podcast
details
.com
Print
Share
Look for any podcast host, guest or anyone
Search
Showing episodes and shows of
Netenrich
Shows
Good Question
FraudGPT, how do we adapt?
In the latest episode of Good Question, we explore how new tools like Fraud GPT, a dark AI tool designed specifically for malicious activities, are changing the landscape of financial crime. We talk about how Inscribe is developing innovative solutions to counter these threats. The conversation covers a wide range of topics, including the challenges of evolving AI technology, ethical considerations in AI development, and the importance of human oversight. Inscribe’s mission is to build solutions that blend the computational power of AI with the human insight that is crucial for nuanced decision-making. This isn't just about automating frau...
2024-11-02
38 min
IT Ops Query
From Sony breach to CrowdStrike, IT Ops-SecOps rift deepened
Rich Lane is currently IT director at the City of Medford, Massachusetts, and has had a varied career in IT infrastructure and operations. He served as VP of digital operations strategy for data security software vendor Netenrich from 2021 to 2022, and as a Forrester Research analyst from 2018 to 2021. Before that, Lane worked as a professional services consultant for observability vendor Splunk, and as IT infrastructure and operations manager at Bain Capital. From Lane's perspective, the CrowdStrike outage reflected an organizational disconnect at many companies between the IT security teams that choose tools and the infrastructure operations teams that...
2024-10-10
16 min
Good Question
[Live Recording] AI Agents, can they fight fraud?
In this live recording of Good Question, we explore the role of AI agents in the future of fraud prevention with expert fraud fighters, a live studio audience, and (of course) ChatGPT! This lively discussion focuses on the integration of AI agents into fraud-fighting strategies to streamline operations, enhance accuracy, and improve team efficiency. Our guests start by reflecting on the impact of generative AI tools like ChatGPT, discuss their potential to reduce the "toil" fraud operations teams face, and debate whether AI might eventually replace certain roles or merely augment human expertise. Our guests also interact with the a...
2024-10-09
57 min
CyberWire Daily
VPN compromise causes concerns.
Global Affairs Canada investigates a major data breach. New York sues Citibank over inadequate online security. Alpha ransomware launches a dedicated leak site on the dark web. A leaked database with 50 million records may or may not be real. CISA and the FBI provide guidance for SOHO routers.Patch ‘em if ya got ‘em. Krustyloader exploits Ivanti weaknesses. Unit 42 tracks a large-scale scareware campaign. Alex Stamos calls Microsoft’s security strategies “morally indefensible.” Our guests are Gianna Whitver and Maria Velasquez from the Cybersecurity Marketing Society to talk about their new podcast "Breaking Through in Cybersecurity Marketing." And do you have w...
2024-01-31
34 min
Security Weekly Podcast Network (Audio)
Digital Transformation Breaks Risk Management - Chris Morales - BSW #323
CEOs and boards struggle with their digital transformation process. Does their operations hinder or align with business initiatives? Has their security operations scaled to meet the data and digital demands to protect against business risk? In today’s episode, we’re talking to Chris Morales, CISO at Netenrich, who’ll provide compelling insights towards security transformation. Security organizations all face similar security challenges of too much data, siloed teams, underperforming legacy tools, and time-consuming and laborious threat investigation work. We’ll discuss the approach enterprises need to consider in advancing their security maturity. It’s one that’s data-driven, adaptive, an...
2023-10-10
1h 02
Business Security Weekly (Audio)
Digital Transformation Breaks Risk Management - Chris Morales - BSW #323
CEOs and boards struggle with their digital transformation process. Does their operations hinder or align with business initiatives? Has their security operations scaled to meet the data and digital demands to protect against business risk? In today’s episode, we’re talking to Chris Morales, CISO at Netenrich, who’ll provide compelling insights towards security transformation. Security organizations all face similar security challenges of too much data, siloed teams, underperforming legacy tools, and time-consuming and laborious threat investigation work. We’ll discuss the approach enterprises need to consider in advancing their security maturity. It’s one that’s data-driven, adaptive, an...
