podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Evan & Paul
Shows
Cyber After Hours
Zero Trust: Buzzword or Best Practice?
Ever wonder if Zero Trust is the next big buzzword or if it actually holds the key to modern cybersecurity? In Episode 27 of Cyber After Hours—titled “Zero Trust: Buzzword or Best Practice?”—co-hosts Evan Morgan and Paul Marco kick things off with a friendly Star Wars vs. Star Trek debate before diving into the serious question of what it really takes to implement Zero Trust. From the importance of saying “no” to avoid burnout, to the need for continuous authentication and behavioral analysis, they explore why this framework (not a product!) might be your best bet for...
2025-05-27
1h 05
Cyber After Hours
Developing Cybersecurity Talent: Is Academia Keeping Up?
Ever wonder if universities are really prepping cybersecurity students for the real world—or just handing out degrees that look nice framed on a wall? In this lively episode of Cyber After Hours—Developing Cybersecurity Talent: Is Academia Keeping Up?—Evan and Paul (who, humorously, admits he has a chronic name-forgetting phobia) dive headfirst into the debate about formal education versus hands-on experience. From joking about daylight savings throwing off their cybersecurity routines, to Brett's adventure of learning Python "just because," the conversation quickly turns to serious questions: Are certifications enough to bridge the ga...
2025-05-20
53 min
Cyber After Hours
Developing Cybersecurity Talent: Is Academia Keeping Up?
Ever wonder if universities are really prepping cybersecurity students for the real world—or just handing out degrees that look nice framed on a wall? In this lively episode of Cyber After Hours—Developing Cybersecurity Talent: Is Academia Keeping Up?—Evan and Paul (who, humorously, admits he has a chronic name-forgetting phobia) dive headfirst into the debate about formal education versus hands-on experience. From joking about daylight savings throwing off their cybersecurity routines, to Brett's adventure of learning Python "just because," the conversation quickly turns to serious questions: Are certifications enough to bridge the ga...
2025-05-20
53 min
Cyber After Hours
Cybersecurity Budgeting: Where to Spend, Where to Save
Ever wonder if you’re throwing money at cybersecurity or genuinely investing in it? In Episode 25 of Cyber After Hours—titled “Cybersecurity Budgeting: Where to Spend, Where to Save”—co-hosts Paul Marco and Evan Morgan dive into the nuts and bolts of smart spending. Fresh off their experiences at recent conferences, including some focused on K-12 education, they share what it really takes to build meaningful connections, why shifting conference landscapes like RSA matter, and how an authentic mission in cybersecurity can drive bigger impact than any shiny new tool. From the excitement in Paul’s voice to E...
2025-05-13
55 min
Cyber After Hours
Cybersecurity Budgeting: Where to Spend, Where to Save
Ever wonder if you’re throwing money at cybersecurity or genuinely investing in it? In Episode 25 of Cyber After Hours—titled “Cybersecurity Budgeting: Where to Spend, Where to Save”—co-hosts Paul Marco and Evan Morgan dive into the nuts and bolts of smart spending. Fresh off their experiences at recent conferences, including some focused on K-12 education, they share what it really takes to build meaningful connections, why shifting conference landscapes like RSA matter, and how an authentic mission in cybersecurity can drive bigger impact than any shiny new tool. From the excitement in Paul’s voice to E...
2025-05-13
55 min
Cyber After Hours
Security in the DevOps Era: Balancing Speed and Safety
Ever feel like the faster you develop, the harder it gets to stay secure? You're not alone—and you're certainly not imagining things! In this episode of Cyber After Hours—Security in the DevOps Era: Balancing Speed and Safety—Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposter syndrome (yes, even cybersecurity pros feel it!), and moves swiftly into the heart of DevSecOps. From sharing laughs about remote work challenges during the pandemic, to diving deep into why blending security with rapid develo...
2025-05-06
44 min
Cyber After Hours
Security in the DevOps Era: Balancing Speed and Safety
Ever feel like the faster you develop, the harder it gets to stay secure? You're not alone—and you're certainly not imagining things! In this episode of Cyber After Hours—Security in the DevOps Era: Balancing Speed and Safety—Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposter syndrome (yes, even cybersecurity pros feel it!), and moves swiftly into the heart of DevSecOps. From sharing laughs about remote work challenges during the pandemic, to diving deep into why blending security with rapid develo...
2025-05-06
44 min
Cyber After Hours
Do Hype Cycles Help or Hurt?
Ever wonder if hype cycles fuel genuine innovation or just add to the noise? In this lively Episode 23 of Cyber After Hours—titled “Do Hype Cycles Help or Hurt?”—Evan and Paul kick things off with some personal updates and practical productivity pointers (including a radical approach to inbox management) before tackling one of tech’s most debated topics: are hype cycles driving us forward or holding us back? Throughout the conversation, they chat about the evolution of network security, share personal tales about missteps in tech, and shed light on why acronyms in the industry c...
2025-04-29
49 min
Cyber After Hours
Do Hype Cycles Help or Hurt?
