Podcasts about xdr

  • 239PODCASTS
  • 506EPISODES
  • 43mAVG DURATION
  • 1WEEKLY EPISODE
  • May 9, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about xdr

Latest podcast episodes about xdr

Cyber Talks
Tackling People, Process, and Perception in Cybersecurity

Cyber Talks

Play Episode Listen Later May 9, 2025 33:47


In this episode of Cyber Talks, we speak with Craig Peppard, CISO at Ivari Canada, about why people and processes - not just technology - are the real frontline in cybersecurity. The conversation unpacks the limitations of traditional security awareness training, explores how to move beyond blame to address systemic process failures, and highlights the growing importance of soft skills like empathy and storytelling in security leadership. They also dive into the evolving role of the CISO, the rise of embedded security roles like CISOs, and why mentoring and inclusive hiring practices are essential for building future-ready security teams.--Have a question for us? Reach out: hello@esentire.com---About Cyber TalksFrom ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges.About eSentireeSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠www.esentire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and follow ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@eSentire⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Paul's Security Weekly
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Dr. Aleksandr Yampolskiy, Lenny Zeltser - BSW #394

Paul's Security Weekly

Play Episode Listen Later May 7, 2025 64:40


In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (like EDR, MDR, and XDR) effectively handle threats within an organization, but leave a gap regarding third-party risk. SecurityScorecard created the Supply Chain Detection and Response category to empower organizations to shift from being reactive and uncertain to confidently and proactively protecting their entire supply chain. What is Supply Chain Detection and Response (SCDR)?: https://securityscorecard.com/blog/what-is-supply-chain-detection-and-response/ Learn more about continuous supply chain cyber risk detection and response: https://securityscorecard.com/why-securityscorecard/supply-chain-detection-response/ Claim Your Free SCDR Assessment: https://securityscorecard.com/get-started-scdr/#form This segment is sponsored by Security Scorecard. Visit https://securityweekly.com/securityscorecardrsac for more information on how SecurityScorecard MAX and Supply Chain Detection and Response can help your organization identify and resolve supply chain risks. In this interview, Axonius CISO Lenny Zeltser shares the vision behind Axonius Exposures, the company's latest innovation in unified risk management. Launched ahead of RSA Conference 2025, Exposures tackles one of the most persistent challenges in cybersecurity today: making sense of fragmented risk signals to drive confident, actionable decision-making. Lenny will discuss how Exposures unifies security findings, asset intelligence, and business context in a single platform — giving security teams the clarity and automation they need to prioritize what truly matters. He'll also explore what this launch means for Axonius' mission, the evolution of cyber asset management, and how organizations can move from reactive security postures to proactive, risk-based strategies. Want to see how Axonius Exposures gives you the clarity to take action on your most critical risks? Visit https://securityweekly.com/axoniusrsac to learn more and schedule a personalized demo. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-394

ITSPmagazine | Technology. Cybersecurity. Society
Simplifying Cybersecurity Operations at Scale: Automation with a Human Touch | A Brand Story with Subo Guha from Stellar Cyber | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 7, 2025 19:38


In this episode, Subo Guha, Vice President of Product Management at Stellar Cyber, shares how the company is reshaping cybersecurity operations for managed service providers (MSPs) and their customers. Stellar Cyber's mission is to simplify security without compromising depth—making advanced cybersecurity capabilities accessible to organizations without enterprise-level resources.Subo walks through the foundations of their open XDR platform, which allows customers to retain the endpoint and network tools they already use—such as CrowdStrike or SentinelOne—without being locked into a single ecosystem. This flexibility proves especially valuable to MSSPs managing dozens or hundreds of customers with diverse toolsets, including those that have grown through acquisitions. The platform's modular sensor technology supports IT, OT, and hybrid environments, offering deep packet inspection, network detection, and even user behavior analytics to flag potential lateral movement or anomalous activity.One of the most compelling updates from the conversation is the introduction of their autonomous SOC capability. Subo emphasizes this is not about replacing humans but amplifying their efforts. The platform groups alerts into actionable cases, reducing noise and allowing analysts to respond faster. Built-in machine learning and threat intelligence feeds enrich data as it enters the system, helping determine if something is benign or a real threat.The episode also highlights new program launches like Infinity, which enhances business development and peer collaboration for MSSP partners, and their Cybersecurity Alliance, which deepens integration across a wide variety of security tools. These efforts reflect Stellar Cyber's strong commitment to ecosystem support and customer-centric growth.Subo closes by reinforcing the importance of scalability and affordability. Stellar Cyber offers a single platform with unified licensing to help MSSPs grow without adding complexity or cost. It's a clear statement: powerful security doesn't need to be out of reach for smaller teams or companies.This episode offers a practical view into what it takes to operationalize cybersecurity across diverse environments—and why automation with human collaboration is the path forward.Learn more about Stellar Cyber: https://itspm.ag/stellar-cyber--inc--357947Note: This story contains promotional content. Learn more.Guest: Subo Guha, Senior Vice President Product, Stellar Cyber | https://www.linkedin.com/in/suboguha/ResourcesLearn more and catch more stories from Stellar Cyber: https://www.itspmagazine.com/directory/stellarcyberLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, subo guha, xdr, mssp, cybersecurity, automation, soc, ai, ot, threat detection, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

Business Security Weekly (Audio)
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Dr. Aleksandr Yampolskiy, Lenny Zeltser - BSW #394

Business Security Weekly (Audio)

Play Episode Listen Later May 7, 2025 64:40


In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (like EDR, MDR, and XDR) effectively handle threats within an organization, but leave a gap regarding third-party risk. SecurityScorecard created the Supply Chain Detection and Response category to empower organizations to shift from being reactive and uncertain to confidently and proactively protecting their entire supply chain. What is Supply Chain Detection and Response (SCDR)?: https://securityscorecard.com/blog/what-is-supply-chain-detection-and-response/ Learn more about continuous supply chain cyber risk detection and response: https://securityscorecard.com/why-securityscorecard/supply-chain-detection-response/ Claim Your Free SCDR Assessment: https://securityscorecard.com/get-started-scdr/#form This segment is sponsored by Security Scorecard. Visit https://securityweekly.com/securityscorecardrsac for more information on how SecurityScorecard MAX and Supply Chain Detection and Response can help your organization identify and resolve supply chain risks. In this interview, Axonius CISO Lenny Zeltser shares the vision behind Axonius Exposures, the company's latest innovation in unified risk management. Launched ahead of RSA Conference 2025, Exposures tackles one of the most persistent challenges in cybersecurity today: making sense of fragmented risk signals to drive confident, actionable decision-making. Lenny will discuss how Exposures unifies security findings, asset intelligence, and business context in a single platform — giving security teams the clarity and automation they need to prioritize what truly matters. He'll also explore what this launch means for Axonius' mission, the evolution of cyber asset management, and how organizations can move from reactive security postures to proactive, risk-based strategies. Want to see how Axonius Exposures gives you the clarity to take action on your most critical risks? Visit https://securityweekly.com/axoniusrsac to learn more and schedule a personalized demo. Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-394

Business Security Weekly (Video)
C-Suite Gaps, Cybersecurity is not Working to Solve Exposures and Supply Chain Risks - Lenny Zeltser, Dr. Aleksandr Yampolskiy - BSW #394

Business Security Weekly (Video)

Play Episode Listen Later May 7, 2025 64:40


In the leadership and communications section, The C-suite gap that's putting your company at risk, CISOs band together to urge world governments to harmonize cyber rules, Cybersecurity is Not Working: Time to Try Something Else, and more! Organizations are increasingly threatened by cyberattacks originating from their suppliers. Existing tools (like EDR, MDR, and XDR) effectively handle threats within an organization, but leave a gap regarding third-party risk. SecurityScorecard created the Supply Chain Detection and Response category to empower organizations to shift from being reactive and uncertain to confidently and proactively protecting their entire supply chain. What is Supply Chain Detection and Response (SCDR)?: https://securityscorecard.com/blog/what-is-supply-chain-detection-and-response/ Learn more about continuous supply chain cyber risk detection and response: https://securityscorecard.com/why-securityscorecard/supply-chain-detection-response/ Claim Your Free SCDR Assessment: https://securityscorecard.com/get-started-scdr/#form This segment is sponsored by Security Scorecard. Visit https://securityweekly.com/securityscorecardrsac for more information on how SecurityScorecard MAX and Supply Chain Detection and Response can help your organization identify and resolve supply chain risks. In this interview, Axonius CISO Lenny Zeltser shares the vision behind Axonius Exposures, the company's latest innovation in unified risk management. Launched ahead of RSA Conference 2025, Exposures tackles one of the most persistent challenges in cybersecurity today: making sense of fragmented risk signals to drive confident, actionable decision-making. Lenny will discuss how Exposures unifies security findings, asset intelligence, and business context in a single platform — giving security teams the clarity and automation they need to prioritize what truly matters. He'll also explore what this launch means for Axonius' mission, the evolution of cyber asset management, and how organizations can move from reactive security postures to proactive, risk-based strategies. Want to see how Axonius Exposures gives you the clarity to take action on your most critical risks? Visit https://securityweekly.com/axoniusrsac to learn more and schedule a personalized demo. Show Notes: https://securityweekly.com/bsw-394

Web and Mobile App Development (Language Agnostic, and Based on Real-life experience!)
Consistency, Commitment and Comfort Zones (feat. Ramya Ganesh) - a very human conversation in an increasingly AI world!

Web and Mobile App Development (Language Agnostic, and Based on Real-life experience!)

Play Episode Listen Later May 2, 2025 65:26


In this episode, Krish Palaniappan interviews Ramya Ganesh, an XDR cybersecurity leader and mentor, who shares her journey in the tech industry and her passion for mentoring individuals, especially those with cognitive disabilities. Ramya discusses the importance of mentoring, recognizing when one needs help, and the significance of community support in neurodiversity. She emphasizes the need for self-motivation and consistent actions to achieve personal and professional goals, while also highlighting the role of community in fostering inclusion and support for individuals with cognitive disabilities. In this conversation, Ramya Ganesh and Krish Palaniappan discuss the importance of self-realization, consistency, and the balance between personal passions and responsibilities. They share personal anecdotes about overcoming challenges, the significance of showing up even when faced with difficulties, and the lessons learned from both success and failure. The dialogue emphasizes the need for individuals to prioritize their own passions while also fulfilling their roles as caregivers and professionals.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Apr 28, 2025 7:55


Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20Payload%20Delivered%20Through%20Steganography/31892 SAP Netweaver Exploited CVE-2025-31324 An arbitrary file upload vulnerability in SAP s Netweaver product is actively exploited to upload webshells. Reliaquest discovered the issue. Reliaquest reports that they saw it being abused to upload the Brute Ratel C2 framework. Users of Netweaver must turn off the developmentserver alias and disable visual composer, and the application was deprecated for about 10 years. SAP has released an emergency update for the issue. https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/ https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/ Any.Run Reports False Positive Uploads Due to false positives caused by MS Defender XDR flagging Adobe Acrobat Cloud links as malicious, many users of Any.Run s free tier uploaded confidential documents to Any.Run. Anyrun blocked these uploads for now but reminded users to be cautious about what documents are being uploaded. https://x.com/anyrun_app/status/1915429758516560190

Untitled Beatles Podcast
“One To One: John & Yoko” (2025) / Touring the Shanoff Collection

Untitled Beatles Podcast

Play Episode Listen Later Apr 19, 2025 45:36


As our beloved US quickly descends into cruel authoritarian idiocy, the UBP crew reunited IRL to wax fab on new RSD purchases, old Reckless Records purchases, and then attend an IMAX screening of the new Magnolia Films doc One To One: John & Yoko. Within the fortified safety of their top secret Meigs Field Beatle Bunker Bag, T.J., Tony and Producer Casey hunkered down to opine freely about anything (¿

Cisco Champion Radio
S12|E5 Strengthening Cybersecurity with Cisco XDR Automation

Cisco Champion Radio

Play Episode Listen Later Apr 15, 2025 42:23


In this episode of Cisco Champion Radio, we explore how Cisco XDR (Extended Detection and Response) is transforming cybersecurity through automation and seamless integration with leading security tools. Our experts break down how Cisco XDR reduces alert fatigue, automates incident handling, and streamlines workflows to enhance security operations. We also discuss how automation rules in XDR help prioritize incidents, integrate with tools like Splunk and CrowdStrike, and bridge the skill gap between junior and senior analysts. While there's a learning curve, understanding basic programming and authentication concepts can help security professionals unlock the full potential of automation. Want to see Cisco XDR in action? Learn how to start with DCloud instant demos or hands-on labs at DevNet (developer.cisco.com). Whether you're looking to improve efficiency, reduce manual tasks, or enhance threat detection, this episode is packed with insights to help you leverage automation for stronger security. Resources https://developer.cisco.com/docs/cisco-xdr Cisco guest Christopher Van Der Made, Engineering Product Management Leader, Cisco XDR Cisco Champion hosts Marc Luescher, Sr. Solution Architect, AWS Gert-Jan de Boer, Network Archeologist, aaZoo Network Solutions Donald Robb, Principal Network Architect, Disney Nate Haleen, DevOps Technical Lead, Procellis Technology Inc Moderator Danielle Carter, Customer Voices and Cisco Champion Program

Cyber Talks
In Conversation With Alexander Feick, VP of eSentire Labs

Cyber Talks

Play Episode Listen Later Apr 14, 2025 79:34


In today's episode of the Cyber Culture Café series, Andy and John speak to Alexander Feick, VP of our eSentire Labs team. As the VP of Labs, Alex Feick leads a team responsible for fostering innovations from security professionals on our platform and integrating new technologies into the company's services. Over the past year, his efforts have centered on Generative AI security and enabling the company to leverage the technology more effectively internally. --Cybersecurity isn't just about platforms and processes—it's about people. If relationships matter in cybersecurity, this is where they begin. So, we're introducing a new, breakout series from the eSentire Cyber Talks Podcast – the Cyber Culture Café series! In this series, John Moretti and Andy Lalaguna will sit down for a candid conversation with one of the key players behind the eSentire customer experience. This series is all about pulling back the curtain and putting the spotlight on the people who power eSentire's world-class cybersecurity services.Join us for a relaxed and revealing discussion covering day-to-day challenges, personal motivation, industry observations, and the unique value each guest brings to the eSentire mission. Get to know the voices behind the protection—and why our people are at the core of everything we do.--Have a question for us? Reach out: hello@esentire.com---About Cyber TalksFrom ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges.About eSentireeSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠www.esentire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and follow ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@eSentire⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Cyber Talks
Introducing the Cyber Culture Cafe Series with Andy Lalaguna and John Moretti

Cyber Talks

Play Episode Listen Later Apr 4, 2025 33:24


Cybersecurity isn't just about platforms and processes—it's about people. If relationships matter in cybersecurity, this is where they begin. So, we're introducing a new, breakout series from the eSentire Cyber Talks Podcast – the Cyber Culture Café series! In this series, John Moretti and Andy Lalaguna will sit down for a candid conversation with one of the key players behind the eSentire customer experience. This series is all about pulling back the curtain and putting the spotlight on the people who power eSentire's world-class cybersecurity services.Join us for a relaxed and revealing discussion covering day-to-day challenges, personal motivation, industry observations, and the unique value each guest brings to the eSentire mission. Get to know the voices behind the protection—and why our people are at the core of everything we do.--Have a question for us? Reach out: hello@esentire.com---About Cyber TalksFrom ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges.About eSentireeSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠www.esentire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and follow ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@eSentire⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Risk Management Show
Revolutionizing Vulnerability Management: Insights from Joe Silva

Risk Management Show

Play Episode Listen Later Mar 28, 2025 14:17


In this episode of Global Risk Community Chat, we discussed revolutionizing vulnerability management with Joe Silva, the co-founder and CEO of Spektion. Joe shares his expertise in cybersecurity, drawing from his extensive experience as the former global CISO at JLL and cybersecurity leader at TransUnion.  Spektion is transforming the way organizations manage vulnerabilities by leveraging runtime behavior analysis to address risks beyond traditional CVE-based systems. Joe explains how their innovative approach helps enterprises understand software exploitability, prioritize risks, and integrate with existing tools like EDR, XDR, and SIEM. He also shares actionable insights for CISOs, risk managers, and security executives to enhance their vulnerability management strategies while reducing manual efforts and resource strain. If you want to be our guest or suggest someone for an upcoming episode, send your email to info@globalriskconsult.com with the subject line “Guest Proposal.”  Don't miss this insightful conversation on risk management, cybersecurity, and the future of vulnerability solutions.

