Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
Hernan Cattaneo described Kay 's work as "Quality Stuff !" After Shining in his Country in 2009 by winning the national mix competition , Kay did a lot appearances in many Radios (Mosaique FM , FNOOB , Groundworx ,..) in addition to gigs (Le First , Podium , Saint Tropez ,..) , before establishing his Own Radioshow at Insomnia FM . In 2011 , Kay begin makin his own tracks , gaining attention of many big artists . Lately in that year , he brings the attention of Ryan Luciano a huge producer & ...
…
continue reading
1
71 - Encrypted email and Web 3.0 with Gareth Harte of Telios
44:58
44:58
Na później
Na później
Listy
Polub
Polubione
44:58
Gareth is the founder and CEO/CTO of a decentralized and encrypted email service called Telios. He's previously been a software engineer for over 13 years working in the automotive and banking industry, but in the last few years has shifted his focus towards building on the decentralized internet. This episode is available on YouTube: https://youtu…
…
continue reading
1
70 - Discovering and determining who owns your data
47:08
47:08
Na później
Na później
Listy
Polub
Polubione
47:08
Today we're discussing where our data lives, how can we find most of it and who controls your data. This episode is available on YouTube: https://www.youtube.com/watch?v=IkPftZRMgcA Brian J. Weiss is the CEO of ITECH Solutions that provides IT Services across the United States. Brian J. Weiss https://www.linkedin.com/in/brianjweiss/ https://www.ite…
…
continue reading
1
69 - White House: Cyber activity not against Russia policy
4:49
4:49
Na później
Na później
Listy
Polub
Polubione
4:49
On this episode I'll share my thoughts on the recent White House announcement below. This episode is available on YouTube: https://youtu.be/EHtnyGM0TCE WASHINGTON, June 1 (Reuters) - The White House said on Wednesday that any offensive cyber activity against Russia would not be a violation of U.S. policy of avoiding direct military conflict with Ru…
…
continue reading
1
68 - Cybersecurity Round Table May 2022
58:41
58:41
Na później
Na później
Listy
Polub
Polubione
58:41
On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future, Jon Murchison and Xavier Salinas of Blackpoint Cyber and John Wetzel of Recorded Future to discuss ongoing events and incidents as they relate to cybersecurity. This episode is available on YouTube: https://www.youtube.com/watch?v=5WspCPjl…
…
continue reading
Or at least that's my analysis of CISA Alert AA22-137A It doesn't matter what fancy tools you have if you're using and configuring them incorrectly. This episode is also available on YouTube: https://youtu.be/MJLpCTG_kqI In this episode I'm going to review CISA Alert (AA22-137A) https://www.cisa.gov/uscert/ncas/alerts/aa22-137a Weak Security Contro…
…
continue reading
1
66 - CrowdStrike XDR with Cameron Buriani
27:53
27:53
Na później
Na później
Listy
Polub
Polubione
27:53
Extended detection and response (XDR) collects threat data from previously siloed security tools across an organization’s technology stack for easier and faster investigation, threat hunting, and response. An XDR platform can collect security telemetry from endpoints, cloud workloads, network email, and more.With all of this enriched threat data fi…
…
continue reading
1
65 - Cybersecurity Reskilling with Max Shuftan, SANS Institute
25:42
25:42
Na później
Na później
Listy
Polub
Polubione
25:42
Max Shuftan is the Director, Mission Programs & Partnerships at the SANS Institute. Max leads a business unit at SANS Institute focused on (1) growing the global cybersecurity talent pipeline and increasing Diversity, Equity, and Inclusion (DEI) in the cyber workforce, and (2) fostering a stronger cybersecurity workforce through technical skills tr…
…
continue reading
1
64 - Inside Intel Security with Tom Garrison & Camille Morhardt
29:52
29:52
Na później
Na później
Listy
Polub
Polubione
29:52
Tom Garrison is Vice President and General Manager of Client Security Strategy & Initiatives at Intel Corporation Camille Morhadt is Director, Security Initiatives and Communications, Intel You can listen in on their podcast at https://cybersecurityinside.com/ This episode is available on YouTube: https://www.youtube.com/watch?v=iFDfcT7lqE8Shiva Ma…
…
continue reading
1
Escalate, Exfiltrate and Encrypt - Round 15
7:54
7:54
Na później
Na później
Listy
Polub
Polubione
7:54
These will be quick. I dive into questions submitted from listeners and discuss articles and/or evolving incidents. This episode is available on YouTube: https://www.youtube.com/watch?v=LzMXur-vnw0 This weeks questions; Should I invest in products or process? What threat that keeps you up at night? You’ve had a couple episodes where guest discussed…
