logo
episode-header-image
Feb 2022
40m 40s

Securing Underserved Organizations with ...

MISSION
About this episode

Metaphorically, the tech security world tends to look over a city-scape and hones in on a few shiny skyscrapers, protects them, and declares victory. These big buildings represent the largest institutions. But oftentimes, all the interconnected infrastructure of smaller homes remains unprotected the smaller homes, in this context, are the SMBs and other various organizations. Sinan Eren, the VP of Zero Trust Access at Barracuda, broke down how security is interconnected across all institutions, regardless of size. 

Main Takeaways

  • Attackers Have a Market Now Too: Eren explains the challenges around the reality that cyber attackers have their own market now. Gone are the days when a singular attacker might be responsibile for conducting all elements of a criminal act. Instead, Eren reveals that an entire criminal community facilitates these acts. 
  • The Long Tail Must Be Protected: Eren points out that larger entities that have security in place can still be vulnerable through interactions with smaller and less secure entities in its supply chain. These smaller organizations include SMBs that often interact with larger companies. Furthermore, Eren suggests that there can be an ethical component to make sure that the entire community is secured, not only the largest companies and institutions. 
  • How to Secure SMBs: Since it is clear, from Eren’s point of view, that large businesses and SMBs are interconnected and therefore all must be secured or none will be, the question becomes: What is the best way to secure SMBs? Eren contends that security must be provided to SMBs through MSPs rather than as direct sales to SMBs. His argument is a very reasonable one — SMBs have too much on their plates already to handle security themselves.

IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. Build connected experiences, empower every employee, and deliver continuous innovation - with the customer at the center of everything you do. Learn more at salesforce.com/platform

Up next
Today
Turning 90 Years of Data into AI-Powered Insights
Discover how to turn decades of data into a competitive edge, build lasting customer relationships beyond the first click, and apply AI in ways that truly drive impact. Joining us is Vineet Mahajan, CTO of US News & World Report, who shares how he’s led the 90-year-old brand thro ... Show More
37m 3s
Jun 26
What IT Leaders Can Learn from How the Government Buys Tech
IT leaders in regulated industries know the pain of navigating outdated, slow procurement systems – especially when critical missions depend on modern tools. In this episode, Bryana Tucci, Lead of the AWS Marketplace for the US Intelligence Community, shares how government agenci ... Show More
44m 4s
Jun 5
AI in Content Management | Opportunities and Challenges
Feeling buried under content chaos? You're not alone. Ravi Singh, President and Chief Product Officer at Brightspot, joins us to break down how IT leaders can regain control, cut through AI-generated noise, and build scalable, secure content systems. He shares the secrets behind ... Show More
52m 56s
Recommended Episodes
May 2014
Cyber Security
Can you keep business safe from hackers? Many companies now feel besieged by constant attacks and few can claim not to have been targeted. In the first of a new series of the award-winning The Bottom Line Evan Davis and guests discuss the anatomy of a cyber attack - where the thr ... Show More
28m 7s
Dec 2021
Rediscover trust in cybersecurity: A women in cybersecurity podcast. [Special edition]
It's important for employees to be brought into the fold as security's allies, rather than as its adversaries. For cybersecurity teams that operate with an adversarial mindset appropriate for external threats, it can be challenging to approach internal threats differently. You ca ... Show More
49m 21s
Mar 2023
Detecting sandbox emulations. VEC supply chain attacks. Updates from the hybrid war. CISA and NSA offer IAM guidance. Other CISA advisories. Baphomet gets cold feet after all.
Malware could detect sandbox emulations. A VEC supply chain attack. A new APT is active in Russian-occupied sections of Ukraine. An alleged Russian patriot claims responsibility for the D.C. Health Link attack. CISA and NSA offer guidance on identity and access management (IAM). ... Show More
27m 20s
Mar 2024
2820: The Cyber Insurance Equation: Risk, Responsibility, and Readiness
In today's digital landscape, the role of cybersecurity within organizations is more critical than ever. As businesses navigate the complexities of protecting their data and infrastructure, the Chief Information Security Officer (CISO) stands at the forefront of this evolving bat ... Show More
36m 29s
Mar 2023
Some movement in the cyber underworld. Vishing impersonates the US Social Security Administration. More SVB-themed phishing. And compromise without user interaction.
BianLian gang’s pivot. HinataBot is a Go-based threat. The US Social Security Administration is impersonated in attempted vishing attacks. BlackSnake in the RaaS criminal market. More Silicon Valley Bank-themed phishing. Caleb Barlow from Cylete on security implications you need ... Show More
30 m
Mar 2023
Tools, alerts, and advisories from CISA. Reply phishing scams. Cl0p goes everywhere with GoAnywhere. EW in the hybrid war, and shields stay up.
A CISA tool helps secure Microsoft clouds.JCDC and pre-ransomware notification. CISA releases six ICS advisories. Reply phishing. Cl0p goes everywhere exploiting GoAnywhere. Russian electronic warfare units show the ability to locate Starlink terminals. Betsy Carmelite from Booz ... Show More
28m 13s
Oct 2020
TrickBot’s return is interrupted. Election rumor control. Supply chain security. Securing the Olympics. NSS Labs closes down.
TrickBot came back, but so did its nemesis from Redmond--Microsoft and its partners have taken down most of the new infrastructure the gang reestablished. CISA publishes election rumor control. The Cyberspace Solarium Commission has a white paper on supply chain security. Japan s ... Show More
22m 45s
Nov 2023
Cybercriminals at the service of the state, and an array of new underworld tools.
Data brokers offer information on active US military personnel. Current BlueNoroff activity. A new Gootloader variant is active in the wild. Atlassian vulnerabilities actively exploited. The prevalence of breaches. Update on a Barracuda vulnerability. Hacktivism and the cyber cou ... Show More
28m 16s
Oct 2017
No insight yet into Las Vegas gunman's motive as ISIS inspiration generally discounted. Yahoo! breach affected 3, not 1, billion user accounts. Equifax updates.
In today's podcast, we hear that ISIS claims of responsibility for Las Vegas murders continue to lose plausibility, but the shooter's motives remain a mystery. Yahoo!'s epic breach just got even more epic. Equifax looks little better in the wake of its CEO's Congressional testimo ... Show More
18m 3s
Dec 2019
Data center ransomware. Third-party breach hits telco customers. Buran and Buer on the black market. The Great Canon opens fire. Russia trolls Lithuania. Big bad BEC.
Data center operator CyrusOne sustains a ransomware attack. Another third-party breach involves a database inadvertently left exposed on an unprotected server. Buran ransomware finds its place in the black market, as does the new loader Buer. China’s Great Cannon is back and firi ... Show More
22m 46s