
87 episodes

Cybersecurity: Amplified And Intensified Shiva Maharaj
-
- Technology
-
-
5.0 • 2 Ratings
-
Plans are useless but planning is indispensable and crisis will reveal how you operate.
Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents.
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm Support this podcast: https://anchor.fm/amplifiedandintensified/support
-
71 - Encrypted email and Web 3.0 with Gareth Harte of Telios
Gareth is the founder and CEO/CTO of a decentralized and encrypted email service called Telios. He's previously been a software engineer for over 13 years working in the automotive and banking industry, but in the last few years has shifted his focus towards building on the decentralized internet.
This episode is available on YouTube: https://youtu.be/LRYhz8kb4rg
gareth@corp.telios.io
https://discord.gg/xaHkmga9
https://www.linkedin.com/in/gareth-harte
https://telios.io
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm
---
Support this podcast: https://anchor.fm/amplifiedandintensified/support -
70 - Discovering and determining who owns your data
Today we're discussing where our data lives, how can we find most of it and who controls your data.
This episode is available on YouTube: https://www.youtube.com/watch?v=IkPftZRMgcA
Brian J. Weiss is the CEO of ITECH Solutions that provides IT Services across the United States.
Brian J. Weiss
https://www.linkedin.com/in/brianjweiss/
https://www.itech-solutions.com/
00:00 - Intro
00:10 - Where is your data?
38:03 - It's 5 o'clock somewhere man
38:18 - We are Zero trust 44:12 - Crystal Reports
46:29 - Greatest podcast in the galaxy
46:40 - Get VAM'd with ITECH-Solutions.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
---
Support this podcast: https://anchor.fm/amplifiedandintensified/support -
69 - White House: Cyber activity not against Russia policy
On this episode I'll share my thoughts on the recent White House announcement below.
This episode is available on YouTube: https://youtu.be/EHtnyGM0TCE
WASHINGTON, June 1 (Reuters) - The White House said on Wednesday that any offensive cyber activity against Russia would not be a violation of U.S. policy of avoiding direct military conflict with Russia over its invasion of Ukraine.
White House press secretary Karine Jean-Pierre commented on statements from U.S. cyber command chief General Paul Nakasone, who told Sky News on Wednesday the United States has conducted a series of digital operations in support of Ukraine.
https://www.reuters.com/world/white-house-cyber-activity-not-against-russia-policy-2022-06-01/
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm
---
Support this podcast: https://anchor.fm/amplifiedandintensified/support -
68 - Cybersecurity Round Table May 2022
On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future, Jon Murchison and Xavier Salinas of Blackpoint Cyber and John Wetzel of Recorded Future to discuss ongoing events and incidents as they relate to cybersecurity.
This episode is available on YouTube: https://www.youtube.com/watch?v=5WspCPjlFic
Check out the following podcasts.
Blackpoint Cyber
https://blackpointcyber.com/resources/podcast/
Recorded Future
https://therecord.media/podcast/
Matt Lee
https://www.youtube.com/c/CyberMattLee
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm
---
Support this podcast: https://anchor.fm/amplifiedandintensified/support -
67 - CISA vs. Snake Oil
Or at least that's my analysis of CISA Alert AA22-137A
It doesn't matter what fancy tools you have if you're using and configuring them incorrectly.
This episode is also available on YouTube: https://youtu.be/MJLpCTG_kqI
In this episode I'm going to review CISA Alert (AA22-137A)
https://www.cisa.gov/uscert/ncas/alerts/aa22-137a
Weak Security Controls and Practices Routinely Exploited for Initial Access
Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices and includes best practices to mitigate the issues. This advisory was coauthored by the cybersecurity authorities of the United States,[1],[2],[3] Canada,[4] New Zealand,[5],[6] the Netherlands,[7] and the United Kingdom.[8]
Download the PDF version of this report (pdf, 430kb).
---
Support this podcast: https://anchor.fm/amplifiedandintensified/support -
66 - CrowdStrike XDR with Cameron Buriani
Extended detection and response (XDR) collects threat data from previously siloed security tools across an organization’s technology stack for easier and faster investigation, threat hunting, and response. An XDR platform can collect security telemetry from endpoints, cloud workloads, network email, and more.
With all of this enriched threat data filtered and condensed into a single console, XDR enables security teams to rapidly and efficiently hunt and eliminate security threats across multiple domains from one unified solution.
Cameron Buriani is a Sr. Solutions Architect at CrowdStrike.
This episode is available on YouTube: https://youtu.be/MOsiuzb3KBs
https://www.crowdstrike.com/products/endpoint-security/falcon-xdr/
If you'd like to find out more about CrowdStrike services you can get in touch with us via info@kontinuum.com
---
Support this podcast: https://anchor.fm/amplifiedandintensified/support