Look for any podcast host, guest or anyone
Showing episodes and shows of

Evan & Paul

Shows

Cyber After HoursCyber After HoursZero Trust: Buzzword or Best Practice?Ever wonder if Zero Trust is the next big buzzword or if it actually holds the key to modern cybersecurity? In Episode 27 of Cyber After Hours—titled “Zero Trust: Buzzword or Best Practice?”—co-hosts Evan Morgan and Paul Marco kick things off with a friendly Star Wars vs. Star Trek debate before diving into the serious question of what it really takes to implement Zero Trust. From the importance of saying “no” to avoid burnout, to the need for continuous authentication and behavioral analysis, they explore why this framework (not a product!) might be your best bet for...2025-05-271h 05Cyber After HoursCyber After HoursDeveloping Cybersecurity Talent: Is Academia Keeping Up?Ever wonder if universities are really prepping cybersecurity students for the real world—or just handing out degrees that look nice framed on a wall? In this lively episode of Cyber After Hours—Developing Cybersecurity Talent: Is Academia Keeping Up?—Evan and Paul (who, humorously, admits he has a chronic name-forgetting phobia) dive headfirst into the debate about formal education versus hands-on experience. From joking about daylight savings throwing off their cybersecurity routines, to Brett's adventure of learning Python "just because," the conversation quickly turns to serious questions: Are certifications enough to bridge the ga...2025-05-2053 minCyber After HoursCyber After HoursDeveloping Cybersecurity Talent: Is Academia Keeping Up?Ever wonder if universities are really prepping cybersecurity students for the real world—or just handing out degrees that look nice framed on a wall? In this lively episode of Cyber After Hours—Developing Cybersecurity Talent: Is Academia Keeping Up?—Evan and Paul (who, humorously, admits he has a chronic name-forgetting phobia) dive headfirst into the debate about formal education versus hands-on experience. From joking about daylight savings throwing off their cybersecurity routines, to Brett's adventure of learning Python "just because," the conversation quickly turns to serious questions: Are certifications enough to bridge the ga...2025-05-2053 minCyber After HoursCyber After HoursCybersecurity Budgeting: Where to Spend, Where to SaveEver wonder if you’re throwing money at cybersecurity or genuinely investing in it? In Episode 25 of Cyber After Hours—titled “Cybersecurity Budgeting: Where to Spend, Where to Save”—co-hosts Paul Marco and Evan Morgan dive into the nuts and bolts of smart spending. Fresh off their experiences at recent conferences, including some focused on K-12 education, they share what it really takes to build meaningful connections, why shifting conference landscapes like RSA matter, and how an authentic mission in cybersecurity can drive bigger impact than any shiny new tool. From the excitement in Paul’s voice to E...2025-05-1355 minCyber After HoursCyber After HoursCybersecurity Budgeting: Where to Spend, Where to SaveEver wonder if you’re throwing money at cybersecurity or genuinely investing in it? In Episode 25 of Cyber After Hours—titled “Cybersecurity Budgeting: Where to Spend, Where to Save”—co-hosts Paul Marco and Evan Morgan dive into the nuts and bolts of smart spending. Fresh off their experiences at recent conferences, including some focused on K-12 education, they share what it really takes to build meaningful connections, why shifting conference landscapes like RSA matter, and how an authentic mission in cybersecurity can drive bigger impact than any shiny new tool. From the excitement in Paul’s voice to E...2025-05-1355 minCyber After HoursCyber After HoursSecurity in the DevOps Era: Balancing Speed and SafetyEver feel like the faster you develop, the harder it gets to stay secure? You're not alone—and you're certainly not imagining things! In this episode of Cyber After Hours—Security in the DevOps Era: Balancing Speed and Safety—Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposter syndrome (yes, even cybersecurity pros feel it!), and moves swiftly into the heart of DevSecOps. From sharing laughs about remote work challenges during the pandemic, to diving deep into why blending security with rapid develo...2025-05-0644 minCyber After HoursCyber After HoursSecurity in the DevOps Era: Balancing Speed and SafetyEver feel like the faster you develop, the harder it gets to stay secure? You're not alone—and you're certainly not imagining things! In this episode of Cyber After Hours—Security in the DevOps Era: Balancing Speed and Safety—Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposter syndrome (yes, even cybersecurity pros feel it!), and moves swiftly into the heart of DevSecOps. From sharing laughs about remote work challenges during the pandemic, to diving deep into why blending security with rapid develo...2025-05-0644 minCyber After HoursCyber After HoursDo Hype Cycles Help or Hurt?Ever wonder if hype cycles fuel genuine innovation or just add to the noise? In this lively Episode 23 of Cyber After Hours—titled “Do Hype Cycles Help or Hurt?”—Evan and Paul kick things off with some personal updates and practical productivity pointers (including a radical approach to inbox management) before tackling one of tech’s most debated topics: are hype cycles driving us forward or holding us back? Throughout the conversation, they chat about the evolution of network security, share personal tales about missteps in tech, and shed light on why acronyms in the industry c...2025-04-2949 minCyber After HoursCyber After HoursDo Hype Cycles Help or Hurt?Ever wonder if hype cycles fuel genuine innovation or just add to the noise? In this lively Episode 23 of Cyber After Hours—titled “Do Hype Cycles Help or Hurt?”