Ever wonder if hype cycles fuel genuine innovation or just add to the noise? In this lively Episode 23 of Cyber After Hours—titled “Do Hype Cycles Help or Hurt?”—Evan and Paul kick things off with some personal updates and practical productivity pointers (including a radical approach to inbox management) before tackling one of tech’s most debated topics: are hype cycles driving us forward or holding us back? Throughout the conversation, they chat about the evolution of network security, share personal tales about missteps in tech, and shed light on why acronyms in the industry c...
2025-04-29
49 min
Tech Path Crypto News
Altcoin Season📈Technical Analysis w/ Evan Aldo
The long wait for altcoin season might finally be coming to an end. After months of flat markets and investor uncertainty, analysts believes we’re on the edge of a major shift. With the crypto market cap surpassing $3 trillion and Bitcoin soaring to a 7-week high, there’s a growing sense that altcoins are about to take center stage.~This episode is sponsored by iTrust Capital~iTrustCapital | Get $100 Funding Reward + No Monthly Fees when you sign up using our custom link! ➜ https://bit.ly/iTrustPaulGuest: Evan AldoEvan Aldo Youtube Channel ➜ https://bit.ly/EvanA...
2025-04-28
29 min
Cyber After Hours
Security Orchestration, Automation, and Response (SOAR): Hype or Necessity?
Ever wonder if Security Orchestration, Automation, and Response (SOAR) is truly essential—or just another buzzword in cybersecurity? In this episode of Cyber After Hours—SOAR: Hype or Necessity?—Paul and Evan sit down with Josh Lawson to unpack exactly that, starting with some amusing (and insightful) stories on workplace culture and how company dynamics directly impact security practices. The conversation quickly heats up as they dive into Identity and Access Management (IAM), exploring why automation isn't just a nice-to-have anymore—it's critical for lean teams trying to keep pace with the growing complexity of cyber thr...
2025-04-22
58 min
Cyber After Hours
Security Orchestration, Automation, and Response (SOAR): Hype or Necessity?
Ever wonder if Security Orchestration, Automation, and Response (SOAR) is truly essential—or just another buzzword in cybersecurity? In this episode of Cyber After Hours—SOAR: Hype or Necessity?—Paul and Evan sit down with Josh Lawson to unpack exactly that, starting with some amusing (and insightful) stories on workplace culture and how company dynamics directly impact security practices. The conversation quickly heats up as they dive into Identity and Access Management (IAM), exploring why automation isn't just a nice-to-have anymore—it's critical for lean teams trying to keep pace with the growing complexity of cyber thr...
2025-04-22
58 min
Cyber After Hours
Why Endpoint Security is Your First Line of Defense
Ever wonder if endpoint security truly deserves the hype as your first line of defense—or is there more to the story? In this lively episode of Cyber After Hours—Endpoint Security: Is It Really the First Line of Defense?—Paul Marco and Evan Morgan kick things off by swapping stories about the unpredictable rollercoaster of entrepreneurship, proving once again you often learn more from spectacular failures than steady successes. As the conversation heats up, they tackle the great cybersecurity debate: Is endpoint protection really the front-line hero, or should access controls step into the spotli...
2025-04-15
47 min
Cyber After Hours
Why Endpoint Security is Your First Line of Defense
Ever wonder if endpoint security truly deserves the hype as your first line of defense—or is there more to the story? In this lively episode of Cyber After Hours—Endpoint Security: Is It Really the First Line of Defense?—Paul Marco and Evan Morgan kick things off by swapping stories about the unpredictable rollercoaster of entrepreneurship, proving once again you often learn more from spectacular failures than steady successes. As the conversation heats up, they tackle the great cybersecurity debate: Is endpoint protection really the front-line hero, or should access controls step into the spotli...
2025-04-15
47 min
Cyber After Hours
Data Privacy vs. Cybersecurity: Where Do They Intersect?
Ever feel numb when you hear about yet another data breach? You're not alone. In this episode of Cyber After Hours—Data Privacy vs. Cybersecurity: Where Do They Intersect?—Evan and Paul welcome Steve Ward, a seasoned cybersecurity leader turned venture capitalist, for an insightful (and surprisingly humorous) conversation on privacy, security, and why consumers barely blink at breaches these days. From diving into Steve's impressive career navigating the tricky venture capital waters, to exploring why cybersecurity often feels like Groundhog Day, the trio discusses how the constant drumbeat of cyber threats has led...
2025-04-08
53 min
Cyber After Hours
Data Privacy vs. Cybersecurity: Where Do They Intersect?
Ever feel numb when you hear about yet another data breach? You're not alone. In this episode of Cyber After Hours—Data Privacy vs. Cybersecurity: Where Do They Intersect?—Evan and Paul welcome Steve Ward, a seasoned cybersecurity leader turned venture capitalist, for an insightful (and surprisingly humorous) conversation on privacy, security, and why consumers barely blink at breaches these days. From diving into Steve's impressive career navigating the tricky venture capital waters, to exploring why cybersecurity often feels like Groundhog Day, the trio discusses how the constant drumbeat of cyber threats has led...
