Folgen
-
Rick and Kevin discuss partnerships in the Managed Service Provider space, with a focus on the cyber insurance sector. Kevin revealed that his team is exploring a new channel within the Managed Service Provider space, due to the similar customer base. He emphasized the importance of affordable and accessible cyber insurance as a crucial component of an organization's risk management strategy for 2024 and beyond. He also highlighted the correlation between security solutions, cyber policy, and insurability, stating that cyber insurance should provide protection against threats that security tools cannot. Kevin stresses the significance of maintaining an active insurance policy and managing it to address new vulnerabilities.
Connect with Kevin: https://www.linkedin.com/in/kschmidt10/
Visit Coalition: https://www.coalitioninc.com/
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Rick and Kevin discuss partnerships in the Managed Service Provider space, with a focus on the cyber insurance sector. Kevin revealed that his team is exploring a new channel within the Managed Service Provider space, due to the similar customer base. He emphasized the importance of affordable and accessible cyber insurance as a crucial component of an organization's risk management strategy for 2024 and beyond. He also highlighted the correlation between security solutions, cyber policy, and insurability, stating that cyber insurance should provide protection against threats that security tools cannot. Kevin stresses the significance of maintaining an active insurance policy and managing it to address new vulnerabilities.
Connect with Kevin: https://www.linkedin.com/in/kschmidt10/
Visit Coalition: https://www.coalitioninc.com/
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Fehlende Folgen?
-
In todays episode Danny and Rick dive into the evolution of cybersecurity, focusing on the shift towards a Zero Trust model and the critical need for sensible controls like blocking unnecessary applications and limiting privileges. They emphasize how ThreatLockers innovative security solution effectively prevents ransomware, zero-day exploits, and other attacks by adopting a "deny-by-default" approach. Danny explains the importance of moving from a model of allowing everything to blocking everything unless explicitly permitted, making cybersecurity more accessible for everyone. They highlight the benefits of Zero Trust and robust hygiene practices in endpoint protection. Together, they stress the role of innovation and a proactive mindset in building stronger cybersecurity defenses.
Connect with Danny: https://www.linkedin.com/in/dannyjenkinscyber/
Visit ThreatLocker: https://www.threatlocker.com/
Learn more about ThreatLocker: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=danny_10.23.24&utm_content=danny&utm_term=podcast
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
In todays episode Danny and Rick dive into the evolution of cybersecurity, focusing on the shift towards a Zero Trust model and the critical need for sensible controls like blocking unnecessary applications and limiting privileges. They emphasize how ThreatLockers innovative security solution effectively prevents ransomware, zero-day exploits, and other attacks by adopting a "deny-by-default" approach. Danny explains the importance of moving from a model of allowing everything to blocking everything unless explicitly permitted, making cybersecurity more accessible for everyone. They highlight the benefits of Zero Trust and robust hygiene practices in endpoint protection. Together, they stress the role of innovation and a proactive mindset in building stronger cybersecurity defenses.
Connect with Danny: https://www.linkedin.com/in/dannyjenkinscyber/
Visit ThreatLocker: https://www.threatlocker.com/
Learn more about ThreatLocker: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=danny_10.23.24&utm_content=danny&utm_term=podcast
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Rob discusses ThreatLockers's approach to cybersecurity, emphasizing a preventativerather than reactive strategy. He explains their tools are designed to blockeverything that isn't explicitly allowed to run, not just bad things. This approach, heargued, is particularly important in situations where legitimate tools can be misused. Rob clarifies the concept of "Zero Trust", which involves assuming a breach is inevitable and limiting access to only what's needed and its importance.
Connect with Rob: https://www.linkedin.com/in/threatlockerrob/
Visit ThreatLocker: https://www.threatlocker.com/
Learn more about ThreatLocker: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=rob_10.16.24&utm_content=rob&utm_term=podcast
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Rob discusses ThreatLockers's approach to cybersecurity, emphasizing a preventativerather than reactive strategy. He explains their tools are designed to blockeverything that isn't explicitly allowed to run, not just bad things. This approach, heargued, is particularly important in situations where legitimate tools can be misused. Rob clarifies the concept of "Zero Trust", which involves assuming a breach is inevitable and limiting access to only what's needed and its importance.
Connect with Rob: https://www.linkedin.com/in/threatlockerrob/
Visit ThreatLocker: https://www.threatlocker.com/
Learn more about ThreatLocker: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=rob_10.16.24&utm_content=rob&utm_term=podcast
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Rick and Ryan discuss ThreatLocker's cybersecurity solutions, emphasizing proactive threat prevention and the importance of a strong security foundation. They explored the concept of 'zero trust' in cybersecurity and the challenges of managing threats, particularly those involving social engineering. The conversation also touched on Ryan's career journey and the evolution of cybersecurity practices in organizations.
