Look for any podcast host, guest or anyone
Showing episodes and shows of

Netenrich

Shows

Good QuestionGood QuestionFraudGPT, how do we adapt?In the latest episode of Good Question, we explore how new tools like Fraud GPT, a dark AI tool designed specifically for malicious activities, are changing the landscape of financial crime. We talk about how Inscribe is developing innovative solutions to counter these threats. The conversation covers a wide range of topics, including the challenges of evolving AI technology, ethical considerations in AI development, and the importance of human oversight. Inscribe’s mission is to build solutions that blend the computational power of AI with the human insight that is crucial for nuanced decision-making. This isn't just about automating frau...2024-11-0238 minIT Ops QueryIT Ops QueryFrom Sony breach to CrowdStrike, IT Ops-SecOps rift deepenedRich Lane is currently IT director at the City of Medford, Massachusetts, and has had a varied career in IT infrastructure and operations. He served as VP of digital operations strategy for data security software vendor Netenrich from 2021 to 2022, and as a Forrester Research analyst from 2018 to 2021. Before that, Lane worked as a professional services consultant for observability vendor Splunk, and as IT infrastructure and operations manager at Bain Capital. From Lane's perspective, the CrowdStrike outage reflected an organizational disconnect at many companies between the IT security teams that choose tools and the infrastructure operations teams that...2024-10-1016 minGood QuestionGood Question[Live Recording] AI Agents, can they fight fraud?In this live recording of Good Question, we explore the role of AI agents in the future of fraud prevention with expert fraud fighters, a live studio audience, and (of course) ChatGPT! This lively discussion focuses on the integration of AI agents into fraud-fighting strategies to streamline operations, enhance accuracy, and improve team efficiency. Our guests start by reflecting on the impact of generative AI tools like ChatGPT, discuss their potential to reduce the "toil" fraud operations teams face, and debate whether AI might eventually replace certain roles or merely augment human expertise. Our guests also interact with the a...2024-10-0957 minCyberWire DailyCyberWire DailyVPN compromise causes concerns.Global Affairs Canada investigates a major data breach. New York sues Citibank over inadequate online security. Alpha ransomware launches a dedicated leak site on the dark web. A leaked database with 50 million records may or may not be real. CISA and the FBI provide guidance for SOHO routers.Patch ‘em if ya got ‘em. Krustyloader exploits Ivanti weaknesses. Unit 42 tracks a large-scale scareware campaign. Alex Stamos calls Microsoft’s security strategies “morally indefensible.” Our guests are Gianna Whitver and Maria Velasquez from the Cybersecurity Marketing Society to talk about their new podcast "Breaking Through in Cybersecurity Marketing." And do you have w...2024-01-3134 minSecurity Weekly Podcast Network (Audio)Security Weekly Podcast Network (Audio)Digital Transformation Breaks Risk Management - Chris Morales - BSW #323CEOs and boards struggle with their digital transformation process. Does their operations hinder or align with business initiatives? Has their security operations scaled to meet the data and digital demands to protect against business risk? In today’s episode, we’re talking to Chris Morales, CISO at Netenrich, who’ll provide compelling insights towards security transformation. Security organizations all face similar security challenges of too much data, siloed teams, underperforming legacy tools, and time-consuming and laborious threat investigation work. We’ll discuss the approach enterprises need to consider in advancing their security maturity. It’s one that’s data-driven, adaptive, an...2023-10-101h 02Business Security Weekly (Audio)Business Security Weekly (Audio)Digital Transformation Breaks Risk Management - Chris Morales - BSW #323CEOs and boards struggle with their digital transformation process. Does their operations hinder or align with business initiatives? Has their security operations scaled to meet the data and digital demands to protect against business risk? In today’s episode, we’re talking to Chris Morales, CISO at Netenrich, who’ll provide compelling insights towards security transformation. Security organizations all face similar security challenges of too much data, siloed teams, underperforming legacy tools, and time-consuming and laborious threat investigation work. We’ll discuss the approach enterprises need to consider in advancing their security maturity. It’s one that’s data-driven, adaptive, an...2023-10-101h 02Business Security