—Evan and Paul kick things off with some personal updates and practical productivity pointers (including a radical approach to inbox management) before tackling one of tech’s most debated topics: are hype cycles driving us forward or holding us back? Throughout the conversation, they chat about the evolution of network security, share personal tales about missteps in tech, and shed light on why acronyms in the industry c...2025-04-2949 minTech Path Crypto NewsTech Path Crypto NewsAltcoin Season📈Technical Analysis w/ Evan AldoThe long wait for altcoin season might finally be coming to an end. After months of flat markets and investor uncertainty, analysts believes we’re on the edge of a major shift. With the crypto market cap surpassing $3 trillion and Bitcoin soaring to a 7-week high, there’s a growing sense that altcoins are about to take center stage.~This episode is sponsored by iTrust Capital~iTrustCapital | Get $100 Funding Reward + No Monthly Fees when you sign up using our custom link! ➜ https://bit.ly/iTrustPaulGuest: Evan AldoEvan Aldo Youtube Channel ➜ https://bit.ly/EvanA...2025-04-2829 minCyber After HoursCyber After HoursSecurity Orchestration, Automation, and Response (SOAR): Hype or Necessity?Ever wonder if Security Orchestration, Automation, and Response (SOAR) is truly essential—or just another buzzword in cybersecurity?  In this episode of Cyber After Hours—SOAR: Hype or Necessity?—Paul and Evan sit down with Josh Lawson to unpack exactly that, starting with some amusing (and insightful) stories on workplace culture and how company dynamics directly impact security practices. The conversation quickly heats up as they dive into Identity and Access Management (IAM), exploring why automation isn't just a nice-to-have anymore—it's critical for lean teams trying to keep pace with the growing complexity of cyber thr...2025-04-2258 minCyber After HoursCyber After HoursSecurity Orchestration, Automation, and Response (SOAR): Hype or Necessity?Ever wonder if Security Orchestration, Automation, and Response (SOAR) is truly essential—or just another buzzword in cybersecurity?  In this episode of Cyber After Hours—SOAR: Hype or Necessity?—Paul and Evan sit down with Josh Lawson to unpack exactly that, starting with some amusing (and insightful) stories on workplace culture and how company dynamics directly impact security practices. The conversation quickly heats up as they dive into Identity and Access Management (IAM), exploring why automation isn't just a nice-to-have anymore—it's critical for lean teams trying to keep pace with the growing complexity of cyber thr...2025-04-2258 minCyber After HoursCyber After HoursWhy Endpoint Security is Your First Line of DefenseEver wonder if endpoint security truly deserves the hype as your first line of defense—or is there more to the story? In this lively episode of Cyber After Hours—Endpoint Security: Is It Really the First Line of Defense?—Paul Marco and Evan Morgan kick things off by swapping stories about the unpredictable rollercoaster of entrepreneurship, proving once again you often learn more from spectacular failures than steady successes. As the conversation heats up, they tackle the great cybersecurity debate: Is endpoint protection really the front-line hero, or should access controls step into the spotli...2025-04-1547 minCyber After HoursCyber After HoursWhy Endpoint Security is Your First Line of DefenseEver wonder if endpoint security truly deserves the hype as your first line of defense—or is there more to the story? In this lively episode of Cyber After Hours—Endpoint Security: Is It Really the First Line of Defense?—Paul Marco and Evan Morgan kick things off by swapping stories about the unpredictable rollercoaster of entrepreneurship, proving once again you often learn more from spectacular failures than steady successes. As the conversation heats up, they tackle the great cybersecurity debate: Is endpoint protection really the front-line hero, or should access controls step into the spotli...2025-04-1547 minCyber After HoursCyber After HoursData Privacy vs. Cybersecurity: Where Do They Intersect?Ever feel numb when you hear about yet another data breach? You're not alone. In this episode of Cyber After Hours—Data Privacy vs. Cybersecurity: Where Do They Intersect?—Evan and Paul welcome Steve Ward, a seasoned cybersecurity leader turned venture capitalist, for an insightful (and surprisingly humorous) conversation on privacy, security, and why consumers barely blink at breaches these days. From diving into Steve's impressive career navigating the tricky venture capital waters, to exploring why cybersecurity often feels like Groundhog Day, the trio discusses how the constant drumbeat of cyber threats has led...2025-04-0853 minCyber After HoursCyber After HoursData Privacy vs. Cybersecurity: Where Do They Intersect?Ever feel numb when you hear about yet another data breach? You're not alone. In this episode of Cyber After Hours—Data Privacy vs. Cybersecurity: Where Do They Intersect?