logo
episode-header-image
Jan 2024
4m 54s

Encore: shadow IT (noun) [Word Notes]

N2K Networks
About this episode
Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations t ... Show More
Up next
Jul 10
Convinced, compromised, and confirmed.
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠Dave Bittner⁠⁠⁠, ⁠⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that a ... Show More
51m 16s
Jul 8
adversary group naming (noun) [Word Notes]
Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain. 
10m 17s
Jul 3
Brushed aside: The subtle scam you didn't order.
This week, our hosts⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠Dave Bittner⁠⁠, ⁠⁠⁠⁠⁠⁠⁠Joe Carrigan⁠⁠⁠⁠⁠⁠⁠, and ⁠⁠⁠⁠⁠⁠⁠Maria Varmazis⁠⁠⁠⁠⁠⁠⁠ (also host of the ⁠⁠⁠⁠⁠⁠⁠T-Minus⁠⁠⁠⁠⁠⁠⁠ Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making ... Show More
44 m
Recommended Episodes
Jul 2021
Analyzing the Impact of A.I. and Technology on Society and Cybersecurity
Technology is advancing at pace never seen before and the newest tech, applications and widgets are being widely adopted at an even quicker rate. Just look at A.I. and machine learning tools,which are now used to identify things once thought unimaginable — whether it's to figure ... Show More
49m 58s
Aug 2023
2481: Zenoss - From Cloud to AI: The Evolution of IT Infrastructure
In today's episode of Tech Talks Daily, I sit down with Trent Fitz, a seasoned veteran in the tech space with over two decades of leadership experience, especially in cloud computing, AI, and cybersecurity. As Chief Product Officer of Zenoss, Trent has been at the forefront of te ... Show More
27m 4s
Feb 2021
The War with Algorithms: Why Your Next Security Strategy Includes A.I. and Machine Learning
The image of a hooded individual illuminated by the glare of a computer screen hacking into a company’s network is the classic picture of what a cyber attack looks like. The reality, though, is these attackers are almost never a one-man band, but rather a sophisticated team armed ... Show More
40m 57s
Oct 2021
1758: MuleSoft - The IT and Business Alignment Barometer Report
MuleSoft is a trusted integration and API platform provider that can empower any company to quickly unlock and integrate their apps and data to create connected experiences faster. Paul Crerand joins me on the Tech Talks Daily Podcast to discuss the IT and Business Alignment Baro ... Show More
23m 33s
Nov 2021
1798: Dr. Chase Cunningham, CSO of Ericom Software
Dr. Chase Cunningham, CSO of Ericom Software released a techno-thriller book during Cyber Awareness Month titled "C:\>_gAbrIel." This book draws on Chase’s real-world experience as a technologist and how cyber warfare, cybersecurity, and artificial intelligence (AI) can be levera ... Show More
16m 18s
Jul 2021
Software is King, but Hardware is Still an Integral Tool with Future of Tech Enterprise, Bob Venero
The work from home shift has revolutionized IT Departments more than any invention ever could. When closets became offices, and commutes morphed into strolls around the neighborhood, corporate IT was left scrambling. Many companies were ill prepared to support remote workers and ... Show More
42m 42s
Dec 2021
Security Straight Talk with Jim Alkove, Chief Trust Officer at Salesforce, and George Kurtz, President/CEO and co-founder of CrowdStrike
When it comes to IT security, there are a lot of marketing pitches out there offering bullish assessments of certain technologies, and, of course, the particular products being pitched. Really, there’s nothing wrong with marketers doing their jobs, and it’s especially useful when ... Show More
36m 12s
Jun 2023
HS050 The Tech Job Debacle
Google, Microsoft, Twitter, META/FB and a few others laid off an estimated 200,000 tech and tech-adjacent folks in recent weeks. Other companies like Fedex and Amazon have made layoffs, many impacting the IT teams. What does that mean for the tech industry? Between AI and our cor ... Show More
28 m
Jun 2023
CISA Alert AA23-165A – Understanding Ransomware Threat Actors: LockBit.
CISA, FBI, the MS-ISAC, and international partners are releasing this Cybersecurity Advisory to detail LockBit ransomware incidents and provide recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operati ... Show More
2m 43s
Mar 2022
Diving Into Deep Learning with Chuck Everette, Director of Cybersecurity Advocacy, Deep Instinct
AI and machine learning are part of the solution in many cybersecurity products. The issue is that machine learning tends to take a lot of time. Cyber threats are moving quickly so computers need to learn fast to stop them. Chuck Everette, the Director of Cybersecurity Advocacy a ... Show More
34m 39s