Weekly (Video)Business Security Weekly (Video)Digital Transformation Breaks Risk Management - Chris Morales - BSW #323CEOs and boards struggle with their digital transformation process. Does their operations hinder or align with business initiatives? Has their security operations scaled to meet the data and digital demands to protect against business risk? In today’s episode, we’re talking to Chris Morales, CISO at Netenrich, who’ll provide compelling insights towards security transformation. Security organizations all face similar security challenges of too much data, siloed teams, underperforming legacy tools, and time-consuming and laborious threat investigation work. We’ll discuss the approach enterprises need to consider in advancing their security maturity. It’s one that’s data-driven, adaptive, an...2023-10-0936 minCyberWire DailyCyberWire DailyPhishing kits in the C2C market. Cyberespionage, Pyongyang and Beijing editions. Ransomware under the radar. A new hacktivist group says it doesn’t much care for NATO corruption.Telekopye and the rise of commodified phishing kits. Lazarus Group fields new malware. Implications of China's campaign against vulnerable Barracuda appliances. Abhubllka ransomware's targeting and low extortion demands. Malek Ben Salem of Accenture outlines generative AI Implications to spam detection. Jeff Welgan, Chief Learning Officer at N2K Networks, unpacks the NICE framework and strategic workforce intelligence. And a new hacktivist group emerges, and takes a particular interest in NATO members.For links to all of today's stories check out our CyberWire daily news briefing:https://thecyberwire.com/newsletters/daily-briefing/12/1622023-08-2526 minCyber BriefingCyber BriefingCyber Briefing - 2023.08.25 👉 What are the latest cybersecurity alerts, incidents, and news? 🚨 #CyberAlerts Zero-Day Vulnerability in WinRAR Exploited for Financial Theft Source: Group-IB Neanderthals Unleash Phishing Toolkit via Telegram's Telekopye Source: ESET Cybercriminals Use Whiffy Recon for Precise WiFi Tracking Source: Secureworks Lazarus APT's Ingenious Exploitation of Zoho ManageEngine Flaw Unveiled Source: Cisco Talos Critical Flaws in Jupiter X Core WordPress Plugin Pose Hijacking Risks Source: Patchstack NVIDIA's D3D10 Driver Unearths Memory Vulnerabilities with Virtualization Risk2023-08-2509 minCyberWire DailyCyberWire DailyA malign AI tool: FraudGPT. Stealer logs in the C2C market. Signs in the blockchain that some Conti alumni are working with the Akira gang. And a kinetic strike against a cyber target.FraudGPT is a chatbot with malign intent. Stealer logs in the C2C market. Signs in the blockchain that some Conti alumni are working with the Akira gang. Tim Starks from Washington Post's Cybersecurity 202 on the White House’s new National Cyber Director nominee. Maria Varmazis speaks with David Luber, Deputy Director of NSA's Cybersecurity Directorate, on space systems as critical infrastructure. And a kinetic strike against a cyber target: Ukrainian drones may have hit Fancy Bear’s Moscow digs.For links to all of today's stories check out our CyberWire daily news briefing:2023-07-2626 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichFear, Loathing, and Responsible DisclosureVulnerability research and inevitable conflicts with software companies has been a part of hacker culture for at least three decades. In this podcast, we’re joined by Casey John Ellis, co-founder of Bugcrowd and of Disclose.io where we discuss the evolution towards bug bounty programs, what this all means for the world of AI vulnerabilities, and how hackers are making the world more secure. We may sprinkle in some light economics and ethics into the conversation. 2023-07-1140 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichFear, Loathing, and Responsible DisclosureVulnerability research and inevitable conflicts with software companies has been a part of hacker culture for at least three decades. In this podcast, we’re joined by Casey John Ellis, co-founder of Bugcrowd and of Disclose.io where we discuss the evolution towards bug bounty programs, what this all means for the world of AI vulnerabilities, and how hackers are making the world more secure. We may sprinkle in some light economics and ethics into the conversation. 2023-07-1140 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichScript Kiddies or APT: Inside the World of DDoSWe often think of DDoS as something that is only affecting gamers and is launched by misbehaving youth, but the landscape of people who leverage DDoS runs the gamut all the way up to nation-state actors.  Join us as we talk with Richard Hummel of NETSCOUT as we discuss the evolving landscape of DDoS attacks and what's coming next over the horizon. 