2025-04-08
54 min
Cyber After Hours
Cybersecurity Needs a Revolution, Not a Department of No
Ever felt like cybersecurity is always the team that says “no” to everything? Well, it’s time to change that narrative. In this episode of Cyber After Hours—How to Prevent Security From Becoming the "Department of No"—we start off sharing laughs about New York snowstorms and the funny ways different cultures react to weather surprises. But quickly, the discussion dives deeper, exploring Simon Sinek’s powerful concept of playing the “infinite game” rather than getting stuck on short-term wins. Through candid personal stories, Paul and Evan tackle why security teams often get...
2025-04-01
50 min
Cyber After Hours
Cybersecurity Needs a Revolution, Not a Department of No
Ever felt like cybersecurity is always the team that says “no” to everything? Well, it’s time to change that narrative. In this episode of Cyber After Hours—How to Prevent Security From Becoming the "Department of No"—we start off sharing laughs about New York snowstorms and the funny ways different cultures react to weather surprises. But quickly, the discussion dives deeper, exploring Simon Sinek’s powerful concept of playing the “infinite game” rather than getting stuck on short-term wins. Through candid personal stories, Paul and Evan tackle why security teams often get...
2025-04-01
50 min
Cyber After Hours
How Quantum Computers Will Change Cybersecurity Forever
What happens when AI meets quantum computing in the heart of your SOC? In this week’s episode of Cyber After Hours, we’re joined by Edward Wu, CEO of Dropzone AI, to explore just how fast the cybersecurity game is changing—and what it means for defenders trying to stay one step ahead. From the frozen roofs of Syracuse to palm-sized quantum machines, we dive into a wide-ranging conversation on the future of cybersecurity. Edward shares his journey from building alert-generating tools to creating AI agents that actually help analysts make sense of the...
2025-03-25
50 min
Cyber After Hours
How Quantum Computers Will Change Cybersecurity Forever
What happens when AI meets quantum computing in the heart of your SOC? In this week’s episode of Cyber After Hours, we’re joined by Edward Wu, CEO of Dropzone AI, to explore just how fast the cybersecurity game is changing—and what it means for defenders trying to stay one step ahead. From the frozen roofs of Syracuse to palm-sized quantum machines, we dive into a wide-ranging conversation on the future of cybersecurity. Edward shares his journey from building alert-generating tools to creating AI agents that actually help analysts make sense of the...
2025-03-25
50 min
Cyber After Hours
Cybersecurity Regulations Are Coming—What You Need To Know
Ever wonder what a candid bar-side chat can teach us about the future of cybersecurity regulation? In the latest episode of Cyber After Hours—“S1 E17: What’s Next for Cybersecurity Regulation?”—we look back at how this podcast began and share a key realization: it’s not just about cybersecurity or AI. It’s about perspective, and how understanding the “why” behind decisions can transform the way we tackle complex, tech-driven challenges. They reflect on the show’s humble origins and shine a light on the profound role of human insight in a field too often do...
2025-03-18
52 min
Cyber After Hours
Cybersecurity Regulations Are Coming—What You Need To Know
Ever wonder what a candid bar-side chat can teach us about the future of cybersecurity regulation? In the latest episode of Cyber After Hours—“S1 E17: What’s Next for Cybersecurity Regulation?”—we look back at how this podcast began and share a key realization: it’s not just about cybersecurity or AI. It’s about perspective, and how understanding the “why” behind decisions can transform the way we tackle complex, tech-driven challenges. They reflect on the show’s humble origins and shine a light on the profound role of human insight in a field too often do...
2025-03-18
52 min
But We All Shine On
Seven: "Don't give up. You will come through it." Coram Voice and Evan Amery.
In episode seven, Paolo and Paul visit the offices of Coram Voice to learn about their writing competition for care-experienced young people and meet one of last year’s winners, Evan Amery. Evan’s journey is one of resilience, courage, and transformation.At just 11 years old, Evan was outed by a close friend. After coming out as transgender, and struggling with his mental health Evan, aged 14, found himself in a psychiatric unit. Upon his discharge into foster care, he faced a new fear—life with strangers. But his foster family, Nick and Jackie, provided the love, acceptance, and su...
2025-03-17
40 min
The Producer Rachel Show
DID EVAN PAUL INSPIRE JELLY ROLL TO LOSE WEIGHT?
Evan Paul: From Big Boy to Big Time – Life in Radio, Reinvention & Staying in the GameWhen I joined Detroit’s Channel 955 in 2007 as Executive Producer of the morning show, one of the first people to welcome me was Evan Paul—then known as "Big Boy" on the night shift. At nearly 400 pounds, he was larger than life in every way, but what stood out more than his size was his kindness, work ethic, and passion for radio. Fast forward, and Evan is now the nationally syndicated host of Taste of Country Nights, heard on over 130+ country radio...
2025-03-15
42 min
Cyber After Hours
Why Passwords Will Never Be Secure
Ever wonder how someone juggling customer service, consulting, and sales can still find time for a debate on decaf coffee and cyber threats? In this episode of Cyber After Hours, we sit down with Eric Gerena—whose colorful career path gives him a refreshingly unique perspective on staying motivated and delivering real value to clients. From demystifying the art of sales (spoiler: it’s really about solving people’s problems) to revealing how post-quantum cryptography could upend today’s security protocols, we cover the spectrum of what’s next in cybersecurity. Think biometrics, physical ke...