Irish Tech News Audio Articles
Integrity360 expands into France with acquisition of Holiseum

Irish Tech News Audio Articles

Play Episode Listen Later Mar 20, 2025 5:58


Continuing its global expansion plan, Integrity360 has acquired leading cyber security specialist Holiseum headquartered in Paris, France. The terms of the transaction were not disclosed. The acquisition will enable Integrity360 to accelerate its growth in France and continental Europe, and significantly provide a new and exciting services practice focused on Operational Technology ("OT") and Internet of Things ("IoT") technologies which complement Integrity360's existing service practices. Those include cyber risk and assurance, cyber security testing, incident response, infrastructure, Microsoft cyber, payments compliance, and a highly comprehensive range of cyber security managed services including managed detection and response ("MDR") solutions. Holiseum will continue to operate from its existing three facilities in France but with the benefit of the full resources and capability of the wider Integrity360 business. Holiseum, founded in 2018, is a highly respected and well-established cybersecurity consultancy that specialises in critical and industrial infrastructure. It serves approx. 80 customers throughout France and selected international locations from facilities in Paris and Nimes including organisations operating in the energy, infrastructure, manufacturing, transport and financial sectors. In particular, Holiseum is an expert in OT technology and has helped many global corporate and infrastructure organisations secure and evolve their OT environment and associated IT estates. Holiseum's reputation is underpinned by several security accreditations from ANSSI - the National Cybersecurity Agency of France - including PASSI (cybersecurity audit services) and PACS (cybersecurity support and consulting) - where Holiseum is one of the first three certified organisations in France. Holiseum's portfolio of services include audit, training, investigation and a full suite of OT consulting solutions. Securing critical infrastructures is a high priority for many governments and corporate organisations across the globe due to the alarming rise in attacks on industrial and energy infrastructure. Leading industry analyst Gartner has commented that such attacks could result in the weaponisation of OT environments to seriously harm human life. Despite the tightening of the regulatory environment with the introduction of cyber security frameworks including NIS2 (Network and Information Security 2) and DORA (Digital Operational Resilience Act) the challenge of continuously securing critical infrastructure remains acute. Holiseum will form a major new practice within Integrity360 dedicated to the mission of aiding, protecting and supporting both government and industrial infrastructure. The existing Holiseum team of 32 will be rapidly expanded in France and across all other Integrity360 markets in support of this mission. In addition, Holiseum's headquarters in Paris will form a new regional hub for the group from which it will deliver the full suite of Integrity360 services, and during 2025 an additional Paris based SOC (Security Operations Centre) will be launched to join the existing network of six SOCs across EMEA (Dublin, Stockholm, Naples, Sofia, Madrid and Cape Town). The SOC teams deliver a wide-ranging set of managed services for customers including EDR, XDR and MDR (Endpoint Detection and Response, Extended Detection and Response, and Managed Detection and Response). Integrity360's innovative range of services have been recognised on multiple occasions by Gartner, namely as a Representative Vendor in the Gartner market guide for Managed Detection and Response services. The addition of Holiseum brings group revenues to over €160m and a dedicated cybersecurity team of over 700 employees. Further innovation and demand for its services across the EMEA region will expand group revenues in 2025 across all territories. Ian Brown, Executive Chairman at Integrity360 commented: "We are very excited to be welcoming the team from Hol...

Blue Security
Defender Experts with Special Guest Raae Wolfram

Blue Security

Play Episode Listen Later Mar 4, 2025 65:21


SummaryIn this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer engage with Ray Wolfram, Senior Product Manager for Defender Experts at Microsoft. Ray shares her extensive background in healthcare IT and cybersecurity, detailing her journey to Microsoft and the impact of COVID-19 on the cybersecurity landscape. The conversation delves into the two offerings of Defender Experts: Defender Experts for Hunting and Defender Experts for XDR, highlighting their unique features and the role of Microsoft in providing unparalleled threat intelligence. The episode emphasizes the importance of human expertise in cybersecurity and the proactive approach of Defender Experts in threat hunting and incident response. In this conversation, the speakers discuss the evolving landscape of cybersecurity, focusing on the role of threat hunters, the capabilities of Microsoft Defender Experts for XDR, and the importance of partnerships in providing comprehensive security solutions. They explore how Microsoft meets customers where they are, the onboarding process for new customers, and the integration of third-party solutions into the Defender ecosystem. The discussion also highlights the proactive nature of Defender Experts and the future roadmap for Defender for Cloud, emphasizing the need for collaboration in the cybersecurity space.----------------------------------------------------YouTube Video Link:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ https://youtu.be/zY9zOEFkZOc----------------------------------------------------Documentation:https://learn.microsoft.com/en-us/defender-xdr/defender-experts-for-huntinghttps://learn.microsoft.com/en-us/defender-xdr/dex-xdr-overviewhttps://www.microsoft.com/en-us/security/blog/2023/03/27/microsoft-incident-response-retainer-is-generally-available/https://www.linkedin.com/in/raaewolfram/----------------------------------------------------Contact Us:Website: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/company/bluesecpodYouTube:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/andyjaw/Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠andy@bluesecuritypod.com⁠----------------------------------------------------Adam BrewerTwitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/ajbrewerLinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/adamjbrewer/Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠adam@bluesecuritypod.com

Und dann kam Punk
195: Stefan Sandrock (BUOYANCY, ENFOLD, OHIO´S FAVORITE) - Und dann kam Punk

Und dann kam Punk

Play Episode Listen Later Feb 25, 2025 276:46


Christopher & Jobst im Gespräch mit Stefan. Wir reden über Naomi Klein, Jura & Ökonomie, VHS-Skatevideos, Claus Grabkes Eight Dayz, ein Skateplatz gegenüber vom städtischen Krankenhaus, Kapella-Treff, der 29. Januar im Bundestag, zerbrochene Bohrer, fehlender Q-Vermerk im Zeugnis, plötzlich Alltag beim Vater, die Idee von Perfektionismus, das Thyssen-Werk in Bielefeld, ein Depeche Mode & Iron Maiden Tape von Jens, die Schlagerparade im Radio, XDr. AlbanX im PC69, Kommunikationselektroniker dank BIZ, Marty McFly, Angst vorm Ajo, Britcore von Silver Bullet, N-Factor "Winter in Deutschland", Mikro auf der Paniermehl-Packung, der kleine Sammy von Judge, Weinrich und der Skatekeller, heimelig im AJZ Bielefeld fühlen, das Forum Enger, ein Zwerg in nem LKW, ein AJZ Coverfestival mit Chain of Strength, Lizards in Straight Jackets, irgendwie Punker aber auch Straight Edge, SSWC aus Gütersloh, die Uniform aus T-Shirt & Dickies & Vans, als Aushilfsbassist von Veil mit 108 auf Tour, in den Proberaum gehen um Sounds zu entwickeln, die Split-7" mit June´s Tragic Drive, Unbroken als Blaupause, Philipp verkleidet als Metal am Bass, mit RZA in der Bravo, zu viele Menschen mit Abitur im Podcast, Howard Zinn & son Zeug, relativ kleine Arschloch-Dichte, Abstract Hip Hop, Brausepöter im Hafenklang, die kleine Skateboard Brand Equate, Weißwein & Cremant, die Band Ohio´s Favorite, House mit Mineral Music & Sandrock, Autor beim NDR, das Fanzinr 45 Revolutions per Minute, via Frontline zum Model, keine Ausstellungen, ein Bild mit fallenden Häusern für Erik, Happy Grindcore, Lurkidammerburschen, auf gar keinen Fall Krimi, Exposé und Leseprobe, Küsten- & Inselkrimis, chinesische Science Fiction Romane, das Restaurant Kini in der Sandstrasse, das beste vegane Bolognese Rezept, langfristig wird´s besser, Rutger Bregmann, nicht so aussehen wie ne Hantel, uvm.Drei Songs für die Playlist1) Ein Lieblingssong vom 15-jährigen Stefan: BAD RELIGION - Generator2) Einer der besten Hardcore-Songs aller Zeiten: SNAPCASE - Drain Me / Filler 3) Ein aktueller Song bei dem Stefan im Radio nicht umschaltet: HARRY STYLES - As It Was

The Industrial Talk Podcast with Scott MacKenzie
Ariadna Broquetas and Toni Serrano with Seven Sector Technologies

The Industrial Talk Podcast with Scott MacKenzie

Play Episode Listen Later Feb 21, 2025 19:27


Industrial Talk is onsite at IoT Solutions World Congress and talking to Ariadna Broquetas and Toni Serrano with Seven Sector Technologies about "Making cybersecurity work for you". Scott MacKenzie hosts the Industrial Talk podcast, featuring Toni and Addie from Seven Sector Technologies at the IoT Solutions World Congress in Barcelona. Toni, a cybersecurity expert, and Addie, a marketing professional, discuss their product, XDR net, which provides active defense against cyberattacks. XDR net is a hardware device that monitors and blocks potential threats on local networks. It can handle up to 500 devices per unit and is easy to set up. They also mention the implementation of digital twins to enhance security. Toni and Addie emphasize the importance of cybersecurity in today's digital landscape and invite listeners to connect with them on LinkedIn for more information. Action Items [ ] Implement digital twin technology for the XDRnet product. [ ] Integrate alert capabilities to notify customers of potential threats via email, phone, or other channels. [ ] Reach out to Toni Serrano (LinkedIn: Toni Serrano) or Ariadna Broquetas (LinkedIn: Ariadna Broquetas) from Seven Sector Technology to discuss the XDRnet solution further. Outline Introduction to the Podcast and Event Scott MacKenzie introduces the podcast, emphasizing its focus on industry professionals and innovations. The podcast is recorded on-site at the IoT Solutions World Congress in Barcelona, Spain. Scott highlights the event as a must-attend for problem solvers in digital transformation. The company featured in the episode is Seven Sector Technologies. Meeting the Guests: Toni and Addie Scott introduces Toni and Addie, the guests from Seven Sector Technologies. Toni and Addie are both from Barcelona, and Scott shares a humorous story about his arrival in Barcelona on a holiday. The conference is in its first day, and Scott and the guests discuss the event's attendance and traffic. Scott transitions to discussing the main topic: Seven Sector Technologies and their product, XDR net. Background of Tony and Addie Toni shares his background in cybersecurity, having studied and worked in the field since childhood. Addie is a student studying international business and marketing, and she is responsible for marketing at Seven Sector Technologies. Both Toni and Addie express their belief in the importance of cybersecurity in today's digital world. Scott and the guests discuss the increasing threats and the necessity of cybersecurity for all enterprises. Introduction to XDR Net and Active Defense Toni explains XDR net, a hardware device that detects, monitors, and blocks potential attacks on local networks. The device is designed to protect against various types of attacks, including those that target vulnerable parts of a network. Scott inquires about the ease of setting up XDR net, and Toni assures that it is straightforward. Addie adds that once the device is plugged into the network, their team takes care of the rest, ensuring minimal effort from the client. Use Cases and Scalability Scott uses a manufacturing scenario to illustrate how XDR net can protect a company with numerous devices. Toni and Addie confirm that XDR net can handle a large number of devices, with the need for additional devices as the number of assets increases. Scott asks about the scalability of the solution, and Toni and Addie

Cyber Talks
From Critical Alerts to Business Context: Why CTEM is the Future of Cybersecurity

Cyber Talks

Play Episode Listen Later Jan 21, 2025 41:00


In this episode of Cyber Talks, Tia Hopkins, Chief Cyber Resilience Officer & Field CTO at eSentire, and Roselle Safran, Founder & CEO at KeyCaliber, discuss the evolution of Continuous Threat Exposure Management (CTEM) and its role in modern cybersecurity. They explore the practical application of CTEM, its benefits for business context in security, and how it integrates with Managed Detection and Response (MDR) to enhance resilience. Key takeaways include: The difference between CTEM as a platform, tool, and technology and the 5 key stages of CTEM (per Gartner) Current challenges and limitations of CTEM adoption, such as gaining full visibility, prioritizing vulnerabilities, and cross-team alignment How MDR integrates with CTEM to provide real-time threat detection and response with the ultimate goal of building cyber resilience Emerging trends and technologies to look out for within CTEM -- Have a question for us? Reach out: hello@esentire.com --- About Cyber Talks From ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges. About eSentire eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠www.esentire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and follow ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@eSentire⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Cisco Champion Radio
S12|E2 From Data to Decisions: Exploring Splunk's Role in Digital Transformation

Cisco Champion Radio

Play Episode Listen Later Jan 14, 2025 39:40


In this episode of Cisco Champion Radio, we delve into the dynamic collaboration between Cisco and Splunk. Together, we explore how these industry leaders are enhancing visibility, streamlining operations, and strengthening security through powerful integrations and flexible licensing options. Discover how Splunk's innovative platform empowers users to turn raw data into actionable insights, offering holistic solutions for observability (IT operations, APM) and security (SIEM, XDR, UBA). Learn how Splunk's search processing language and natural language interface make data accessible and valuable, while its ability to accept data in any format ensures highly adaptable flexibility. We also discuss Splunk's integrations with Cisco products, delivering streamlined solutions that provide exceptional visibility and reliability. Whether you're curious about Splunk's licensing options, training resources, or deployment flexibility—on-premises or in the cloud—this episode covers it all. Tune in to hear about how Cisco and Splunk are empowering partners and customers alike through innovative solutions and tailored services like managed and professional offerings. Don't miss this insightful conversation that bridges the gap between cutting-edge technology and real-world applications. Cisco guest Jason Conger, Partner Field, CTO, Splunk Cisco Champion hosts David Penaloza, Principal Engineer, Verizon Liam Keegan, Advisor Nate Haleen, DevOps Technical Lead, Procellis Technology Inc. Donald Robb, Principal Network Architect, Disney Moderator Danielle Carter, Customer Voices and Cisco Champion Program, Cisco

Today in Health IT
2 Minute Drill: Arctic Wolf Acquires Cylance and Cyber Attacks For the Holidays With Drex Deford

Today in Health IT

Play Episode Listen Later Jan 13, 2025 3:16 Transcription Available


Drex covers Arctic Wolf's acquisition of Cylance to boost its XDR platform, a ransomware attack crippling PIH Health's systems, and an extortion attack targeting Rhode Island's public assistance program.Remember, Stay a Little Paranoid Subscribe: This Week Health Twitter: This Week Health LinkedIn: Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer

The Call to Mastery with Jordan Raynor
Dr. Mark Shrime (Chief Medical Officer for Mercy Ships)

The Call to Mastery with Jordan Raynor

Play Episode Listen Later Jan 8, 2025 40:03


How Mark's 3 appearances on American Ninja Warrior sharpened his skills as a doctor, how the gospel compels him to think differently about “The Checklist Manifesto,” and why he felt he could die happy during a near-death experience.Links Mentioned:Dr. Mark ShrimeDr. Mark Shrime on XDr. Mark Shrime on InstagramDr. Mark Shrime TEDxMercy ShipsAmerican Ninja WarriorSolving for Why: A Surgeon's Journey to Discover the Transformative Power of PurposeEpisode Scott Harrison (Founder of charity: water)When Breath Becomes AirThe Sacredness of Secular Work: 4 Ways Your Job Matters for Eternity (Even When You're Not Sharing the Gospel)Complications: A Surgeon's Notes on an Imperfect ScienceBeing Mortal: Medicine and What Matters in the EndThe Checklist Manifesto: How to Get Things RightAtul GawandeMr. RogersC. S. LewisTransitions (40th Anniversary Edition): Making Sense of Life's Changes The Culture Code: The Secrets of Highly Successful GroupsJordan Raynor

PayPod: The Payments Industry Podcast
Cybersecurity in the Age of AI with Sequretek's Anand Naik

PayPod: The Payments Industry Podcast

Play Episode Listen Later Jan 6, 2025 27:17


EpisodeTopic                                                                                                      In this episode, we delve into the world of cybersecurity with Anand Naik, founder of Sequretek Tech. Anand shares his extensive experience working with major companies like IBM, Sun Microsystems, and Symantec, and how he transitioned into founding Sequretek in 2013 to provide cutting-edge solutions to protect businesses from evolving cyber threats. His company's focus on using AI and machine learning to combat security risks in real-time is transforming the way cybersecurity is approached. From large enterprises to smaller organizations, the need for robust protection against cyberattacks has never been more critical. Lessons You'll Learn Listeners will gain valuable insights into the cybersecurity landscape, particularly how new technologies like AI, machine learning, and cloud-based solutions are redefining threat detection and mitigation. Anand explains the importance of simplifying security, offering businesses the flexibility to maintain visibility over their operations without overhauling existing systems. You'll also learn about the growing risks from IoT devices and quantum computing, and how companies can stay ahead by adopting advanced security solutions like Sequretek's percept XDR and percept IGA. About Our Guest Anand Naik is the founder and CEO of Sequretek Tech, a company dedicated to providing innovative cybersecurity solutions powered by AI and machine learning. With over two decades of experience working with global giants like IBM, Symantec, and Sun Microsystems, Anand brings a wealth of knowledge in cybersecurity. His company focuses on making security simple, providing businesses with seamless integration of advanced protection while reducing the complexity of managing multiple security systems. Anand's work is helping to shape the future of enterprise security, ensuring organizations stay protected in a rapidly evolving digital landscape. Topics Covered In this episode, Anand shares his journey from corporate giant to startup entrepreneur, offering insights into the technological shifts he witnessed and how they shaped his approach to cybersecurity. He discusses Sequretek's unique approach to providing real-time, AI-driven threat detection and security management. Anand also talks about the importance of flexible, modular systems that integrate with existing infrastructures and the future of cybersecurity, touching on emerging threats such as IoT breaches and quantum computing. Additionally, he explains how Sequretek is helping businesses navigate these challenges with minimal disruption and maximum protection.  