…
continue reading
1
63 - Remote workforce security at Zapier with Attila Török Head Of Security at Zapier
30:45
30:45
Na później
Na później
Listy
Polub
Polubione
30:45
Attila started his career developing custom Linux kernels for weird hardware and built government-issued document management systems for many years, before becoming a penetration tester. Later he joined LogMeIn as the first security hire and eventually ran Security Assurance as a Director, where my core areas of focus were infrastructure security, …
…
continue reading
1
62 - Going Beyond XDR with Kiran Vangaveti
40:40
40:40
Na później
Na później
Listy
Polub
Polubione
40:40
Kiran Vangaveti is currently the founder and CEO of BluSapphire Technologies. In his work life, he is a cybersecurity professional and product builder with 24+ years of experience in leading cybersecurity practices for multiple Fortune 100’s in varied industry verticals. Today, cyber resilience is far more important than cybersecurity alone can be,…
…
continue reading
1
61 - Taking care of your most valuable assets with Jason Van Camp Deliberate Discomfort Challenge
31:43
31:43
Na później
Na później
Listy
Polub
Polubione
31:43
Burnout and alert fatigue are likely at an all time high with the current state of events combined with the last two plus years. OOn this episode we explore the Deliberate Discomfort Challenge as a way to help take care of our most valuable assets, our people to get back in tune with themselves and life. Jason and his team are running a Buy One Get…
…
continue reading
1
60 - Insider threat hunting & Lapsus$ Groups tactics, techniques and procedures.
49:59
49:59
Na później
Na później
Listy
Polub
Polubione
49:59
On todays episode I'm joined by Greg Linares and John Wetzel to discuss insider threats, what you should look for and how to help mitigate them. We also discuss some of the tactics, techniques and procedures (TTPs) employed by the Lapsus$ Group over the last few months to help you build your insider threat hunting program. The general consensus see…
…
continue reading
1
59 - Jeremy Kirk of The Ransomware Files
39:29
39:29
Na później
Na później
Listy
Polub
Polubione
39:29
On this episode Shiva Maharaj sits down with Jeremy Kirk of The Ransomware Files for expert analysis of cybersecurity, ransomware, intelligence collection, threat intelligence, cyber attacks ,cyber crime, privacy, lapsus$ group, rEvil and Kaseya and more. Jeremy Kirk is an executive editor with Information Security Media Group, a publishing company…
…
continue reading
1
58 - Securing DNS with Peter Lowe of DNSFilter
57:24
57:24
Na później
Na później
Listy
Polub
Polubione
57:24
On this episode we discuss encrypted DNS, DNS over https, Russia Cyber Warfare, Lapsus$ Group and more. Peter Lowe is the Principal Security Researcher at DNSFilter. Peter has worked in primarily Internet focused roles throughout his career, in positions that include technical support, system administration, web development, and as Technical Direct…
…
continue reading
1
57 - Daniel Stenberg Creator of cURL and libcurl
25:36
25:36
Na później
Na później
Listy
Polub
Polubione
25:36
Daniel Stenberg is the founder and lead developer of cURL and libcurl. An internet protocol geek, an open source person and a developer. Daniel has been programming for fun and profit since 1985. You'll find lots of info about my various projects on these web pages and on his GitHub profile. Daniel participates within the IETF, primarily in the HTT…
…
continue reading
1
56 - Greg Linares, cybersecurity before it became a hashtag
51:45
51:45
Na później
Na później
Listy
Polub
Polubione
51:45
Greg Linares' professional career in cybersecurity began in 2006, when he joined eEye Digital Security as a Security Researcher. During his tenure, he was accredited with the discovery of several vulnerabilities in major vendors such as Microsoft, CA, Yahoo, Bitdefender and AFLAC, as well as doing development on the Retina Network Security Scanner.…
…
continue reading
1
55: PSA - Helping to secure those in need
16:34
16:34
Na później
Na później
Listy
Polub
Polubione
16:34
In light of ongoing events in the Ukraine and inspired by Recorded Future and Grey Noise, we have teamed up with Dark Cubed to offer security services to company's in need to bolster security quickly and effectively. Vince Crisler https://www.linkedin.com/in/vincecrisler/ https://darkcubed.com/ Eric Taylor https://www.linkedin.com/in/ransomware/ ht…
…
continue reading
1
54 - Cybersecurity Round Table Vince Crisler, Matt Lee, Allan Liska and Xavier Salinas.