2025-03-11
43 min
Cyber After Hours
Why Passwords Will Never Be Secure
Ever wonder how someone juggling customer service, consulting, and sales can still find time for a debate on decaf coffee and cyber threats? In this episode of Cyber After Hours, we sit down with Eric Gerena—whose colorful career path gives him a refreshingly unique perspective on staying motivated and delivering real value to clients. From demystifying the art of sales (spoiler: it’s really about solving people’s problems) to revealing how post-quantum cryptography could upend today’s security protocols, we cover the spectrum of what’s next in cybersecurity. Think biometrics, physical ke...
2025-03-11
43 min
Cyber After Hours
The Future of Cybersecurity: 2025's Cutting-Edge Technologies
Ever wish strategic planning felt more like a celebration and less like a chore? In this episode, we pop the cork on what makes a planning session truly satisfying, from the thrill of crossing off to-do items to the power of hitting pause for some much-needed self-reflection. Get ready to raise a glass—because by the end of this conversation, you’ll be toasting the art (and fun) of mapping out your next big moves. Once the party hats come off, we dive headfirst into the cutting edge of cybersecurity. AI models...
2025-03-04
1h 06
Cyber After Hours
The Future of Cybersecurity: 2025's Cutting-Edge Technologies
Ever wish strategic planning felt more like a celebration and less like a chore? In this episode, we pop the cork on what makes a planning session truly satisfying, from the thrill of crossing off to-do items to the power of hitting pause for some much-needed self-reflection. Get ready to raise a glass—because by the end of this conversation, you’ll be toasting the art (and fun) of mapping out your next big moves. Once the party hats come off, we dive headfirst into the cutting edge of cybersecurity. AI models...
2025-03-04
1h 06
Cyber After Hours
Why Cyber Extortion Payments Should Be Illegal
Ever wonder what would happen if paying cyber ransom demands was flat-out illegal? In this lively new installment of Cyber After Hours—S1E14, “Should Governments Make It Illegal to Pay Cyber Extortion Demands?”—we explore exactly that. Our guest is Ross, a dynamic entrepreneur operating in stealth mode, who adds fresh perspective (and a few laughs) to the conversation. We share everything from goofy phishing scams promising toothbrush rewards to serious cautionary tales involving Uber and Equifax. We dig into the controversial issue of banning ransomware payments, asking if companies should b...
2025-02-25
1h 10
Cyber After Hours
Why Cyber Extortion Payments Should Be Illegal
Ever wonder what would happen if paying cyber ransom demands was flat-out illegal? In this lively new installment of Cyber After Hours—S1E14, “Should Governments Make It Illegal to Pay Cyber Extortion Demands?”—we explore exactly that. Our guest is Ross, a dynamic entrepreneur operating in stealth mode, who adds fresh perspective (and a few laughs) to the conversation. We share everything from goofy phishing scams promising toothbrush rewards to serious cautionary tales involving Uber and Equifax. We dig into the controversial issue of banning ransomware payments, asking if companies should b...
2025-02-25
1h 10
Cyber After Hours
How to Manage Zero-Day Vulnerabilities
Ever wonder how facial hair fundraisers and cybersecurity connect? In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits. From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned. We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to the nuances of patch management and d...
2025-02-23
48 min
Cyber After Hours
How AI Will Change Hacking Forever
AI: The Ultimate Hacker or Cybersecurity’s Best Ally? In this week’s episode of Cyber After Hours (S1E13 – The Role of AI in Offensive Cybersecurity), we crack open a few drinks and an even bigger debate: Is AI leveling the playing field in cyber, or tilting it in favor of the bad guys? AI-powered attacks are no longer some sci-fi concept. Generative AI is handing cybercriminals—yes, even the amateurs—a playbook for crafting hyper-realistic phishing campaigns, automating reconnaissance, and scaling attacks like never before. Financial services and other regulated industries are left wo...
2025-02-22
56 min
Cyber After Hours
What We Learned from the Worst Cyber Breaches
Ever wondered if there’s a secret “Swag Dark Web” out there for conference freebies? In this new episode of Cyber After Hours (S1E12: What Cyber Security Lessons Can We Learn From Recent Breaches?), we sit down with Omri—co-founder of DoControl and self-proclaimed swag connoisseur—for a lively journey from Israel’s buzzing startup scene to Miami’s growing tech hub. Along the way, he spills stories about the art (and occasional comedy) of swag hunting, while giving us a front-row seat to the latest shifts in cybersecurity. We dig into big-picture le...
2025-02-22
46 min
Cyber After Hours
CISO vs. CTO: The Battle for Your Security Budget
Ever wonder why identity and access management (IAM) can make or break your cybersecurity strategy? In this episode of Cyber After Hours, we sit down with Lance Peterman—an industry pro whose passion for mentoring the next generation radiates through every story he shares. Lance reveals how IAM, executed well, can be a game-changer in preventing breaches and fortifying your cyber hygiene. If you’ve ever thought of IAM as just another box to check, prepare to see it in a whole new light. The conversation then shifts to the ever-evolving danc...