—Evan and Paul welcome Steve Ward, a seasoned cybersecurity leader turned venture capitalist, for an insightful (and surprisingly humorous) conversation on privacy, security, and why consumers barely blink at breaches these days. From diving into Steve's impressive career navigating the tricky venture capital waters, to exploring why cybersecurity often feels like Groundhog Day, the trio discusses how the constant drumbeat of cyber threats has led...2025-04-0854 minCyber After HoursCyber After HoursCybersecurity Needs a Revolution, Not a Department of NoEver felt like cybersecurity is always the team that says “no” to everything? Well, it’s time to change that narrative. In this episode of Cyber After Hours—How to Prevent Security From Becoming the "Department of No"—we start off sharing laughs about New York snowstorms and the funny ways different cultures react to weather surprises. But quickly, the discussion dives deeper, exploring Simon Sinek’s powerful concept of playing the “infinite game” rather than getting stuck on short-term wins. Through candid personal stories, Paul and Evan tackle why security teams often get...2025-04-0150 minCyber After HoursCyber After HoursCybersecurity Needs a Revolution, Not a Department of NoEver felt like cybersecurity is always the team that says “no” to everything? Well, it’s time to change that narrative. In this episode of Cyber After Hours—How to Prevent Security From Becoming the "Department of No"—we start off sharing laughs about New York snowstorms and the funny ways different cultures react to weather surprises. But quickly, the discussion dives deeper, exploring Simon Sinek’s powerful concept of playing the “infinite game” rather than getting stuck on short-term wins. Through candid personal stories, Paul and Evan tackle why security teams often get...2025-04-0150 minCyber After HoursCyber After HoursHow Quantum Computers Will Change Cybersecurity ForeverWhat happens when AI meets quantum computing in the heart of your SOC? In this week’s episode of Cyber After Hours, we’re joined by Edward Wu, CEO of Dropzone AI, to explore just how fast the cybersecurity game is changing—and what it means for defenders trying to stay one step ahead. From the frozen roofs of Syracuse to palm-sized quantum machines, we dive into a wide-ranging conversation on the future of cybersecurity. Edward shares his journey from building alert-generating tools to creating AI agents that actually help analysts make sense of the...2025-03-2550 minCyber After HoursCyber After HoursHow Quantum Computers Will Change Cybersecurity ForeverWhat happens when AI meets quantum computing in the heart of your SOC? In this week’s episode of Cyber After Hours, we’re joined by Edward Wu, CEO of Dropzone AI, to explore just how fast the cybersecurity game is changing—and what it means for defenders trying to stay one step ahead. From the frozen roofs of Syracuse to palm-sized quantum machines, we dive into a wide-ranging conversation on the future of cybersecurity. Edward shares his journey from building alert-generating tools to creating AI agents that actually help analysts make sense of the...2025-03-2550 minCyber After HoursCyber After HoursCybersecurity Regulations Are Coming—What You Need To KnowEver wonder what a candid bar-side chat can teach us about the future of cybersecurity regulation? In the latest episode of Cyber After Hours—“S1 E17: What’s Next for Cybersecurity Regulation?”—we look back at how this podcast began and share a key realization: it’s not just about cybersecurity or AI. It’s about perspective, and how understanding the “why” behind decisions can transform the way we tackle complex, tech-driven challenges. They reflect on the show’s humble origins and shine a light on the profound role of human insight in a field too often do...2025-03-1852 minCyber After HoursCyber After HoursCybersecurity Regulations Are Coming—What You Need To KnowEver wonder what a candid bar-side chat can teach us about the future of cybersecurity regulation? In the latest episode of Cyber After Hours—“S1 E17: What’s Next for Cybersecurity Regulation?”—we look back at how this podcast began and share a key realization: it’s not just about cybersecurity or AI. It’s about perspective, and how understanding the “why” behind decisions can transform the way we tackle complex, tech-driven challenges. They reflect on the show’s humble origins and shine a light on the profound role of human insight in a field too often do...2025-03-1852 minBut We All Shine OnBut We All Shine OnSeven: "Don't give up. You will come through it." Coram Voice and Evan Amery.In episode seven, Paolo and Paul visit the offices of Coram Voice to learn about their writing competition for care-experienced young people and meet one of last year’s winners, Evan Amery. Evan’s journey is one of resilience, courage, and transformation.At just 11 years old, Evan was outed by a close friend. After coming out as transgender, and struggling with his mental health Evan, aged 14, found himself in a psychiatric unit. Upon his discharge into foster care, he faced a new fear—life with strangers. But his foster family, Nick and Jackie, provided the love, acceptance, and su...2025-03-1740 minThe Producer Rachel ShowThe Producer Rachel ShowDID EVAN PAUL INSPIRE JELLY ROLL TO LOSE WEIGHT?Evan Paul: From Big Boy to Big Time – Life in Radio, Reinvention & Staying in the GameWhen I joined Detroit’s Channel 955 in 2007 as Executive Producer of the morning show, one of the first people to welcome me was Evan Paul—then known as "Big Boy" on the night shift. At nearly 400 pounds, he was larger than life in every way, but what stood out more than his size was his kindness, work ethic, and passion for radio. Fast forward, and Evan is now the nationally syndicated host of Taste of Country Nights, heard on over 130+ country radio...2025-03-1542 minCyber After HoursCyber After HoursWhy Passwords Will Never Be SecureEver wonder how someone juggling customer service, consulting, and sales can still find time for a debate on decaf coffee and cyber threats? In this episode of Cyber After Hours, we sit down with Eric Gerena—whose colorful career path gives him a refreshingly unique perspective on staying motivated and delivering real value to clients. From demystifying the art of sales (spoiler: it’s really about solving people’s problems) to revealing how post-quantum cryptography could upend today’s security protocols, we cover the spectrum of what’s next in cybersecurity.  