2023-06-2832 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichScript Kiddies or APT: Inside the World of DDoSWe often think of DDoS as something that is only affecting gamers and is launched by misbehaving youth, but the landscape of people who leverage DDoS runs the gamut all the way up to nation-state actors.  Join us as we talk with Richard Hummel of NETSCOUT as we discuss the evolving landscape of DDoS attacks and what's coming next over the horizon. 2023-06-2832 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichInsecurity as a ServiceOne of the great things about cybersecurity is that there are always new problems to research and try to solve.  Join us as we talk with Jaime Blasco on his journey towards trying to solve security challenges in software as a service application. 2023-06-1336 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichInsecurity as a ServiceOne of the great things about cybersecurity is that there are always new problems to research and try to solve.  Join us as we talk with Jaime Blasco on his journey towards trying to solve security challenges in software as a service application. 2023-06-1336 minCloud Security Podcast by GoogleCloud Security Podcast by GoogleEP125 Will SIEM Ever Die: SIEM Lessons from the Past for the FutureGuest: David Swift, Security Strategist at Netenrich Topics: Which old Security Information and Event Management (SIEM) lessons apply today? Which old SIEM lessons absolutely do not apply today and will harm you? What are the benefits and costs of SIEM in 2023? What are the top cloud security use cases for SIEM in 2023? What are your favorite challenges with SIEM in 2023 special in the cloud? Are they different from, say, 2013 or perhaps 2003? Do you think SIEM can ever die?   Resources: L...2023-06-1229 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichCyber Security and Meat Space: Insights From Malware Targeting the Power GridOften when we think of cyber security, we think of financial fraud, ransomware, or data theft.  In recent years we've seen an increase in malware targeting industrial control systems such as sewage treatment plants, the power grid, and utilities necessary for basic human life.  We are joined by Jimmy Wylie of Dragos to discuss the trends and what he sees in this world, and how the problem is getting worse.   2023-05-311h 00DEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichCyber Security and Meat Space: Insights From Malware Targeting the Power GridOften when we think of cyber security, we think of financial fraud, ransomware, or data theft.  In recent years we've seen an increase in malware targeting industrial control systems such as sewage treatment plants, the power grid, and utilities necessary for basic human life.  We are joined by Jimmy Wylie of Dragos to discuss the trends and what he sees in this world, and how the problem is getting worse.   2023-05-311h 00DEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichThreat Actors and Making DNS Fail Harder and at Greater Scale than Ever BeforeEverything defenders do is public, which means threat actors can look us up in how we’re detecting them and adapt their techniques. The bad news is that they learn how to evade us. The good news is that since I’m a former latchkey kid who grew up in the 80s with a short attention span, there is always something new to research. Donald “Mac” MacCarthy from Open Source Context joins us to talk about how he sees threat actors changing using passive DNS and what we can do about it. 2023-05-1938 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichThreat Actors and Making DNS Fail Harder and at Greater Scale than Ever BeforeEverything defenders do is public, which means threat actors can look us up in how we’re detecting them and adapt their techniques. The bad news is that they learn how to evade us. The good news is that since I’m a former latchkey kid who grew up in the 80s with a short attention span, there is always something new to research. Donald “Mac” MacCarthy from Open Source Context joins us to talk about how he sees threat actors changing using passive DNS and what we can do about it. 2023-05-1938 minState of Identity Podcast Series by LiminalState of Identity Podcast Series by LiminalCybersecurity Perspectives from a Principal Threat HunterJohn Bambenek, Principal Threat Hunter at Netenrich, joins host Cameron D'Ambrosi for a deep dive into the current trends across the cybersecurity landscape, from ChatGPT and deepfake offensive threats to leveraging data analytics across your XDR, SIEM and SOAR technology stacks for improved defenses.2023-05-0431 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by Netenrich25 years of SIEM: The Rocky Journey to Autonomic Security OperationsIn this episode, we are joined by Dr. Anton Chuvakin, Office of the CISO, at Google Cloud Security, where we discuss the evolution of SIEM from on-premise to the Cloud, and to autonomic security operations. Can our industry innovate to move beyond current SIEM limitations to reach “ops nirvana” to a data analytics-fueled security operations? 