2025-02-22
45 min
Cyber After Hours
Hacking the Future: Network Security 2025
Ever wonder if a collared shirt can feel as comfy as your favorite tee while you’re unraveling the future of network security? That’s exactly how we kick off S1E10 – The Future of Network Security: SASE, SD-WAN, and Beyond. In this lively episode, we have a warm chat filled with humor, a little scotch, and a few laughs about our quest for the perfect podcast intro—plus a shout-out to my talented cousin for the stellar graphic design work. Once the jokes (and glasses) are topped off, we dive into the real mea...
2025-02-22
56 min
Cyber After Hours
Open Source vs. Proprietary Cyber Threat Intelligence: The Great Debate
Ever wonder how half-eaten pumpkin pie and dusty cybersecurity tools could possibly go together? In this spirited episode of Cyber After Hours—S1E9: The Future of Cyber Threat Intelligence: Open Source vs. Proprietary—we kick things off by raising a toast to our amazing listeners and swapping some hilarious post-Thanksgiving tales. Think family drama, questionable leftover recipes, and a few laughs about why some security products end up collecting cobwebs instead of catching threats. From there, we dive headfirst into the debate on open-source vs. paid intel, comparing the hands-on effort of free...
2025-02-22
50 min
Cyber After Hours
How to Manage Zero-Day Vulnerabilities
Ever wonder how facial hair fundraisers and cybersecurity connect? In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits. From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned. We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to the nuances of patch management and d...
2025-02-22
48 min
Cyber After Hours
Cyber Hygiene: Protect Yourself from Digital Disease
Ever catch yourself hoping technology could ride in like a knight in shining armor to battle digital threats? In the newest episode of Cyber After Hours—S1E7 Cyber Hygiene: The Overlooked Essentials—we dive headfirst into the wild world of AI-powered scam disruption, ethical dilemmas, and everyday security practices that can save you serious headaches. We kick things off with a clever chatbot that pretends to be an elderly user, stringing scammers along while shielding real victims from harm. It’s part comedy, part cautionary tale, and it sparks a lively debate about...
2025-02-22
48 min
Cyber After Hours
Cybersecurity Isn't About Tech - It's About Strategy
Ever wonder how personal finance mishaps and big-picture cybersecurity planning might collide? In this lively episode of Cyber After Hours—S1E6 What Does It Mean to be Strategic in Cybersecurity?—we kick off with humorous stories about our own investment choices (spoiler alert: real estate beats crypto in our portfolios!) before diving into the serious business of aligning technology, budgeting, and team dynamics with larger business goals. From laughing over AI-driven investigations that save us from drowning in data overload to sharing the occasional misstep with “silver bullet” tools, our conversation moves from lighthearted anecdotes...
2025-02-22
50 min
Cyber After Hours
Why Cybersecurity is WAY More Complex Than You Think
Ever imagine pneumonia changing your favorite drink from bourbon to gin and tonic? That’s exactly how we kick off this episode of Cyber After Hours—S1E5: “What Makes Cybersecurity So Complex and How Do We Get Over It?”—by sharing personal stories and unexpected shifts in our day-to-day routines. The big question on our minds is why cybersecurity feels so complicated in the first place. From developers juggling code releases to risk managers balancing compliance and authentic security, each role adds another layer of complexity—especially for smaller organizations with limited resources.
2025-02-22
30 min
Cyber After Hours
How AI is Changing Cyber Defense Forever
Remember when iPods were the hot new thing? Ever wonder why we still call these shows “podcasts” even though iPods are practically museum pieces? In this new episode of Cyber After Hours—S1E4 The Evolving Role of AI in Cyber Defense—we take a playful look at tech’s most enduring terminologies, like “firewall” and “port," and uncover how nautical, historical, and downright whimsical origins continue to shape our modern tech vocabulary. It’s a fun reminder that the language we use can be just as fascinating as the gadgets themselves. But it’s not all...
2025-02-22
45 min
Cyber After Hours
The Good, the Bad, and the Ugly of Cyber Vendor Consolidation
Ever felt like you're paying a “convenience fee” just to access your own data in the cloud? In our new Cyber After Hours episode—S1E3: The Good, the Bad, and the Ugly of Cyber Vendor Consolidation—we dive into exactly that dilemma. We start off by sharing a personal story of how we challenged a ridiculous vendor charge and actually won. It’s a reminder that you don’t have to accept every fee that shows up on the invoice—especially in cloud computing, where hidden costs can sneak up on you fast. F...
2025-02-22
33 min
Cyber After Hours
How to Build a Battle-Ready Cyber Incident Response Team
Ever been hit with unexpected costs that make you question whether profit outweighs protection? In this eye-opening new episode of Cyber After Hours—Incident Response: How to Build a Battle-Ready Team—we dive headfirst into a personal story that exposes one of cybersecurity’s biggest ethical dilemmas. Picture owning a security tool but still getting slammed with exorbitant fees just to access the logs you desperately need. Our conversation peels back the layers on that frustration, calling for honesty and transparency in a field that’s too critical to be driven by hidden markups...