Breaking Change
v28 - Do you regret it yet?

Breaking Change

Play Episode Listen Later Jan 4, 2025 144:46


I don't normally do this, but content warning, this episode talks at length about death and funerals and, while I continue to approach everything with an inappropriate degree of levity, if that's something you're not game to listen to right now, go ahead and skip the first hour of this one. Recommend me your favorite show or video game at podcast@searls.co and I will either play/watch it or lie and say I did. Thanks! Now: links and transcript: Kirkland Signature, Organic Non-Dairy Oat Beverage Die with Zero book The "Prefer tabs when opening documents" setting Aaron's puns, ranked Amazon hoped more people would quit BoldVoice Accent Oracle Cab drivers get Alzheimer's less Video Games Can't Afford to Look This Good LG announces Bachelor's Only TV Can the rich world escape its baby crisis? Why aren't we talking about the real reason male college enrollment is dropping? The Diplomat The Penguin It's in the Game Madden documentary Like a Dragon / Yakuza 7 Indiana Jones and the Great Circle Transcript: [00:00:29] It is our first new year together in this relationship. [00:00:36] Breaking Change survived season one. [00:00:39] We are now in season two. [00:00:43] I don't know what, you know, how seasons should translate to a show about nothing. [00:00:51] I like to talk about how, you know, in different stages of life, we go through different seasons, right? [00:00:58] You know, like maybe, you know, after, you know, the seasonal life when maybe you get married or you have a kid, your first kid and all the changes that kind of go with that. [00:01:08] And if you play multiplayer competitive games, you might go through different seasons. [00:01:15] You know, like if you play Diablo four or Call of Duty, you might be in a particular eight week or 12 week season. [00:01:24] Now, as you grind your battle pass, that's similar in in scale and scope to having a child or having some big life event, because it turns out none of this fucking matters. [00:01:35] Hello, welcome. [00:01:36] This is a this is your kind and friendly host, Justin Searles, son of Fred Searles, son of Fred Searles himself, son of a Fred Searles. [00:01:48] That's yeah, there were there were, I think, three Fred's before me and then my dad was like combo breaker and he named me Justin. [00:02:02] Uh, thank you for subscribing to the advertisement free version of the podcast. [00:02:08] Uh, if you, if you think that there should be an advertisement version of the podcast, feel free to write in a podcast at Searles.co and then pay me money to read about your shit. [00:02:20] And I will do that. [00:02:21] Uh, and, and, you know, I'm happy to have all the conflicts of interest in the world because, uh, if your product sucks and I use it, I can't help myself. [00:02:32] I'm just, I'm just going to say it's bad. [00:02:34] So, uh, that's a real, you know, I, I, if you can't tell, I also run the ad sales department of this journalistic outfit and, uh, that might have something to do with the total lack of, uh, corporate funding. [00:02:48] Well, anyway, this is version 28 of the program. [00:02:54] This, this, this episode's breaking change titled, do you regret it yet? [00:02:59] And that'll make sense, uh, momentarily. [00:03:03] Uh, so, um, it's a big one in a sense, you know, it's something that, uh, there's very little in life that I'm not comfortable talking about. [00:03:14] And that's because, you know, well, I'll just dive right in. [00:03:20] So, so I read it, uh, I read an article, uh, uh, some number of years ago that explained that part of the reason why foot fetishes are so common in men is like part of the brain that identifies feet. [00:03:38] And part of the brain that is like erogenous in its, you know, there's different parts of the brain. [00:03:46] They do different things, but if you got to pick which neuron cluster you lived in as a part of the brain, erogenous zone, that would be sweet. [00:03:53] That'd be a lot more fun than the, um, whatever the, the part of the brain is that gets scared easily, which, uh, because I get stressed and anxious, [00:04:04] even just talking into a microphone with zero stakes on a recording that I could stop. [00:04:08] That makes me no money. [00:04:10] I'm too nervous to remember the fear part of the amygdala. [00:04:13] There it is. [00:04:14] You see, and if it just, and, and that gets back to my point in my particular fucked up brain soup, [00:04:22] the, uh, the, uh, the part of my brain that talks out my mouth hole is right next to the part of my brain that critically reasons through things. [00:04:37] So for me, it is very difficult to process something without talking it, talking it through. [00:04:47] And the idea that something is taboo has always been really uncomfortable for me. [00:04:52] And you can just sort of see the pained look on my face as I try to hold it in like a, like a burp or something. [00:04:57] Like I, I, I got to let it out somehow. [00:05:00] And so I'm, I, you know, I'm glad, I'm glad I get to be here with you. [00:05:05] I hope you find it kind of entertaining. [00:05:06] Unfortunately, the thing to talk about first thing, as I get into the section of this to-do list, that is this podcast titled life is that the big thing that happened since the last major breaking change, uh, uh, back in version 26, which is, I, I, I understand two numbers away from 28. [00:05:30] Uh, the big thing that changed, uh, is, uh, my father, Fred, he of a, a long and proud line of Fred's, uh, he passed away, uh, uh, uh, December 15th. [00:05:45] So just, just shortly after, uh, the previous, the previous version aired and, uh, pretty much every it's January 4th today and we're still working through it. [00:05:59] Um, he had a heart attack. [00:06:02] I think that's fair to say at this point, there's no, you know, no way to be a thousand percent sure, but all the signs suggest that's what it was. [00:06:11] And, uh, you know, without getting into, uh, the, the details, my side of the story is like, I was at Epcot with my brother, Jeremy. [00:06:26] So at least we were together. [00:06:28] Um, Jeremy gets the call and, uh, you know, we were, we were in that little tequila bar, uh, hanging out with a friend of ours who works there. [00:06:40] And, uh, the tequila bar inside of the Mexican pavilion pyramid. [00:06:44] And, uh, he had just brought us out the three kind of specialty cocktails that they got going on right now. [00:06:53] Uh, which is, uh, you know, wasn't, we are in a great time. [00:06:57] It was a lot of fun. [00:06:58] And, uh, Jeremy gets the call. [00:07:00] We process a little bit. [00:07:02] We realized like, we got to get home. [00:07:04] We got to figure this shit out. [00:07:06] You know, he's, he's a, he was a former emergency responder. [00:07:09] So he's really good at, uh, at thinking through the logistical things that you have to do with a relatively cool head. [00:07:16] It, you know, he comes across as like, you know, not drill sergeanty, but somebody who's like, you know, part of being calm and collected in an urgent situation is you have to be very direct. [00:07:28] And boom, boom, boom, boom. [00:07:30] So that was as soon as he knew what was happening. [00:07:35] That's the mode he flipped on. [00:07:37] And the mode that I flipped on was intense, uh, metabolization is the best word I can think of it. [00:07:44] Cause like you have like, like, like, like the saves take four shots of liquor, right? [00:07:48] You will metabolize that at whatever speed you do, and it'll hit you really hard and maybe you'll black out and maybe you'll, uh, you're a slower burn. [00:07:56] But for me, I feel, I feel things, whether they're chemical toxicology report showing up things or emotions, I tend to feel them extremely intensely and, and, and, and, and in a relatively brief burst, you know, uh, if you ever lit in a strip of magnesium on fire, which for some reason I did several times. [00:08:19] I was in, in, in different science lab classes as a kid, it brights, it burns real bright and real hot, but not for very long. [00:08:27] So while, while Jeremy was in his, you know, we got to figure out what to do mode. [00:08:33] Uh, we got to get out of here. [00:08:35] Uh, we gotta, you gotta, you know, we gotta book the next flight to Michigan to take care of this shit. [00:08:43] I was in, I'm going to, I'm going to just take a little, I'm going to pop a little deep squat here in Epcot, uh, right outside this bar. [00:08:56] And I'm going to just allow my vision to get blurry, which it did. [00:09:04] Um, my heart to race, my stomach to turn. [00:09:08] And I just needed that, you know, you lose track of time when something big and, and, and, and, and earth shaken happens. [00:09:20] I [00:09:22] snapped out of it is, you know, it's, it's crude way. [00:09:31] Words don't, words that you use for everyday things end up getting used for big life-changing things. [00:09:40] And it makes it feel smaller. [00:09:43] So even though I'm verbally processing every time I tell the story or think through it and, and talk it out. [00:09:53] I, I, I, I kind of came to my normal Justin senses pretty quickly, uh, where normal Justin senses means, you know, back in the bar, you know, everyone's, you know, who'd heard was upset and immediately like they're in their own kind of sense of shock, even not knowing my dad. [00:10:14] And I, I was, you know, uh, comforting them immediately and, you know, just asking our host, Hey, you know, because as a, as a staff member, he, he's able to get us out of the park a little bit more expeditiously, uh, than having to go all the way out and do this big, you know, what would have felt like a 15 minute walk of shame out of a theme park. [00:10:39] And, uh, yeah, anyway, so he got us out of there, we got home, booked flight, got, went up to Michigan the next day, uh, pretty much immediately. [00:10:50] And, and, and, and, and, and kudos to my brother for, for having that serious first response. [00:10:56] Cause like my first response after asking for, Hey, get us out of here was to see those three specialty cocktails on the table and be like, well, that, that would be a waste and B I could probably use a drink. [00:11:08] And so I, you know, one of them was a sake and, uh, mezcal infusion. [00:11:13] And I was like, well, they'd already poured it. [00:11:16] So I just threw that back on, on my way out the door. [00:11:18] That was probably a good move. [00:11:21] Uh, so we got up to Michigan, right? [00:11:25] And I don't want to tell anyone else's story about how, how they work through stuff and families. [00:11:31] Everyone processes things differently. [00:11:34] Uh, uh, so I'll skip all that shit. [00:11:36] I'll just say that like pretty quickly, the service planning, like that takes over, you know, the, uh, this is the first time I've had an immediate family member pass, but pretty quickly you're like, all right, well, there is this kind of, you know, process. [00:11:53] It's like not dissimilar from wedding planning, but instead of having six months, a year, or if you're an elder millennial, like eight years to plan, you have, uh, a few days. [00:12:07] And fortunately, uh, uh, dad had just by coincidence of, of, of another, uh, person we know passing had found a funeral home that he really liked. [00:12:18] And he, he said he wanted to do that one. [00:12:20] So that, that was off the table. [00:12:21] That was, that worked out. [00:12:23] But, uh, then, you know, even, and that was helpful. [00:12:28] That was really helpful to sit down and, and, and, you know, of course you go to the funeral home, you talk to the funeral home director and super sympathetic there. [00:12:35] It takes a certain kind, right? [00:12:38] A person, you know, you gotta have the strategically placed tissue boxes all over the place and then know when to stop talking and when to hand it and when to back away. [00:12:46] And, you know, dude is an absolute champ, but he's also done this before and he knows the questions to ask. [00:12:55] And it's not to like boil it down into a questionnaire, but it, it's a questionnaire. [00:13:00] It's like, Hey, what do you want? [00:13:01] How do you got to do this? [00:13:02] You know, you're being bang, boom. [00:13:04] What? [00:13:04] And fortunately, uh, collectively we came to the table with a lot of answers to a lot of those stock questions at the ready. [00:13:15] Um, but the thing that stood out to me was, you know, there's going to be a service we're going to have to write an obituary. [00:13:22] They gave us a start and, um, a start is actually the perfect thing to give me when it, when it comes to writing, you know, if you give me a blank page, it could take me all week. [00:13:32] But if you give me something I don't like and like me not writing in a hurry would result in the thing I don't like going out, then all of a sudden I get the motivation to go and write some shit. [00:13:46] So we, we, we, we, we worked together and we cleaned up the eulogy or the, excuse me, the obituary, all these terms you only use sparingly. [00:13:55] Occasionally, uh, got the obituary out, had a tremendous response, maybe from some of you because it was up on the website. [00:14:05] Had a tremendous response from people. [00:14:07] Everyone was shocked. [00:14:08] You know, no one expected that, uh, dad had a tremendously large social network being a dentist for 45 plus years in a community of people who loved him. [00:14:20] And he was genuinely, you know, an incredibly kind and friendly guy everywhere he went. [00:14:26] Uh, so, so that was good. [00:14:29] And you re and, and it was the obituary that made me realize like, well, I, you know, I knew this intellectually, but be like, oh yeah, like next few days here are for them. [00:14:37] It's for everybody else to understand process grief. [00:14:42] And so as soon as the obituary out, I was like, all right, next eulogy time. [00:14:48] So I, uh, I approached it as soon as I knew it's a, when I know something's for me, I let it be for me. [00:14:58] I'm not, I've, I accept myself. [00:15:00] I love myself and take care of myself as best I can. [00:15:03] I don't, I'm not a martyr, right? [00:15:06] Like I don't push down my needs and interests for the sake of other people. [00:15:12] To the point of other people's viewing it as selfish sometimes. [00:15:15] And increasingly over the years, I'm viewing it as like, maybe you, maybe it's the children who are wrong. [00:15:21] Maybe this is just the way to be, because it turns out that when you take good care of yourself, you can show up for other people. [00:15:26] Well, right. [00:15:26] So anyway, I, I, as soon as I knew that like the point of the service wasn't for me, the point of the service was, uh, the other people in the room who, who, some of whom drove hours and stayed overnight in hotels to come be there. [00:15:42] It was, it was to give them something. [00:15:46] So as soon as that bit flipped in my brain, it became very easy to write a eulogy because I, I approached it like work. [00:15:56] I approached it like a conference talk or yeah, like it, I didn't actually open keynote, but I thought about it because that's how, that's how I tend to storyboard and work out conference talks. [00:16:09] And I, I thought about like, well, maybe I just do that and I just don't show the slides, you know, because I think it would be possibly inappropriate to, to have a PowerPoint presentation at your, I, at a funeral. [00:16:23] I don't know. [00:16:24] I guess I had to make one anyway. [00:16:26] We'll talk about that. [00:16:29] So anyway, writing, the eulogy took over. [00:16:31] It went smoothly. [00:16:33] It, I liked how it turned out. [00:16:35] If you subscribe to the newsletter, you'll get a copy of it. [00:16:38] So, so justin.searles.co slash newsletter. [00:16:41] It's called Searles of Wisdom, which of course, you know, me making that sound kitschy right now in this rather grave moment might sound inappropriate to, to, to shill, but you will get a copy of the eulogy. [00:16:53] I'm happy with it, how it turned out. [00:16:56] I, uh, as soon as I wrote it then, of course, and this is what I'm trying to illustrate is like everything just became task A. [00:17:03] Like, okay, task A is complete, task B, no real time in there for processing and thinking through things through. [00:17:11] Uh, so the eulogy took over, wrote it, and as soon as I'd written it, I was now task C, I gotta deliver it, you know. [00:17:21] I don't typically read a script when I speak, uh, but I had to write it all out as if it was being spoken. [00:17:32] And I had to even practice and rehearse it as if I was reading it because I knew that in an emotionally, you know, the best way that people seem to talk about this is like, it's, your emotions are close to the surface as if like any little tiny thing could just break the surface tension and, and, and spill over. [00:17:51] Right. [00:17:52] I knew that out of my control, I might, I might tear up. [00:17:56] I might cry. [00:17:57] I might need a minute. [00:18:01] While delivering this. [00:18:02] And so I, uh, I, I practiced it to be read, but I knew like, man, there's just a, there's a, I call it a 5%, 10% chance that I just have a fucking breakdown and I can't get through this thing. [00:18:18] And the anxiety in the day and a half leading up to the service worrying that I would fail as a public speaker outside the context of, you know, sure. [00:18:32] Everyone would give you a break if your dad just died. [00:18:35] Right. [00:18:35] But this is like the last thing I'm doing for him, you know, in a, in a publicly meaningful way. [00:18:40] And it's also a skill that I've spent a lot of time working on. [00:18:45] And so I wouldn't for me to fail at that by, by breaking or by even, even just failing to deliver it successfully and in a, in an impactful way would have been hard for me. [00:19:05] And it would have been something I probably would be ruminating on here. [00:19:08] We are a couple of weeks later. [00:19:10] And as a result, what happened is the same thing that happens before I give a conference talk in front of a bunch of people at a conference or whatever. [00:19:18] It's the, the, the, the, uh, stress hormone gets released, the adrenaline and the cortisol starts coming out. [00:19:26] And so the morning of the funeral, everyone else is kind of approaching it their own way. [00:19:31] And I'm like, it's game time, you know, like I, I'm dialed in my, you know, all of my instincts are about just getting through that five to seven minute speech. [00:19:47] And no emotional response before then. [00:19:50] And afterwards, to be honest, the biggest emotional response afterwards was the relief of successfully. [00:19:57] And I did successfully deliver it. [00:19:59] And, uh, and then as soon as task C of delivering it is done, then task D starts of now it's the end of a funeral service. [00:20:08] And you've got a receiving line of all these guests coming up and they, you know, they're, they're approaching the open casket and they're, they're coming to, you know, hug you, talk to you. [00:20:17] See how you are. [00:20:18] And there's a performative aspect to that, right? [00:20:22] Like you gotta be like, all right, who's ready for lunch? [00:20:24] That would be inappropriate. [00:20:25] Right. [00:20:26] But the, you know, also talking about how, like, oh, I'm actually mostly focused on how I did a good job. [00:20:32] Giving this speech would separately be maybe, you know, off color, but these are the things that go through our brains in the, in these high impact moments. [00:20:43] When you just have to, when, when, whenever a situation dictates that your behavior be misaligned or the statements about oneself be at all discordant with what's really going on inside you in that literal moment. [00:21:08] And so, so I did my best, uh, of course, to make it about other people and see how they're doing and answer their questions in as, uh, productive a way as possible. [00:21:20] Right. [00:21:20] Give them answers about myself that gave them the things that they needed was my primary response all through. [00:21:29] And then, and then through that, and then task E, the wake. [00:21:32] Right. [00:21:33] And, and, uh, you do, you, you do that. [00:21:35] And then suddenly, uh, well, now you have task F after, after all that stuff of like, okay, well, we've got all this leftover food we got to take home. [00:21:42] So it's like load up the car and, and, and, and help everyone out and see everyone on their way safely. [00:21:48] And then, you know, you're exhausted and you want to just go back and, and, you know, get out of this fucking suit that barely fits. [00:21:58] Nope. [00:21:59] Task G is you got to go turn around, drive 20 minutes in the opposite direction to go back to the funeral home, to pick up all of these flowers. [00:22:05] Cause you, you tell people not to send flowers. [00:22:07] Uh, you, you say, you know, in dad's case, donate to the humane society, but people send flowers. [00:22:14] And then, you know, what do you fucking do with them? [00:22:16] Right. [00:22:17] It's like, well, here's look, if you or someone you're affiliated with sent flowers to this particular funeral, I'm deeply grateful. [00:22:25] And I had a moving moment, actually looking at all the flowers of friends of mine, people who never met dad. [00:22:31] Most of the time, a couple of our neighbors, right. [00:22:35] Who we don't really know well, but they're just really lovely people. [00:22:38] They, they did a bouquet and it was really nice. [00:22:40] You