2023-10-10
1h 02
Business Security Weekly (Video)
Digital Transformation Breaks Risk Management - Chris Morales - BSW #323
CEOs and boards struggle with their digital transformation process. Does their operations hinder or align with business initiatives? Has their security operations scaled to meet the data and digital demands to protect against business risk? In today’s episode, we’re talking to Chris Morales, CISO at Netenrich, who’ll provide compelling insights towards security transformation. Security organizations all face similar security challenges of too much data, siloed teams, underperforming legacy tools, and time-consuming and laborious threat investigation work. We’ll discuss the approach enterprises need to consider in advancing their security maturity. It’s one that’s data-driven, adaptive, an...
2023-10-09
36 min
CyberWire Daily
Phishing kits in the C2C market. Cyberespionage, Pyongyang and Beijing editions. Ransomware under the radar. A new hacktivist group says it doesn’t much care for NATO corruption.
Telekopye and the rise of commodified phishing kits. Lazarus Group fields new malware. Implications of China's campaign against vulnerable Barracuda appliances. Abhubllka ransomware's targeting and low extortion demands. Malek Ben Salem of Accenture outlines generative AI Implications to spam detection. Jeff Welgan, Chief Learning Officer at N2K Networks, unpacks the NICE framework and strategic workforce intelligence. And a new hacktivist group emerges, and takes a particular interest in NATO members.For links to all of today's stories check out our CyberWire daily news briefing:https://thecyberwire.com/newsletters/daily-briefing/12/162
2023-08-25
26 min
Cyber Briefing
Cyber Briefing - 2023.08.25
👉 What are the latest cybersecurity alerts, incidents, and news? 🚨 #CyberAlerts Zero-Day Vulnerability in WinRAR Exploited for Financial Theft Source: Group-IB Neanderthals Unleash Phishing Toolkit via Telegram's Telekopye Source: ESET Cybercriminals Use Whiffy Recon for Precise WiFi Tracking Source: Secureworks Lazarus APT's Ingenious Exploitation of Zoho ManageEngine Flaw Unveiled Source: Cisco Talos Critical Flaws in Jupiter X Core WordPress Plugin Pose Hijacking Risks Source: Patchstack NVIDIA's D3D10 Driver Unearths Memory Vulnerabilities with Virtualization Risk
2023-08-25
09 min
CyberWire Daily
A malign AI tool: FraudGPT. Stealer logs in the C2C market. Signs in the blockchain that some Conti alumni are working with the Akira gang. And a kinetic strike against a cyber target.
FraudGPT is a chatbot with malign intent. Stealer logs in the C2C market. Signs in the blockchain that some Conti alumni are working with the Akira gang. Tim Starks from Washington Post's Cybersecurity 202 on the White House’s new National Cyber Director nominee. Maria Varmazis speaks with David Luber, Deputy Director of NSA's Cybersecurity Directorate, on space systems as critical infrastructure. And a kinetic strike against a cyber target: Ukrainian drones may have hit Fancy Bear’s Moscow digs.For links to all of today's stories check out our CyberWire daily news briefing:
2023-07-26
26 min
DEATH Labs: Cyber Threats and Research by Netenrich
Fear, Loathing, and Responsible Disclosure
Vulnerability research and inevitable conflicts with software companies has been a part of hacker culture for at least three decades. In this podcast, we’re joined by Casey John Ellis, co-founder of Bugcrowd and of Disclose.io where we discuss the evolution towards bug bounty programs, what this all means for the world of AI vulnerabilities, and how hackers are making the world more secure. We may sprinkle in some light economics and ethics into the conversation.
2023-07-11
40 min
DEATH Labs: Cyber Threats and Research by Netenrich
Fear, Loathing, and Responsible Disclosure
Vulnerability research and inevitable conflicts with software companies has been a part of hacker culture for at least three decades. In this podcast, we’re joined by Casey John Ellis, co-founder of Bugcrowd and of Disclose.io where we discuss the evolution towards bug bounty programs, what this all means for the world of AI vulnerabilities, and how hackers are making the world more secure. We may sprinkle in some light economics and ethics into the conversation.
2023-07-11
40 min
DEATH Labs: Cyber Threats and Research by Netenrich
Script Kiddies or APT: Inside the World of DDoS
We often think of DDoS as something that is only affecting gamers and is launched by misbehaving youth, but the landscape of people who leverage DDoS runs the gamut all the way up to nation-state actors. Join us as we talk with Richard Hummel of NETSCOUT as we discuss the evolving landscape of DDoS attacks and what's coming next over the horizon.
