Winamp Logo
Cybersecurity: Amplified And Intensified Cover
Cybersecurity: Amplified And Intensified Profile

Cybersecurity: Amplified And Intensified

English, Social, 1 season, 87 episodes, 2 days, 11 hours, 29 minutes
About
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join us as we discuss ongoing cybersecurity incidents, trends and best practices to secure everyday life.
Episode Artwork

71 - Encrypted email and Web 3.0 with Gareth Harte of Telios

Gareth is the founder and CEO/CTO of a decentralized and encrypted email service called Telios. He's previously been a software engineer for over 13 years working in the automotive and banking industry, but in the last few years has shifted his focus towards building on the decentralized internet. This episode is available on YouTube: https://youtu.be/LRYhz8kb4rg [email protected] https://discord.gg/xaHkmga9 https://www.linkedin.com/in/gareth-harte https://telios.io Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
6/14/202244 minutes, 58 seconds
Episode Artwork

70 - Discovering and determining who owns your data

Today we're discussing where our data lives, how can we find most of it and who controls your data. This episode is available on YouTube: https://www.youtube.com/watch?v=IkPftZRMgcA Brian J. Weiss is the CEO of ITECH Solutions that provides IT Services across the United States. Brian J. Weiss https://www.linkedin.com/in/brianjweiss/ https://www.itech-solutions.com/ 00:00 - Intro 00:10 - Where is your data? 38:03 - It's 5 o'clock somewhere man 38:18 - We are Zero trust 44:12 - Crystal Reports 46:29 - Greatest podcast in the galaxy 46:40 - Get VAM'd with ITECH-Solutions.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
6/9/202247 minutes, 8 seconds
Episode Artwork

69 - White House: Cyber activity not against Russia policy

On this episode I'll share my thoughts on the recent White House announcement below. This episode is available on YouTube: https://youtu.be/EHtnyGM0TCE WASHINGTON, June 1 (Reuters) - The White House said on Wednesday that any offensive cyber activity against Russia would not be a violation of U.S. policy of avoiding direct military conflict with Russia over its invasion of Ukraine. White House press secretary Karine Jean-Pierre commented on statements from U.S. cyber command chief General Paul Nakasone, who told Sky News on Wednesday the United States has conducted a series of digital operations in support of Ukraine. https://www.reuters.com/world/white-house-cyber-activity-not-against-russia-policy-2022-06-01/ Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/   https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
6/2/20224 minutes, 49 seconds
Episode Artwork

68 - Cybersecurity Round Table May 2022

On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future, Jon Murchison and Xavier Salinas of Blackpoint Cyber and John Wetzel of Recorded Future to discuss ongoing events and incidents as they relate to cybersecurity.   This episode is available on YouTube: https://www.youtube.com/watch?v=5WspCPjlFic Check out the following podcasts.  Blackpoint Cyber https://blackpointcyber.com/resources/podcast/ Recorded Future https://therecord.media/podcast/ Matt Lee https://www.youtube.com/c/CyberMattLee Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
5/25/202258 minutes, 41 seconds
Episode Artwork

67 - CISA vs. Snake Oil

Or at least that's my analysis of CISA Alert AA22-137A It doesn't matter what fancy tools you have if you're using and configuring them incorrectly.  This episode is also available on YouTube: https://youtu.be/MJLpCTG_kqI In this episode I'm going to review CISA Alert (AA22-137A) https://www.cisa.gov/uscert/ncas/alerts/aa22-137a Weak Security Controls and Practices Routinely Exploited for Initial Access Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices and includes best practices to mitigate the issues. This advisory was coauthored by the cybersecurity authorities of the United States,[1],[2],[3] Canada,[4] New Zealand,[5],[6] the Netherlands,[7] and the United Kingdom.[8] Download the PDF version of this report (pdf, 430kb). --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
5/18/202219 minutes, 36 seconds
Episode Artwork

66 - CrowdStrike XDR with Cameron Buriani

Extended detection and response (XDR) collects threat data from previously siloed security tools across an organization’s technology stack for easier and faster investigation, threat hunting, and response. An XDR platform can collect security telemetry from endpoints, cloud workloads, network email, and more. With all of this enriched threat data filtered and condensed into a single console, XDR enables security teams to rapidly and efficiently hunt and eliminate security threats across multiple domains from one unified solution. Cameron Buriani is a Sr. Solutions Architect at CrowdStrike. This episode is available on YouTube: https://youtu.be/MOsiuzb3KBs https://www.crowdstrike.com/products/endpoint-security/falcon-xdr/ If you'd like to find out more about CrowdStrike services you can get in touch with us via [email protected] --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
5/11/202227 minutes, 53 seconds
Episode Artwork

