabe technologists to grow their organization. Timeline: 0:29 Rahul's journey. 4:40 Rahul's current role. 7:58 How the types of cyberattacks have changed. 12:53 How has IT interaction evolved? 16:50 Problems security industry. 20:12 Market mindset vs. security mindset. 23:10 Ownership of data. 27:02 Cloud, saas, and security. 31:40 Priorities for securing an enterprise. 34:50 How security is secure enough. 37:40 Providing a stable core to the business. 41:11 The state of data science vis a vis security. 44:05 Future of security, data science, and AI. 46:14 Distributed computing and security. 50:30 Tenets of Rahul's success. 53:15 Rahul's favorite read. 54:35 Closing remarks. Rahul's Recommended Read: Mindset: The New Psychology of Success – Carol S. Dweck http://amzn.to/2GvEX2F Podcast Link: https://futureofdata.org/rckashyap-cylance-on-state-of-security-technologist-mindset-futureofdata-podcast/ Rahul's BIO: Rahul Kashyap is the Global Chief Technology Officer at Cylance, where he is responsible for strategy, products, and architecture. Rahul has been instrumental in building several key security technologies viz: Network Intrusion Prevention Systems (NIPS), Host Intrusion Prevention Systems (HIPS), Web Application Firewalls (WAF), Whitelisting, Endpoint/Server Host Monitoring (EDR), and Micro-virtualization. He has been awarded several patents for his innovations. Rahul is an accomplished pen-tester and has in-depth knowledge of OS, networking, and security products. Rahul has written several security research papers, blogs, and articles that are widely quoted and referenced by media around the world. He has built, led, and scaled award-winning teams that innovate and solve complex security challenges in both large and start-up companies. He is frequently featured in several podcasts, webinars, and media briefings. Rahul has been a speaker at several top security conferences like BlackHat, BlueHat, Hack-In-The-Box, RSA, DerbyCon, BSides, ISSA International, OWASP, InfoSec UK, and others. He was named 'Silicon Valley's 40 under 40' by Silicon Valley Business Journal. Rahul mentors entrepreneurs who work with select VC firms and is on the advisory board of tech start-ups. About #Podcast: #FutureOfData podcast is a conversation starter to bring leaders, influencers, and lead practitioners to discuss their journey to create the data-driven future. Wanna Join? If you or any you know wants to join in, Register your interest @ http://play.analyticsweek.com/guest/ Want to sponsor? Email us @ info@analyticsweek.com Keywords: #FutureOfData #DataAnalytics #Leadership #Podcast #BigData #Strategy
We discuss SoundCloud Monetization and Whitelisting.
Application whitelisting has long been thought of as a good way of enhancing cybersecurity. But certifying and maintaining applications lists proved too labor intensive and expensive. Now the National Security Agency may have found a more efficient route to application whitelisting. Eric Chudow, senior mitigation expert for cybersecurity at NSA, joined Federal Drive with Tom Temin to explain.