2023-04-1852 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by Netenrich25 years of SIEM: The Rocky Journey to Autonomic Security OperationsIn this episode, we are joined by Dr. Anton Chuvakin, Office of the CISO, at Google Cloud Security, where we discuss the evolution of SIEM from on-premise to the Cloud, and to autonomic security operations. Can our industry innovate to move beyond current SIEM limitations to reach “ops nirvana” to a data analytics-fueled security operations? 2023-04-1852 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichToil Reduction as a Service - Improving Automation in Threat Detection and AnalyticsWe are joined this week by John Giglio, director of cloud security for SADA, with tales from the trenches on how automation has helped threat hunting and threat analytics to improve the lives of security organizations. 2023-04-1153 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichToil Reduction as a Service - Improving Automation in Threat Detection and AnalyticsWe are joined this week by John Giglio, director of cloud security for SADA, with tales from the trenches on how automation has helped threat hunting and threat analytics to improve the lives of security organizations. 2023-04-1153 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichData Dumpster Fires, How to Make Your SIEM Not SuckFor this week’s interview, Netenrich’s John Bambenek chats with Merys Raymer, Partner Engineering at Google Cloud Security. Merys shares her personal journey as a former threat and security analyst, fighting fires in the SOC trenches. She provides real world insights on the need for advanced SIEMs, data analytics, and automation to optimize security operations. 2023-04-0449 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichData Dumpster Fires, How to Make Your SIEM Not SuckFor this week’s interview, Netenrich’s John Bambenek chats with Merys Raymer, Partner Engineering at Google Cloud Security. Merys shares her personal journey as a former threat and security analyst, fighting fires in the SOC trenches. She provides real world insights on the need for advanced SIEMs, data analytics, and automation to optimize security operations. 2023-04-0449 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichSwimming in Muddy WatersMuddy Waters is an active and prolific APT threat using some unique tactics and malware to actual exfiltrate data. We are joined by Allison Wikoff, who is an expert in this threat actor to discuss what techniques they are using and what it means for enterprise defenses.  2023-03-2236 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichSwimming in Muddy WatersMuddy Waters is an active and prolific APT threat using some unique tactics and malware to actual exfiltrate data. We are joined by Allison Wikoff, who is an expert in this threat actor to discuss what techniques they are using and what it means for enterprise defenses.  2023-03-2236 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichCan ChatGPT Help Malware Analysts?In this episode, we’re joined by Juan Andres Guerrero-Saade discussing how language learning models can be used by security analysts, and those teaching, the next generation of cyber security professionals to aid them, and their work. 2023-03-0837 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichCan ChatGPT Help Malware Analysts?In this episode, we’re joined by Juan Andres Guerrero-Saade discussing how language learning models can be used by security analysts, and those teaching, the next generation of cyber security professionals to aid them, and their work. 2023-03-0837 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichThreat Hunting: Finding Malicious Phishing DomainsJohn Bambenek covers the rise of domain clustering of malicious phishing domains that security analysts need to care about. He is joined by cybersecurity expert Ed Gibbs, Field CTO at Whois API, who shares enlightening techniques on how to find, investigate and resolve these types of daily attacks. 2023-02-2237 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichThreat Hunting: Finding Malicious Phishing DomainsJohn Bambenek covers the rise of domain clustering of malicious phishing domains that security analysts need to care about. He is joined by cybersecurity expert Ed Gibbs, Field CTO at Whois API, who shares enlightening techniques on how to find, investigate and resolve these types of daily attacks. 