Think biometrics, physical ke...2025-03-1143 minCyber After HoursCyber After HoursWhy Passwords Will Never Be SecureEver wonder how someone juggling customer service, consulting, and sales can still find time for a debate on decaf coffee and cyber threats? In this episode of Cyber After Hours, we sit down with Eric Gerena—whose colorful career path gives him a refreshingly unique perspective on staying motivated and delivering real value to clients. From demystifying the art of sales (spoiler: it’s really about solving people’s problems) to revealing how post-quantum cryptography could upend today’s security protocols, we cover the spectrum of what’s next in cybersecurity.  Think biometrics, physical ke...2025-03-1143 minCyber After HoursCyber After HoursThe Future of Cybersecurity: 2025's Cutting-Edge TechnologiesEver wish strategic planning felt more like a celebration and less like a chore?  In this episode, we pop the cork on what makes a planning session truly satisfying, from the thrill of crossing off to-do items to the power of hitting pause for some much-needed self-reflection.  Get ready to raise a glass—because by the end of this conversation, you’ll be toasting the art (and fun) of mapping out your next big moves. Once the party hats come off, we dive headfirst into the cutting edge of cybersecurity.  AI models...2025-03-041h 06Cyber After HoursCyber After HoursThe Future of Cybersecurity: 2025's Cutting-Edge TechnologiesEver wish strategic planning felt more like a celebration and less like a chore?  In this episode, we pop the cork on what makes a planning session truly satisfying, from the thrill of crossing off to-do items to the power of hitting pause for some much-needed self-reflection.  Get ready to raise a glass—because by the end of this conversation, you’ll be toasting the art (and fun) of mapping out your next big moves. Once the party hats come off, we dive headfirst into the cutting edge of cybersecurity.  AI models...2025-03-041h 06Cyber After HoursCyber After HoursWhy Cyber Extortion Payments Should Be IllegalEver wonder what would happen if paying cyber ransom demands was flat-out illegal? In this lively new installment of Cyber After Hours—S1E14, “Should Governments Make It Illegal to Pay Cyber Extortion Demands?”—we explore exactly that. Our guest is Ross, a dynamic entrepreneur operating in stealth mode, who adds fresh perspective (and a few laughs) to the conversation. We share everything from goofy phishing scams promising toothbrush rewards to serious cautionary tales involving Uber and Equifax. We dig into the controversial issue of banning ransomware payments, asking if companies should b...2025-02-251h 10Cyber After HoursCyber After HoursWhy Cyber Extortion Payments Should Be IllegalEver wonder what would happen if paying cyber ransom demands was flat-out illegal? In this lively new installment of Cyber After Hours—S1E14, “Should Governments Make It Illegal to Pay Cyber Extortion Demands?”—we explore exactly that. Our guest is Ross, a dynamic entrepreneur operating in stealth mode, who adds fresh perspective (and a few laughs) to the conversation. We share everything from goofy phishing scams promising toothbrush rewards to serious cautionary tales involving Uber and Equifax. We dig into the controversial issue of banning ransomware payments, asking if companies should b...2025-02-251h 10Cyber After HoursCyber After HoursHow to Manage Zero-Day VulnerabilitiesEver wonder how facial hair fundraisers and cybersecurity connect? In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits. From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned. We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to the nuances of patch management and d...2025-02-2348 minCyber After HoursCyber After HoursHow AI Will Change Hacking ForeverAI:  The Ultimate Hacker or Cybersecurity’s Best Ally? In this week’s episode of Cyber After Hours (S1E13 – The Role of AI in Offensive Cybersecurity), we crack open a few drinks and an even bigger debate: Is AI leveling the playing field in cyber, or tilting it in favor of the bad guys? AI-powered attacks are no longer some sci-fi concept. Generative AI is handing cybercriminals—yes, even the amateurs—a playbook for crafting hyper-realistic phishing campaigns, automating reconnaissance, and scaling attacks like never before. Financial services and other regulated industries are left wo...2025-02-2256 minCyber After HoursCyber After HoursWhat We Learned from the Worst Cyber BreachesEver wondered if there’s a secret “Swag Dark Web” out there for conference freebies? In this new episode of Cyber After Hours (S1E12: What Cyber Security Lessons Can We Learn From Recent Breaches?), we sit down with Omri—co-founder of DoControl and self-proclaimed swag connoisseur—for a lively journey from Israel’s buzzing startup scene to Miami’s growing tech hub. Along the way, he spills stories about the art (and occasional comedy) of swag hunting, while giving us a front-row seat to the latest shifts in cybersecurity. We dig into big-picture le...2025-02-2246 minCyber After HoursCyber After HoursCISO vs. CTO: The Battle for Your Security BudgetEver wonder why identity and access management (IAM) can make or break your cybersecurity strategy? In this episode of Cyber After Hours, we sit down with Lance Peterman—an industry pro whose passion for mentoring the next generation radiates through every story he shares. Lance reveals how IAM, executed well, can be a game-changer in preventing breaches and fortifying your cyber hygiene. If you’ve ever thought of IAM as just another box to check, prepare to see it in a whole new light. The conversation then shifts to the ever-evolving danc...2025-02-2245 minCyber After HoursCyber After HoursHacking the Future: Network Security 2025Ever wonder if a collared shirt can feel as comfy as your favorite tee while you’re unraveling the future of network security? That’s exactly how we kick off S1E10 – The Future