2023-06-28
32 min
DEATH Labs: Cyber Threats and Research by Netenrich
Script Kiddies or APT: Inside the World of DDoS
We often think of DDoS as something that is only affecting gamers and is launched by misbehaving youth, but the landscape of people who leverage DDoS runs the gamut all the way up to nation-state actors. Join us as we talk with Richard Hummel of NETSCOUT as we discuss the evolving landscape of DDoS attacks and what's coming next over the horizon.
2023-06-28
32 min
DEATH Labs: Cyber Threats and Research by Netenrich
Insecurity as a Service
One of the great things about cybersecurity is that there are always new problems to research and try to solve. Join us as we talk with Jaime Blasco on his journey towards trying to solve security challenges in software as a service application.
2023-06-13
36 min
DEATH Labs: Cyber Threats and Research by Netenrich
Insecurity as a Service
One of the great things about cybersecurity is that there are always new problems to research and try to solve. Join us as we talk with Jaime Blasco on his journey towards trying to solve security challenges in software as a service application.
2023-06-13
36 min
Cloud Security Podcast by Google
EP125 Will SIEM Ever Die: SIEM Lessons from the Past for the Future
Guest: David Swift, Security Strategist at Netenrich Topics: Which old Security Information and Event Management (SIEM) lessons apply today? Which old SIEM lessons absolutely do not apply today and will harm you? What are the benefits and costs of SIEM in 2023? What are the top cloud security use cases for SIEM in 2023? What are your favorite challenges with SIEM in 2023 special in the cloud? Are they different from, say, 2013 or perhaps 2003? Do you think SIEM can ever die? Resources: L...
2023-06-12
29 min
DEATH Labs: Cyber Threats and Research by Netenrich
Cyber Security and Meat Space: Insights From Malware Targeting the Power Grid
Often when we think of cyber security, we think of financial fraud, ransomware, or data theft. In recent years we've seen an increase in malware targeting industrial control systems such as sewage treatment plants, the power grid, and utilities necessary for basic human life. We are joined by Jimmy Wylie of Dragos to discuss the trends and what he sees in this world, and how the problem is getting worse.
2023-05-31
1h 00
DEATH Labs: Cyber Threats and Research by Netenrich
Cyber Security and Meat Space: Insights From Malware Targeting the Power Grid
Often when we think of cyber security, we think of financial fraud, ransomware, or data theft. In recent years we've seen an increase in malware targeting industrial control systems such as sewage treatment plants, the power grid, and utilities necessary for basic human life. We are joined by Jimmy Wylie of Dragos to discuss the trends and what he sees in this world, and how the problem is getting worse.
2023-05-31
1h 00
DEATH Labs: Cyber Threats and Research by Netenrich
Threat Actors and Making DNS Fail Harder and at Greater Scale than Ever Before
Everything defenders do is public, which means threat actors can look us up in how we’re detecting them and adapt their techniques. The bad news is that they learn how to evade us. The good news is that since I’m a former latchkey kid who grew up in the 80s with a short attention span, there is always something new to research. Donald “Mac” MacCarthy from Open Source Context joins us to talk about how he sees threat actors changing using passive DNS and what we can do about it.
2023-05-19
38 min
DEATH Labs: Cyber Threats and Research by Netenrich
Threat Actors and Making DNS Fail Harder and at Greater Scale than Ever Before
Everything defenders do is public, which means threat actors can look us up in how we’re detecting them and adapt their techniques. The bad news is that they learn how to evade us. The good news is that since I’m a former latchkey kid who grew up in the 80s with a short attention span, there is always something new to research. Donald “Mac” MacCarthy from Open Source Context joins us to talk about how he sees threat actors changing using passive DNS and what we can do about it.
2023-05-19
38 min
State of Identity Podcast Series by Liminal
Cybersecurity Perspectives from a Principal Threat Hunter
John Bambenek, Principal Threat Hunter at Netenrich, joins host Cameron D'Ambrosi for a deep dive into the current trends across the cybersecurity landscape, from ChatGPT and deepfake offensive threats to leveraging data analytics across your XDR, SIEM and SOAR technology stacks for improved defenses.
2023-05-04
31 min
DEATH Labs: Cyber Threats and Research by Netenrich
25 years of SIEM: The Rocky Journey to Autonomic Security Operations
In this episode, we are joined by Dr. Anton Chuvakin, Office of the CISO, at Google Cloud Security, where we discuss the evolution of SIEM from on-premise to the Cloud, and to autonomic security operations. Can our industry innovate to move beyond current SIEM limitations to reach “ops nirvana” to a data analytics-fueled security operations?
