Intensified 公开
[search 0]
更多
Download the App!
show episodes
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
  continue reading
 
Hernan Cattaneo described Kay 's work as "Quality Stuff !" After Shining in his Country in 2009 by winning the national mix competition , Kay did a lot appearances in many Radios (Mosaique FM , FNOOB , Groundworx ,..) in addition to gigs (Le First , Podium , Saint Tropez ,..) , before establishing his Own Radioshow at Insomnia FM . In 2011 , Kay begin makin his own tracks , gaining attention of many big artists . Lately in that year , he brings the attention of Ryan Luciano a huge producer & ...
  continue reading
 
Loading …
show series
 
Gareth is the founder and CEO/CTO of a decentralized and encrypted email service called Telios. He's previously been a software engineer for over 13 years working in the automotive and banking industry, but in the last few years has shifted his focus towards building on the decentralized internet. This episode is available on YouTube: https://youtu…
  continue reading
 
Today we're discussing where our data lives, how can we find most of it and who controls your data. This episode is available on YouTube: https://www.youtube.com/watch?v=IkPftZRMgcA Brian J. Weiss is the CEO of ITECH Solutions that provides IT Services across the United States. Brian J. Weiss https://www.linkedin.com/in/brianjweiss/ https://www.ite…
  continue reading
 
On this episode I'll share my thoughts on the recent White House announcement below. This episode is available on YouTube: https://youtu.be/EHtnyGM0TCE WASHINGTON, June 1 (Reuters) - The White House said on Wednesday that any offensive cyber activity against Russia would not be a violation of U.S. policy of avoiding direct military conflict with Ru…
  continue reading
 
On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future, Jon Murchison and Xavier Salinas of Blackpoint Cyber and John Wetzel of Recorded Future to discuss ongoing events and incidents as they relate to cybersecurity. This episode is available on YouTube: https://www.youtube.com/watch?v=5WspCPjl…
  continue reading
 
Or at least that's my analysis of CISA Alert AA22-137A It doesn't matter what fancy tools you have if you're using and configuring them incorrectly. This episode is also available on YouTube: https://youtu.be/MJLpCTG_kqI In this episode I'm going to review CISA Alert (AA22-137A) https://www.cisa.gov/uscert/ncas/alerts/aa22-137a Weak Security Contro…
  continue reading
 
Extended detection and response (XDR) collects threat data from previously siloed security tools across an organization’s technology stack for easier and faster investigation, threat hunting, and response. An XDR platform can collect security telemetry from endpoints, cloud workloads, network email, and more.With all of this enriched threat data fi…
  continue reading
 
Max Shuftan is the Director, Mission Programs & Partnerships at the SANS Institute. Max leads a business unit at SANS Institute focused on (1) growing the global cybersecurity talent pipeline and increasing Diversity, Equity, and Inclusion (DEI) in the cyber workforce, and (2) fostering a stronger cybersecurity workforce through technical skills tr…
  continue reading
 
Tom Garrison is Vice President and General Manager of Client Security Strategy & Initiatives at Intel Corporation Camille Morhadt is Director, Security Initiatives and Communications, Intel You can listen in on their podcast at https://cybersecurityinside.com/ This episode is available on YouTube: https://www.youtube.com/watch?v=iFDfcT7lqE8Shiva Ma…
  continue reading
 
These will be quick. I dive into questions submitted from listeners and discuss articles and/or evolving incidents. This episode is available on YouTube: https://www.youtube.com/watch?v=LzMXur-vnw0 This weeks questions; Should I invest in products or process? What threat that keeps you up at night? You’ve had a couple episodes where guest discussed…
  continue reading
 
Attila started his career developing custom Linux kernels for weird hardware and built government-issued document management systems for many years, before becoming a penetration tester. Later he joined LogMeIn as the first security hire and eventually ran Security Assurance as a Director, where my core areas of focus were infrastructure security, …
  continue reading
 
Kiran Vangaveti is currently the founder and CEO of BluSapphire Technologies. In his work life, he is a cybersecurity professional and product builder with 24+ years of experience in leading cybersecurity practices for multiple Fortune 100’s in varied industry verticals. Today, cyber resilience is far more important than cybersecurity alone can be,…
  continue reading
 
Burnout and alert fatigue are likely at an all time high with the current state of events combined with the last two plus years. OOn this episode we explore the Deliberate Discomfort Challenge as a way to help take care of our most valuable assets, our people to get back in tune with themselves and life. Jason and his team are running a Buy One Get…
  continue reading
 