of Network Security: SASE, SD-WAN, and Beyond. In this lively episode, we have a warm chat filled with humor, a little scotch, and a few laughs about our quest for the perfect podcast intro—plus a shout-out to my talented cousin for the stellar graphic design work. Once the jokes (and glasses) are topped off, we dive into the real mea...2025-02-2256 minCyber After HoursCyber After HoursOpen Source vs. Proprietary Cyber Threat Intelligence: The Great DebateEver wonder how half-eaten pumpkin pie and dusty cybersecurity tools could possibly go together? In this spirited episode of Cyber After Hours—S1E9: The Future of Cyber Threat Intelligence: Open Source vs. Proprietary—we kick things off by raising a toast to our amazing listeners and swapping some hilarious post-Thanksgiving tales. Think family drama, questionable leftover recipes, and a few laughs about why some security products end up collecting cobwebs instead of catching threats. From there, we dive headfirst into the debate on open-source vs. paid intel, comparing the hands-on effort of free...2025-02-2250 minCyber After HoursCyber After HoursHow to Manage Zero-Day VulnerabilitiesEver wonder how facial hair fundraisers and cybersecurity connect? In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits. From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned. We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to the nuances of patch management and d...2025-02-2248 minCyber After HoursCyber After HoursCyber Hygiene: Protect Yourself from Digital DiseaseEver catch yourself hoping technology could ride in like a knight in shining armor to battle digital threats? In the newest episode of Cyber After Hours—S1E7 Cyber Hygiene: The Overlooked Essentials—we dive headfirst into the wild world of AI-powered scam disruption, ethical dilemmas, and everyday security practices that can save you serious headaches. We kick things off with a clever chatbot that pretends to be an elderly user, stringing scammers along while shielding real victims from harm. It’s part comedy, part cautionary tale, and it sparks a lively debate about...2025-02-2248 minCyber After HoursCyber After HoursCybersecurity Isn't About Tech - It's About StrategyEver wonder how personal finance mishaps and big-picture cybersecurity planning might collide? In this lively episode of Cyber After Hours—S1E6 What Does It Mean to be Strategic in Cybersecurity?—we kick off with humorous stories about our own investment choices (spoiler alert: real estate beats crypto in our portfolios!) before diving into the serious business of aligning technology, budgeting, and team dynamics with larger business goals. From laughing over AI-driven investigations that save us from drowning in data overload to sharing the occasional misstep with “silver bullet” tools, our conversation moves from lighthearted anecdotes...2025-02-2250 minCyber After HoursCyber After HoursWhy Cybersecurity is WAY More Complex Than You ThinkEver imagine pneumonia changing your favorite drink from bourbon to gin and tonic? That’s exactly how we kick off this episode of Cyber After Hours—S1E5: “What Makes Cybersecurity So Complex and How Do We Get Over It?”—by sharing personal stories and unexpected shifts in our day-to-day routines. The big question on our minds is why cybersecurity feels so complicated in the first place. From developers juggling code releases to risk managers balancing compliance and authentic security, each role adds another layer of complexity—especially for smaller organizations with limited resources.2025-02-2230 minCyber After HoursCyber After HoursHow AI is Changing Cyber Defense ForeverRemember when iPods were the hot new thing? Ever wonder why we still call these shows “podcasts” even though iPods are practically museum pieces? In this new episode of Cyber After Hours—S1E4 The Evolving Role of AI in Cyber Defense—we take a playful look at tech’s most enduring terminologies, like “firewall” and “port," and uncover how nautical, historical, and downright whimsical origins continue to shape our modern tech vocabulary. It’s a fun reminder that the language we use can be just as fascinating as the gadgets themselves. But it’s not all...2025-02-2245 minCyber After HoursCyber After HoursThe Good, the Bad, and the Ugly of Cyber Vendor ConsolidationEver felt like you're paying a “convenience fee” just to access your own data in the cloud? In our new Cyber After Hours episode—S1E3: The Good, the Bad, and the Ugly of Cyber Vendor Consolidation—we dive into exactly that dilemma. We start off by sharing a personal story of how we challenged a ridiculous vendor charge and actually won. It’s a reminder that you don’t have to accept every fee that shows up on the invoice—especially in cloud computing, where hidden costs can sneak up on you fast. F...2025-02-2233 minCyber After HoursCyber After HoursHow to Build a Battle-Ready Cyber Incident Response TeamEver been hit with unexpected costs that make you question whether profit outweighs protection? In this eye-opening new episode of Cyber After Hours—Incident Response: How to Build a Battle-Ready Team—we dive headfirst into a personal story that exposes one of cybersecurity’s biggest ethical dilemmas. Picture owning a security tool but still getting slammed with exorbitant fees just to access the logs you desperately need. Our conversation peels back the layers on that frustration, calling for honesty and transparency in a field that’s too critical to be driven by hidden markups...2025-02-2239 minCyber After HoursCyber After HoursHow to Fix the Cybersecurity Skills Gap (and Why It Matters)Ever get caught off guard by a cyber scam and wonder how you landed in the middle of it? In our very first episode of Cyber After Hours—S1E1: “Cybersecurity Skills Gap: The Role of Cross-Training and Mentorship”—we dive into all the hilarious missteps of starting a podcast, from battling those infuriating lip-smacking noises to hunting down the perfect microphone. Along the way, we examine Paul's run-in with an extortion attempt, highlighting just how crucial cybersecurity awareness is—especially for those of us who might be easy targets. We also explore how cybers...2025-02-2236 minCyber After HoursCyber After HoursS1 E12 - What cyber security lessons can we learn from recent breaches?Ever wondered if there’s a secret “Swag Dark Web” out there for conference freebies?   