2023-04-18
52 min
DEATH Labs: Cyber Threats and Research by Netenrich
25 years of SIEM: The Rocky Journey to Autonomic Security Operations
In this episode, we are joined by Dr. Anton Chuvakin, Office of the CISO, at Google Cloud Security, where we discuss the evolution of SIEM from on-premise to the Cloud, and to autonomic security operations. Can our industry innovate to move beyond current SIEM limitations to reach “ops nirvana” to a data analytics-fueled security operations?
2023-04-18
52 min
DEATH Labs: Cyber Threats and Research by Netenrich
Toil Reduction as a Service - Improving Automation in Threat Detection and Analytics
We are joined this week by John Giglio, director of cloud security for SADA, with tales from the trenches on how automation has helped threat hunting and threat analytics to improve the lives of security organizations.
2023-04-11
53 min
DEATH Labs: Cyber Threats and Research by Netenrich
Toil Reduction as a Service - Improving Automation in Threat Detection and Analytics
We are joined this week by John Giglio, director of cloud security for SADA, with tales from the trenches on how automation has helped threat hunting and threat analytics to improve the lives of security organizations.
2023-04-11
53 min
DEATH Labs: Cyber Threats and Research by Netenrich
Data Dumpster Fires, How to Make Your SIEM Not Suck
For this week’s interview, Netenrich’s John Bambenek chats with Merys Raymer, Partner Engineering at Google Cloud Security. Merys shares her personal journey as a former threat and security analyst, fighting fires in the SOC trenches. She provides real world insights on the need for advanced SIEMs, data analytics, and automation to optimize security operations.
2023-04-04
49 min
DEATH Labs: Cyber Threats and Research by Netenrich
Data Dumpster Fires, How to Make Your SIEM Not Suck
For this week’s interview, Netenrich’s John Bambenek chats with Merys Raymer, Partner Engineering at Google Cloud Security. Merys shares her personal journey as a former threat and security analyst, fighting fires in the SOC trenches. She provides real world insights on the need for advanced SIEMs, data analytics, and automation to optimize security operations.
2023-04-04
49 min
DEATH Labs: Cyber Threats and Research by Netenrich
Swimming in Muddy Waters
Muddy Waters is an active and prolific APT threat using some unique tactics and malware to actual exfiltrate data. We are joined by Allison Wikoff, who is an expert in this threat actor to discuss what techniques they are using and what it means for enterprise defenses.
2023-03-22
36 min
DEATH Labs: Cyber Threats and Research by Netenrich
Swimming in Muddy Waters
Muddy Waters is an active and prolific APT threat using some unique tactics and malware to actual exfiltrate data. We are joined by Allison Wikoff, who is an expert in this threat actor to discuss what techniques they are using and what it means for enterprise defenses.
2023-03-22
36 min
DEATH Labs: Cyber Threats and Research by Netenrich
Can ChatGPT Help Malware Analysts?
In this episode, we’re joined by Juan Andres Guerrero-Saade discussing how language learning models can be used by security analysts, and those teaching, the next generation of cyber security professionals to aid them, and their work.
2023-03-08
37 min
DEATH Labs: Cyber Threats and Research by Netenrich
Can ChatGPT Help Malware Analysts?
In this episode, we’re joined by Juan Andres Guerrero-Saade discussing how language learning models can be used by security analysts, and those teaching, the next generation of cyber security professionals to aid them, and their work.
2023-03-08
37 min
DEATH Labs: Cyber Threats and Research by Netenrich
Threat Hunting: Finding Malicious Phishing Domains
John Bambenek covers the rise of domain clustering of malicious phishing domains that security analysts need to care about. He is joined by cybersecurity expert Ed Gibbs, Field CTO at Whois API, who shares enlightening techniques on how to find, investigate and resolve these types of daily attacks.
2023-02-22
37 min
DEATH Labs: Cyber Threats and Research by Netenrich
Threat Hunting: Finding Malicious Phishing Domains
John Bambenek covers the rise of domain clustering of malicious phishing domains that security analysts need to care about. He is joined by cybersecurity expert Ed Gibbs, Field CTO at Whois API, who shares enlightening techniques on how to find, investigate and resolve these types of daily attacks.