2025-02-22
39 min
Cyber After Hours
How to Fix the Cybersecurity Skills Gap (and Why It Matters)
Ever get caught off guard by a cyber scam and wonder how you landed in the middle of it? In our very first episode of Cyber After Hours—S1E1: “Cybersecurity Skills Gap: The Role of Cross-Training and Mentorship”—we dive into all the hilarious missteps of starting a podcast, from battling those infuriating lip-smacking noises to hunting down the perfect microphone. Along the way, we examine Paul's run-in with an extortion attempt, highlighting just how crucial cybersecurity awareness is—especially for those of us who might be easy targets. We also explore how cybers...
2025-02-22
36 min
Cyber After Hours
S1 E12 - What cyber security lessons can we learn from recent breaches?
Ever wondered if there’s a secret “Swag Dark Web” out there for conference freebies? In this new episode of Cyber After Hours (S1E12: What Cyber Security Lessons Can We Learn From Recent Breaches?), we sit down with Omri—co-founder of DoControl and self-proclaimed swag connoisseur—for a lively journey from Israel’s buzzing startup scene to Miami’s growing tech hub. Along the way, he spills stories about the art (and occasional comedy) of swag hunting, while giving us a front-row seat to the latest shifts in cybersecurity. We di...
2025-02-20
46 min
Cyber After Hours
S1 E13 - The Role of AI in Offensive Cybersecurity
AI: The Ultimate Hacker or Cybersecurity’s Best Ally? In this week’s episode of Cyber After Hours (S1E13 – The Role of AI in Offensive Cybersecurity), we crack open a few drinks and an even bigger debate: Is AI leveling the playing field in cyber, or tilting it in favor of the bad guys? AI-powered attacks are no longer some sci-fi concept. Generative AI is handing cybercriminals—yes, even the amateurs—a playbook for crafting hyper-realistic phishing campaigns, automating reconnaissance, and scaling attacks like never before. Financial serv...
2025-02-20
56 min
Cyber After Hours
S1 E11 - CISO vs. CTO: Defining Roles and Responsibilities in Security
Ever wonder why identity and access management (IAM) can make or break your cybersecurity strategy? In this episode of Cyber After Hours, we sit down with Lance Peterman—an industry pro whose passion for mentoring the next generation radiates through every story he shares. Lance reveals how IAM, executed well, can be a game-changer in preventing breaches and fortifying your cyber hygiene. If you’ve ever thought of IAM as just another box to check, prepare to see it in a whole new light. The co...
2025-02-20
44 min
Cyber After Hours
S1 E10 - The Future of Network Security: SASE, SD-WAN, and Beyond
Ever wonder if a collared shirt can feel as comfy as your favorite tee while you’re unraveling the future of network security? That’s exactly how we kick off S1E10 – The Future of Network Security: SASE, SD-WAN, and Beyond. In this lively episode, we have a warm chat filled with humor, a little scotch, and a few laughs about our quest for the perfect podcast intro—plus a shout-out to my talented cousin for the stellar graphic design work. Once the jokes (and glasses) are topped off, we dive i...
2025-02-20
56 min
Cyber After Hours
S1 E9 - The Future of Cyber Threat Intelligence: Open Source vs. Proprietary
Ever wonder how half-eaten pumpkin pie and dusty cybersecurity tools could possibly go together? In this spirited episode of Cyber After Hours—S1E9: The Future of Cyber Threat Intelligence: Open Source vs. Proprietary—we kick things off by raising a toast to our amazing listeners and swapping some hilarious post-Thanksgiving tales. Think family drama, questionable leftover recipes, and a few laughs about why some security products end up collecting cobwebs instead of catching threats. From there, we dive headfirst into the debate on open-source vs. paid intel, comparing the h...
2025-02-20
50 min
Cyber After Hours
S1 E8 - Patch Management: How to Handle Zero-Day Vulnerabilities
Ever wonder how facial hair fundraisers and cybersecurity connect? In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits. From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned. We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to the nuance...
2025-02-20
48 min
Cyber After Hours
S1 E7 - Cyber Hygiene: The Overlooked Essentials
Ever catch yourself hoping technology could ride in like a knight in shining armor to battle digital threats? In the newest episode of Cyber After Hours—S1E7 Cyber Hygiene: The Overlooked Essentials—we dive headfirst into the wild world of AI-powered scam disruption, ethical dilemmas, and everyday security practices that can save you serious headaches. We kick things off with a clever chatbot that pretends to be an elderly user, stringing scammers along while shielding real victims from harm. It’s part comedy, part cautionary tale, and it sparks...
2025-02-20
48 min
Cyber After Hours
S1 E6 - What Does It Mean to be Strategic in Cybersecurity?
Ever wonder how personal finance mishaps and big-picture cybersecurity planning might collide? In this lively episode of Cyber After Hours—S1E6 What Does It Mean to be Strategic in Cybersecurity?—we kick off with humorous stories about our own investment choices (spoiler alert: real estate beats crypto in our portfolios!) before diving into the serious business of aligning technology, budgeting, and team dynamics with larger business goals. From laughing over AI-driven investigations that save us from drowning in data overload to sharing the occasional misstep with “silver bullet” tools, our conversation moves from...
2025-02-20
50 min
Cyber After Hours
S1 E5 - What Makes Cybersecurity So Complex and How Do We Get Over It?
