The exploits of vlogger Blackcatloner who navigates his way through life proving that he is truly one lone cat against a big bad world. Also includes Blackcat Riffs, where he riffs on Public Domain educational movies, Blackcatloner Reviews and more.
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Join us on a cybersecurity journey like no other! In our podcast, we dive into the dynamic world of cybersecurity, exploring the latest topics and trends. We blend insightful discussions with a touch of humor and real-world anecdotes to keep you informed, entertained, and one step ahead of the cyber threats lurking out there. Tune in for a unique blend of cybersecurity insights and a dash of 'BS' – because learning about security doesn't have to be dry and boring!
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Safeguarding Manufacturing Operations with Ray Texter
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36
The manufacturing threat landscape is evolving rapidly, with increased automation and remote access needs making Operational Technology (OT) environments more vulnerable to cyber threats. As attackers become more sophisticated, manufacturers must adapt to protect their critical infrastructure and maintain business continuity. Join Tia Hopkins, Fiel…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
From Ransomware to Remote Access: Key Cyber Threats in Manufacturing
27:08
27:08
Play later
Play later
Lists
Like
Liked
27:08
The manufacturing industry is facing an increasingly complex threat landscape, characterized by expanding attack surfaces due to continuous IT transformation and interconnected OT environments. Key threats such as ransomware and sophisticated social engineering attacks are exploiting these vulnerabilities, making robust security measures and swift …
…
continue reading
In this episode, we dive into the latest security breaches, including the high-profile incidents at Ticketmaster and Snowflake. We'll explore the details of what happened and the lessons learned. Plus, we’ll discuss ways to leverage AI in security. Tune in!By Nathanael Dick and Andrew Nuxoll
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Debunking Cybersecurity Myths with Eldon Sprickerhoff
40:13
40:13
Play later
Play later
Lists
Like
Liked
40:13
In this episode of Cyber Talks, Erin McLean and Eldon Sprickerhoff, Founder & Advisor of eSentire, to discuss the latest trends and misconceptions in cybersecurity. Eldon shares his recent experience of being inducted into the Waterloo Entrepreneur Hall of Fame, reflecting on his journey and the importance of support from his family and colleagues.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Breaking Into Cybersecurity with Chris Frey: Networking and Connections
20:06
20:06
Play later
Play later
Lists
Like
Liked
20:06
In this follow-up episode, we reunite with aspiring cybersecurity professional Chris Frey to dive deeper into the strategies for breaking into the cybersecurity field. This time, our focus is on the power of personal interactions and building connections both in-person and online. Chris shares his journey, highlighting the key steps he took to netw…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unlocking the Key to Success, Differentiation, and Excellence for MSSPs with Tommy Wald and Bob Layton
47:07
47:07
Play later
Play later
Lists
Like
Liked
47:07
In this episode of Cyber Talks, Erin McLean, Chief Marketing Officer at eSentire, sits down with Bob Layton, Chief Channel Officer, and Tommy Wald, CEO of RIATA Technologies, to discuss the evolution of MSSP services, the importance of building strong client relationships, and the necessity of robust vendor partnerships. Tommy and Bob also share th…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Handling Mergers & Acquisitions as a Security Leader with Ron Park and Dwayne Smith
56:15
56:15
Play later
Play later
Lists
Like
Liked
56:15
Although mergers and acquisitions (M&As) are strategic moves that can propel companies toward greater market share, enhanced capabilities, and increased innovation, one critical aspect often overlooked is cybersecurity. Ensuring robust cybersecurity during the M&A process is paramount, as it safeguards the integrity of both companies involved, prot…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Building a Career in Cyber by Thinking Outside the (Technical) Box with Kristin Kelly
31:57
31:57
Play later
Play later
Lists
Like
Liked
31:57
For those who want to enter the cybersecurity field, especially if they come from a non-technical background, there is no shortage of opportunities. Just ask Kristin Kelly, our Growth Marketing Programs Specialist, who was recently recognized as a Young Professional to Watch by the International Legal Technology Association (ILTA). In this conversa…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Behind the Screens: Developing an Industry-Leading Security Operations Program with Rob Watson and Ciaran Luttrell