54:52
54:52
Na później
Na później
Listy
Polub
Polubione
54:52
On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future and Xavier Salinas of Blackpoint Cyber to discuss ongoing events and incidents as they relate to cybersecurity. January 2022 Dark Cubed Webinar tomorrow Thursday February 24 2022 at 12 PM EST https://darkcubed.zoom.us/webinar/register/WN_BJ…
…
continue reading
1
53 - The Russians are coming. What should we expect? #Russia #Ukraine #NATO
43:31
43:31
Na później
Na później
Listy
Polub
Polubione
43:31
On today's episode we discuss the potential fallout as it relates to cybersecurity and the current Ukraine situation. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com…
…
continue reading
1
52 - Vendor Selection and why it's more important than you think
51:08
51:08
Na później
Na później
Listy
Polub
Polubione
51:08
On today's episode we discuss Vendor Selection and why it's more important than you think. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.k…
…
continue reading
Asset management is mostly overlooked and garners little respect. Done right, it can save you more times than you can count. Join us as we sit down with Brian Weiss of I Tech Solutions to discuss the unsexy nature of IT hygiene. https://twitter.com/barricadecyber/status/1491821234212032512?s=20&t=pesziXKExz5nisA8Vd2QiQ Brian J. Weiss | LinkedIn htt…
…
continue reading
1
49 - Cybersecurity Round Table Vince Crisler, Matt Lee, Allan Liska, Jon Murchison and John Wetzel.
58:32
58:32
Na później
Na później
Listy
Polub
Polubione
58:32
On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future, Jon Murchison of Blackpoint Cyber and John Wetzel of Recorded Future to discuss ongoing events and incidents as they relate to cybersecurity. January 2022 Vince Crisler https://www.linkedin.com/in/vincecrisler/ https://darkcubed.com/ Matt …
…
continue reading
1
48 - Actionable Disclosure Programs with Jon Murchison, Xavier Salinas, Matt Lee, Brian Weiss
1:06:51
1:06:51
Na później
Na później
Listy
Polub
Polubione
1:06:51
On today's episode we're discussing the current issues and the best way forward to create actionable and accountable vulnerability disclosure. Jonathan Murchison, the founder and CEO of Blackpoint, started his career in Network Engineering and IT operations, but quickly made the switch to the quiet world of the intelligence community. He has since …
…
continue reading
1
47 - Revil Arrested & Ukraine Under Threat
41:59
41:59
Na później
Na później
Listy
Polub
Polubione
41:59
Joining us today are Matt Lee and Gerald Auger to discuss the recent actions against REvil and Ukraine under threat. Dr. Auger is a 15+ year cybersecurity professional, academic, and author. He has been the cybersecurity architect at MUSC, a multi-billion dollar academic medical center. He is currently a partner in a cybersecurity consulting firm, …
…
continue reading
1
46 - Cybersecurity Education At Scale with Dr. Gerald Auger Ph.D.
35:45
35:45
Na później
Na później
Listy
Polub
Polubione
35:45
Dr. Auger is a 15+ year cybersecurity professional, academic, and author. He has been the cybersecurity architect at MUSC, a multi-billion dollar academic medical center. He is currently a partner in a cybersecurity consulting firm, adjunct faculty at The Citadel Military College, and chief content creator of the successful YouTube channel SimplyCy…
…
continue reading
1
45 - FBI warns FIN7 BadUSB attacks and Yealink calling home
22:19
22:19
Na później
Na później
Listy
Polub
Polubione
22:19
The FIN7 ransomware group has been sending malware laden BadUSB devices to targets in the United States. https://therecord.media/fbi-fin7-hackers-target-us-companies-with-badusb-devices-to-install-ransomware/ Yealink phones are communicating with Chinese based servers three times a day and are able to review and log all network traffic flowing thro…
…
continue reading
1
44 - Bypassing Defender with DumpStack.log and Mimikatz
8:13
8:13
Na później
Na później
Listy
Polub
Polubione
8:13
On this episode Eric shows us how to bypass Microsoft Windows Defender with DumpStack log and Mimikatz. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp …
…
continue reading
1
43 - Strategies to help prevent ransomware.