65 - Cybersecurity Reskilling with Max Shuftan, SANS Institute

Max Shuftan is the Director, Mission Programs & Partnerships at the SANS Institute. Max leads a business unit at SANS Institute focused on (1) growing the global cybersecurity talent pipeline and increasing Diversity, Equity, and Inclusion (DEI) in the cyber workforce, and (2) fostering a stronger cybersecurity workforce through technical skills training and certification plus security awareness training of the State, Local, and Education (SLED) community. https://www.linkedin.com/in/maxwell-shuftan-3786b21a/ SANS Mission: https://www.sans.org/mission/ SANS Academies: https://www.sans.org/scholarship-academies/ SANS.edu undergraduate program: https://www.sans.edu/acs/ CyberStart America (high school program): https://www.cyberstartamerica.org/ Cyber FastTrack (college competition): https://www.cyber-fasttrack.org/ New to Cyber: https://www.sans.org/cybersecurity-careers/?msc=main-nav --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
5/4/202225 minutes, 42 seconds
Episode Artwork

64 - Inside Intel Security with Tom Garrison & Camille Morhardt

Tom Garrison is Vice President and General Manager of Client Security Strategy & Initiatives at Intel Corporation   Camille Morhadt is Director, Security Initiatives and Communications, Intel   You can listen in on their podcast at https://cybersecurityinside.com/  This episode is available on YouTube: https://www.youtube.com/watch?v=iFDfcT7lqE8 Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
4/28/202229 minutes, 52 seconds
Episode Artwork

Escalate, Exfiltrate and Encrypt - Round 15

These will be quick. I dive into questions submitted from listeners and discuss articles and/or evolving incidents. This episode is available on YouTube: https://www.youtube.com/watch?v=LzMXur-vnw0 This weeks questions; Should I invest in products or process? What threat that keeps you up at night? You’ve had a couple episodes where guest discussed how few management agents are installed. Where are you on agent count and why? Every major vendor is pushing EDR on us, should we do it? With Kaseya buying datto what are your thoughts on the vendor consolidation in the MSP industry? Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/  https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
4/26/20227 minutes, 54 seconds
Episode Artwork

63 - Remote workforce security at Zapier with Attila Török Head Of Security at Zapier

Attila started his career developing custom Linux kernels for weird hardware and built government-issued document management systems for many years, before becoming a penetration tester. Later he joined LogMeIn as the first security hire and eventually ran Security Assurance as a Director, where my core areas of focus were infrastructure security, corporate IT security, and application security. Now at Zapier, he leads the Security Zone that combines Application Security, Cloud Security, Compliance, Detection & Response and IT.   This episode is available on YouTube: https://www.youtube.com/watch?v=XRygIRKkcA4  https://www.linkedin.com/in/atorok/ https://twitter.com/zapier   Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/  --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
4/18/202230 minutes, 45 seconds
Episode Artwork

62 - Going Beyond XDR with Kiran Vangaveti

Kiran Vangaveti is currently the founder and CEO of BluSapphire Technologies. In his work life, he is a cybersecurity professional and product builder with 24+ years of experience in leading cybersecurity practices for multiple Fortune 100’s in varied industry verticals.  Today, cyber resilience is far more important than cybersecurity alone can be, and he genuinely believes that a proactive approach to defense can help organizations large and small cope with threats that emerge on a near-daily basis. Kiran’s work has given him the opportunity to interact with industry thought leaders and government agencies around the globe. https://www.blusapphire.com/ https://www.linkedin.com/in/kiranvangaveti/ This episode is available on YouTube: https://www.youtube.com/watch?v=pUz-AjRlKsg --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
4/10/202240 minutes, 40 seconds
Episode Artwork

61 - Taking care of your most valuable assets with Jason Van Camp Deliberate Discomfort Challenge