know, flowers are beautiful, but. [00:22:49] Like a cigarette can be really, really nice, but a carton can be a lot. [00:22:53] Uh, you know, a cocktail can be really nice, but drinking a whole fifth is problematic. [00:23:00] When you have so many bouquets that you can't fit them into your vehicle and also the people in the vehicle. [00:23:06] It's all it's, it, it just, it, it becomes a work. [00:23:10] Right. [00:23:11] And so that's what, you know, that's one of the ways in which having this service like this become sort of, you know, like less about the immediate family and more about the surrounding, you know, network of people that somebody knows. [00:23:24] And maybe this is all common sense and, and I should have been more conscientious of this going into the experience, but looking back on it, uh, I was just sort of like, all right, well, here's next task is figure out how to cram all these flowers. [00:23:39] And then you get home and it's like, where'd all these flowers go? [00:23:43] And so you just kind of scatter them throughout the house. [00:23:48] Uh, but they're all, you know, like they're not invasives or they're not like going to survive the long winter. [00:23:53] Like they're, they're now all on their own separate week to two week timer of themselves dying and needing to be dealt with, which is like, you know, a, let's just say an echo or a reverberation of like kind of what you're thinking about. [00:24:07] So maybe, okay, look, I don't want to spend this whole fucking podcast talking about a funeral. [00:24:15] I realize it's like maybe a bit of a downer, but you know, there's other stuff going on to like, I skipped a whole fucking half day activity. [00:24:25] Actually is wedge a task in there between B and C if you're for anyone playing the home game and keeping track of this, not that it's that complicated, uh, you got to come up with a slideshow, right? [00:24:39] So you've got the visitation before the service and we also had it the night before for anyone who couldn't make it or, you know, maybe acquaintances and whatnot, who didn't feel like going to the whole service, whatever it is. [00:24:57] You got to come up with a slideshow, which is theoretically easy these days because there's so many goddamn pictures of all of us. [00:25:04] It's theoretically easy because you have tools like, uh, shared iCloud photo libraries, uh, and shared albums, which, you know, as soon as somebody suggested a shared album, I went into my like pre canned speech. [00:25:20] And I think of, well, actually shared albums predate, you know, modern ways of sharing photos in the photos app. [00:25:25] And so whenever you put anything in a shared album, Apple compresses it pretty badly. [00:25:30] It, it downscales the resolution. [00:25:32] It also, you know, adjusts downward, the quality of the image. [00:25:39] And I got halfway through that spiel and being like, you know, this is going to go up on a 10 ADP TV in the back of a room. [00:25:45] Like it's fine. [00:25:46] That's not the issue. [00:25:47] But then the next issue is, you know, everyone goes in the people and pets and photo library, sees all the pictures of dad that aren't bad. [00:25:56] And we all dump them into the same shared library, shared photo album, which is like, like, that's no one's fault, but mine. [00:26:02] I told people just do that and I'll clear them out. [00:26:04] But then you wind up with, and it turns out, this is how that stupid fucking system works. [00:26:09] The shared photo album will treat all of those duplicates as distinct. [00:26:14] And there's, even though there's duplicate deduping now in the photos app, it does not apply to shared library, shared photo albums. [00:26:21] And on top of that, if somebody adds something to a shared photo album, they can remove it. [00:26:27] But for somebody else, like, like, let's say I added a photo of dad that Becky didn't want in there. [00:26:33] Well, Becky can't go in and remove it. [00:26:35] Only the organizer can remove it or the person who posted it. [00:26:39] So then I had to be the person going through and, like, servicing any requests people had for photos to, like, ban from the slideshow. [00:26:46] Because for whatever reason, you know, it's a sensitive time. [00:26:49] And then after it was all done, you realize the slideshow tools don't work correctly. [00:26:56] Like, just the play button and all the different options in the Mac, like, just don't work correctly in a shared album. [00:27:01] Because, of course, they don't. [00:27:02] So then you've got to copy them all. [00:27:07] You thought I was talking about feelings, but it all comes back. [00:27:11] All comes back to Apple shit. [00:27:13] So you've got to copy them all into your photo library, whoever is going to be running the slideshow. [00:27:17] Create a new slideshow project from there. [00:27:20] Dump them all in there. [00:27:22] And then realize there's no, once you've dumped shit into a slideshow project, there is no way to reorder them. [00:27:27] Short of manually drag dropping extremely slowly in a left-right horizontal scroll dingus. [00:27:34] And you've got 500 pictures or something, just fucking forget about it. [00:27:37] And on top of that, I had all these dupes. [00:27:40] Like, I had manually de-duped as best as I could before. [00:27:43] But first question I get half an hour into the visitation is like, yeah, it just seems weird. [00:27:48] Because, like, there's this one picture of me that's going to come up, like, four times. [00:27:52] I was like, I'm sorry, bud. [00:27:54] I said, oh, it's randomized or whatever, you know. [00:28:01] So after you get all of those into a photo slideshow project, and successfully, I installed amphetamine, which will keep your screen awake. [00:28:11] And you plug that into HDMI, and you know how to put a fucking Mac on a TV. [00:28:15] I don't need to tell you that. [00:28:16] After all of it was done and I got home, the two days later I realized, oh, yeah, shit. [00:28:24] Because now my photo library is full, all of the most recent photos are just shit that was copied, that was already initially in my photo library anyway. [00:28:32] And none of them are showing up in the little dupes thing, of course, because it needs days to analyze on Wi-Fi. [00:28:39] So I went to the recent imports or recently saved tab, and then I had to manually go through and delete, like, 1,400 pictures of my dad. [00:28:50] And then hope that, like, I wasn't deleting one that wasn't a dupe. [00:28:55] So I had to go through and, like, manually tease these out. [00:28:59] It took me a fucking hour and a half. [00:29:02] And, yeah, so then I deleted all those to kind of dedupe it, because I was confident I had copies of all those pictures already somewhere else in the library. [00:29:11] That could have been smoother, is the short version of this story. [00:29:16] And, of course, there's no goddamn good software that does this. [00:29:20] There are two people who have made apps that simply shuffle photos in a slideshow. [00:29:26] And they're bad apps. [00:29:27] So they look old. [00:29:28] It's like they basically had to reinvent slideshow stuff, including the software and the shuffling and the crossfades and the Ken Burns effect and the music and all the stuff that the Apple product does. [00:29:38] They had to reinvent all that just to have a shuffle button, which is what you probably want, especially if you've got a mix of scanned photos and, you know, contemporaneous photos. [00:29:50] Because there's no way you're going to make the timeline actually contiguous. [00:29:54] So instead, like, well, here's, like, a bunch of photos between, like, 2003 and 2017, because that's the digital photography era. [00:30:05] And then in 2018, when we scanned all of our photo albums, suddenly it's just all of the photo albums in random order. [00:30:12] And then you have 2019 to 2024. [00:30:15] Like, it's not a cohesive experience. [00:30:20] Now, I would say, well, you know, it's a visitation. [00:30:23] People are coming and going. [00:30:24] They go in, they visit the casket, and they spend time chatting. [00:30:28] But, like, they don't, though. [00:30:30] All the chairs are pointing at this TV, and people just sat there for more than an hour. [00:30:36] They'd watch multiple. [00:30:37] Like, I thought that having a 45-minute long slideshow, that pacing would be okay. [00:30:43] People watched it two or three times while they chatted, you know, just the state of, the lack of kinetic energy throughout the entire experience of somebody passing. [00:30:54] You know, the phrase sit Shiva from Judaism. [00:30:58] Like, I am somebody who is relatively uncomfortable just sitting around, around other people. [00:31:06] I'm happy to sit around by myself. [00:31:08] I'm doing it right now. [00:31:09] I'm actually pretty good at it. [00:31:10] Ask anybody. [00:31:11] But to not have an activity with other people, and also not to have, like, interesting conversation to have with other people, [00:31:20] to just have to be around and with other people, is really goddamn hard. [00:31:25] And I suspect I'm not the only one who feels that way. [00:31:28] Hence, everyone just staring at the slideshow and making a comment here and there. [00:31:32] So, a couple things did jump out at me about that service and about the visitation, though, that were interesting. [00:31:40] One was, Dad had mentored a couple of younger dentists in his last couple years practicing. [00:31:48] People who had intended to take over the practice. [00:31:51] That's his own long story. [00:31:52] But they were, my age or younger, probably younger, definitely younger, come to think of it. [00:31:59] Splendid people. [00:32:00] Like, super upbeat, super duper energetic, just, like, fun. [00:32:05] They forced my dad to do stuff like go fishing and get out and do things that he normally wouldn't do. [00:32:13] And they blew me away by just saying, like, you know, dad was 72. [00:32:18] He was like, this guy, most dentists, when they get older, the hands get shaky. [00:32:25] Their craft gets sloppy. [00:32:28] But your dad was, he, he, I think he said, he set the standard. [00:32:33] He was just a beast. [00:32:34] He was, and I was like, what do you mean? [00:32:36] Like, actually, I've never really talked to anyone about his craft, right? [00:32:41] Because he didn't want to talk about it. [00:32:44] He was like, his prep work and, and, and how he prepped for each procedure was meticulous and perfect every single time. [00:32:53] And his technique while doing things was, was like, like phenomenal. [00:33:00] And they went into a handful of specifics for me. [00:33:02] And that was really special to me because I, like, I, I know that about myself that I'm chasing this asymptotic goal of perfection, but I didn't have evidence that my dad was as well outside of just stuff around the house. [00:33:16] And you can say that, well, that's perfectionism and that's OCD. [00:33:19] And we both have like, you know, traits of that too. [00:33:20] But the, that was really interesting because everyone had only ever experienced my dad as a patient or somebody who's like really, really gregarious and friendly and good at comforting patients. [00:33:33] But yeah, their stories were really, really encouraging. [00:33:39] And that was, that was one where it's like, I was glad to be able to walk away from that series of experiences and learn new stuff about my dad, uh, new stuff that rounded out the story of him in my mind. [00:33:54] Uh, so I'm really thankful to those guys, uh, because they were able to dive in and baby bird for me, explain like I'm five, like the ways in which he was a great dentist, which is just a thing that like, you know, everyone. [00:34:08] How do you rate your dentist, right? [00:34:10] Well, he's good at comforting me. [00:34:12] He's good at explaining things. [00:34:13] He doesn't upsell me a lot. [00:34:15] You know, I'm not afraid when I'm in the chair with him. [00:34:17] And then afterwards things seem to go pretty well, but like, really like the, the work is a black box. [00:34:22] You can't see what's going on in your fucking mouth. [00:34:24] You're, you're conscious. [00:34:25] You know how you feel before and how you feel after, but it's, uh, that was really cool. [00:34:31] Uh, the other, uh, another dentist that worked for him earlier in, in, in, uh, his career, uh, she, she had previously lost her dad and she said, you know, she said something that felt at the time, extremely true. [00:34:47] That a funeral is like having to host the worst party ever. [00:34:51] Uh, so that just to put a cap on it, that's, uh, accurate. [00:35:00] It felt like a party because I got to see a whole lot of people, friends from college, you know, Mark Van Holstein, the president or former president, but co-founder, founder of, uh, mutually human software in Grand Rapids. [00:35:10] You had my former housemate. [00:35:11] He came out, uh, uh, other kid, uh, other friends from, from middle school, high school made the trick, trick, trick, trick, Jeff and Dan. [00:35:21] It was really great to see so many people under, you know, suboptimal circumstances. [00:35:28] And then of course the whole set of extended family where it's like weddings and funerals, huh? [00:35:33] And then like the obligatory, like, yeah, we should really figure out a way to see each other more. [00:35:37] And it's like true. [00:35:38] And no one doesn't feel that way. [00:35:40] It's just like structurally unlikely the way people's lives work. [00:35:44] Uh, and so there's a sort of, uh, uh, nihilism is definitely the wrong word. [00:35:52] There's a sort of resignation that one has about what even are weddings and funerals and why is it that there's this whole cast of characters in your life that are important or close to you and via affiliation or history in some way. [00:36:12] But that you only see at these really like, like, like, like loud life events where it's a big, the background sound is a huge gong going off that distracts from actually getting to know the people. [00:36:26] If you just, you know, picked them on a random Tuesday and went to lunch, you'd probably learn a lot about the person. [00:36:31] But if it's just in the context of like, you know, like looking at, you know, a tray of sandwiches and having to find something to say, it's all going to be sucked in by the event. [00:36:41] And that's too bad, but that's, that's life, I guess, uh, tasks, you know, H through Z day after I, I had intentionally put off any sort of like looking at stuff, like, like thinking about the logistics, uh, the finances, the legal side, the, all that stuff, life insurance, yada, yada. [00:37:06] Uh, but then, you know, it was a lot of that, right. [00:37:09] For, for the rest of our trip, we were there for, for, for 11 days. [00:37:12] I would say skipping a lot of the minutiae because I, of course, you know, when the, when the, when, when a, when a household had a household or breadwinner passes and they didn't leave instructions, like you got to go and do the forensic analysis to figure out like, what are all the, where is everything? [00:37:32] Right. [00:37:32] That's, that's what it was. [00:37:34] It's all fine. [00:37:36] But the, uh, the tech support son, which is like my, you know, uh, it's not an official designation, but, uh, you know, it's a, it's a role I've stepped into and I feel like I've grown into pretty well. [00:37:48] One of the things that jumped is, all right, so we got a couple of things going on. [00:37:54] One, my mom is in an Apple family organized to buy my dad's Apple ID. [00:37:59] Now what? [00:38:00] All the purchases have been made in general on dad's Apple ID, including their Apple one premiere subscription. [00:38:06] Okay. [00:38:07] Well, you know, next eight, you can imagine my next eight Google searches or coggy searches. [00:38:13] All right. [00:38:14] Well, how do you change head of house or organizer of a family answer? [00:38:19] You cannot. [00:38:19] Okay. [00:38:20] Well, how can I transfer the purchases from an organizer to somebody else in the family? [00:38:28] You cannot. [00:38:28] Okay. [00:38:29] Is there a process by which I can make somebody sort of like a legacy page on Facebook, a legacy [00:38:35] human Apple ID? [00:38:37] No. [00:38:39] Okay. [00:38:40] So what do I do? [00:38:41] And they're like, well, you can call Apple support and they may need a death certificate, [00:38:45] but then you can call them and then they can do some amount of stuff, but some, but you don't [00:38:52] get to know what. [00:38:52] And once you kind of go through that process, the Apple ID gets like locked out or that's a, [00:38:57] that's a risk. [00:38:58] And all the sort of, you know, contingent, other things related to that. [00:39:02] I was like, all right, well, I don't necessarily want to do that as a first resort, but I do got [00:39:09] to figure this out because having just like this extra Apple, having this whole like digital [00:39:14] twin to borrow a, an industry term, continue to be a part of a, you know, an Apple family, [00:39:22] a one password family or all this for years into years, just because the software companies [00:39:27] don't make it logistically possible to die. [00:39:30] Uh, that seems great, you know, like, like, so working through that, you know, like I, I still [00:39:38] don't quite have a solution to that. [00:39:39] I'm just going to get through a couple of billing cycles on all the other stuff first, [00:39:43] before I think too hard about it. [00:39:44] Just kidding. [00:39:45] I've thought really hard about it and I've got a 15 step, you know, uh, set of to do's, [00:39:50] but they're just gonna, I gracefully, mercifully, I mercifully punted them two weeks into the [00:39:56] future. [00:39:56] Uh, I, one of the biggest things other than the Apple family stuff was my, my dad had just [00:40:09] bought a new iPhone 16. [00:40:12] I, and he set it up and all that stuff, but my mom was on an older one, like a 12 pro or a 12 mini or a 13 mini. [00:40:19] And it didn't make sense to leave her with the old phone and the new 16, just like in a drawer, [00:40:30] it made sense to give her the new phone. [00:40:33] Right. [00:40:34] Otherwise that the other phone's old enough. [00:40:36] It's like, I'll just be back in six months or, or, or, you know, like we'll, you'll be wasting [00:40:39] money. [00:40:40] So, and that, you know, just like deleting photos of your dad because of a stupid duplication bug, [00:40:45] having to go through a whole bunch of hoops to, to migrate one phone to the other was like the [00:40:50] next challenge. [00:40:52] Cause here was why it was thorny, right? [00:40:54] If, if all of the bank accounts and multi-factor authentication against banks is almost exclusively [00:41:03] SMS, right? [00:41:04] Cause they didn't get on the bandwagon for a, a T O T P or, you know, like you scan the QR code and you [00:41:11] get an authenticator app to, to show it. [00:41:13] And because they, they certainly don't support pass keys. [00:41:16] Uh, we can't just turn off dad's cellular line until we work through all the financial stuff. [00:41:22] But at the same time, okay. [00:41:25] So like if I'm resetting dad's phone and moving mom's stuff onto dad's phone, then how do I [00:41:30] transfer, how do I get these, how do I make it so that dad's SIM doesn't just disappear? [00:41:35] Cause like last thing I want to do is have to call T-Mobile and explain, and then set up the [00:41:41] old phone from scratch and then have them like, I guess, restart the e-SIM process over the phone [00:41:46] on Christmas, you know, Christmas Eve or whatever. [00:41:51] So I, um, I came up with like a towers of Hanoi solution that I actually kind of liked. [00:41:56] What I did was I transferred dad's SIM from the 16 to mom's 13, call it. [00:42:03] So now she had two SIMs on her phone. [00:42:05] She had her primary SIM and dad's SIM, uh, e-SIM. [00:42:09] Uh, uh, and then I, oh, and the 13 or the 12, whatever has one physical and one e-SIM. [00:42:17] And she fortunately had a physical SIM in there. [00:42:19] So she was able to, to, to receive dad's old e-SIM. [00:42:22] So now the 13 of that stage has a physical, a physical nano SIM and an e-SIM. [00:42:27] And then that allowed me to go to dad's phone, back it up, of course, and all that, and then [00:42:32] wipe it. [00:42:33] Cause it had no cellular plan on it. [00:42:35] And then you set it up new, you set it up for mom. [00:42:40] And during that wizard, you know, you do the direct transfer, they're connected via, you [00:42:45] know, USB cables or whatever. [00:42:46] You set it up for mom. [00:42:49] And she has to, she, it says, Hey, you're ready to transfer your cellular plans. [00:42:56] I'm like, yes. [00:42:56] And then I, it's, I realized it's not, you click, you tap one in it and a check box goes [00:43:02] up next to that number. [00:43:03] And then you check the other one and the check box, the check mark moves. [00:43:07] It's clearly like it doesn't support actually initializing a phone with two SIMs, which means [00:43:14] now it's like, okay, so I'll move for a primary SIM first as part of this direct transfer. [00:43:20] And then the direct transfer, because her router was simultaneously and coincidentally failing, [00:43:25] the direct transfer failed because the wifi timed out. [00:43:30] And when you're in the direct transfer mode between two phones in that setting, you can't [00:43:36] like get to control center and turn off the wifi nick. [00:43:39] So then I've got these two phones that I can clearly tell are timing out