7:27
7:27
Na później
Na później
Listy
Polub
Polubione
7:27
This episode is meant to spark ideas, stimulate thoughts and hopefully leave you with more questions than answers As you prepare your company for an incident or ransomware event. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj…
…
continue reading
1
42 - Avoiding Predatory Vendor Practices
27:26
27:26
Na później
Na później
Listy
Polub
Polubione
27:26
We've all been there, vendors overpromising, underdelivering and tucking tail to run when confronted. This episode is meant to peel back how we deal with all vendors, and hopefully you can pick up a thing or three. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buyme…
…
continue reading
1
Khonsari Ransomware exploiting Log4J/Log4Shell with Allan Liska, CSIRT at Recorded Future - Escalate, Exfiltrate & Encrypt - Round 15
15:52
15:52
Na później
Na później
Listy
Polub
Polubione
15:52
On today's episode Allan Liska of Recorded Future digs into the Khonsari Ransomware sample Eric submitted to Hybrid Analysis. https://www.hybrid-analysis.com/sample/f2e3f685256e5f31b05fc9f9ca470f527d7fdae28fa3190c8eba179473e20789 Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of sec…
…
continue reading
1
Episode #41 - Incident Response Planning with Matt Lee
46:43
46:43
Na później
Na później
Listy
Polub
Polubione
46:43
Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has …
…
continue reading
1
Mobile Security - Escalate, Exfiltrate & Encrypt - Round 14
1:32:50
1:32:50
Na później
Na później
Listy
Polub
Polubione
1:32:50
On today's episode we are joined by Jonathan Scott, James Donaldson of CopperheadOS and Haseeb Awan of EFANI to discuss mobile security. Copperhead is a cyber-security firm specializing in securing mobility solutions. Our product, CopperheadOS, is a secure Android available for Pixel devices in various deployments. https://copperhead.co/android/ Ha…
…
continue reading
1
Episode #40 - Incident Response Orchestration with Maxime Lamothe-Brassard of LimaCharlie.io
1:02:53
1:02:53
Na później
Na później
Listy
Polub
Polubione
1:02:53
As part of the Canadian Intelligence apparatus, Maxime worked in positions ranging from development of cyber defense technologies through Counter Computer Network Exploitation and Counter Intelligence. Maxime led the creation of an advanced cyber security program for the Canadian government and received several Director’s awards for his service. Af…
…
continue reading
1
Episode 39 - It is what it is. #DarkCubed
44:43
44:43
Na później
Na później
Listy
Polub
Polubione
44:43
This video episode is available on Spotify and YouTube. On today's episode; EMOTET brought to you by LOCKBIT 2.0 Cybersecurity doesn't want Ransomware to go away Don't buy into the FUD MEAL Team SIX is on the case Every day is a day to look out for Ransomware attacks E-Commerce Linux servers hacked with shells PHISH and OSINT Targeting Packages by …
…
continue reading
1
Episode 37 - PEGASUS ID and more with Jonathan Scott
1:32:28
1:32:28
Na później
Na później
Listy
Polub
Polubione
1:32:28
Buy Eric a Coffee Eric Taylor is Educating folks around cyber security Buy Shiva a Coffee IT support that's actually supportive. Jonathan Scott is an American Phone & Cloud Hacker, founder of @haktree and @spyware_wiki. Human & Woman's Rights - Free Speech Activist Lead and currently the lead Mobile Pen-Tester for @cLabs. https://twitter.com/jonath…
…
continue reading
1
Episode 38 - Remote Monitoring & Management with David Weeks of N-Able
44:12
44:12
Na później
Na później
Listy
Polub
Polubione
44:12
David Weeks is the senior director of partner experience for N-able. Weeks works side-by-side with top-performing N-Able MSPs and their global partner community. A big part of his role is to listen and engage with our partners so that we better understand their needs, share ideas more freely, and provide valuable insight into the current market con…
…
continue reading
1
The US Ransomware Response and CMMC with Vince Crisler - Escalate, Exfiltrate & Encrypt - Round 13
33:54
33:54
Na później
Na później
Listy
Polub
Polubione
33:54
Today we're joined by Vince Crisler to discuss recent US actions against ransomware and the evolution of CMMC. Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused o…
