87 afleveringen

Plans are useless but planning is indispensable and crisis will reveal how you operate.

Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents.

Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support

Cybersecurity: Amplified And Intensified Shiva Maharaj

    • Technologie

Plans are useless but planning is indispensable and crisis will reveal how you operate.

Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents.

Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support

    71 - Encrypted email and Web 3.0 with Gareth Harte of Telios

    71 - Encrypted email and Web 3.0 with Gareth Harte of Telios

    Gareth is the founder and CEO/CTO of a decentralized and encrypted email service called Telios. He's previously been a software engineer for over 13 years working in the automotive and banking industry, but in the last few years has shifted his focus towards building on the decentralized internet.

    This episode is available on YouTube: https://youtu.be/LRYhz8kb4rg

    gareth@corp.telios.io
    https://discord.gg/xaHkmga9
    https://www.linkedin.com/in/gareth-harte
    https://telios.io

    Shiva Maharaj
    https://www.linkedin.com/in/shivamaharaj
    https://twitter.com/kontinuummsp
    https://www.kontinuum.com/
    https://www.buymeacoffee.com/shivaemm


    ---

    Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support

    • 44 min.
    70 - Discovering and determining who owns your data

    70 - Discovering and determining who owns your data

    Today we're discussing where our data lives, how can we find most of it and who controls your data.

    This episode is available on YouTube: https://www.youtube.com/watch?v=IkPftZRMgcA

    Brian J. Weiss is the CEO of ITECH Solutions that provides IT Services across the United States.

    Brian J. Weiss
    https://www.linkedin.com/in/brianjweiss/
    https://www.itech-solutions.com/

    00:00 - Intro
    00:10 - Where is your data?
    38:03 - It's 5 o'clock somewhere man
    38:18 - We are Zero trust 44:12 - Crystal Reports
    46:29 - Greatest podcast in the galaxy
    46:40 - Get VAM'd with ITECH-Solutions.com

    Shiva Maharaj
    https://www.linkedin.com/in/shivamaharaj
    https://twitter.com/kontinuummsp
    https://www.kontinuum.com/


    ---

    Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support

    • 47 min.
    69 - White House: Cyber activity not against Russia policy

    69 - White House: Cyber activity not against Russia policy

    On this episode I'll share my thoughts on the recent White House announcement below.

    This episode is available on YouTube: https://youtu.be/EHtnyGM0TCE

    WASHINGTON, June 1 (Reuters) - The White House said on Wednesday that any offensive cyber activity against Russia would not be a violation of U.S. policy of avoiding direct military conflict with Russia over its invasion of Ukraine.

    White House press secretary Karine Jean-Pierre commented on statements from U.S. cyber command chief General Paul Nakasone, who told Sky News on Wednesday the United States has conducted a series of digital operations in support of Ukraine.

    https://www.reuters.com/world/white-house-cyber-activity-not-against-russia-policy-2022-06-01/

    Shiva Maharaj
    https://www.linkedin.com/in/shivamaharaj
    https://twitter.com/kontinuummsp
    https://www.kontinuum.com/  
    https://www.buymeacoffee.com/shivaemm


    ---

    Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support

    • 4 min.
    68 - Cybersecurity Round Table May 2022

    68 - Cybersecurity Round Table May 2022

    On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future, Jon Murchison and Xavier Salinas of Blackpoint Cyber and John Wetzel of Recorded Future to discuss ongoing events and incidents as they relate to cybersecurity.  

    This episode is available on YouTube: https://www.youtube.com/watch?v=5WspCPjlFic

    Check out the following podcasts. 

    Blackpoint Cyber
    https://blackpointcyber.com/resources/podcast/

    Recorded Future
    https://therecord.media/podcast/

    Matt Lee
    https://www.youtube.com/c/CyberMattLee

    Shiva Maharaj
    https://www.linkedin.com/in/shivamaharaj
    https://twitter.com/kontinuummsp
    https://www.kontinuum.com/
    https://www.buymeacoffee.com/shivaemm


    ---

    Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support

    • 58 min.
    67 - CISA vs. Snake Oil

    67 - CISA vs. Snake Oil

    Or at least that's my analysis of CISA Alert AA22-137A

    It doesn't matter what fancy tools you have if you're using and configuring them incorrectly. 

    This episode is also available on YouTube: https://youtu.be/MJLpCTG_kqI

    In this episode I'm going to review CISA Alert (AA22-137A)
    https://www.cisa.gov/uscert/ncas/alerts/aa22-137a

    Weak Security Controls and Practices Routinely Exploited for Initial Access

    Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices and includes best practices to mitigate the issues. This advisory was coauthored by the cybersecurity authorities of the United States,[1],[2],[3] Canada,[4] New Zealand,[5],[6] the Netherlands,[7] and the United Kingdom.[8]

    Download the PDF version of this report (pdf, 430kb).


    ---

    Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support

    • 19 min.
    66 - CrowdStrike XDR with Cameron Buriani

    66 - CrowdStrike XDR with Cameron Buriani

    Extended detection and response (XDR) collects threat data from previously siloed security tools across an organization’s technology stack for easier and faster investigation, threat hunting, and response. An XDR platform can collect security telemetry from endpoints, cloud workloads, network email, and more.
    With all of this enriched threat data filtered and condensed into a single console, XDR enables security teams to rapidly and efficiently hunt and eliminate security threats across multiple domains from one unified solution.
    Cameron Buriani is a Sr. Solutions Architect at CrowdStrike.
    This episode is available on YouTube: https://youtu.be/MOsiuzb3KBs
    https://www.crowdstrike.com/products/endpoint-security/falcon-xdr/
    If you'd like to find out more about CrowdStrike services you can get in touch with us via info@kontinuum.com

    ---

    Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support

    • 27 min.

Top-podcasts in Technologie

Acquired
Ben Gilbert and David Rosenthal
✨Poki - Podcast over Kunstmatige Intelligentie AI
Alexander Klöpping & Wietse Hage
De Technoloog | BNR
BNR Nieuwsradio
Bright Podcast
Bright B.V.
Lex Fridman Podcast
Lex Fridman
Tweakers Podcast
Tweakers