2023-02-2237 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichHow business email compromises attack our emotions and bottom lineJohn Bambenek talks with security expert Ronnie Tokazowski, Principal Threat Advisor at Cofense, on the rise of behavioral-led attacks impacting organizations. Recent exposures involving romance scams and pig butchering techniques target people and their emotions involving business email compromises. Ronnie delves into the methods organizations can detect and prevent issues from escalating. It centers on finding the gaps that traditional point solutions and ops systems are not currently tracking. 2023-02-0833 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichHow business email compromises attack our emotions and bottom lineJohn Bambenek talks with security expert Ronnie Tokazowski, Principal Threat Advisor at Cofense, on the rise of behavioral-led attacks impacting organizations. Recent exposures involving romance scams and pig butchering techniques target people and their emotions involving business email compromises. Ronnie delves into the methods organizations can detect and prevent issues from escalating. It centers on finding the gaps that traditional point solutions and ops systems are not currently tracking. 2023-02-0833 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichIntroducing DEATH Labs podcast by NetenrichHost John Bambenek, threat researcher at Netenrich, interviews leading security experts and threat researchers on the latest cyberattacks and compromises impacting businesses today. Listeners will gain insights on proven techniques and approaches to advanced threat hunting, detection, and response.  Listen in to the witty and humorous conversations backed by decades of security and SOC expertise. 2023-02-0600 minDEATH Labs: Cyber Threats and Research by NetenrichDEATH Labs: Cyber Threats and Research by NetenrichIntroducing DEATH Labs podcast by NetenrichHost John Bambenek, threat researcher at Netenrich, interviews leading security experts and threat researchers on the latest cyberattacks and compromises impacting businesses today. Listeners will gain insights on proven techniques and approaches to advanced threat hunting, detection, and response.  Listen in to the witty and humorous conversations backed by decades of security and SOC expertise. 2023-02-0600 minChanging ChannelsChanging ChannelsBest of Changing Channels 2022Changing Channels welcomed dozens of seasoned and insightful channel leaders from around the world and across the industry to share their experiences in developing modern routes to market. As we transition to the new year, Channelnomics is revisiting some of the best moments of Changing Channels over the last 12 months. We’re looking back at the deep thoughts and experiences shared by numerous industry executives, including: Rob Rae, Datto Cheryl Cook, Dell Technologies Louise McEvoy, Trend Micro Ted Schumann, Planet One (now Avant) Michelle Hodges, Ivanta (formerly of GitLab) John Dusett, Ingram Micro Cloud Lou Serlenga, Nile Dan To...2022-12-2723 minChanging ChannelsChanging ChannelsNetenrich’s Justin Crotty on Leveraging Data in Managed ServicesJustin Crotty, senior vice president of channels at Netenrich, joins Channelnomics Changing Channels host Larry Walsh to discuss how data and device telemetry is transforming managed service delivery and value propositions.  Managed services in the channel are nothing new. Partners started delivering them more than 20 years ago, augmenting and replacing their legacy break/fix support with remote monitoring and management.   Increasingly, vendors — particularly legacy hardware and software vendors — are discovering the power and value of service and subscription models. Vendors want the same predictable recurring revenue that partners have generated for years. Wall Street and private...2022-06-2222 minThe CISO DiariesThe CISO DiariesJohn Bambenek - Principal Threat Hunter at NetenrichJohn Bambenek - Principal Threat Hunter at Netenrich; Chief Architect of the Cyber Panopticon; Incident Handler for Internet Storm Center About John Bambenek:John Bambenek is an information security practitioner from Champaign, Illinois. As a graduate from the University of Illinois with a B.A. in Theoretical Astrophysics (emphasis in extragalactic astrophysics) and a minor in Mathematics, he has been employed as a project manager at Cap Gemini Ernst and Young, where he provided consulting services to numerous Fortune 500 firms. He continues to provide his expertise to the SANS Institute by authoring published course materials and...2022-02-2442 minCyber WorkCyber WorkHow to become a cyber threat researcher | Guest John BambenekOn today’s podcast, John Bambenek of Netenrich and Bambenek Consulting talks about threat research, intelligence analytics, why