On todays episode I'm joined by Greg Linares and John Wetzel to discuss insider threats, what you should look for and how to help mitigate them. We also discuss some of the tactics, techniques and procedures (TTPs) employed by the Lapsus$ Group over the last few months to help you build your insider threat hunting program. The general consensus see…
  continue reading
 
On this episode Shiva Maharaj sits down with Jeremy Kirk of The Ransomware Files for expert analysis of cybersecurity, ransomware, intelligence collection, threat intelligence, cyber attacks ,cyber crime, privacy, lapsus$ group, rEvil and Kaseya and more. Jeremy Kirk is an executive editor with Information Security Media Group, a publishing company…
  continue reading
 
On this episode we discuss encrypted DNS, DNS over https, Russia Cyber Warfare, Lapsus$ Group and more. Peter Lowe is the Principal Security Researcher at DNSFilter. Peter has worked in primarily Internet focused roles throughout his career, in positions that include technical support, system administration, web development, and as Technical Direct…
  continue reading
 
Daniel Stenberg is the founder and lead developer of cURL and libcurl. An internet protocol geek, an open source person and a developer. Daniel has been programming for fun and profit since 1985. You'll find lots of info about my various projects on these web pages and on his GitHub profile. Daniel participates within the IETF, primarily in the HTT…
  continue reading
 
Greg Linares' professional career in cybersecurity began in 2006, when he joined eEye Digital Security as a Security Researcher. During his tenure, he was accredited with the discovery of several vulnerabilities in major vendors such as Microsoft, CA, Yahoo, Bitdefender and AFLAC, as well as doing development on the Retina Network Security Scanner.…
  continue reading
 
In light of ongoing events in the Ukraine and inspired by Recorded Future and Grey Noise, we have teamed up with Dark Cubed to offer security services to company's in need to bolster security quickly and effectively. Vince Crisler https://www.linkedin.com/in/vincecrisler/ https://darkcubed.com/ Eric Taylor https://www.linkedin.com/in/ransomware/ ht…
  continue reading
 
On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future and Xavier Salinas of Blackpoint Cyber to discuss ongoing events and incidents as they relate to cybersecurity. January 2022 Dark Cubed Webinar tomorrow Thursday February 24 2022 at 12 PM EST https://darkcubed.zoom.us/webinar/register/WN_BJ…
  continue reading
 
On today's episode we discuss the potential fallout as it relates to cybersecurity and the current Ukraine situation. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com…
  continue reading
 
On today's episode we discuss Vendor Selection and why it's more important than you think. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.k…
  continue reading
 
Asset management is mostly overlooked and garners little respect. Done right, it can save you more times than you can count. Join us as we sit down with Brian Weiss of I Tech Solutions to discuss the unsexy nature of IT hygiene. https://twitter.com/barricadecyber/status/1491821234212032512?s=20&t=pesziXKExz5nisA8Vd2QiQ Brian J. Weiss | LinkedIn htt…
  continue reading
 
On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future, Jon Murchison of Blackpoint Cyber and John Wetzel of Recorded Future to discuss ongoing events and incidents as they relate to cybersecurity. January 2022 Vince Crisler https://www.linkedin.com/in/vincecrisler/ https://darkcubed.com/ Matt …
  continue reading
 
On today's episode we're discussing the current issues and the best way forward to create actionable and accountable vulnerability disclosure. Jonathan Murchison, the founder and CEO of Blackpoint, started his career in Network Engineering and IT operations, but quickly made the switch to the quiet world of the intelligence community. He has since …
  continue reading
 
Joining us today are Matt Lee and Gerald Auger to discuss the recent actions against REvil and Ukraine under threat. Dr. Auger is a 15+ year cybersecurity professional, academic, and author. He has been the cybersecurity architect at MUSC, a multi-billion dollar academic medical center. He is currently a partner in a cybersecurity consulting firm, …
  continue reading
 
Dr. Auger is a 15+ year cybersecurity professional, academic, and author. He has been the cybersecurity architect at MUSC, a multi-billion dollar academic medical center. He is currently a partner in a cybersecurity consulting firm, adjunct faculty at The Citadel Military College, and chief content creator of the successful YouTube channel SimplyCy…
  continue reading
 
The FIN7 ransomware group has been sending malware laden BadUSB devices to targets in the United States. https://therecord.media/fbi-fin7-hackers-target-us-companies-with-badusb-devices-to-install-ransomware/ Yealink phones are communicating with Chinese based servers three times a day and are able to review and log all network traffic flowing thro…
  continue reading
 
On this episode Eric shows us how to bypass Microsoft Windows Defender with DumpStack log and Mimikatz. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp …
  continue reading
 
This episode is meant to spark ideas, stimulate thoughts and hopefully leave you with more questions than answers As you prepare your company for an incident or ransomware event. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj…
  continue reading
 