39:55
39:55
Play later
Play later
Lists
Like
Liked
39:55
In this episode, Ciaran Luttrell, Sr. Director of SOC Operations, EMEA, is joined by Rob Watson, SVP Security Services, to discuss security operations. Specifically, they chat about how SOCs should be structured, how to build a high-performing team of SOC Analysts, helping your team tackle burnout, and what it really takes to build an in-house SOC.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Inside the Ransomware Economy: The Industries and Businesses at Risk with Spence Hutchinson
28:18
28:18
Play later
Play later
Lists
Like
Liked
28:18
In this episode, we sit down with Spence Hutchinson, Sr. Staff Threat Intelligence Researcher with our Threat Response Unit (TRU), and chat about the ransomware landscape, the cybercriminal "gig" economy, and which industries and types of businesses are most at risk of ransomware attacks. Key takeaways from the conversation include: The evolution o…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Inside the Cybersecurity Job Market: Trends and Insights with Stephanie Zavala
27:43
27:43
Play later
Play later
Lists
Like
Liked
27:43
In this installment of the cybersecurity podcast, we sit down with cybersecurity recruitment expert, Stephanie Zavala, to dive into the current trends shaping the job market in cybersecurity. She shares insights on salary movements, the most sought-after specialties in the field, and much more.By Nathanael Dick and Andrew Nuxoll
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Sustainability, Innovation, and the Future of MSPs/MSSPs with Joe Panettieri
41:04
41:04
Play later
Play later
Lists
Like
Liked
41:04
In this episode, we sit down with Joe Panettieri, Founder of Channel Angels, Sustainable Tech Partner, and Mentore Ventures, to discuss how Joe got his start as a communications intern at IBM, his approach to making cybersecurity communications clear and digestible, and the dynamic nature of the cybersecurity industry. He also shares the lessons le…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Decoding AlphV/BlackCat’s Ransomware Operations with Joe Stewart and Keegan Keplinger
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26
The AlphV/BlackCat ransomware-as-a-service gang has been in the news lately thanks to the recent ransomware attack on Change Healthcare that resulted in widespread disruptions to healthcare services and allegedly resulted in the organization paying a $22 million ransom. Shortly thereafter, an affiliate claimed that BlackCat cheated them out of thei…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Investing in Security: Reducing Cyber Risks in Private Equity with Eldon Sprickerhoff and Ryan Westman
24:51
24:51
Play later
Play later
Lists
Like
Liked
24:51
Private Equity (PE) firms are increasingly targeted due to their comprehensive disclosure requirements, possession of sensitive data, and wide network of portfolio companies, making them lucrative targets for cybercriminals. What's more, threat actors exploit these characteristics to gain access to an extensive network by breaching just one entity.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Blackcat Ransomware Attack-Change Healthcare PAYS 22 Million
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56
Learn about the hackers that breached Change Healthcare. Did Change Healthcare just pay them 22 million dollars? We will also cover the latest cyber attacks and the rise of lock bit ransomware.By Nathanael Dick and Andrew Nuxoll
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Breaking Barriers and Leading with Purpose with Andrea Markstrom and Tia Hopkins
54:15
54:15
Play later
Play later
Lists
Like
Liked
54:15
Since its emergence in 1911, every year on March 8, we celebrate International Women's Day to recognize the inspiring contributions that women have made in the professional and personal lives of those around them. In this episode, Erin McLean talks to Tia Hopkins and Andrea Markstrom, the Chief Information Officer at Schulte Roth & Zabel LLP and Fo…
…
continue reading
This podcast episode discusses the possible exit scam of ransomware-as-a-service gang Alphv/BlackCat, as well as the chaotic months the gang had leading up to its closure.By Alexander Culafi
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Dissecting LockBit’s Ransomware Operations with Keegan Keplinger and Brandon Stencell
31:52
31:52
Play later
Play later
Lists
Like
Liked
31:52
Since their emergence in 2019 under the moniker 'ABCD', the LockBit ransomware-as-a-service gang has carved out a notorious reputation as a leading purveyor of ransomware. Their notoriety was cemented by pioneering triple extortion techniques and causing unprecedented disruption across the globe. However, they suffered a significant blow with the o…
…
continue reading
LockBit returns just days after an international law enforcement operation infiltrated the ransomware gang's network and seized infrastructure, source code and decryption keys.By Alexander Culafi