Burnout and alert fatigue are likely at an all time high with the current state of events combined with the last two plus years. OOn this episode we explore the Deliberate Discomfort Challenge as a way to help take care of our most valuable assets, our people to get back in tune with themselves and life. Jason and his team are running a Buy One Get One opportunity for the Deliberate Discomfort Challenge. Grab a body, sign up and we (Cybersecurity: Amplified and Intensified) will pay for the first ten (10) of our listeners/viewers that sign up. Available on YouTube: https://www.youtube.com/watch?v=Ov9r8uO95ko Jason B.A. Van Camp epitomizes leadership and a positive drive to excel. He has an exceptional never-quit attitude and a will to win, coupled with unique ability and desire to unlock the potential of others. He is a Forbes Business Council Member, a Wall Street Journal, Amazon, and USA Today best-selling author, a decorated Green Beret, a world traveler, and an entrepreneur. First and foremost, though, he is a dedicated husband, loving father, and loyal friend. Jason has mastered the art of storytelling that reflects many of his own life adventures. Jason was born in Washington D.C. and raised across the Potomac River in Springfield, Virginia. In 1995, Jason was accepted to the United States Military Academy at West Point. While at West Point, Jason played Linebacker for the Army Black Knights football team, served a two-year LDS Church mission to Russia, and, upon graduation, won the prestigious General Loeffke Award for Excellence in Foreign Languages. After graduating from West Point, Jason volunteered to attend U.S. Army Ranger School in Fort Benning, GA where he earned his Ranger tab in 2002. Jason then began a one year tour to Korea serving a few miles from the Demilitarized zone (DMZ) between South and North Korea. Immediately after serving in Korea, Jason was deployed with the 101st Airborne Division in the invasion of Iraq (2003). In 2006, Jason won the coveted Green Beret and began serving as a Detachment Commander with 10th Special Forces Group in Fort Carson, Colorado. During his 14 years in the U.S. Army, Jason has won numerous awards, notably the Bronze Star with V device for Valor as well as two additional Bronze Stars during numerous combat rotations as a Special Forces Detachment Commander in the Middle East and Africa. Jason then founded Mission Six Zero, a leadership consulting firm comprised of Medal of Honor recipients, U.S. Army Rangers, Navy SEALs and other Special Operations Forces team members, he founded in 2009. The company offers assessments, masterclasses, workshops, and live keynotes in a variety of industries: pharmaceutical, medical device, financial services, real estate, technology, governmental organizations (including law enforcement), as well as others. Over the past 10 years, Jason is a seasoned speaker, having given hundreds of talks to corporate conferences, trade organizations, governmental agencies, military units and youth groups. He is a proponent of Mission Six Zero’s Total Warrior (TM) model. Jason is also honored to be the Founder and Executive Director of Warrior Rising, which he started in 2015 to empower U.S. veterans and their immediate families by providing them opportunities to create sustainable businesses, perpetuate the hiring of fellow U.S. military veterans, and earn their future. Warrior Rising is a 501(c)(3) nonprofit dedicated to helping veterans achieve success in business through instruction, mentoring, funding access, and maintaining the veteran community. To date, Warrior Rising has had more than 3,000 veterans apply to its program. Audio Podcast: https://anchor.fm/amplifiedandintensified Jason Van Camp https://missionsixzero.com/ https://missionsixzero.com/challenge/ --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
4/4/202231 minutes, 43 seconds
Episode Artwork

60 - Insider threat hunting & Lapsus$ Groups tactics, techniques and procedures.

On todays episode I'm joined by Greg Linares and John Wetzel to discuss insider threats, what you should look for and how to help mitigate them.  We also discuss some of the tactics, techniques and procedures (TTPs) employed by the Lapsus$ Group over the last few months to help you build your insider threat hunting program.  The general consensus seems to be no data loss prevention (DLP) system gets you where you need to be in securing your data. Greg Linares' professional career in cybersecurity began in 2006, when he joined eEye Digital Security as a Security Researcher. During his tenure, he was accredited with the discovery of several vulnerabilities in major vendors such as Microsoft, CA, Yahoo, Bitdefender and AFLAC, as well as doing development on the Retina Network Security Scanner. Over the next several years he performed many lead roles in reverse engineering, penetration testing, malware analysis, threat intelligence, and security software development. Currently he is a heading up a security team at a Venture Capital firm in CA and has a passion for helping and supporting others at all stages in their cybersecurity career.  John Wetzel is currently the Director of Intelligence Solutions at Recorded Future. John is an experienced security intelligence leader building strategic, global teams. Hands-on technical leader passionately merging technical, business, product knowledge to achieve strategic business outcomes. Strong communicator for boards of directors and C-suite to practitioners. Previously DOD counterintelligence and compliance officer (NISPOM, ITAR, EAR) with strong relationships to federal law enforcement. Writer and speaker on cyber threat intelligence applications, insider threat programs at SANS CTI Summit, Kaspersky SAS 2019, Predict host and trainer 2016-2020. Co-author, The Security Intelligence Handbook (available on Amazon). This episode is available on YouTube: https://youtu.be/N4frDXTusBU Greg Linares https://twitter.com/laughing_mantis https://www.youtube.com/channel/UCSnNQ4Rah04sokjkLI8NAJg John Wetzel https://www.linkedin.com/in/johnawetzel https://twitter.com/johnwetzel https://recordedfuture.com  Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
3/28/202249 minutes, 59 seconds
Episode Artwork