Doug and Russ show you how to discriminate...against IP addresses. It's cyber-fascism day here at SDL. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/SDL_Episode14
Seitdem Apple mit iOS 9 Content-Blocking eingeführt hat, ist das Thema Werbeblocker wieder präsent in den Medien. Andreas, Patrick und Sven reden über den Status Quo. Lieber Fluggast, wenn dir das Gehörte gefällt oder dir Sorgenfalten auf die edle Stirn fabriziert, dann haben wir etwas für dich: iTunes Bewertungen. Die heutige Episode von Der Übercast wird unterstützt von: • Marked 2 - für den Mac zeigt euch eine Vorschau von eurem Markdown Dokument während ihr schreibt in eurem Texteditor. Nutzt den Coupon Code DERUBERCAST um 30% Rabatt auf die Direktversion zu bekommen. • Audible.de - Hörbücher überall genießen. Jetzt einen Monat lang gratis testen. Überbleibsel Flughafen Trittroller: Micro Luggage Reloaded – Scooter Luggage – Micro Kickboard The New Yorker: The Semiotics of ‘Rose Gold’ Kickstarter: Perch - A Revolutionary Sit-to-Stand Desk Marketch auf GitHub + Demo Überschallneuigkeiten Pocus — The Other Half YouTube: Apple iPhone 6s vs iPhone 6s Plus Water Test! Is it secretly waterproof? A waterproof review. Wer ist der Content Block King? WinFuture.de: YouTube macht Ernst: Bezahlabo soll Ende Oktober kommen Golem.de: Adblock Plus: Axel Springer sieht Journalismus nur als Vehikel für Werbung Marco.org: Just doesn’t feel good Eyeo GmbH – Die Werbeagentur hinter Adblock Plus The Awl Eyeo sind Adblock Plus. Beispiel: 70 Firmen zahlen dafür das ihre Werbung durchgewunken wird. Stichwort “acceptable ads” = nicht zu störend & nicht zu aufdringlich Insgesamt 700 Firmen würden das Prädikat “acceptable ads” vertragen. Adblock extension sells to mystery buyer AdBlock vs. AdBlock Plus: Why I Switched To Adblock Plus (And You Should, Too) Crystal – Interview und Acceptable Ads Info Interview mit dem Entwickler von Crystal, der in Verruf geraten ist, weil er mit Eyeo einen. Das “Feature” ist optional, aber standardmäßig an. Generell gibt er sich im Interview sehr diplomatisch. Er findet die Grundidee von “acceptable ads” gut, hat aber keine Zeit und Ressourcen das selbst zu kurieren. Im Grunde will er Leser und Schreiber mit seiner App etwas gutes tun. Bezahlt wird er von Eyeo trotzdem, gibt aber an, dass die Einnahmen geringer sind als jene aus den Appeinnahmen. Links vom Entwickler: Why are people using ad blockers on mobile? On Acceptable Ads. Hier wird unter anderem auch auf die Frage eingegangen, was “accaptable ads” sind: Acceptable Ads are not annoying. Acceptable Ads do not disrupt or distort the page content we’re trying to read. Acceptable Ads are transparent with us about being an ad. Acceptable Ads are effective without shouting at us. Acceptable Ads are appropriate to the site that we are on. Kritikerrunde – Was ist faul im Staate Dänemark? The problem isn’t with there being advertising on the web driven by page impressions. The issue is how awful they look, how invasive they can be (auto*play audio/video, yuck!), their attempts at deceiving your website’s audience, and tracking your every mouse click or tap around the web in order to serve their own needs while sacrificing the privacy of the customers they are seeking to gain. Samantha Bielefeld vs. The Verge And advertisers have had fifteen years to show self restraint. They’ve had the chance to not secretly track people, set cookies for their own benefit, insert popunders and popovers and poparounds, and mostly, deliver us ads we actually want to see. Seth Godin zum Thema Ad Blocking What I hear when people say ‘native’ advertising is: advertising that is not easily blocked at all. The Brooks Review Inside AdWords: Google brings you closer to your customers in the moments that matter Blocked: An In-Depth Special Report on iOS 9 Content Blockers Mit dabei: Prognosen zu den kommenden Trends (Native Advertising, Video* u. Audiowerbung, Paywalls/Crowdfunding/Memberships, E-Commerce/Affiliate Programme, Influencer Marketing). PDF Download ePUB Download WAN-IFRA: The emerging threat of ad blockers - World News Publishing Focus Zeldman on Web & Interaction Design: Ad Blocking and the Future of the Web Das Privatssphäre Statement von The DECK Tipps Wie viel schneller machen Content Blocker das Web und welcher ist der schnellste? Ben Brooks testete und kam auf folgende Top 3: 1Blocker Ad Block Multi Adamant und Blockr (unentschieden) Adamant von Cocoa Apps ($1.99) 1Blocker (0€ - IAP 2.99€) Blockr (0.99€) Freedom (0€) Safari Blocker ($0) hochgradig konfigurierbar (mit den gleichen Einstellungen, auf welche auch die Entwickler selbst Zugriff haben) optional: automatisch upgedated Listen für Adblocking und Privatsphere von EasyList aka Adblock Plus. Community Feature: Man kann seine Blocker teilen und nach suchen nach anderen. Clickbait Websites Blocker Shutup Comments YouTube App nicht als default starten Whitelisting (leider ohne das Community Feature) Audible Giveaway Es gibt ein paar Audible Gutschein-Codes zu gewinnen für ein Hörbuch deiner Wahl. Wer teilnehmen will, darf hier klicken (und auch gerne den letzten Teil selbst ausfüllen): Beim @derubercast hören wurde mir lauschbare Ware von Audible für lau angeboten. Möchte ich natürlich gewinnen, weil…. Unsere Picks Sven: Tiles Patrick: Dictater by Nosrac Andreas: Self-Made Deodorant – How to Make Natural Deodorant & Hair Gone Wild & die Alternative (Happy Hair) In Spenderlaune? Wir haben Flattr und PayPal am Start und würden uns freuen.