in the activation [00:43:43] process while the SIM is moving. [00:43:45] And I'm like, fuck sake. [00:43:47] But it's also like a mesh router and there's three mesh access points throughout the house [00:43:52] and I don't know where they are. [00:43:53] So I, I can't just unplug them and make the SSID go away. [00:43:57] So then I would like throw on my winter coat, it's fucking freezing outside and I start marching [00:44:03] down the street until I can get to like far enough away that they both lose the wifi signal [00:44:09] so that the transfer doesn't fail. [00:44:11] So I, it took 15 houses. [00:44:14] I'm, you know, in, in, in, in, uh, uh, my winter coat, 15 houses, they finally get onto [00:44:21] five G and then the, the, the transfer starts succeeding. [00:44:23] And then I start walking back and then it's just instantly says failed. [00:44:26] So then I get back to the house, start the whole thing over again. [00:44:30] And now of course, mom's primary SIM is like trapped on the first phone or the second, the [00:44:36] new 16, but in setting it up again, it doesn't see it anymore because like it was just at that [00:44:41] perfect moment when all the e-sim juice lands in the 16 or whatever. [00:44:48] So I started the whole process over again. [00:44:50] I, I, I set it up fair and square and then I, I, uh, uh, it all went fine after a few hours. [00:44:59] And then the last thing it does is the 13 or whatever says, Hey, okay, time to delete [00:45:04] me. [00:45:04] And then it's like a, basically two taps and you've deleted the phone that just was the [00:45:08] sender or the old phone in the transfer process. [00:45:11] And I almost habitually clicked it. [00:45:13] And I was like, wait, no, that will delete the SIM, the e-sim. [00:45:16] So click, no, cancel out of that, restart the phone. [00:45:20] And then, and then you can transfer that second SIM back to the first one. [00:45:23] So like when that was just two phones, just moving to e-sims, like again, you know, note [00:45:28] to Apple, like this could probably be made easier. [00:45:31] Uh, it's just, it's edge cases like this, that all software companies are really, really bad [00:45:37] at, uh, especially ones that don't have a great track record of automated testing and stuff [00:45:43] like, so I get it. [00:45:45] I know why it happened. [00:45:47] The other thing that sucked was a dad had an Apple card and if we're not going to have [00:45:52] a phone with dad on it, you don't want, there's no other fucking way to cancel an Apple card. [00:45:57] You have to be on the phone that has the Apple card to cancel it. [00:46:01] But if there's no phone with Fred on it, like that meant I, that forced the issue. [00:46:05] Like I'm not, I'm putting off all the financial stuff, right? [00:46:07] But I had to cancel the Apple card, but I had a balance. [00:46:10] So now I've got to like pay a balance on this Apple card. [00:46:13] And of course the banking connection, he didn't like, like it expired or something. [00:46:18] So I have to go and find the banking information. [00:46:21] I log in, whatever I hit cancel. [00:46:23] And it's, you can cancel the card. [00:46:25] It wants you to pay the balance first. [00:46:27] I tried to pay the exact balance. [00:46:30] It was $218 and 17 cents. [00:46:32] I, and I tried 15 goddamn times. [00:46:35] Uh, I changed to a different bank and it said insufficient balance. [00:46:41] And I was like, does that mean like the checking accounts overdrawn? [00:46:45] So then I'm panicking. [00:46:45] It's like, so I go into the bank account. [00:46:47] I'm like, is it easy overdrawn or what? [00:46:50] Hour of, you know, me retrying and doing this only to realize that there's a fucking bug, [00:46:58] a rounding bug of sub decimal sense. [00:47:02] Because when it said $218 and 17 cents as being the balance owed, it was probably a floating [00:47:09] point under there of $218 and call it 16.51 cents. [00:47:16] Because when I tried to do $218 and 17 cents, it failed. [00:47:21] It's an insufficient balance, which made me think insufficient funds. [00:47:25] But then I had the bright idea to try just one penny less than that. [00:47:28] And it cleared. [00:47:30] It meant that you can't make a payment on the card that is in excess of what is owed on the [00:47:35] card. [00:47:35] And it saw that fraction of a penny as being, oh, hey now, a little too generous. [00:47:40] So an Apple, you know, be good guy, Apple, making sure people can't overpay. [00:47:44] Also, the bad guy, Apple doesn't write tests or use, you know, appropriate data structures [00:47:50] for storing goddamn dollars. [00:47:52] Results in, I can't close this card out. [00:47:56] So eventually, so I got it down to one penny. [00:47:58] And then when it was down to one penny, it let me pay one penny, which is separately hilarious. [00:48:02] So I close the Apple card and then the Apple card says, all right, you're closed now. [00:48:09] The card is removed from all your devices. [00:48:14] Now monitor for the next few months and make payments against anything that shows up in [00:48:18] the statement, right? [00:48:19] Because like, that's how credit cards work. [00:48:20] Things don't post immediately. [00:48:22] I was like, well, I have no idea what was getting charged onto this thing. [00:48:26] What might hit it? [00:48:28] I'd scrolled through a statement. [00:48:31] I had a feeling it wouldn't be bad. [00:48:32] But then of course, like as soon as I wipe that phone, I even restored it. [00:48:36] I restored dad's Apple ID onto another phone because I had a burner phone back when I got [00:48:42] home just to see like, would it, would it, would it, would the, would it, the iCloud sync [00:48:47] work, you know, where your wallet shit just shows up in the new phone just magically after [00:48:52] setup. [00:48:52] And the answer is no, because the Apple card is closed. [00:48:55] So there's no reason to put the Apple card on the new phone. [00:48:58] People would be confused, even though it's just in this removed state of like, watch the [00:49:01] balance, which means now that once the phone gets wiped, there's actually no way to pay [00:49:06] a balance. [00:49:06] If one were to materialize, I guess it would just go to collections. [00:49:10] So now, you know, like, please don't post any transactions to my dad's defunct Apple card. [00:49:16] Cause like, I don't have any fucking way to pay it. [00:49:18] There's card.apple.com. [00:49:19] But like, that's just for downloading statements. [00:49:22] So great job, Apple, like you should really make it easier to die. [00:49:26] Like, fuck, fuck it's sake. [00:49:27] This is a, I realized this has been a lot. [00:49:33] I'm going to move right along. [00:49:37] While we were up, we wanted to just, we needed a break. [00:49:42] It'd been like day after day of the same, you know, emotional and logistical tumult. [00:49:48] Just a real grind. [00:49:49] So we want to go see a movie and like, like, uh, uh, Jeremy had expressed interest in seeing [00:49:53] wicked, which is an autobiography about Ariana Grande as a person, as best I can tell. [00:50:00] Real just, she seems like a piece of shit in real life, but also she got to play one in [00:50:08] a movie. [00:50:08] And so like, uh, it's like one of those things where it's like, well, that Bill Murray just [00:50:12] like plays himself. [00:50:13] And it just so happens that he is such a delightful and interesting person that everything he's [00:50:18] in is always amazing. [00:50:19] So I'm glad she got to play herself. [00:50:21] It seemed well acted, but I knew it was probably just who she is. [00:50:27] Uh, huge fan. [00:50:31] Uh, so anyway, we went to see wicked and all of a sudden, you know, we joked about it beforehand, [00:50:37] but like, I can't, I don't understand lyrics. [00:50:39] I have a thing I've got a, uh, a worm lives inside my brain. [00:50:43] And whenever there's a song playing, uh, that worm starts humming and I can't hear the lyrics [00:50:49] to the song. [00:50:50] I can't understand or discriminate where the words are starting and stopping. [00:50:53] I can't tell what is being said. [00:50:56] And if I can barely make it out, then I'm so overwrought and focusing on what's being said. [00:51:01] Then, then I kind of lose the thread. [00:51:02] Like I'll hear the individual words if I really focus, but then not understand what is being [00:51:08] communicated through lyrics. [00:51:10] At the same time, you go to a musical, you go to like, when I went to Hamilton, this was [00:51:15] like extremely clear. [00:51:16] It's like, Oh, I, I put, we went to Hamilton, uh, when, when Hamilton was still cool and not [00:51:21] seen as some sort of, you know, uh, uh, white supremacist whitewashing by putting BIPOC [00:51:27] people in, in these roles and whatnot, 2020 was a hell of a year, uh, when we went to [00:51:33] Hamilton, I got, they got through the first number and I was like, that was very impressive. [00:51:38] I, I appreciate the, this tonal, you know, interesting take. [00:51:43] This is like very like, like skillfully and artfully, uh, done. [00:51:47] Uh, and then, uh, you know, then they go straight into another song and I turned to Becky. [00:51:54] He was like, is there, is there no talking in this one? [00:51:56] Is there zero spoken dialogue in this? [00:52:00] And it turned out that the answer was yes. [00:52:02] And I was like, I don't understand anything. [00:52:04] And so, uh, when we went to Hamilton, which I'd paid a lot of money to go to, uh, I walked [00:52:09] to the lobby in the middle of the show. [00:52:12] And then I ordered like two thingies of wine, uh, which I paid a lot of money for the wine. [00:52:20] And then I got back to the seat, threw back both wines and fell asleep. [00:52:23] So that was Hamilton for me. [00:52:26] So here I am at wicked and we're in the first little ditty. [00:52:28] And I'm like, I don't understand any of these fucking words. [00:52:33] I don't, I don't know what's happening. [00:52:35] And I've got to worry that this is going to be a song heavy movie, which it was. [00:52:40] So I was like, you know what, like normally I'd be embarrassed to do this, [00:52:44] but I'm going to go to the front and say, like, I'm hard of hearing. [00:52:49] Can I have a subtitle machine dingus? [00:52:52] I knew that theaters had them. [00:52:55] I didn't really know how they worked or what they were, if they were any good. [00:52:58] But I was like, you know, for the sake of science and technology, I'm going to try the [00:53:02] subtitle dingus. [00:53:04] So I went to the front, I went to the little, like, you know, whatever ticket booth, and [00:53:08] they handed me a gooseneck snake thing where the bottom is like, it's like a, a drill that [00:53:17] would bore a tunnel, but it goes in the cup holder. [00:53:20] So it's like a cup holder drill and it screws in. [00:53:23] So it goes in the cup holder. [00:53:25] You screw it in to secure it. [00:53:27] And then there's a long gooseneck, a too long, in my opinion, gooseneck. [00:53:31] It's like probably two feet. [00:53:34] If you don't know the term gooseneck, like, like, like, like bendy, like, like, you know, [00:53:42] relatively thick, not a cable, but like a, like a pole that is pliable. [00:53:48] So you can bend it in all sorts of different directions to kind of adjust it. [00:53:53] And then on the top, it was a, a device that had a blinder on the top so that other people [00:53:59] weren't getting a whole bunch of illumination and seeing subtitles and a radio system in [00:54:05] the center, as well as like a kind of internal projector unit. [00:54:08] And so it was very interesting to see how these worked. [00:54:11] You would, and, and, and honestly, because I was uninterested in the Ariana Grande story, [00:54:16] I was mostly just futzing with, and it gave me something to do for the three and a half [00:54:23] hours. [00:54:23] By the way, I had been told that there was an intermission and I was told that because somebody [00:54:29] had in the game of telephone and said they broke it up into two parts. [00:54:32] So like I went in expecting an intermission and then we're like three hours in, it's almost [00:54:37] like 11 fucking o'clock. [00:54:38] And I'm like, I got to pee, but like, I hear there's an intermission. [00:54:41] How late are we going to be here? [00:54:44] So that was, that kept me busy too. [00:54:46] I had something else to do, but anyway, the, the, the subtitle machine was really interesting [00:54:50] because as you look at it and once you get it configured, right, you realize like while [00:55:00] I was walking down the, the, the corridor, it just said, Hey, you know, go inside the theater [00:55:06] or whatever. [00:55:07] When you go in the side of theater, it'll just start showing up. [00:55:09] And when I looked inside the theater, just at the, at the edge of the theater, it was like, [00:55:14] malfunctioning. [00:55:15] It said like something about an, a reader. [00:55:16] And then I realized, Oh, what's happening here is, and this is really one of those kind [00:55:20] of old school, cool technology, you know, innovations where they couldn't just use a digital system [00:55:27] for this per se. [00:55:28] Like a protocol, right? [00:55:30] Like if you were to build this today, these would be like lithium ion battery devices that [00:55:34] would have some charging dock and some kind of software that ran on, like on top of some [00:55:38] minimal Linux stack. [00:55:40] And then it would use the, the, the theater's wifi to send subtitles, which would require [00:55:46] all of this configuration, right? [00:55:47] Like, okay, now punch in on the touch screen on your subtitle device, like which theater, [00:55:52] which theater you're in and which movie time. [00:55:54] And we'll play it. [00:55:55] Right. [00:55:55] But instead, this was just like a short wave radio system. [00:55:58] So you'd be inside the theater and every theater you, you've never even noticed this. [00:56:03] Probably you're in the theater and you're watching a movie. [00:56:06] And the subtitle machine is just receiving these waves that you can't see because the projector [00:56:13] area, I presume is just always blasting out radio waves of the current line of dialogue. [00:56:20] You just didn't have the device to see it. [00:56:22] And so I got the thing screwed in with Jeremy's help because I'm not very handy and I got to [00:56:29] actually follow along the rest of the movie, which makes me an authority on, on, on being [00:56:34] able to say not that great. [00:56:35] Not very interesting. [00:56:37] I I'm on the Kinsey scale. [00:56:40] I'm all the way to hetero male, which means musical theater is not, doesn't come naturally [00:56:48] to me in terms of being like something that gets me real excited deep down there. [00:56:53] Uh, sorry if that's you, I'm just saying it's not it anyway. [00:57:02] Uh, yeah. [00:57:03] So that was, that was pretty cool. [00:57:05] Uh, other life stuff. [00:57:13] Well, the, the version, I guess tying a bow around the, uh, the trip up there and all [00:57:21] that realizing I've gone an hour on it now. [00:57:25] People, when you move from the Midwest United States to Florida and you do it because you [00:57:35] feel like the Midwest kind of sucks, you know, it's cold. [00:57:38] A lot of the time, uh, a lot of the rest belt States are, well, they're called rust belt. [00:57:45] They're dying economically. [00:57:46] There's less economic activity. [00:57:48] There's less new stuff. [00:57:50] There's less vibrancy. [00:57:51] Uh, when you move from the Midwest to Florida and you have a great setup there and lots of sunshine [00:58:00] and, and, and, and stuff to do people react in very different ways. [00:58:08] No one just says, Oh my God, that's so great for you. [00:58:10] I'm really, really happy for you. [00:58:11] Wow. [00:58:12] That sounds awesome. [00:58:12] I mean, some people kind of do, uh, a lot of people are either jealous or in some state [00:58:20] of denial or, or frustration by it, you know, like you feel abandoned or whatnot. [00:58:27] I think, I think the people who genuinely think the Midwest is better and the people who are [00:58:34] jealous, both end up asking the same question of us Midwestern expats. [00:58:41] And that, that question is, do you regret it yet? [00:58:44] God, I've been down here for four years. [00:58:48] Right. [00:58:49] And here I am. [00:58:50] My dad just died. [00:58:52] Just put on a funeral, you know, staying at a Hampton Inn. [00:58:57] Huh? [00:58:59] A Hampton Inn where like, it was a great experience. [00:59:02] The staff were really great, but like they had a desk in the laundry room that was never screwed [00:59:07] in or, or, or secured properly. [00:59:08] So I set down my brand new MacBook pro and a Coke, a can of Coke. [00:59:13] And then it just collapsed all of it all at once to the floor. [00:59:17] So my MacBook got soaking wet and Coke. [00:59:19] And also the, the unibody enclosure got super scraped up. [00:59:23] And, uh, the, the day before the funeral, I was all, you know, in a lot of neck pain from, [00:59:29] from the fall and the general manager still hasn't gotten back to me. [00:59:33] It was gray outside. [00:59:35] It was cold. [00:59:37] You know, and I, and I was struggling like for activities and things we could do as a [00:59:42] family and, and settled. [00:59:43] Uh, and the best, most entertaining thing to do was the Ariana Grande story. [00:59:50] And they ask, do you regret it yet? [00:59:52] Like totally just straight. [00:59:56] Every time we go back, I thought like, this is going to be the trip. [01:00:00] I go back and I don't have a single person ask me that, but then it came up relative at the [01:00:06] wake. [01:00:09] And I was like, man, thank you for asking. [01:00:11] You know, I think about it a lot. [01:00:14] I love Michigan. [01:00:14] Michigan's beautiful in the summers, but inside I'm like, come on. [01:00:17] No, I don't regret it. [01:00:19] Yes. [01:00:20] I'm already homesick. [01:00:21] Uh, it's fucking awesome here. [01:00:23] I'm not going to lie. [01:00:24] Like I live in goddamn paradise. [01:00:26] I don't know why more people don't do it. [01:00:28] I don't, you know, politics are part of the equation for a lot of folks, uh, politics and [01:00:35] policies. [01:00:36] Uh, and I, and I get it, but man, like I am so much fucking happier here just on a [01:00:42] day-to-day basis. [01:00:43] Like you, you blind out all of the sort of like metal layer stuff and just like my meat [01:00:48] bag gets a lot more sun and a lot more movement and a lot more just stuff going on down here. [01:00:53] And so, no, I don't regret it yet. [01:00:54] Uh, but if I ever do, I'll let you know, I've got a podcast, so I definitely will. [01:01:02] Uh, one thing I do regret is eating so, or is, uh, uh, drinking so little dairy in my [01:01:07] twenties because I have become extremely lactose intolerant. [01:01:12] Uh, so I don't have any lactase to the point where even if I drink lactaid, like, like what [01:01:19] they call like lactose free milk, but, but actually is lactose full milk with also lactase enzyme [01:01:25] added to it so that your tummy will process it. [01:01:28] Even when I drink that, I drank 20 grams two nights ago and the whole next day I was [01:01:33] wrecked. [01:01:33] That's not a lot of fucking milk. [01:01:35] Uh, now you call that an allergy or an intolerance. [01:01:39] Um, but like if I want cereal, like it's going to happen. [01:01:42] So sure you can pathologize it, but I was like, I, I am making a trade with my future self. [01:01:48] Like I'm going to put up with some indigestion so that I can have this deal. [01:01:52] Okay. [01:01:53] We're in, uh, if I had a peanut allergy to the point of like anaphylactic shock, I'd be [01:02:01] having the same negotiation. [01:02:03] I would just probably not take the deal most of the time. [01:02:07] Uh, anyway, I finally caved. [01:02:11] Cause like I talking about politics, I am politically, um, unaccepting intolerant of, [01:02:19] uh, milk alternatives. [01:02:22] Cause it's not milk. [01:02:24] People call almond milk, milk. [01:02:26] That's not milk. [01:02:27] That's just squeezed almond. [01:02:29] And like the amount of water that goes into making an almond is insane. [01:02:32] And so the, whatever almond milk is must be not, not really great from a sustainability [01:02:37] perspective. [01:02:38] And it's just, it's not, it's not what it says on the 10. [01:02:41] It shouldn't be allowed to be called milk. [01:02:43] It's like that fake egg product called just egg. [01:02:45] I was like, that's no, it's unjust egg. [01:02:48] This is not an egg. [01:02:49] Uh, so I, I, I caved and I bought Kirkland dairy-free oat beverage is what it says in the [01:03:00] box and oat milk. [01:03:02] And I had that last night and I'm still mad at myself about it, but here we are. [01:03:08] I'm going to say that's, I'm going to cap it at an hour of life updates. [01:03:16] I knew it would be life heavy. [01:03:18] Um, but, and because it's a heavy period of life right now, but if you're curious after all [01:03:24] of this shit and all the storytelling and all me getting stuff off my chest, I'm actually [01:03:28] doing great. [01:03:29] I'm processing things. [01:03:30] Love my dad dearly. [01:03:31] Um, I, I've taken the moments, you know, to be quiet and still and to spend effort and [01:03:44] time genuinely reflecting and going through old things and, you know, letting feelings happen [01:03:51] and letting those memories come by and doing other