Connect with Ryan: https://www.linkedin.com/in/ryan-bowman-3358a71b/
Visit ThreatLocker: https://www.threatlocker.com/
Check out ThreatLockers platform: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=ryan_10.9.24&utm_content=ryan&utm_term=podcast
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Rick and Ryan discuss ThreatLocker's cybersecurity solutions, emphasizing proactive threat prevention and the importance of a strong security foundation. They explored the concept of 'zero trust' in cybersecurity and the challenges of managing threats, particularly those involving social engineering. The conversation also touched on Ryan's career journey and the evolution of cybersecurity practices in organizations.
Connect with Ryan: https://www.linkedin.com/in/ryan-bowman-3358a71b/
Visit ThreatLocker: https://www.threatlocker.com/
Check out ThreatLockers platform: https://www.threatlocker.com/try-threatlocker?utm_source=short_arms&utm_medium=sponsor&utm_campaign=ryan_10.9.24&utm_content=ryan&utm_term=podcast
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Gary and Rick discuss the increasing importance of cybersecurity compliance and the role of managed service providers (MSPs) in addressing this need. Gary highlighted the advantages of MSPs as a staff augmentation solution for small and medium-sized businesses (SMBs), which often lack the resources and expertise to handle cybersecurity in-house. Rick noted the trend of security talent moving to MSPs for access to the latest tools and technologies. They also discussed the continuous threat and exposure management challenges faced by SMBs, emphasizing the need for integrated tools to identify and mitigate vulnerabilities.
Connect with Gary: https://www.linkedin.com/in/gary-drexler-2942b643/
Visit Cytellix: https://www.cytellix.com/
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Gary and Rick discuss the increasing importance of cybersecurity compliance and the role of managed service providers (MSPs) in addressing this need. Gary highlighted the advantages of MSPs as a staff augmentation solution for small and medium-sized businesses (SMBs), which often lack the resources and expertise to handle cybersecurity in-house. Rick noted the trend of security talent moving to MSPs for access to the latest tools and technologies. They also discussed the continuous threat and exposure management challenges faced by SMBs, emphasizing the need for integrated tools to identify and mitigate vulnerabilities.
Connect with Gary: https://www.linkedin.com/in/gary-drexler-2942b643/
Visit Cytellix: https://www.cytellix.com/
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Trenelle shares her insights on the importance of a robust cyber security strategy. Trenelleemphasizes the significance of understanding where important data is stored, conductingregular assessments, and maintaining ongoing monitoring and awareness of potential threats. She also expresses enthusiasm for the emerging trend of extended detection andresponse (XDR), which combines assessment with ongoing monitoring to provide acomprehensive view of cyber security risks. As the workforce evolves, cybersecurity strategies should adapt to meet new challenges.
Connect with Trenelle: https://www.linkedin.com/in/trenellelyiscott-piercemba/
Visit Cytellix: https://www.cytellix.com/
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Trenelle shares her insights on the importance of a robust cyber security strategy. Trenelleemphasizes the significance of understanding where important data is stored, conductingregular assessments, and maintaining ongoing monitoring and awareness of potential threats. She also expresses enthusiasm for the emerging trend of extended detection andresponse (XDR), which combines assessment with ongoing monitoring to provide acomprehensive view of cyber security risks. As the workforce evolves, cybersecurity strategies should adapt to meet new challenges.
Connect with Trenelle: https://www.linkedin.com/in/trenellelyiscott-piercemba/
Visit Cytellix: https://www.cytellix.com/
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Garret shares his insights on the importance of identity management and authentication incybersecurity. Garret emphasizes that while authentication is necessary, it is not sufficientto ensure the identity of a user. He pointed out that identities can be stolen or bypassedthrough various methods, and the real challenge lies in managing user privileges andkeeping track of their activities in real-time. Identity governance should be a robust component of any cybersecurity stack. Garret defines governance in the context of identity management.
Connect with Garret: https://www.linkedin.com/in/theauthguy/
Visit YouAttest: https://youattest.com/
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Garret shares his insights on the importance of identity management and authentication incybersecurity. Garret emphasizes that while authentication is necessary, it is not sufficientto ensure the identity of a user. He pointed out that identities can be stolen or bypassedthrough various methods, and the real challenge lies in managing user privileges andkeeping track of their activities in real-time. Identity governance should be a robust component of any cybersecurity stack. Garret defines governance in the context of identity management.