the same security problems are so evergreen and the importance of pitching in a little extra bit of your time and talents to make the world a bit better than you found it. – Start learning cybersecurity for free: https://www.infosecinstitute.com/free – View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast0:00 - Intro 2:45 - Getting into cybersecurity 9:40 - Threat researcher versus security researcher and threat analyst12:05 - How to get i...2021-11-1550 minThe CISO DiariesThe CISO DiariesChris Morales, CISO at Netenrich - Quick Witted Veteran, Fueled by Data AnalyticsAbout Chris Morales:We’re here this week with an AI and threat modeling guru, Chris Morales! He’s Netenrich’s FIRST CISO and Head of Security Strategy overseeing the strategic development, implementation, and market execution of the company’s security solutions and processes. Chris has 20-something years of information security experience, having previously led advisory services and security analytics for Vectra AI – while at Vectra he educated many of the Cloud Security Alliance chapter members on dissecting a Microsoft Office 365 attack. During his career, he has advised and designed incident response and threat management programs for some of the...2021-09-2343 minCyber WorkCyber WorkSecOps and the keys to a successful cybersecurity startup | Guest Raju ChekuriNetOps, SecOps and CloudOps — you’ll learn about it all on today’s episode featuring Raju Chekuri, CEO of NetEnrich. Raju shares his career journey, discusses his work helping new tech and cybersecurity startups, and explains why clinging blindly to a five-year plan can be a recipe for disaster.0:00 - Intro 2:12 - Getting started in cybersecurity3:38 - How the security landscape has changed8:27 - Complexity and scope of cybersecurity10:05 - 16+ years at NetEnrich14:30 - Going beyond governance to do it right17:30 - Strategies for upping ITOps along with business22:50 - Example...2021-01-2547 minCyber Security InterviewsCyber Security Interviews#101 - Brandon Hoffman: Align Security To Business OutcomesBrandon Hoffman is the CISO & Head of Security Strategy at Netenrich. Brandon is an admired security executive responsible for Netenrich’s technical sales and security strategy for both the company and its customers. Most recently, he oversaw solution architecture for Intel 471’s dark web threat intelligence business.As former CTO at Lumeta Corporation and RedSeal Networks, Brandon led technical and field development in network security, vulnerability, and risk. He’s also held key practitioner roles focused in security architecture, penetration testing, networking, and data center operations. Brandon holds an MS degree from Northwestern University and a BS degree...2020-11-1638 minTechnadoTechnadoTechnado, Ep. 172: NetEnrich’s Brandon HoffmanThe new CISO at NetEnrich, Brandon Hoffman, was this week’s guest on Technado, where he discussed the role of the SOC in a company’s security strategy. He also shared his take on a new worm phishing campaign in the segment “Who Got Pwned.” After the break, Don and Daniel dissected Microsoft’s explanation for their Azure AD outage in “Deja News.” Finally, they talked about new x64 emulation that will help Windows on ARM, AT&T shelving DSL, OWC’s new Thunderbolt 4 hub, and leaked Windows XP code that could impact current Windows versions.2020-10-0849 minTechnado (Archived)Technado (Archived)Technado, Ep. 172: NetEnrich’s Brandon HoffmanThe new CISO at NetEnrich, Brandon Hoffman, was this week’s guest on Technado, where he discussed the role of the SOC in a company’s security strategy. He also shared his take on a new worm phishing campaign in the segment “Who Got Pwned.” After the break, Don and Daniel dissected Microsoft’s explanation for their Azure AD outage in “Deja News.” Finally, they talked about new x64 emulation that will help Windows on ARM, AT&T shelving DSL, OWC’s new Thunderbolt 4 hub, and leaked Windows XP code that could impact current Windows versions.2020-10-0800 minpod2112 Podcastpod2112 PodcastEpisode 3: Managed Services in the Cloud Computing EraA decade ago, managed services swept through the IT channel at precisely the right time to replace the profitability of commoditized hardware and expensive break/fix services. Today, managed services is crossing into the realm of cloud computing. No longer are resellers just monitoring and managing servers, they are facilitating and orchestrating cloud platforms, complex data migrations, hosted applications and security systems. The level of complexity is enormous, but so too is the market opportunity. Cloud computing is the next-generation of managed services. Justin Crotty, Senior Vice President Channel Sales and Marketing at NetEnrich, joins Pod2112 to discuss the...2017-05-0300 min