The CyberWire
Decoding XDR: Allie Mellen on What's Next [Threat Vector]

The CyberWire

Play Episode Listen Later Dec 24, 2024 39:59


While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, Threat Vector by Palo Alto Networks. See you in 2025! Announcement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn more here. Check out our episode on "Cyber Espionage and Financial Crime: North Korea's Double Threat" with Assaf Dahan, Director of Threat Research at Palo Alto Networks Cortex team. Join host David Moulton on Threat Vector, as he dives deep into the rapidly evolving XDR landscape with Allie Mellen, Principal Analyst at Forrester. With expertise in security operations, nation-state threats, and the application of AI in security, Allie offers an inside look at how XDR is reshaping threat detection and response. From tackling the SIEM market's current challenges to optimizing detection engineering, Allie provides invaluable insights into the people, processes, and tools central to an effective SOC. This episode offers listeners a thoughtful exploration of how to navigate today's complex threat landscape and separate XDR hype from reality. Perfect for cybersecurity professionals looking to stay ahead in the field, tune in to hear expert perspectives on the next steps in cybersecurity resilience. Ready to go deeper? Join Josh Costa, Director of Product Marketing, Allie Mellen, Principal Analyst at Forrester and David Moulton, Director of Content and Thought Leadership for Unit 42 as they discuss the State of XDR https://start.paloaltonetworks.com/State-of-XDR-with-Forrester.  Join the conversation on our social media channels: Website: http://www.paloaltonetworks.com  Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠ Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/palo-alto-networks/ YouTube: ⁠⁠⁠⁠@paloaltonetworks Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠ About Threat Vector Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization. Palo Alto Networks Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

Irish Tech News Audio Articles
Integrity360 acquires Adsigo to expand European footprint

Irish Tech News Audio Articles

Play Episode Listen Later Dec 4, 2024 4:13


As part of its Pan European expansion plan Integrity360 has acquired leading European PCI QSA (Payment Card Industry Qualified Security Assessor) and cyber security services company Adsigo. The terms of the transaction were not disclosed. The acquisition will enable Integrity360 to expand further into continental Europe and provides additional skilled resources to its existing substantial PCI and cyber security compliance teams. Adsigo is a highly respected and well-established consultancy founded in 2013, and serves customers in Germany, Austria and Switzerland. It operates out of Stuttgart, Hamburg and Zurich from which it provides services to a wide range of financial, industrial, and services organisations. Adsigo has a leading position in PCI compliance and operates as one of the leading Qualified Security Assessor ("QSA") organisations in Europe having completed over 1,500 assessments. Adsigo will complement Integrity360's existing substantial PCI practice which operates as the No. 1 most chosen QSA organisation by Visa and Mastercard service provider organisations across Europe. Integrity360 has also been a proud member of the PCI GEAR (Global Executive Assessor Roundtable) since 2018 helping to refine and define PCI standards for the benefit of the industry. Adsigo will also compliment Integrity360's existing regulatory and cyber framework services capability including ISO27001, cyber security strategy, and third-party risk management. Integrity360 will invest further in Adsigo to become a regional hub for the full suite of Integrity360 services during 2025 including the addition of a new SOC ("Security Operations Centre") based in Germany, which will be combined with the existing circa 130 people Integrity360 SOC resources based out of Dublin, Stockholm, Naples and Sofia. The SOC teams deliver a wide-ranging set of managed services for customers including EDR, XDR and MDR (Endpoint Detection and Response, Extended Detection and Response, and Managed Detection and Response). Integrity360's innovative range of services have been recognised on multiple occasions by Gartner, namely as a Representative Vendor in the Gartner market guide for Managed Detection and Response services. Ian Brown, Executive Chairman at Integrity360 commented: "We are delighted to be welcoming the team from Adsigo to Integrity360. We have known Ralph and Stephan for some time and both organisations share the same passion for technical excellence and customer service as we do. "The enhanced group will now significantly expand our existing activities and cyber services across the DACH region (Germany, Austria and Switzerland) as well as offering the wider range of Integrity360 services to the existing customers of Adsigo. With the addition of Adsigo, group revenues in 2024 will exceed €135m significantly up on 2023, and group resources to approx. 550 employees." Ralph Woern, Founder and Chief Executive Officer of Adsigo commented: "I am really delighted that Adsigo is joining Integrity360 and continuing the journey that we started some 20 years ago. Thanks to the support of our customers and employees, Adsigo has become a leading QSA and provider of cyber services in Germany, Austria and Switzerland. Adsigo is excited to continue that journey but also with Integrity360's support, allowing us to further expand our team, our services, and our market coverage. "Our skills, combined with those of Integrity360, will provide an extension of our portfolio of professional, support and managed services. This is great news for employees, customers, and partners. I look forward to working closely with Ian and the wider Integrity360 team over the coming years." See more stories here.

