logo
episode-header-image
Feb 2022
40m 40s

Securing Underserved Organizations with ...

MISSION
About this episode
Sinan Eren, VP of Zero Trust Access at Barracuda Networks, outlines his philosophy of zero-trust access, and chats about how many underserved businesses and institutions, including SMBs, remain less secure. He makes the point that the best way to serve security to SMBs is through services provided to SMBs by MSPs. He also shares a little about how his intere ... Show More
Up next
Nov 20
How to Maximize ROI on AI in 2026
<p>The promise of agentic AI has been massive, autonomous systems that act, reason, and make business decisions, but most enterprises are still struggling to see results.</p><p>In this episode, host Chris Brandt sits down with Sumeet Arora, Chief Product Officer at Teradata, to u ... Show More
59m 51s
Nov 6
90% of AI Demos Fail. Here’s How to Build One that Won’t
<p>If you’ve ever shipped an AI feature that looked great in testing — only to watch it behave unpredictably in production — you’re not alone.</p><p>In this episode of IT Visionaries, host Chris Brandt talks with Lawrence Jones, Founding Engineer at incident.io, about the critica ... Show More
59m 22s
Oct 31
The Future of Procurement: Real-Time Supply Chain Intelligence
<p>Every product a company ships depends on thousands of tiny decisions happening deep inside the supply chain. But most organizations are still making those decisions using stale spreadsheets, fragmented systems, and guesswork.</p><p>In this episode, we explore how AI-driven pro ... Show More
53m 20s
Recommended Episodes
May 2014
Cyber Security
Can you keep business safe from hackers? Many companies now feel besieged by constant attacks and few can claim not to have been targeted. In the first of a new series of the award-winning The Bottom Line Evan Davis and guests discuss the anatomy of a cyber attack - where the thr ... Show More
28m 7s
Dec 2021
Rediscover trust in cybersecurity: A women in cybersecurity podcast. [Special edition]
It's important for employees to be brought into the fold as security's allies, rather than as its adversaries. For cybersecurity teams that operate with an adversarial mindset appropriate for external threats, it can be challenging to approach internal threats differently. You ca ... Show More
46m 21s
Mar 2023
Detecting sandbox emulations. VEC supply chain attacks. Updates from the hybrid war. CISA and NSA offer IAM guidance. Other CISA advisories. Baphomet gets cold feet after all.
Malware could detect sandbox emulations. A VEC supply chain attack. A new APT is active in Russian-occupied sections of Ukraine. An alleged Russian patriot claims responsibility for the D.C. Health Link attack. CISA and NSA offer guidance on identity and access management (IAM). ... Show More
27m 20s
Mar 2024
2820: The Cyber Insurance Equation: Risk, Responsibility, and Readiness
In today's digital landscape, the role of cybersecurity within organizations is more critical than ever. As businesses navigate the complexities of protecting their data and infrastructure, the Chief Information Security Officer (CISO) stands at the forefront of this evolving bat ... Show More
36m 29s
Mar 2023
Some movement in the cyber underworld. Vishing impersonates the US Social Security Administration. More SVB-themed phishing. And compromise without user interaction.
BianLian gang’s pivot. HinataBot is a Go-based threat. The US Social Security Administration is impersonated in attempted vishing attacks. BlackSnake in the RaaS criminal market. More Silicon Valley Bank-themed phishing. Caleb Barlow from Cylete on security implications you need ... Show More
30 m
Mar 2023
Tools, alerts, and advisories from CISA. Reply phishing scams. Cl0p goes everywhere with GoAnywhere. EW in the hybrid war, and shields stay up.
A CISA tool helps secure Microsoft clouds.JCDC and pre-ransomware notification. CISA releases six ICS advisories. Reply phishing. Cl0p goes everywhere exploiting GoAnywhere. Russian electronic warfare units show the ability to locate Starlink terminals. Betsy Carmelite from Booz ... Show More
28m 13s
Oct 2020
TrickBot’s return is interrupted. Election rumor control. Supply chain security. Securing the Olympics. NSS Labs closes down.
TrickBot came back, but so did its nemesis from Redmond--Microsoft and its partners have taken down most of the new infrastructure the gang reestablished. CISA publishes election rumor control. The Cyberspace Solarium Commission has a white paper on supply chain security. Japan s ... Show More
22m 45s
Nov 2023
Cybercriminals at the service of the state, and an array of new underworld tools.
Data brokers offer information on active US military personnel. Current BlueNoroff activity. A new Gootloader variant is active in the wild. Atlassian vulnerabilities actively exploited. The prevalence of breaches. Update on a Barracuda vulnerability. Hacktivism and the cyber cou ... Show More
28m 16s
Oct 2017
No insight yet into Las Vegas gunman's motive as ISIS inspiration generally discounted. Yahoo! breach affected 3, not 1, billion user accounts. Equifax updates.
In today's podcast, we hear that ISIS claims of responsibility for Las Vegas murders continue to lose plausibility, but the shooter's motives remain a mystery. Yahoo!'s epic breach just got even more epic. Equifax looks little better in the wake of its CEO's Congressional testimo ... Show More
18m 3s
Dec 2019
Data center ransomware. Third-party breach hits telco customers. Buran and Buer on the black market. The Great Canon opens fire. Russia trolls Lithuania. Big bad BEC.
Data center operator CyrusOne sustains a ransomware attack. Another third-party breach involves a database inadvertently left exposed on an unprotected server. Buran ransomware finds its place in the black market, as does the new loader Buer. China’s Great Cannon is back and firi ... Show More
22m 46s