2023-02-22
37 min
DEATH Labs: Cyber Threats and Research by Netenrich
How business email compromises attack our emotions and bottom line
John Bambenek talks with security expert Ronnie Tokazowski, Principal Threat Advisor at Cofense, on the rise of behavioral-led attacks impacting organizations. Recent exposures involving romance scams and pig butchering techniques target people and their emotions involving business email compromises. Ronnie delves into the methods organizations can detect and prevent issues from escalating. It centers on finding the gaps that traditional point solutions and ops systems are not currently tracking.
2023-02-08
33 min
DEATH Labs: Cyber Threats and Research by Netenrich
How business email compromises attack our emotions and bottom line
John Bambenek talks with security expert Ronnie Tokazowski, Principal Threat Advisor at Cofense, on the rise of behavioral-led attacks impacting organizations. Recent exposures involving romance scams and pig butchering techniques target people and their emotions involving business email compromises. Ronnie delves into the methods organizations can detect and prevent issues from escalating. It centers on finding the gaps that traditional point solutions and ops systems are not currently tracking.
2023-02-08
33 min
DEATH Labs: Cyber Threats and Research by Netenrich
Introducing DEATH Labs podcast by Netenrich
Host John Bambenek, threat researcher at Netenrich, interviews leading security experts and threat researchers on the latest cyberattacks and compromises impacting businesses today. Listeners will gain insights on proven techniques and approaches to advanced threat hunting, detection, and response. Listen in to the witty and humorous conversations backed by decades of security and SOC expertise.
2023-02-06
00 min
DEATH Labs: Cyber Threats and Research by Netenrich
Introducing DEATH Labs podcast by Netenrich
Host John Bambenek, threat researcher at Netenrich, interviews leading security experts and threat researchers on the latest cyberattacks and compromises impacting businesses today. Listeners will gain insights on proven techniques and approaches to advanced threat hunting, detection, and response. Listen in to the witty and humorous conversations backed by decades of security and SOC expertise.
2023-02-06
00 min
Changing Channels
Best of Changing Channels 2022
Changing Channels welcomed dozens of seasoned and insightful channel leaders from around the world and across the industry to share their experiences in developing modern routes to market. As we transition to the new year, Channelnomics is revisiting some of the best moments of Changing Channels over the last 12 months. We’re looking back at the deep thoughts and experiences shared by numerous industry executives, including: Rob Rae, Datto Cheryl Cook, Dell Technologies Louise McEvoy, Trend Micro Ted Schumann, Planet One (now Avant) Michelle Hodges, Ivanta (formerly of GitLab) John Dusett, Ingram Micro Cloud Lou Serlenga, Nile Dan To...
2022-12-27
23 min
Changing Channels
Netenrich’s Justin Crotty on Leveraging Data in Managed Services
Justin Crotty, senior vice president of channels at Netenrich, joins Channelnomics Changing Channels host Larry Walsh to discuss how data and device telemetry is transforming managed service delivery and value propositions. Managed services in the channel are nothing new. Partners started delivering them more than 20 years ago, augmenting and replacing their legacy break/fix support with remote monitoring and management. Increasingly, vendors — particularly legacy hardware and software vendors — are discovering the power and value of service and subscription models. Vendors want the same predictable recurring revenue that partners have generated for years. Wall Street and private...
2022-06-22
22 min
The CISO Diaries
John Bambenek - Principal Threat Hunter at Netenrich
John Bambenek - Principal Threat Hunter at Netenrich; Chief Architect of the Cyber Panopticon; Incident Handler for Internet Storm Center About John Bambenek:John Bambenek is an information security practitioner from Champaign, Illinois. As a graduate from the University of Illinois with a B.A. in Theoretical Astrophysics (emphasis in extragalactic astrophysics) and a minor in Mathematics, he has been employed as a project manager at Cap Gemini Ernst and Young, where he provided consulting services to numerous Fortune 500 firms. He continues to provide his expertise to the SANS Institute by authoring published course materials and...