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Connect to John Gilroy on LinkedIn   https://www.linkedin.com/in/john-gilroy/ Want to listen to other episodes? www.Federaltechpodcast.com With public speaking, everyone has butterflies before they begin; instructors tell speakers to get them to fly in formation. When it comes to tools for cybersecurity, we have a similar situation – you may have End point Detection and Response, Extended Detection and Response, Managed Detection and Response, DR, XDR, MDR, Security Information and Event Management, and many others. ThreatQuotient was founded with the intention of making sure these disparate tools provide actionable information for federal agencies. During today's interview with Craig Mueller, he takes us through context, customization, and collaboration that is needed in all federal agencies. The net result is the reduction in false positives and automation of the intelligence lifecycle. Criag Mueller brings up a topic that is rarely covered—air gapped systems.  Because of their deep understanding of the intelligence community, ThreatQuotient can provide services to agencies that use air-gapped networks.  

Backup Central's Restore it All
Detecting Ransomware Before It's Too Late

Backup Central's Restore it All

Play Episode Listen Later Nov 11, 2024 45:48 Transcription Available


WCcontinue=====================DESCRIPTION===============Detecting ransomware requires more than just good antivirus software - it demands a comprehensive approach using multiple tools and techniques. In this episode of The Backup Wrap-up, security expert Mike Saylor breaks down the essential components of ransomware detection, from endpoint protection to network monitoring.Learn about the latest detection tools like XDR, EDR, and SOAR, and discover why many organizations might benefit from working with a managed security service provider. We discuss real-world examples of ransomware detection, including unusual signs that might indicate an attack in progress. Whether you're managing IT for a small business or an enterprise organization, this episode provides practical insights into detecting ransomware before it's too late.

The CyberWire
State of security automation. [CSO Perspectives]

The CyberWire

Play Episode Listen Later Nov 4, 2024 22:34


Rick Howard, N2K CyberWire's Chief Analyst and Senior Fellow, turns over hosting duties to William MacMillan, the Chief Product Officer at Andesite, to discuss the Cybersecurity First Principle of automation: current state and what happens now with AI as it applies to SOC Operations. For a complete reading list and even more information, check out Rick's more detailed essay on the topic. Check out Rick's 3-part election mini-series: Part 1: Election Propaganda Part 1: How Does Election Propaganda Work? In this episode, Rick Howard, N2K CyberWire's Chief Analyst and Senior Fellow, discusses personal defensive measures that every citizen can take—regardless of political philosophy—to resist the influence of propaganda. This foundational episode is essential for understanding how to navigate the complex landscape of election messaging. Part 2: Election Propaganda: Part 2: Modern propaganda efforts. In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire's Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber. Part 3: Election Propaganda: Part 3: Efforts to reduce the impact of future elections. Thinking past the US 2024 Presidential Election, In part three of the series, Rick Howard, N2K CyberWire's Chief Analyst and Senior Fellow, discusses reducing the impact of propaganda in the future elections with Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4 and host of the 8th Layer Insights Podcast, Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project, and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber. References: Bob Violino, 2022. 7 top challenges of security tool integration [Analysis]. CSO Online. Bruce Japsen, 2024. UnitedHealth Group Cyberattack Costs To Hit $2.3 Billion This Year [News]. Forbes. Clay Chun, 2019. JOHN BOYD AND THE “OODA” LOOP (GREAT STRATEGISTS) [Explainer]. War Room - U.S. Army War College. Michael Cobb, 2023. The history, evolution and current state of SIEM [Explainer]. TechTarget. Rick Howard, 2022. History of Infosec: a primer. [Podcast and essay]. The CyberWire - CSO Perspectives. Rick Howard, 2020. Security operations centers: a first principle idea. [Podcast and Essay]. The CyberWire. Rick Howard, 2020. SOAR – a first principle idea. [Podcast and Essay]. The CyberWire - CSO Perspectives. Rick Howard, 2021. XDR: from the Rick the Toolman Series. [Podcast and Essay]. The CyberWire - CSO Perspectives. Robert Lemos, 2024. SOAR Is Dead, Long Live SOAR [Analysis]. Dark Reading. Timbuk 3, 1986. The Future's So Bright, I Gotta Wear Shades [Song]. Genius. Timbuk3VEVO, 2009. Timbuk 3 - The Future's So Bright [Music Video]. YouTube. Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Talks
Building Resilience Through Long-term MDR Partnerships with Rich Raether and Andrew DeBratto

Cyber Talks

Play Episode Listen Later Oct 31, 2024 33:38


In this episode of Cyber Talks, Rich Raether, CIO of Quarles & Brady, and Andrew DeBratto, CISO of Hunton Andrews Kurth LLP, discuss their decades-long journey in IT and cybersecurity. They recount shared projects, including navigating early security challenges, and reflect on how the industry has transformed, focusing on threat management and resilience-building. Rich and Andrew also share their personal and professional insights on managing cyber risk and reflect on how best practices in the industry have evolved. They emphasize the importance of fostering a security-conscious culture not just during October but year-round, encouraging proactive education to mitigate risks from ransomware, phishing, and other persistent threats. Key takeaways include: Building and maintaining cybersecurity resilience through incremental improvements and a measured approach to adopting new technologies. How cybersecurity has shifted from traditional perimeter-based models to modern cloud and AI-driven systems, underlining the increased complexity in securing hybrid environments. Practical advice for maintaining security at home and in the workplace, emphasizing proactive user education and vigilance against phishing and impersonation threats. Building resilient security operations with trusted MDR partners to ensure consistent threat visibility and quick incident response. -- Have a question for us? Reach out: hello@esentire.com --- About Cyber Talks From ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges. About eSentire eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠www.esentire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and follow ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@eSentire⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Embedded Insiders
Unlocking CylanceMDR and the Future of Software-Defined Vehicles

Embedded Insiders

Play Episode Listen Later Oct 23, 2024 40:00


Send us a textIn this episode of Embedded Insiders, we're joined by Sriram Krishnan, BlackBerry's Head of Product Management, to discuss CylanceMDR, their AI-powered managed detection and response solution. We'll explore how its XDR architecture enhances security by seamlessly integrating with existing tools, enabling more efficient threat detection and response.Tolly Report on BlackBerry's CylanceENDPOINTLater, Rich sits down with Marcelo Williams, Global Senior Director at Infineon Technologies, to discuss the fast-approaching era of software-defined vehicles (SDVs) and their impact on the automotive industry.But first, Rich, Ken, and I will recap Embedded World North America, highlighting standout sessions, hands-on workshops, and the winners of our Best-in-Show awards. If you missed it, we've got you covered!For more information, visit embeddedcomputing.com

Cloud Security Podcast
Building a SOC Team in 2024 - Automation & AI

Cloud Security Podcast

Play Episode Listen Later Oct 15, 2024 56:25


What is the future of SOC? In this episode Ashish sat down with Allie Mellen, Principal Analyst at Forrester, to explore the current state of security operations and the evolving role of AI in cybersecurity. Allie spoke about why Cloud Detection Response (CDR) might be dead, how Generative AI is failing to live up to its hype in security use cases, and why automation will never fully replace human security analysts. We get into the challenges faced by SOC teams today, the burnout issue among security analysts, and how adopting detection engineering and eliminating the outdated structures could transform the way security teams operate. Guest Socials:⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠Allie's Linkedin Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Podcast- Youtube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp Questions asked: (00:00) Introduction (02:48) A bit about Allie (03:13) The role of analysts in cybersecurity (05:56) What is EDR? (06:30) What is XDR? (08:42) The impact of GenAI (10:19) How is GenAI going to impact SOAR? (14:52) Where to start with SOC? (24:08) Starting to build your SOC team (27:32) How SOC should respond to new technology? (31:48) Expectations from Managed SOC providers (35:16) Detection challenges for Hybrid Environments (38:01) Level 2 and 3 SOC in new world (42:37) What training is required for the SOC team? (48:49) How will this space evolve? (51:48) The Fun Questions Resources spoken about during the interview: Cloud Detection and Response Tools Do Not Exist

CISO-Security Vendor Relationship Podcast
Does Burying Your Head in the Sand Count as a Security Posture? (LIVE in Boca Raton, FL)

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Oct 8, 2024 45:54


All links and images for this episode can be found on CISO Series. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Eduardo Ortiz, vp, global head of cybersecurity, Techtronic Industries. Joining us is Adam Fletcher, CSO, Blackstone. In this episode: Keeping our eyes on new risks The hiring disconnect Mental health in incident response Moving on from CrowdStrike Thanks to our podcast sponsors, Fortra, Quadrant Information Security, and Savvy Security! Fortra's Data Protection solutions protect sensitive data while keeping users productive. Our interlocking data loss prevention (DLP), data classification, and secure collaboration tools can be SaaS deployed or on-premises, and we offer managed services to extend your team and reduce risk. Visit www.fortra.com/solutions/data-security/data-protection for more information. Quadrant Security is bad news for bad dudes. Quadrant's XDR solution combines the best people, processes, and technology — managing your security so you can manage business operations. For a limited time, our analysts will provide your organization a free dark web report, detailing the data leaving you vulnerable. Learn more: quadrantsec.com/darkweb. Despite significant investments in SSO, MFA, IGA, and PAM, organizations still face significant challenges in securing identities, particularly with SaaS apps. Savvy Security augments these tools with full app and identity visibility to discover and remediate shadow and shared accounts, misconfigured authentication, and weak, reused, or compromised credentials. Visit savvy.security/ciso-series to learn more.

CISO-Security Vendor Relationship Podcast
… And the Business Listened to the CISO and Everyone Lived Happily Ever After

CISO-Security Vendor Relationship Podcast

Play Episode Listen Later Sep 24, 2024 36:45


All links and images for this episode can be found on CISO Series. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is Stephen Harrison, CISO, MGM Resorts International. In this episode: Understanding the AI attack surface Low code, low security? Chief information storytelling officer Finding the right partners Thanks to our podcast sponsor, Vectra AI! Vectra AI is the only extended detection and response (XDR) with AI-driven Attack Signal Intelligence. Vectra AI's attack signal intelligence platform uses AI to find attacks on networks, identities, clouds and GenAI tools. Learn more at vectra.ai/showme.

Backup Central's Restore it All
Detecting Ransomware Before It's Too Late

Backup Central's Restore it All

Play Episode Listen Later Sep 16, 2024 45:25 Transcription Available


In this eye-opening episode of The Backup Wrap-up, we delve into the critical topic of detecting ransomware. Joined by cybersecurity expert Dr. Mike Sailor, we explore the subtle signs that could indicate a ransomware attack in progress. From slight performance degradation to unusual network behavior, we cover the early warning signs that every IT professional and digital asset owner should be aware of.Our discussion goes beyond just identifying threats. We examine the role of advanced security tools like SIEM and XDR in early ransomware detection, and why integrating these with endpoint protection is crucial for an effective defense strategy. We also stress the importance of having a solid incident response plan and the benefits of virtualization in recovery efforts. Whether you're looking to bolster your organization's cybersecurity or simply protect your personal data, this episode provides invaluable insights into detecting ransomware before it's too late.

Cyber Talks
The Role of Threat Intelligence Sharing and Collaboration in Cyber Defense with Ryan Westman

Cyber Talks

Play Episode Listen Later Sep 11, 2024 50:00


The cyber threat landscape is evolving at an unprecedented pace, with increasingly sophisticated attacks from both nation-state actors and cybercriminals. Organizations must not only stay informed about emerging threats but also act swiftly to operationalize threat intelligence. Effective cybersecurity requires collaboration, cutting-edge tools, and strategic partnerships to mitigate risks in this dynamic environment. In this episode, Erin McLean, CMO at eSentire, and Ryan Westman, Director of Threat Intelligence, discuss how eSentire's Threat Response Unit (TRU) operates, the importance of actionable threat intelligence, and the growing impact of AI on the cybersecurity landscape. Key Takeaways: How eSentire's TRU operationalizes threat intelligence to detect and mitigate cyber threats in real-time. The importance of collaboration across the cybersecurity community, from private companies to government agencies. Insights into the evolving global threat landscape, including the role of nation-state actors and cybercriminals. The challenges of law enforcement in combating cybercrime and the critical role of private sector cybersecurity firms. The double-edged impact of generative AI in enhancing productivity while also amplifying the sophistication of cyberattacks. -- Have a question for us? Reach out: hello@esentire.com --- About Cyber Talks From ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges. About eSentire eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠www.esentire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and follow ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@eSentire⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

The Handbook: The Agency Operations Podcast
Dan Timmiss: How to get your agency IT ready for scaling

The Handbook: The Agency Operations Podcast

Play Episode Listen Later Sep 10, 2024 42:52 Transcription Available


As an Ops person, the role of IT expert is often part of the job. So how can you ensure your agency's IT infrastructure is set up for scaling? That's the focus of our discussion with Dan Timmiss, Technical Director at Kaizen IT Solutions. With over two decades of experience, Dan has helped hundreds of creative agencies optimize and manage their IT setups, from audits to complete IT overhauls and supporting scaling teams.In this episode, Dan shares essential best practices:The importance of implementing single sign-on (SSO) and multi-factor authentication (MFA) for security and ease of accessHow cloud storage can complement on-premise servers if you have heavy media filesUsing mobile device management solutions like Jamf to manage your fleet of computers, including ‘zero touch deployment' and easy on-boarding and off-boardingSeeking security accreditations like Cyber Essentials Plus, CIS Benchmarks or ISO 27001 to help secure contracts with global clientsHow newer services like MDR (managed detection and response) and XDR (extended detection and response) go beyond traditional anti-virus solutions to monitor your systems for threatsWhy to educate your team on ‘social engineering' scams that could cause financial and reputational harmFollow Dan on LinkedIn: https://www.linkedin.com/in/dan-timmiss-486ab517/ Follow Harv on LinkedIn: https://www.linkedin.com/in/harvnagra/Stay up to date with regular ops insights. Subscribe to The Handbook: The Operations Newsletter.This podcast is brought to you by Scoro, where you can manage your projects, resources and finances in a single system.

CISO Edge, The Gartner Cybersecurity Podcast
Can Vendor Consolidation and Defense in Depth Coexist?

CISO Edge, The Gartner Cybersecurity Podcast

Play Episode Listen Later Sep 3, 2024 35:55


Join Gartner experts Chris Mixter and Peter Firstbrook as they debunk the myths about vendor consolidation and provide CISOs with practical guidance on navigating this sea change in how cybersecurity technology is sold and operated. Does vendor consolidation contravene defense in depth? (05:34)Take a data-centric perspective to evaluate consolidation opportunities. (12:09) Questions for CISOs ask cybersecurity technology vendors about their pivot to platform-centric architectures. (21:29) Questions for CISOs to ask themselves about their cybersecurity talent in the platform era. (27:29) Gartner Distinguished VP Analyst Peter Firstbrook utilizes his 25+ years of experience as an industry analyst to help clients improve their security posture to defend and respond to malicious attacks. Peter is responsible for endpoint protection platform (EPP), endpoint detection, and remediation (EDR), extended detection and response (XDR) markets, as well as topics such as security vendor consolidation, workspace security and generative AI security.