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shaping the Cybersecurity Program: Top Priorities and the Power of Mentorship with Michael Smith
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41
In this episode, we explore Michael Smith's journey from an Air Force IT Manager to VP of Infrastructure and Operations at Trinity Industries, Inc., highlighting his pivotal roles and the cybersecurity landscape within the architecture, engineering, and construction sectors. Michael shares insights on outsourcing cybersecurity teams, the strategic …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
More Responsibility, Less Resources: How Security Leaders Can Do More With Less
37:39
37:39
Play later
Play later
Lists
Like
Liked
37:39
Given the macroeconomic climate, security leaders are constantly tasked to do more with less – you’re being asked to take on more responsibility and protect your organizations against increasing cyber threats while balancing evolving regulatory frameworks and third-party vendor risk management. In this episode, Tia Hopkins, Chief Cyber Resilience O…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Breaking into Cybersecurity: How to Get Started in Cybersecurity
41:39
41:39
Play later
Play later
Lists
Like
Liked
41:39
Join us as we sit down with aspiring cybersecurity professional Chris Frey to discuss the ins and outs of breaking into the cybersecurity field. We cover practical tips you need to know to kickstart your cybersecurity career. Whether you're a newcomer or a seasoned professional, this episode provides valuable insights and inspiration to carve your …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Tackling Threats: Building a Winning Cyber Defense with Terrell Davis
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58
Whether you're on the football field or on the cybersecurity battlefield, being resilient means being able to bounce back stronger after a setback. On the field, it's about how quickly your team is able to adapt to a bad start or a late-game deficit to take the win. In cybersecurity, it's about how your organization can anticipate, withstand, and r…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
From the Arena to the Boardroom: Greg Crowley's First 90 Days Blueprint
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12
The role of any security leader – be it the CISO, CIO, VP Security, or even Director of Security, is that of a grandmaster in chess. Every move in the first phase sets the tone for the game, and the world of cybersecurity is no different. As a new security leader, your first 90 days can either establish a robust defense against cyber threats or lea…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unveiling the Inside Courthouse Break-In with Gary De Mercurio: A Dive into Ethical Hacking and the Overlooked Realm of Physical Security
38:27
38:27
Play later
Play later
Lists
Like
Liked
38:27
Step into the fascinating world of cybersecurity with our latest podcast featuring Gary De Mercurio, a distinguished penetration tester renowned for his involvement in an classic penetration test courthouse break-in that sent shockwaves through the industry. In this gripping interview, Gary takes us on a journey around his experience and helps us a…
…
continue reading
🎄 Holiday Cyber Tips 🎁 'Tis the season to be merry and cyber-safe! Join Andrew Nuxoll and Nathanael Dick on a quick journey through essential holiday cyber tips. From safeguarding your social media cheer to dodging order scams, phishing, and travel risks – we've got you covered. 🔍 Spot Fake Websites 🌐 Secure Your Domains 📧 Verify Order Confirmation…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Insured and Insecure: Trust vs. Verification-Cybersecurity Insurance
19:58
19:58
Play later
Play later
Lists
Like
Liked
19:58
join us for a quick dive into the latest cybersecurity headlines. We dissect Boeing and Booking.com breaches, focusing on the LockBit malware and Scattered Spider hacking group. Plus, we stress the crucial balance of trust and verification in cybersecurity insurance. Short, sweet, and secure—tune in for a bite-sized update on the cyber front. Happy…
…
continue reading
In this episode of the Cybberssecurity Podcast, we dive deep into the latest developments in the world of cybersecurity, exploring two major breaches that have sent shockwaves through the tech industry: Okta and ServiceNow. We'll also dissect the legal battle surrounding the SolarWinds CISO that sheds light on the often murky world of cybersecurity…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Data Unveiled: Privacy, Trust, and InfoSec with Ben Malisow
27:11
27:11
Play later
Play later
Lists
Like
Liked
27:11
Join Andrew and Ben in their conversation about information security, privacy, and Ben's Book: Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity.By Nathanael Dick and Andrew Nuxoll
…
continue reading