In this new episode of Cyber After Hours (S1E12: What Cyber Security Lessons Can We Learn From Recent Breaches?), we sit down with Omri—co-founder of DoControl and self-proclaimed swag connoisseur—for a lively journey from Israel’s buzzing startup scene to Miami’s growing tech hub.   Along the way, he spills stories about the art (and occasional comedy) of swag hunting, while giving us a front-row seat to the latest shifts in cybersecurity.   We di...2025-02-2046 minCyber After HoursCyber After HoursS1 E13 - The Role of AI in Offensive CybersecurityAI:  The Ultimate Hacker or Cybersecurity’s Best Ally?   In this week’s episode of Cyber After Hours (S1E13 – The Role of AI in Offensive Cybersecurity), we crack open a few drinks and an even bigger debate: Is AI leveling the playing field in cyber, or tilting it in favor of the bad guys?   AI-powered attacks are no longer some sci-fi concept. Generative AI is handing cybercriminals—yes, even the amateurs—a playbook for crafting hyper-realistic phishing campaigns, automating reconnaissance, and scaling attacks like never before.   Financial serv...2025-02-2056 minCyber After HoursCyber After HoursS1 E11 - CISO vs. CTO: Defining Roles and Responsibilities in SecurityEver wonder why identity and access management (IAM) can make or break your cybersecurity strategy?   In this episode of Cyber After Hours, we sit down with Lance Peterman—an industry pro whose passion for mentoring the next generation radiates through every story he shares.   Lance reveals how IAM, executed well, can be a game-changer in preventing breaches and fortifying your cyber hygiene.   If you’ve ever thought of IAM as just another box to check, prepare to see it in a whole new light.   The co...2025-02-2044 minCyber After HoursCyber After HoursS1 E10 - The Future of Network Security: SASE, SD-WAN, and BeyondEver wonder if a collared shirt can feel as comfy as your favorite tee while you’re unraveling the future of network security? That’s exactly how we kick off S1E10 – The Future of Network Security: SASE, SD-WAN, and Beyond. In this lively episode, we have a warm chat filled with humor, a little scotch, and a few laughs about our quest for the perfect podcast intro—plus a shout-out to my talented cousin for the stellar graphic design work.   Once the jokes (and glasses) are topped off, we dive i...2025-02-2056 minCyber After HoursCyber After HoursS1 E9 - The Future of Cyber Threat Intelligence: Open Source vs. ProprietaryEver wonder how half-eaten pumpkin pie and dusty cybersecurity tools could possibly go together? In this spirited episode of Cyber After Hours—S1E9: The Future of Cyber Threat Intelligence: Open Source vs. Proprietary—we kick things off by raising a toast to our amazing listeners and swapping some hilarious post-Thanksgiving tales. Think family drama, questionable leftover recipes, and a few laughs about why some security products end up collecting cobwebs instead of catching threats.   From there, we dive headfirst into the debate on open-source vs. paid intel, comparing the h...2025-02-2050 minCyber After HoursCyber After HoursS1 E8 - Patch Management: How to Handle Zero-Day VulnerabilitiesEver wonder how facial hair fundraisers and cybersecurity connect? In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits.   From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned. We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to the nuance...2025-02-2048 minCyber After HoursCyber After HoursS1 E7 - Cyber Hygiene: The Overlooked EssentialsEver catch yourself hoping technology could ride in like a knight in shining armor to battle digital threats? In the newest episode of Cyber After Hours—S1E7 Cyber Hygiene: The Overlooked Essentials—we dive headfirst into the wild world of AI-powered scam disruption, ethical dilemmas, and everyday security practices that can save you serious headaches.   We kick things off with a clever chatbot that pretends to be an elderly user, stringing scammers along while shielding real victims from harm. It’s part comedy, part cautionary tale, and it sparks...2025-02-2048 minCyber After HoursCyber After HoursS1 E6 - What Does It Mean to be Strategic in Cybersecurity?Ever wonder how personal finance mishaps and big-picture cybersecurity planning might collide? In this lively episode of Cyber After Hours—S1E6 What Does It Mean to be Strategic in Cybersecurity?—we kick off with humorous stories about our own investment choices (spoiler alert: real estate beats crypto in our portfolios!) before diving into the serious business of aligning technology, budgeting, and team dynamics with larger business goals.   From laughing over AI-driven investigations that save us from drowning in data overload to sharing the occasional misstep with “silver bullet” tools, our conversation moves from...2025-02-2050 minCyber After HoursCyber After HoursS1 E5 - What Makes Cybersecurity So Complex and How Do We Get Over It?Ever imagine pneumonia changing your favorite drink from bourbon to gin and tonic? That’s exactly how we kick off this episode of Cyber After Hours—S1E5: “What Makes Cybersecurity So Complex and How Do We Get Over It?”