Smologies with Alie Ward
GAMING with Jane McGonigal

Smologies with Alie Ward

Play Episode Listen Later Aug 29, 2024 30:41


Games! Play! Fun! Addiction? Flim-flam? From the origins of tabletop classics to the future of VR, Dr. Jane McGonigal answers our burning questions. This video game developer, TED speaker and bestselling author is an expert on how playing -- and especially video games -- can motivate, soothe and connect us. Will video games turn your child into a future car thief? How do they make you stronger? How much is too much? What about slot machines? Everyone who loves games (and everyone who hates games) should hear this one.Dr. McGonigal's website and XDr. McGonigal's book “Imaginable”A donation went to AbleGamers  Full-length (*not* G-rated) Ludology episode + tons of science linksMore kid-friendly Smologies episodes!Become a patron of Ologies for as little as a buck a monthOlogiesMerch.com has hats, shirts, masks, totes!Follow @Ologies on X and InstagramFollow @AlieWard on X and InstagramSound editing by Zeke Thomas Rodrigues & Jarrett Sleeper of MindJam MediaMade possible by work from Mercedes Maitland, Noel Dilworth, Susan Hale, Kelly R. Dwyer, Emily White, & Erin TalbertSmologies theme song by Harold Malcolm

Cyber Talks
Aligning Cybersecurity with Business Goals: Insights from Mark Benaquista

Cyber Talks

Play Episode Listen Later Aug 14, 2024 45:59


In this episode, Erin McLean chats with Mark Benaquista, a seasoned cybersecurity leader and Managing Director at Thomas H. Lee Partners. Mark shares his career journey from starting as an associate at JPMorgan to leading cybersecurity portfolios across various industries. He offers valuable insights into the importance of aligning technology with business objectives and the critical role cybersecurity plays in supporting these goals. Mark also delves into his current role at Thomas H. Lee Partners, where he oversees technology and cybersecurity across the firm's diverse portfolio, highlighting the collaborative approach that drives success. Key discussion points include: Mark's shift from a finance-focused role at JPMorgan to a technology-driven career, illustrating the value of flexibility and seizing new opportunities. Insights from Mark's decade at Merck, where he learned the importance of aligning IT with business objectives and the value of mentorship in career growth. Challenges Mark faced while transitioning to Warner Music and how he first encountered the critical importance of cybersecurity in a rapidly changing industry. Mark's approach to managing technology and cybersecurity across a diverse portfolio, focusing on collaboration, risk management, and the importance of integrating cyber risk into broader business discussions. Mark's thoughts on managing cybersecurity stress, emphasizing transparency, collaboration, and business alignment to ensure that security leaders don't shoulder the burden alone. -- Have a question for us? Reach out: hello@esentire.com --- About Cyber Talks From ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges. About eSentire eSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠www.esentire.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ and follow ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@eSentire⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠.

Blue Security
Cloud Security - Defender for Servers Deep-Dive

Blue Security

Play Episode Listen Later Jul 9, 2024 34:52


In this episode of the Blue Security Podcast, Andy and Adam discuss Defender for Servers, a cloud security solution offered by Microsoft. They explain that Defender for Servers is part of the larger Defender for Cloud umbrella and is designed to protect cloud infrastructure, specifically servers. They discuss the different plans available, including Plan 1 and Plan 2, which offer varying levels of endpoint protection and vulnerability management. They also highlight the inclusion of Cloud Security Posture Management (CSPM) in both plans. The hosts emphasize the vendor-agnostic nature of Defender for Servers, which can be used in AWS, GCP, and on-premises environments. Takeaways -Defender for Servers is part of the larger Defender for Cloud umbrella and is designed to protect cloud infrastructure, specifically servers. -There are two plans available for Defender for Servers: Plan 1 and Plan 2. Plan 1 offers endpoint protection, while Plan 2 includes additional features such as XDR, EDR, and regulatory compliance capabilities. -Both Plan 1 and Plan 2 include Cloud Security Posture Management (CSPM), which provides security recommendations and secure score assessments. -Defender for Servers is vendor-agnostic and can be used in AWS, GCP, and on-premises environments. It is available for both Windows and Linux VMs. -Defender for Servers is priced on a consumption-based model, allowing customers to pay only for what they use. ---------------------------------------------------- YouTube Video Link:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠https://youtu.be/-jG2BFPS45o⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ---------------------------------------------------- Documentation: ⁠https://learn.microsoft.com/en-us/azure/defender-for-cloud/plan-defender-for-servers-select-plan https://learn.microsoft.com/en-us/defender-vulnerability-management/defender-vulnerability-management-capabilities#vulnerability-managment-capabilities-for-servers https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-cloud-security-posture-management ---------------------------------------------------- Contact Us: Website: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://bluesecuritypod.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/bluesecuritypod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Linkedin: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/company/bluesecpod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Youtube: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/c/BlueSecurityPodcast⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ----------------------------------------------------------- Andy Jaw Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/ajawzero⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/andyjaw/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠andy@bluesecuritypod.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ---------------------------------------------------- Adam Brewer Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/ajbrewer⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ LinkedIn: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.linkedin.com/in/adamjbrewer/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Email: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠adam@bluesecuritypod.com

Defense in Depth
Securing Identities in the Cloud

Defense in Depth

Play Episode Listen Later Jun 27, 2024 32:33


All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is our sponsored guest, Adam Bateman, CEO, Push Security. The SaaS attacks matrix community resource mentioned by Adam in the episode can be found here. Editorial note: Geoff Belknap is an advisor to Push Security. In this episode: Where are we going wrong Finding the missing pieces  Protecting an expanding border It starts with understanding risk Thanks to our podcast sponsor, Push Security Prevent, detect and respond to identity attacks using Push Security's browser agent. Enable Push's out-of-the-box controls or integrate Push with your SIEM, XDR and SOAR. Block phishing attacks, detect session hijacking and stop SSO passwords being exposed. Find out what else the Push browser agent can do at pushsecurity.com.

The TechTual Talk
How to Start your Cyber Security Career with Splunk !

The TechTual Talk

Play Episode Listen Later Jun 21, 2024 83:19


Send us a Text Message.Learn Splunk from ECA here: https://mailchi.mp/techualconsulting.com/eca-academyWelcome to  Techtual Chatter  your ultimate podcast for all things technology and cybersecurity! In our latest episode, How to Start your Cyber Security Career with Splunk !, host Henri sits down with cybersecurity expert and founder of Ellington Cyber Academy, Kenneth, to unpack everything you need to know about launching a rewarding career in cybersecurity with Splunk.Are you eager to become a **Splunk architect** but don't know where to start? We delve into why a strong technical background is essential and outline the critical Linux proficiency and soft skills needed for client communication and approval.Learn the importance of **hands-on experience** with Splunk and discover how to effectively utilize **NIST and Mitre frameworks** for building top-notch detection rules. Henri and Kenneth also shed light on **baseline behavior understanding** and the pitfalls of implementing ineffective notables.Here are some of the key topics we will discuss tonight:1. **SIEM vs. Log Management:** Discover the critical differences between SIEM platforms and traditional log management solutions. What sets them apart?2. **Splunk Unveiled:** Why is Splunk so popular among organizations? We delve into its features, use cases, and benefits for cybersecurity professionals.3. **Splunk + Cisco Merger:** The recent merger between Splunk and Cisco has significant implications for the SIEM landscape. Learn how it impacts cyber professionals worldwide.4. **XDR and SOAR Integration:** Explore how Extended Detection and Response (XDR) and Security Orchestration, Automation, and Response (SOAR) platforms complement SIEM tools.5. **Learning Resources:** Where can you find the best materials to master Splunk and other SIEM platforms? We share valuable resources for your learning journey.6. **Our Partnership:** Join us in collaboration with ECA and TechTual as we navigate the ever-evolving cybersecurity landscape.Support the Show.If you enjoyed the show don't forget to leave us a 5 star review, to help with the algorithm :) Email: henridavis@thetechtualtalk.com➡️ Need coaching help then go here (ask about our financing)⬇️https://techualconsulting.com/offerings➡️ Want to land your first IT Job? Then check out the IT course from Course careers use my link and code Techtual50 to get $50 off your course ⬇️https://account.coursecareers.com/ref/50932/➡️ Need help getting into Cybersecurity for a low price then check out Josh Madakor's Cybersecurity course at Leveld Careers and use my code TechTual10 to get 10%off your course. ⬇️https://www.leveldcareers.com/a/2147530874/RuqjrBGjIf you want a high paying role in the cloud then click here⬇️https://Levelupintech.com/techStop data brokers from exposing your information with Aura!Click the link below to try out Aura's FREE 14 day trial and see if your personal information has been compromised

The CyberWire
The current state of XDR: A Rick-the-toolman episode.

The CyberWire

Play Episode Listen Later Jun 17, 2024 19:29


Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of “eXtended Detection and Response” (XDR) with CyberWire Hash Table guests Rick Doten, Centene's VP of Security, and Milad Aslaner, Sentinel One's XDR Product Manager. References: Alexandra Aguiar, 2023. Key Trends from the 2023 Hype Cycle for Security Operations [Gartner Hype Cycle Chart]. Noetic Cyber. Daniel Suarez, 2006. Daemon [Book]. Goodreads. Dave Crocker, 2020. Who Invented Email, Email History, How Email Was Invented [Websote]. LivingInternet. Eric Hutchins, Michael Cloppert, Rohan Amin, 2010, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [Paper] Lockheed Martin Corporation. Jon Ramsey, Mark Ryland, 2022. AWS co-announces release of the Open Cybersecurity Schema Framework (OCSF) project [Press Release]. Amazon Web Services. Nir Zuk, 2018. Palo Alto Networks Ignite USA '18 Keynote [Presentation]. YouTube. Raffael Marty, 2021. A Log Management History Lesson – From syslogd(8) to XDR [Youtube Video]. YouTube. Raffael Marty, 2021. A history lesson on security logging, from syslogd to XDR [Essay]. VentureBeat. Rick Howard, 2020. Daemon [Podcast]. Word Notes. Rick Howard, 2021. XDR: from the Rick the Toolman Series. [Podcast and Essay]. CSO Perspectives, The CyberWire. Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads. Staff, n.d. Open Cybersecurity Schema Framework [Standard]. GitHub. Staff, 2019. What is EDR? Endpoint Detection & Response Defined [Explainer]. CrowdStrike. Staff, 2020. Log Formats – a (Mostly) Complete Guide [Explainer]. Graylog. Stephen Watts, 2023. Common Event Format (CEF): An Introduction [Explainer]. Splunk. Thomas Lintemuth, Peter Firstbrook, Ayelet Heyman, Craig Lawson, Jeremy D'Hoinne, 2023. Market Guide for Extended Detection and Response [Essay]. Gartner. Learn more about your ad choices. Visit megaphone.fm/adchoices

Defense in Depth
Recruiting from the Help Desk

Defense in Depth

Play Episode Listen Later May 30, 2024 29:32


All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest, Sasha Pereira, vp of infrastructure and CISO, WASH. In this episode: Is working the help desk a great place to get entry level cyber security skills? So why is it so often overlooked or even looked down upon?  What kind of experience do you need? What is the ideal path to break into the cybersecurity industry? Thanks to our podcast sponsor, Push Security! Prevent, detect and respond to identity attacks using Push Security's browser agent. Enable Push's out-of-the-box controls or integrate Push with your SIEM, XDR and SOAR. Block phishing attacks, detect session hijacking and stop SSO passwords being exposed. Find out what else the Push browser agent can do at pushsecurity.com.

Outside Ourselves
Boys, Men, and the Freedom of the Gospel with Anthony Bradley

Outside Ourselves

Play Episode Listen Later May 28, 2024 71:17


Dr. Anthony Bradley serves as a distinguished research fellow at The Acton Institute and Research Professor of Interdisciplinary and Theological Studies at Kuyper College. He joins Kelsi to discuss his research, interest, and writing on the boy and man crisis and how he believes the Christus Victor articulation of the gospel – or Christ's victory over sin, death and the devil on the cross – has powerful implications for ridding men of shame and giving them a larger purpose to serve their neighbor. Show Notes: ⁠Support 1517⁠ ⁠1517 Podcasts⁠ ⁠The 1517 Podcast Network on Apple Podcasts⁠ ⁠1517 on Youtube⁠ More from Kelsi: ⁠Kelsi Klembara⁠ ⁠ Follow Kelsi on Instagram⁠ ⁠Follow Kelsi on Twitter⁠ ⁠Kelsi's Newsletter⁠ Subscribe to the Show: ⁠Apple Podcasts⁠ ⁠Spotify⁠ ⁠Youtube⁠ More from Dr. Bradley: Dr. Bradley's WebsiteDr. Bradley's SubstackFollow Dr. Bradley on XDr. Bradley's latest book, Heroic Fraternities

Paul's Security Weekly
Node.js Secure Coding - Oliver Tavakoli, Chris Thomas, Liran Tal - ASW #286

Paul's Security Weekly

Play Episode Listen Later May 21, 2024 69:05


Secure coding education should be more than a list of issues or repeating generic advice. Liran Tal explains his approach to teaching developers through examples that start with exploiting known vulns and end with discussions on possible fixes. Not only does this create a more engaging experience, but it also relies on code that looks familiar to developers rather than contrived or overly simplistic examples. Segment resources: https://github.com/lirantal https://cheatsheetseries.owasp.org/cheatsheets/NPMSecurityCheat_Sheet.html https://lirantal.com/blog/poor-express-authentication-patterns-nodejs The challenge of evaluating threat alerts in aggregate – what a collection and sequence of threat signals tell us about an attacker's sophistication and motives – has bedeviled SOC teams since the dawn of the Iron Age. Vectra AI CTO Oliver Tavakoli will discuss how the design principles of our XDR platform deal with this challenge and how GenAI impacts this perspective. Segment Resources: Vectra AI Platform Video: https://vimeo.com/916801622 Blog: https://www.vectra.ai/blog/what-is-xdr-the-promise-of-xdr-capabilities-explained Blog: https://www.vectra.ai/blog/xdr-explored-the-evolution-and-impact-of-extended-detection-and-response MXDR Calculator: https://www.vectra.ai/calculators/mxdr-value-calculator This segment is sponsored by Vectra AI. Visit https://securityweekly.com/vectrarsac to learn more about them! In this interview, we will discuss the network security challenges of business applications and how they can also be the solution. AlgoSec has spent over two decades tackling tough security issues in some of the world's most complex networks. Now, they're applying their expertise to hybrid networks—where customers are combining their on-premise resources along with multiple cloud providers. Segment Resources: https://www.algosec.com/resources/ This segment is sponsored by AlgoSec. Visit https://securityweekly.com/algosecrsac to learn more about them! Visit https://www.securityweekly.com/asw for all the latest episodes! Show Notes: https://securityweekly.com/asw-286

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Number of Industrial Devices Accessible From Internet Up 30 Thousand over three years https://isc.sans.edu/diary/It%20appears%20that%20the%20number%20of%20industrial%20devices%20accessible%20from%20the%20internet%20has%20risen%20by%2030%20thousand%20over%20the%20past%20three%20years/30860 Evil XDR: Turning an XDR into an Offensive Tool https://www.darkreading.com/application-security/evil-xdr-researcher-turns-palo-alto-software-into-perfect-malware GitLab Comment Bug https://www.bleepingcomputer.com/news/security/gitlab-affected-by-github-style-cdn-flaw-allowing-malware-hosting/ SEC522 Demo: https://www.sans.org/ondemand/get-demo/316

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Number of Industrial Devices Accessible From Internet Up 30 Thousand over three years https://isc.sans.edu/diary/It%20appears%20that%20the%20number%20of%20industrial%20devices%20accessible%20from%20the%20internet%20has%20risen%20by%2030%20thousand%20over%20the%20past%20three%20years/30860 Evil XDR: Turning an XDR into an Offensive Tool https://www.darkreading.com/application-security/evil-xdr-researcher-turns-palo-alto-software-into-perfect-malware GitLab Comment Bug https://www.bleepingcomputer.com/news/security/gitlab-affected-by-github-style-cdn-flaw-allowing-malware-hosting/ SEC522 Demo: https://www.sans.org/ondemand/get-demo/316

The Call to Mastery with Jordan Raynor
Dr. Darrell Cosden (Author of The Heavenly Good of Earthly Work)

The Call to Mastery with Jordan Raynor

Play Episode Listen Later Feb 14, 2024 45:37


What the nail scars in Jesus's hands mean for the work of your hands, why the eternal value of your “secular” work depends upon the value of creation, how we got to the place of overemphasizing heaven v. the “renewed earth.”--Pre-order The Sacredness of Secular Work today and you could win an epic trip for two to celebrate the sacredness of your “secular” work in a castle, vineyard, cathedral, and more! Entering to win is simple: Step 1: Pre-order the book on Amazon or one of these other retailersStep 2: Fill out this formNO PURCHASE NECESSARY. US Residents, 18+. Visit jordanraynor.com for full rules, entry steps (incl alternate entry), prize details, odds & other info. Void where prohibited.--Links Mentioned:Dr. Darrell Cosden on LinkedInThe Heavenly Good of Earthly WorkThe Sacredness of Secular WorkMiroslav Volf on XDr. Randy Alcorn on XWork and Worship: Reconnecting Our Labor and LiturgyEvery Good Endeavor: Connecting Your Work to God's WorkAl Erisman on LinkedInJordan Raynor