Connect with Garret: https://www.linkedin.com/in/theauthguy/
Visit YouAttest: https://youattest.com/
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Jeff emphasizes the importance of a holistic approach to cybersecurity, focusing on theroles and operations of human beings rather than just the deployment of tools. He arguedthat cybersecurity is a human problem, and human nature must be considered whenseeking solutions. Jeff also highlighted the need for a robust cybersecurity strategy thatintegrates processes, tools, and skills to manage risks effectively. He recommended theuse of AI-powered platforms like the Security Bulldog to improve efficiency and productivity in cybersecurity tasks.
Connect with Jeff: https://www.linkedin.com/in/jeffmajka/
Visit The Security Bulldog: https://securitybulldog.com/
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Jeff emphasizes the importance of a holistic approach to cybersecurity, focusing on theroles and operations of human beings rather than just the deployment of tools. He arguedthat cybersecurity is a human problem, and human nature must be considered whenseeking solutions. Jeff also highlighted the need for a robust cybersecurity strategy thatintegrates processes, tools, and skills to manage risks effectively. He recommended theuse of AI-powered platforms like the Security Bulldog to improve efficiency and productivity in cybersecurity tasks.
Connect with Jeff: https://www.linkedin.com/in/jeffmajka/
Visit The Security Bulldog: https://securitybulldog.com/
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Digital Identity and Verifiable Credentials Discussion
Paul Ashley, CTO of Anonyme Labs, discussed the importance of digital identity incybersecurity and its evolution towards a decentralized model. He elaborated on theconcept of verifiable credentials, which are cryptographically protected and offer a secureand controlled way to manage personal data. Paul also mentioned his attendance at theIdent conference in Las Vegas, which focuses on digital identity. We also discussed potential benefits for both consumers and businesses.
Connect with Paul: https://www.linkedin.com/in/drpaulashley/
Visit Anonyme Labs: https://anonyome.com/
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Digital Identity and Verifiable Credentials Discussion
Paul Ashley, CTO of Anonyme Labs, discussed the importance of digital identity incybersecurity and its evolution towards a decentralized model. He elaborated on theconcept of verifiable credentials, which are cryptographically protected and offer a secureand controlled way to manage personal data. Paul also mentioned his attendance at theIdent conference in Las Vegas, which focuses on digital identity. We also discussed potential benefits for both consumers and businesses.
Connect with Paul: https://www.linkedin.com/in/drpaulashley/
Visit Anonyme Labs: https://anonyome.com/
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Jeremy shares his insights on the evolving cybersecurity landscape, noting that cyber experts are now gaining attention from C-suites, a significant shift since 2019. He highlighted the increasing compliance requirements for companies and expressed enthusiasm about emerging technologies, stressing the need for more engineers to address vulnerabilities. Drawing on his military background, Jeremy emphasizes the importance of a robust cyber strategy, workforce development, and the Cybersecurity Maturity Model Certification (CMMC) in enhancing cyber resilience. Rick and Jeremy, both with special forces backgrounds, also bonded over their shared experiences and current roles, discussing their involvement in veteran support organizations.
Connect with Jeremy: https://www.linkedin.com/in/jeremy-miller-lionfish/
Visit Lionfish Cybersecurity: https://www.lionfishcybersecurity.com/
Visit Special Forces Association: https://www.specialforcesac500.org/ Subscribe: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw?sub_confirmation=1
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
-
Jeremy shares his insights on the evolving cybersecurity landscape, noting that cyber experts are now gaining attention from C-suites, a significant shift since 2019. He highlighted the increasing compliance requirements for companies and expressed enthusiasm about emerging technologies, stressing the need for more engineers to address vulnerabilities. Drawing on his military background, Jeremy emphasizes the importance of a robust cyber strategy, workforce development, and the Cybersecurity Maturity Model Certification (CMMC) in enhancing cyber resilience. Rick and Jeremy, both with special forces backgrounds, also bonded over their shared experiences and current roles, discussing their involvement in veteran support organizations.
Connect with Jeremy: https://www.linkedin.com/in/jeremy-miller-lionfish/
Visit Lionfish Cybersecurity: https://www.lionfishcybersecurity.com/
Visit Special Forces Association: https://www.specialforcesac500.org/ Subscribe: https://www.youtube.com/channel/UCjUNoFuy6d1rouj_SBg3Qkw?sub_confirmation=1
Visit ShortArms website: https://www.shortarmsolutions.com/
You can follow us at:
Linked In: https://www.linkedin.com/company/shortarmsolutions
YouTube: https://www.youtube.com/@shortarmsolutions
Twitter/X: https://twitter.com/ShortArmSAS
- Mehr anzeigen