This episode covers the SEC charges against SolarWinds and CISO Timothy Brown for allegedly hiding known cybersecurity risks prior to the 2020 supply chain attack it suffered.By Alexander Culafi
…
continue reading
This podcast episode covers a security breach suffered by identity vendor Okta involving its customer support systems, which has sparked criticism from customers.By Alexander Culafi
…
continue reading
Celebrate Cybersecurity Awareness Month with hosts Andrew Nuxoll and Nathanael Dick in this special episode as we unravel the CDW and 23andMe data breaches and then explore the intersection of artificial intelligence and digital security. Discover the causes, consequences, and cutting-edge AI solutions to protect your data in the digital age. Don't…
…
continue reading
This podcast episode covers the record-breaking DDoS attack Rapid Reset, why it stands out among other DDoS campaigns and whether it will be widely replicated in the future.By Alexander Culafi
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Breach Lessons and Cisco's Cyberpower Play
22:34
22:34
Play later
Play later
Lists
Like
Liked
22:34
In this upcoming podcast episode, we'll kick things off by introducing ourselves and giving you a sneak peek into our plans for the Cybberssecurity Podcast. In the episode we will cover some current cybersecurity incidents: the MGM and Caesars hacks and we'll dissect how these companies handled the disclosures and what valuable lessons we can extra…
…
continue reading
This podcast episode compares the cyber attacks suffered by casino giants MGM Resorts and Caesars Entertainment in recent weeks and the fallout from them.By Alexander Culafi
…
continue reading
Microsoft revealed that Storm-0558 threat actors stole a consumer signing key from its corporate network, but many questions about the breach and subsequent attacks remain.By Alexander Culafi
…
continue reading
Executives, researchers and former employees told TechTarget Editorial about issues with Microsoft security practices, including patch bypasses, poor transparency and more.By Alexander Culafi
…
continue reading
Black Hat USA 2023 in Las Vegas covered several trends, such as generative AI and cloud security issues, as well as new vulnerabilities, including the Downfall flaw in Intel chips.By Alexander Culafi
…
continue reading
By Alexander Culafi
…
continue reading
Ransomware gangs are focusing more on data theft and extortion, while skipping the encryption of networks. But should these attacks still be considered ransomware?By Alexander Culafi
…
continue reading
Clop's data theft and extortion campaign against MoveIt Transfer customers marks some of the most high-profile threat activity this year, but its success level remains unclear.By Alexander Culafi
…
continue reading
CISA last week said several federal agencies suffered data breaches resulting from a MoveIt Transfer zero-day vulnerability, though it's unclear what type of data was stolen.By Alexander Culafi
…
continue reading
Barracuda Networks attempted to fix the critical ESG zero-day vulnerability, but a Chinese nation-state threat actor was able to maintain access on compromised devices.By Alexander Culafi
…
continue reading
Several organizations, predominantly in the U.K., have confirmed data breaches that stemmed from exploitation of the critical Moveit Transfer zero-day vulnerability.By Alexander Culafi
…
continue reading
This Risk & Repeat episode covers three data breach disclosures from Dish Network, Gentex Corporation and Clarke County Hospital and the troubling trends that connect all three.By Alexander Culafi
…
continue reading
This podcast episode covers the sentencing of former Uber CSO Joe Sullivan over the 2016 breach cover-up, and what it means for other security executives and the industry at large.By Alexander Culafi
…
continue reading
This podcast episode covers the focus on AI-powered security products and uses at RSA Conference 2023 in San Francisco last week, as well as other trends at the show.By Alexander Culafi
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Power of eSentire's Threat Response Unit (TRU): Office Hours with John Moretti
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07
Modern threat response requires the ability to collect unstructured data from disparate sources associated with attacker tactics, techniques, and procedures (TTPs) and operationalize global protections – all in a timely manner. Unfortunately, many in-house security teams don't have the bandwidth or expertise to perform proactive threat hunting, con…
…
continue reading
This podcast episode discusses the 3CX supply chain attack, where it may have started, who was behind it and how the unified communications vendor has responded to the incident.By Alexander Culafi
…
continue reading
This Risk & Repeat podcast episode covers the arrest of BreachForums' alleged owner and the site's subsequent closure, as well as possible connections to the DC Health Link breach.By Alexander Culafi
…
continue reading