We've all been there, vendors overpromising, underdelivering and tucking tail to run when confronted. This episode is meant to peel back how we deal with all vendors, and hopefully you can pick up a thing or three. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buyme…
  continue reading
 
On today's episode Allan Liska of Recorded Future digs into the Khonsari Ransomware sample Eric submitted to Hybrid Analysis. https://www.hybrid-analysis.com/sample/f2e3f685256e5f31b05fc9f9ca470f527d7fdae28fa3190c8eba179473e20789 Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of sec…
  continue reading
 
Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has …
  continue reading
 
On today's episode we are joined by Jonathan Scott, James Donaldson of CopperheadOS and Haseeb Awan of EFANI to discuss mobile security. Copperhead is a cyber-security firm specializing in securing mobility solutions. Our product, CopperheadOS, is a secure Android available for Pixel devices in various deployments. https://copperhead.co/android/ Ha…
  continue reading
 
As part of the Canadian Intelligence apparatus, Maxime worked in positions ranging from development of cyber defense technologies through Counter Computer Network Exploitation and Counter Intelligence. Maxime led the creation of an advanced cyber security program for the Canadian government and received several Director’s awards for his service. Af…
  continue reading
 
This video episode is available on Spotify and YouTube. On today's episode; EMOTET brought to you by LOCKBIT 2.0 Cybersecurity doesn't want Ransomware to go away Don't buy into the FUD MEAL Team SIX is on the case Every day is a day to look out for Ransomware attacks E-Commerce Linux servers hacked with shells PHISH and OSINT Targeting Packages by …
  continue reading
 
Buy Eric a Coffee Eric Taylor is Educating folks around cyber security Buy Shiva a Coffee IT support that's actually supportive. Jonathan Scott is an American Phone & Cloud Hacker, founder of @haktree and @spyware_wiki. Human & Woman's Rights - Free Speech Activist Lead and currently the lead Mobile Pen-Tester for @cLabs. https://twitter.com/jonath…
  continue reading
 
David Weeks is the senior director of partner experience for N-able. Weeks works side-by-side with top-performing N-Able MSPs and their global partner community. A big part of his role is to listen and engage with our partners so that we better understand their needs, share ideas more freely, and provide valuable insight into the current market con…
  continue reading
 
Today we're joined by Vince Crisler to discuss recent US actions against ransomware and the evolution of CMMC. Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused o…
  continue reading
 
Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using…
  continue reading
 
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ If you a…
  continue reading
 
Bob Henderson is the founder and CEO of Intelligence Services Group. Bob's innate purpose for defending and protecting people led them to form ISG. Intelligence Services Group understands companies are facing criminal entities, rogue nation states, internal threats and everyday attempts or carelessness which causes harm and puts their data at risk.…
  continue reading
 
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ Robert N…
  continue reading
 
We spent the last couple weeks going through all of our tools and systems in an effort to find weaknesses. This is what we learned. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.…
  continue reading
 
Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has …
  continue reading
 
After a one week hiatus Eric and Shiva are back discussing what needs to be done to bring meaningful and lasting change to our security posture. Articles referenced are listed below. https://www.bleepingcomputer.com/news/security/us-unites-30-countries-to-disrupt-global-ransomware-attacks/ https://therecord.media/two-members-of-a-ransomware-gang-we…
  continue reading
 
Steve Taylor runs an MSP while podcasting at The RocketMSP Podcast with new episodes being released weekly. The RocketMSP podcast interviews great guests from around the industry while having some fun along the way! You can also find Steve in the RocketMSP peer community, coaching MSP business owners through changes to operate a more successful com…
  continue reading
 
Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused on innovative solutions for small and midsize companies. He is on the IT Security Executive Council for CompTIA,…
  continue reading
 
It would appear Allstate has decided to block RMM platforms from Datto, Ninja and Kaseya effective September 27th without any clear indication as to why. https://www.reddit.com/r/msp/comments/pte6av/allstate_to_block_datto_rmm_ninja_and_kaseya/ Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barric…
  continue reading
 
Scott is an innovative senior technology professional with over twenty years in leading IT infrastructure and network security compliance for businesses of all sizes, including six years in managed services. Scott has in-depth knowledge of multi-year business continuity planning, cybersecurity planning, technology documentation, workflow design, pr…
  continue reading
 
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. https://www.theregister.com/2021/09/15/grief_corp_ransomware_negotiator_rage/ https://threatpost.com/revil-sodinokibi-ransomware-universal-decryptor/169498/ https://threatpost.com/azure-zero-day-supply-chain/169508/ https://www.microsoft.com…
  continue reading
 
Loading …

快速参考指南