Ever imagine pneumonia changing your favorite drink from bourbon to gin and tonic? That’s exactly how we kick off this episode of Cyber After Hours—S1E5: “What Makes Cybersecurity So Complex and How Do We Get Over It?”—by sharing personal stories and unexpected shifts in our day-to-day routines. The big question on our minds is why cybersecurity feels so complicated in the first place. From developers juggling code releases to risk managers balancing compliance and authentic security, each role adds another layer of complexity—especially for smaller organization...
2025-02-20
30 min
Cyber After Hours
S1 E4 - The Evolving Role of AI in Cyber Defense
Remember when iPods were the hot new thing? Ever wonder why we still call these shows “podcasts” even though iPods are practically museum pieces? In this new episode of Cyber After Hours—S1E4 The Evolving Role of AI in Cyber Defense—we take a playful look at tech’s most enduring terminologies, like “firewall” and “port," and uncover how nautical, historical, and downright whimsical origins continue to shape our modern tech vocabulary. It’s a fun reminder that the language we use can be just as fascinating as the gadgets themselves...
2025-02-20
45 min
Cyber After Hours
S1 E3 - The Good, the Bad, and the Ugly of Cyber Vendor Consolidation
Ever felt like you're paying a “convenience fee” just to access your own data in the cloud? In our new Cyber After Hours episode—S1E3: The Good, the Bad, and the Ugly of Cyber Vendor Consolidation—we dive into exactly that dilemma. We start off by sharing a personal story of how we challenged a ridiculous vendor charge and actually won. It’s a reminder that you don’t have to accept every fee that shows up on the invoice—especially in cloud computing, where hidden costs can sneak up on you fast...
2025-02-20
33 min
Cyber After Hours
S1 E2 - Incident Response: How to Build a Battle-Ready Team
Ever been hit with unexpected costs that make you question whether profit outweighs protection? In this eye-opening new episode of Cyber After Hours—Incident Response: How to Build a Battle-Ready Team—we dive headfirst into a personal story that exposes one of cybersecurity’s biggest ethical dilemmas. Picture owning a security tool but still getting slammed with exorbitant fees just to access the logs you desperately need. Our conversation peels back the layers on that frustration, calling for honesty and transparency in a field that’s too critical to be driven b...
2025-02-20
39 min
Cyber After Hours
S1 E1 - Cybersecurity Skills Gap: The Role of Cross-Training and Mentorship
Ever get caught off guard by a cyber scam and wonder how you landed in the middle of it? In our very first episode of Cyber After Hours—S1E1: “Cybersecurity Skills Gap: The Role of Cross-Training and Mentorship”—we dive into all the hilarious missteps of starting a podcast, from battling those infuriating lip-smacking noises to hunting down the perfect microphone. Along the way, we examine Paul's run-in with an extortion attempt, highlighting just how crucial cybersecurity awareness is—especially for those of us who might be easy targets. We also e...
2025-02-20
36 min
Cyber After Hours
How AI Will Change Hacking Forever
AI: The Ultimate Hacker or Cybersecurity’s Best Ally? In this week’s episode of Cyber After Hours (S1E13 – The Role of AI in Offensive Cybersecurity), we crack open a few drinks and an even bigger debate: Is AI leveling the playing field in cyber, or tilting it in favor of the bad guys? AI-powered attacks are no longer some sci-fi concept. Generative AI is handing cybercriminals—yes, even the amateurs—a playbook for crafting hyper-realistic phishing campaigns, automating reconnaissance, and scaling attacks like never before. Financial services and other regulated industries are left wo...
2025-02-19
56 min
Cyber After Hours
What We Learned from the Worst Cyber Breaches
Ever wondered if there’s a secret “Swag Dark Web” out there for conference freebies? In this new episode of Cyber After Hours (S1E12: What Cyber Security Lessons Can We Learn From Recent Breaches?), we sit down with Omri—co-founder of DoControl and self-proclaimed swag connoisseur—for a lively journey from Israel’s buzzing startup scene to Miami’s growing tech hub. Along the way, he spills stories about the art (and occasional comedy) of swag hunting, while giving us a front-row seat to the latest shifts in cybersecurity. We dig into big-picture le...
2025-02-11
46 min
Cyber After Hours
CISO vs. CTO: The Battle for Your Security Budget
Ever wonder why identity and access management (IAM) can make or break your cybersecurity strategy? In this episode of Cyber After Hours, we sit down with Lance Peterman—an industry pro whose passion for mentoring the next generation radiates through every story he shares. Lance reveals how IAM, executed well, can be a game-changer in preventing breaches and fortifying your cyber hygiene. If you’ve ever thought of IAM as just another box to check, prepare to see it in a whole new light. The conversation then shifts to the ever-evolving danc...
2025-02-04
44 min
Cyber After Hours
Hacking the Future: Network Security 2025
Ever wonder if a collared shirt can feel as comfy as your favorite tee while you’re unraveling the future of network security? That’s exactly how we kick off S1E10 – The Future of Network Security: SASE, SD-WAN, and Beyond. In this lively episode, we have a warm chat filled with humor, a little scotch, and a few laughs about our quest for the perfect podcast intro—plus a shout-out to my talented cousin for the stellar graphic design work. Once the jokes (and glasses) are topped off, we dive into the real mea...