Configuring policies for Data Center Security 6 can be intimidating. In this video, you will learn how to create a simple application whitelisting policies to lock down your critical systems against non-approved software applications. Learn more at www.itsdelivers.com
In this episode of the Social Media Marketing Happy Hour #AskHappyHour, Dawn & Traci answer a question about Whitelisting or Unfollowing accounts on Twitter. The question resulted from episode 229 when we talked about JustUnfollow becoming CrowdFireApp. If you use Twitter and wonder about who you should unfollow or never unfollow, you won't want to miss today's episode.
Greg Hetrick shows us how to better lock down our Java apps since we can't "just uninstall Java!"
As with most sizable organizations it is near impossible to uninstall or completely disable Java which sent us on a hunt for a feasible way to contain Java based attacks. What we came up with was restricting it to run only in trusted zones. This worked for APPLET tags when encountered in IE. What this does is block any applet from running if it is not part of a trusted internet zone. First thing is to identify all the internal trusted zones and add them. Next allow the user to trust their own zones. Most of the time it seemed they knew when there was an applet they wanted to run. The Honeynet Project is a lnon-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools to improve Internet security. With Chapters around the world, our volunteers have contributed to fight again malware (such as Confickr), discovering new attacks and creating security tools used by businesses and government agencies all over the world. The organization continues to be on the cutting edge of security research by working to analyze the latest attacks and educating the public about threats to information systems across the world. Why would use use HTTP Comments displayer? This nmap script makes use of patterns to extract HTML comments from HTTP responses. There are times sensitive information may be present within these comments. While this does not necessarily represent a breach in security, this information can be leveraged by an attacker for exploitation.
Viddler showcases its whitelisting feature, which allows you to select what websites are permitted to embed your videos. By viddler Tags : embed, embed video, embedding, online video, viddler, white list, whitelist, whitelisting, who can embed my video
SecuraBit Episode 67: We're all gonna get HAX!October 6, 2010Hosts:Chris Gerling – @chrisgerlingChristopher Mills – @thechrisamAndrew Borel – @andrew_secbit Anthony GartnerGuest: Roger GrimesGeneral topics:Authored eight books, and co-authored another 4Chasing hackers for 23 yearsSCADA issuesWhat the bad guys are doing? Black hat cloud backup?Offline patch and reset days to recover from a issue.Whitelisting may be a solution, that is just too hard to implement in many environments.Needs full sign off from the organizationDifferent levels of identificationSyngress book of the month club for episode 68Utilize code 36449 for a discount on books from Syngress!Executives should have Macs because it makes it easier on the pen testerPatching and warrantiesSANS Connector Program10% of any SANS events or training use coupon code Connect_SecuraBit10Lenny Zeltser Facebook Social Captcha Authenticationhttp://blog.zeltser.com/post/1258010402/facebook-social-captcha-authenticationUpcoming eventsHacker Halted http://www.hackerhalted.com/ Tim Is speaking October 14thPhreaknic 10/15. http://www.phreaknic.info/pn14/Bsides Delaware 11/6Bsides Dallas-FortWorth 11/6Links:http://securabit.comChat with us on IRC at irc.freenode.net #securabitiTunes Podcast - http://itunes.apple.com/us/podcast/securabit/id280048405iPhone App Now Available - http://itunes.apple.com/us/app/securabit-mobile/id382484512?mt=8
Interview with Lih-Tah Wong, Pres. of Computer Mail Serivces on whether or not we should filter e-mail coming into the US