…
continue reading
1
Episode 36 - Allan Liska, CSIRT at Recorded Future - Ransomware & Incident Response
49:54
49:54
Na później
Na później
Listy
Polub
Polubione
49:54
Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using…
…
continue reading
1
Escalate, Exfiltrate & Encrypt - Round 12
29:54
29:54
Na później
Na później
Listy
Polub
Polubione
29:54
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ If you a…
…
continue reading
1
Episode 35 - Bob Henderson with Intelligence Services Group
44:47
44:47
Na później
Na później
Listy
Polub
Polubione
44:47
Bob Henderson is the founder and CEO of Intelligence Services Group. Bob's innate purpose for defending and protecting people led them to form ISG. Intelligence Services Group understands companies are facing criminal entities, rogue nation states, internal threats and everyday attempts or carelessness which causes harm and puts their data at risk.…
…
continue reading
1
Escalate, Exfiltrate & Encrypt - Round 11
32:06
32:06
Na później
Na później
Listy
Polub
Polubione
32:06
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ Robert N…
…
continue reading
We spent the last couple weeks going through all of our tools and systems in an effort to find weaknesses. This is what we learned. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.…
…
continue reading
1
Episode 33 - Vulnerability Disclosure Programs (VDP) with Matt Lee
45:10
45:10
Na później
Na później
Listy
Polub
Polubione
45:10
Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has …
…
continue reading
After a one week hiatus Eric and Shiva are back discussing what needs to be done to bring meaningful and lasting change to our security posture. Articles referenced are listed below. https://www.bleepingcomputer.com/news/security/us-unites-30-countries-to-disrupt-global-ransomware-attacks/ https://therecord.media/two-members-of-a-ransomware-gang-we…
…
continue reading
1
Escalate, Exfiltrate & Encrypt - Round 10
31:13
31:13
Na później
Na później
Listy
Polub
Polubione
31:13
Steve Taylor runs an MSP while podcasting at The RocketMSP Podcast with new episodes being released weekly. The RocketMSP podcast interviews great guests from around the industry while having some fun along the way! You can also find Steve in the RocketMSP peer community, coaching MSP business owners through changes to operate a more successful com…
…
continue reading
1
Episode 31 - Security and compliance guidelines with Vince Crisler
46:57
46:57
Na później
Na później
Listy
Polub
Polubione
46:57
Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused on innovative solutions for small and midsize companies. He is on the IT Security Executive Council for CompTIA,…
…
continue reading
1
Allstate to block Datto, Ninja RMM and Kaseya - Escalate, Exfiltrate & Encrypt - Round 9
23:23
23:23
Na później
Na później
Listy
Polub
Polubione
23:23
It would appear Allstate has decided to block RMM platforms from Datto, Ninja and Kaseya effective September 27th without any clear indication as to why. https://www.reddit.com/r/msp/comments/pte6av/allstate_to_block_datto_rmm_ninja_and_kaseya/ Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barric…
…
continue reading
1
Episode 30 - COVID-19 and its effect on cybersecurity with Scott Davis
57:42
57:42
Na później
Na później
Listy
Polub
Polubione
57:42
Scott is an innovative senior technology professional with over twenty years in leading IT infrastructure and network security compliance for businesses of all sizes, including six years in managed services. Scott has in-depth knowledge of multi-year business continuity planning, cybersecurity planning, technology documentation, workflow design, pr…
…
continue reading
1
Escalate, Exfiltrate & Encrypt - Round 8
29:38
29:38
Na później
Na później
Listy
Polub
Polubione
29:38
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. https://www.theregister.com/2021/09/15/grief_corp_ransomware_negotiator_rage/ https://threatpost.com/revil-sodinokibi-ransomware-universal-decryptor/169498/ https://threatpost.com/azure-zero-day-supply-chain/169508/ https://www.microsoft.com…
…
continue reading