2022-02-24
42 min
Cyber Work
How to become a cyber threat researcher | Guest John Bambenek
On today’s podcast, John Bambenek of Netenrich and Bambenek Consulting talks about threat research, intelligence analytics, why the same security problems are so evergreen and the importance of pitching in a little extra bit of your time and talents to make the world a bit better than you found it. – Start learning cybersecurity for free: https://www.infosecinstitute.com/free – View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast0:00 - Intro 2:45 - Getting into cybersecurity 9:40 - Threat researcher versus security researcher and threat analyst12:05 - How to get i...
2021-11-15
50 min
The CISO Diaries
Chris Morales, CISO at Netenrich - Quick Witted Veteran, Fueled by Data Analytics
About Chris Morales:We’re here this week with an AI and threat modeling guru, Chris Morales! He’s Netenrich’s FIRST CISO and Head of Security Strategy overseeing the strategic development, implementation, and market execution of the company’s security solutions and processes. Chris has 20-something years of information security experience, having previously led advisory services and security analytics for Vectra AI – while at Vectra he educated many of the Cloud Security Alliance chapter members on dissecting a Microsoft Office 365 attack. During his career, he has advised and designed incident response and threat management programs for some of the...
2021-09-23
43 min
Cyber Work
SecOps and the keys to a successful cybersecurity startup | Guest Raju Chekuri
NetOps, SecOps and CloudOps — you’ll learn about it all on today’s episode featuring Raju Chekuri, CEO of NetEnrich. Raju shares his career journey, discusses his work helping new tech and cybersecurity startups, and explains why clinging blindly to a five-year plan can be a recipe for disaster.0:00 - Intro 2:12 - Getting started in cybersecurity3:38 - How the security landscape has changed8:27 - Complexity and scope of cybersecurity10:05 - 16+ years at NetEnrich14:30 - Going beyond governance to do it right17:30 - Strategies for upping ITOps along with business22:50 - Example...
2021-01-25
47 min
Cyber Security Interviews
#101 - Brandon Hoffman: Align Security To Business Outcomes
Brandon Hoffman is the CISO & Head of Security Strategy at Netenrich. Brandon is an admired security executive responsible for Netenrich’s technical sales and security strategy for both the company and its customers. Most recently, he oversaw solution architecture for Intel 471’s dark web threat intelligence business.As former CTO at Lumeta Corporation and RedSeal Networks, Brandon led technical and field development in network security, vulnerability, and risk. He’s also held key practitioner roles focused in security architecture, penetration testing, networking, and data center operations. Brandon holds an MS degree from Northwestern University and a BS degree...
2020-11-16
38 min
Technado
Technado, Ep. 172: NetEnrich’s Brandon Hoffman
The new CISO at NetEnrich, Brandon Hoffman, was this week’s guest on Technado, where he discussed the role of the SOC in a company’s security strategy. He also shared his take on a new worm phishing campaign in the segment “Who Got Pwned.” After the break, Don and Daniel dissected Microsoft’s explanation for their Azure AD outage in “Deja News.” Finally, they talked about new x64 emulation that will help Windows on ARM, AT&T shelving DSL, OWC’s new Thunderbolt 4 hub, and leaked Windows XP code that could impact current Windows versions.
2020-10-08
49 min
Technado (Archived)
Technado, Ep. 172: NetEnrich’s Brandon Hoffman
The new CISO at NetEnrich, Brandon Hoffman, was this week’s guest on Technado, where he discussed the role of the SOC in a company’s security strategy. He also shared his take on a new worm phishing campaign in the segment “Who Got Pwned.” After the break, Don and Daniel dissected Microsoft’s explanation for their Azure AD outage in “Deja News.” Finally, they talked about new x64 emulation that will help Windows on ARM, AT&T shelving DSL, OWC’s new Thunderbolt 4 hub, and leaked Windows XP code that could impact current Windows versions.
2020-10-08
00 min
pod2112 Podcast
Episode 3: Managed Services in the Cloud Computing Era
A decade ago, managed services swept through the IT channel at precisely the right time to replace the profitability of commoditized hardware and expensive break/fix services. Today, managed services is crossing into the realm of cloud computing. No longer are resellers just monitoring and managing servers, they are facilitating and orchestrating cloud platforms, complex data migrations, hosted applications and security systems. The level of complexity is enormous, but so too is the market opportunity. Cloud computing is the next-generation of managed services. Justin Crotty, Senior Vice President Channel Sales and Marketing at NetEnrich, joins Pod2112 to discuss the...
2017-05-03
00 min