—by sharing personal stories and unexpected shifts in our day-to-day routines. The big question on our minds is why cybersecurity feels so complicated in the first place. From developers juggling code releases to risk managers balancing compliance and authentic security, each role adds another layer of complexity—especially for smaller organization...2025-02-2030 minCyber After HoursCyber After HoursS1 E4 - The Evolving Role of AI in Cyber DefenseRemember when iPods were the hot new thing? Ever wonder why we still call these shows “podcasts” even though iPods are practically museum pieces? In this new episode of Cyber After Hours—S1E4 The Evolving Role of AI in Cyber Defense—we take a playful look at tech’s most enduring terminologies, like “firewall” and “port," and uncover how nautical, historical, and downright whimsical origins continue to shape our modern tech vocabulary. It’s a fun reminder that the language we use can be just as fascinating as the gadgets themselves...2025-02-2045 minCyber After HoursCyber After HoursS1 E3 - The Good, the Bad, and the Ugly of Cyber Vendor ConsolidationEver felt like you're paying a “convenience fee” just to access your own data in the cloud? In our new Cyber After Hours episode—S1E3: The Good, the Bad, and the Ugly of Cyber Vendor Consolidation—we dive into exactly that dilemma. We start off by sharing a personal story of how we challenged a ridiculous vendor charge and actually won. It’s a reminder that you don’t have to accept every fee that shows up on the invoice—especially in cloud computing, where hidden costs can sneak up on you fast...2025-02-2033 minCyber After HoursCyber After HoursS1 E2 - Incident Response: How to Build a Battle-Ready TeamEver been hit with unexpected costs that make you question whether profit outweighs protection? In this eye-opening new episode of Cyber After Hours—Incident Response: How to Build a Battle-Ready Team—we dive headfirst into a personal story that exposes one of cybersecurity’s biggest ethical dilemmas. Picture owning a security tool but still getting slammed with exorbitant fees just to access the logs you desperately need. Our conversation peels back the layers on that frustration, calling for honesty and transparency in a field that’s too critical to be driven b...2025-02-2039 minCyber After HoursCyber After HoursS1 E1 - Cybersecurity Skills Gap: The Role of Cross-Training and MentorshipEver get caught off guard by a cyber scam and wonder how you landed in the middle of it? In our very first episode of Cyber After Hours—S1E1: “Cybersecurity Skills Gap: The Role of Cross-Training and Mentorship”—we dive into all the hilarious missteps of starting a podcast, from battling those infuriating lip-smacking noises to hunting down the perfect microphone. Along the way, we examine Paul's run-in with an extortion attempt, highlighting just how crucial cybersecurity awareness is—especially for those of us who might be easy targets.   We also e...2025-02-2036 minCyber After HoursCyber After HoursHow AI Will Change Hacking ForeverAI:  The Ultimate Hacker or Cybersecurity’s Best Ally? In this week’s episode of Cyber After Hours (S1E13 – The Role of AI in Offensive Cybersecurity), we crack open a few drinks and an even bigger debate: Is AI leveling the playing field in cyber, or tilting it in favor of the bad guys? AI-powered attacks are no longer some sci-fi concept. Generative AI is handing cybercriminals—yes, even the amateurs—a playbook for crafting hyper-realistic phishing campaigns, automating reconnaissance, and scaling attacks like never before. Financial services and other regulated industries are left wo...2025-02-1956 minCyber After HoursCyber After HoursWhat We Learned from the Worst Cyber BreachesEver wondered if there’s a secret “Swag Dark Web” out there for conference freebies? In this new episode of Cyber After Hours (S1E12: What Cyber Security Lessons Can We Learn From Recent Breaches?), we sit down with Omri—co-founder of DoControl and self-proclaimed swag connoisseur—for a lively journey from Israel’s buzzing startup scene to Miami’s growing tech hub. Along the way, he spills stories about the art (and occasional comedy) of swag hunting, while giving us a front-row seat to the latest shifts in cybersecurity. We dig into big-picture le...2025-02-1146 minCyber After HoursCyber After HoursCISO vs. CTO: The Battle for Your Security BudgetEver wonder why identity and access management (IAM) can make or break your cybersecurity strategy? In this episode of Cyber After Hours, we sit down with Lance Peterman—an industry pro whose passion for mentoring the next generation radiates through every story he shares. Lance reveals how IAM, executed well, can be a game-changer in preventing breaches and fortifying your cyber hygiene. If you’ve ever thought of IAM as just another box to check, prepare to see it in a whole new light. The conversation then shifts to the ever-evolving danc...2025-02-0444 minCyber After HoursCyber After HoursHacking the Future: Network Security 2025Ever wonder if a collared shirt can feel as comfy as your favorite tee while you’re unraveling the future of network security? That’s exactly how we kick off S1E10 – The Future of Network Security: SASE, SD-WAN, and Beyond. In this lively episode, we have a warm chat filled with humor, a little scotch, and a few laughs about our quest for the perfect podcast intro—plus a shout-out to my talented cousin for the stellar graphic design work. Once the jokes (and glasses) are topped off, we dive into the real mea...2025-01-2856 minCyber After HoursCyber After HoursOpen Source vs. Proprietary Cyber Threat Intelligence: The Great DebateEver wonder how half-eaten pumpkin pie and dusty cybersecurity tools could possibly go together? In this spirited episode of Cyber After Hours—S1E9: The Future of Cyber Threat Intelligence: Open Source vs. Proprietary—we kick things off by raising a toast to our amazing listeners