2025-01-28
56 min
Cyber After Hours
Open Source vs. Proprietary Cyber Threat Intelligence: The Great Debate
Ever wonder how half-eaten pumpkin pie and dusty cybersecurity tools could possibly go together? In this spirited episode of Cyber After Hours—S1E9: The Future of Cyber Threat Intelligence: Open Source vs. Proprietary—we kick things off by raising a toast to our amazing listeners and swapping some hilarious post-Thanksgiving tales. Think family drama, questionable leftover recipes, and a few laughs about why some security products end up collecting cobwebs instead of catching threats. From there, we dive headfirst into the debate on open-source vs. paid intel, comparing the hands-on effort of free...
2025-01-21
50 min
Cyber After Hours
S1 E8 - Patch Management: How to Handle Zero-Day Vulnerabilities
Ever wonder how facial hair fundraisers and cybersecurity connect? In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits. From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned. We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to th...
2025-01-14
48 min
Cyber After Hours
Cyber Hygiene: Protect Yourself from Digital Disease
Ever catch yourself hoping technology could ride in like a knight in shining armor to battle digital threats? In the newest episode of Cyber After Hours—S1E7 Cyber Hygiene: The Overlooked Essentials—we dive headfirst into the wild world of AI-powered scam disruption, ethical dilemmas, and everyday security practices that can save you serious headaches. We kick things off with a clever chatbot that pretends to be an elderly user, stringing scammers along while shielding real victims from harm. It’s part comedy, part cautionary tale, and it sparks a lively debate about...
2025-01-07
48 min
Cyber After Hours
Cybersecurity Isn't About Tech - It's About Strategy
Ever wonder how personal finance mishaps and big-picture cybersecurity planning might collide? In this lively episode of Cyber After Hours—S1E6 What Does It Mean to be Strategic in Cybersecurity?—we kick off with humorous stories about our own investment choices (spoiler alert: real estate beats crypto in our portfolios!) before diving into the serious business of aligning technology, budgeting, and team dynamics with larger business goals. From laughing over AI-driven investigations that save us from drowning in data overload to sharing the occasional misstep with “silver bullet” tools, our conversation moves from lighthearted anecdotes...
2024-12-31
50 min
Cyber After Hours
Why Cybersecurity is WAY More Complex Than You Think
Ever imagine pneumonia changing your favorite drink from bourbon to gin and tonic? That’s exactly how we kick off this episode of Cyber After Hours—S1E5: “What Makes Cybersecurity So Complex and How Do We Get Over It?”—by sharing personal stories and unexpected shifts in our day-to-day routines. The big question on our minds is why cybersecurity feels so complicated in the first place. From developers juggling code releases to risk managers balancing compliance and authentic security, each role adds another layer of complexity—especially for smaller organizations with limited resources.
2024-12-24
30 min
Cyber After Hours
How AI is Changing Cyber Defense Forever
Remember when iPods were the hot new thing? Ever wonder why we still call these shows “podcasts” even though iPods are practically museum pieces? In this new episode of Cyber After Hours—S1E4 The Evolving Role of AI in Cyber Defense—we take a playful look at tech’s most enduring terminologies, like “firewall” and “port," and uncover how nautical, historical, and downright whimsical origins continue to shape our modern tech vocabulary. It’s a fun reminder that the language we use can be just as fascinating as the gadgets themselves. But it’s not all...
2024-12-17
45 min
Cyber After Hours
The Good, the Bad, and the Ugly of Cyber Vendor Consolidation
Ever felt like you're paying a “convenience fee” just to access your own data in the cloud? In our new Cyber After Hours episode—S1E3: The Good, the Bad, and the Ugly of Cyber Vendor Consolidation—we dive into exactly that dilemma. We start off by sharing a personal story of how we challenged a ridiculous vendor charge and actually won. It’s a reminder that you don’t have to accept every fee that shows up on the invoice—especially in cloud computing, where hidden costs can sneak up on you fast. F...
2024-12-10
33 min
Cyber After Hours
How to Build a Battle-Ready Cyber Incident Response Team
Ever been hit with unexpected costs that make you question whether profit outweighs protection? In this eye-opening new episode of Cyber After Hours—Incident Response: How to Build a Battle-Ready Team—we dive headfirst into a personal story that exposes one of cybersecurity’s biggest ethical dilemmas. Picture owning a security tool but still getting slammed with exorbitant fees just to access the logs you desperately need. Our conversation peels back the layers on that frustration, calling for honesty and transparency in a field that’s too critical to be driven by hidden markups...
2024-12-03
39 min
Cyber After Hours
How to Fix the Cybersecurity Skills Gap (and Why It Matters)
Ever get caught off guard by a cyber scam and wonder how you landed in the middle of it? In our very first episode of Cyber After Hours—S1E1: “Cybersecurity Skills Gap: The Role of Cross-Training and Mentorship”—we dive into all the hilarious missteps of starting a podcast, from battling those infuriating lip-smacking noises to hunting down the perfect microphone. Along the way, we examine Paul's run-in with an extortion attempt, highlighting just how crucial cybersecurity awareness is—especially for those of us who might be easy targets. We also explore how cybers...
2024-11-23
36 min