and swapping some hilarious post-Thanksgiving tales. Think family drama, questionable leftover recipes, and a few laughs about why some security products end up collecting cobwebs instead of catching threats. From there, we dive headfirst into the debate on open-source vs. paid intel, comparing the hands-on effort of free...2025-01-2150 minCyber After HoursCyber After HoursS1 E8 - Patch Management: How to Handle Zero-Day VulnerabilitiesEver wonder how facial hair fundraisers and cybersecurity connect? In this lively episode of Cyber After Hours—S1E8 Patch Management: How to Handle Zero-Day Vulnerabilities—we kick off with humorous mustache mishaps (including one domestic faux pas!) before tackling the serious business of zero-day exploits. From waxing poetic about handlebar mustaches to recounting the moment a seemingly secure environment was breached, our conversation moves from laughter to lessons learned. We underscore why a defense-in-depth approach is essential, covering everything from vulnerability management and identity/access controls to th...2025-01-1448 minCyber After HoursCyber After HoursCyber Hygiene: Protect Yourself from Digital DiseaseEver catch yourself hoping technology could ride in like a knight in shining armor to battle digital threats? In the newest episode of Cyber After Hours—S1E7 Cyber Hygiene: The Overlooked Essentials—we dive headfirst into the wild world of AI-powered scam disruption, ethical dilemmas, and everyday security practices that can save you serious headaches. We kick things off with a clever chatbot that pretends to be an elderly user, stringing scammers along while shielding real victims from harm. It’s part comedy, part cautionary tale, and it sparks a lively debate about...2025-01-0748 minCyber After HoursCyber After HoursCybersecurity Isn't About Tech - It's About StrategyEver wonder how personal finance mishaps and big-picture cybersecurity planning might collide? In this lively episode of Cyber After Hours—S1E6 What Does It Mean to be Strategic in Cybersecurity?—we kick off with humorous stories about our own investment choices (spoiler alert: real estate beats crypto in our portfolios!) before diving into the serious business of aligning technology, budgeting, and team dynamics with larger business goals. From laughing over AI-driven investigations that save us from drowning in data overload to sharing the occasional misstep with “silver bullet” tools, our conversation moves from lighthearted anecdotes...2024-12-3150 minCyber After HoursCyber After HoursWhy Cybersecurity is WAY More Complex Than You ThinkEver imagine pneumonia changing your favorite drink from bourbon to gin and tonic? That’s exactly how we kick off this episode of Cyber After Hours—S1E5: “What Makes Cybersecurity So Complex and How Do We Get Over It?”—by sharing personal stories and unexpected shifts in our day-to-day routines. The big question on our minds is why cybersecurity feels so complicated in the first place. From developers juggling code releases to risk managers balancing compliance and authentic security, each role adds another layer of complexity—especially for smaller organizations with limited resources.2024-12-2430 minCyber After HoursCyber After HoursHow AI is Changing Cyber Defense ForeverRemember when iPods were the hot new thing? Ever wonder why we still call these shows “podcasts” even though iPods are practically museum pieces? In this new episode of Cyber After Hours—S1E4 The Evolving Role of AI in Cyber Defense—we take a playful look at tech’s most enduring terminologies, like “firewall” and “port," and uncover how nautical, historical, and downright whimsical origins continue to shape our modern tech vocabulary. It’s a fun reminder that the language we use can be just as fascinating as the gadgets themselves. But it’s not all...2024-12-1745 minCyber After HoursCyber After HoursThe Good, the Bad, and the Ugly of Cyber Vendor ConsolidationEver felt like you're paying a “convenience fee” just to access your own data in the cloud? In our new Cyber After Hours episode—S1E3: The Good, the Bad, and the Ugly of Cyber Vendor Consolidation—we dive into exactly that dilemma. We start off by sharing a personal story of how we challenged a ridiculous vendor charge and actually won. It’s a reminder that you don’t have to accept every fee that shows up on the invoice—especially in cloud computing, where hidden costs can sneak up on you fast. F...2024-12-1033 minCyber After HoursCyber After HoursHow to Build a Battle-Ready Cyber Incident Response TeamEver been hit with unexpected costs that make you question whether profit outweighs protection? In this eye-opening new episode of Cyber After Hours—Incident Response: How to Build a Battle-Ready Team—we dive headfirst into a personal story that exposes one of cybersecurity’s biggest ethical dilemmas. Picture owning a security tool but still getting slammed with exorbitant fees just to access the logs you desperately need. Our conversation peels back the layers on that frustration, calling for honesty and transparency in a field that’s too critical to be driven by hidden markups...2024-12-0339 minCyber After HoursCyber After HoursHow to Fix the Cybersecurity Skills Gap (and Why It Matters)Ever get caught off guard by a cyber scam and wonder how you landed in the middle of it? In our very first episode of Cyber After Hours—S1E1: “Cybersecurity Skills Gap: The Role of Cross-Training and Mentorship”—we dive into all the hilarious missteps of starting a podcast, from battling those infuriating lip-smacking noises to hunting down the perfect microphone. Along the way, we examine Paul's run-in with an extortion attempt, highlighting just how crucial cybersecurity awareness is—especially for those of us who might be easy targets. We also explore how cybers...2024-11-2336 min