59 - Jeremy Kirk of The Ransomware Files

On this episode Shiva Maharaj sits down with Jeremy Kirk of The Ransomware Files for expert analysis of cybersecurity, ransomware, intelligence collection, threat intelligence, cyber attacks ,cyber crime, privacy, lapsus$ group, rEvil and Kaseya and more. Jeremy Kirk is an executive editor with Information Security Media Group, a publishing company focused on computer security. He’s the creator of The Ransomware Files podcast, which tells the harrowing stories of IT pros who have fought back against ransomware, the greatest crime wave the Internet has ever seen.   This episode is available on YouTube: https://www.youtube.com/watch?v=Ysbwah8ldLM Links: https://twitter.com/ransomwarefiles https://twitter.com/Jeremy_Kirk https://anchor.fm/ransomwarefiles  Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm  --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
3/21/202239 minutes, 29 seconds
Episode Artwork

58 - Securing DNS with Peter Lowe of DNSFilter

On this episode we discuss encrypted DNS, DNS over https, Russia Cyber Warfare, Lapsus$ Group and more. Peter Lowe is the Principal Security Researcher at DNSFilter.  Peter has worked in primarily Internet focused roles throughout his career, in positions that include technical support, system administration, web development, and as Technical Director of a small company. Security has always been a passion.  This episode is also available on YouTube: https://www.youtube.com/watch?v=2S5msHMEmS4  Peter Lowe https://www.linkedin.com/in/peterlowe/ https://www.dnsfilter.com/  Brian J. Weiss https://www.linkedin.com/in/brianjweiss/ https://www.itech-solutions.com/  Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
3/16/202257 minutes, 24 seconds
Episode Artwork

57 - Daniel Stenberg Creator of cURL and libcurl

Daniel Stenberg is the founder and lead developer of cURL and libcurl. An internet protocol geek, an open source person and a developer. Daniel has been programming for fun and profit since 1985. You'll find lots of info about my various projects on these web pages and on his GitHub profile.   Daniel participates within the IETF, primarily in the HTTPbis and QUIC working groups, speaks in public every now and then.   Daniel currently works for wolfSSL doing commercial curl support. If you need help to fix curl problems, fix your app's use of libcurl, add features to curl, fix curl bugs, optimize your curl use or libcurl education for your developers... Then Daniel is your man. Contact him!   This episode is also available on YouTube: https://www.youtube.com/watch?v=sp5bYuFIi0Y Daniel Stenberg https://daniel.haxx.se/ https://twitter.com/bagder https://github.com/bagder/ https://www.twitch.tv/curlhacker  Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
3/14/202225 minutes, 36 seconds
Episode Artwork

56 - Greg Linares, cybersecurity before it became a hashtag

Greg Linares' professional career in cybersecurity began in 2006, when he joined eEye Digital Security as a Security Researcher. During his tenure, he was accredited with the discovery of several vulnerabilities in major vendors such as Microsoft, CA, Yahoo, Bitdefender and AFLAC, as well as doing development on the Retina Network Security Scanner. Over the next several years he performed many lead roles in reverse engineering, penetration testing, malware analysis, threat intelligence, and security software development. Currently he is a heading up a security team at a Venture Capital firm in CA and has a passion for helping and supporting others at all stages in their cybersecurity career.  This episode is also on YouTube: https://youtu.be/uy8_bAo9UxU Greg Linares https://twitter.com/laughing_mantis https://www.youtube.com/channel/UCSnNQ4Rah04sokjkLI8NAJg Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
3/8/202251 minutes, 45 seconds
Episode Artwork

55: PSA - Helping to secure those in need

In light of ongoing events in the Ukraine and inspired by Recorded Future and Grey Noise, we have teamed up with Dark Cubed to offer security services to company's in need to bolster security quickly and effectively. Vince Crisler https://www.linkedin.com/in/vincecrisler/ https://darkcubed.com/ Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivamm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
2/25/202216 minutes, 34 seconds
Episode Artwork

54 - Cybersecurity Round Table Vince Crisler, Matt Lee, Allan Liska and Xavier Salinas.

On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future and Xavier Salinas of Blackpoint Cyber to discuss ongoing events and incidents as they relate to cybersecurity. January 2022 Dark Cubed Webinar tomorrow Thursday February 24 2022 at 12 PM EST https://darkcubed.zoom.us/webinar/register/WN_BJ-z_J72Q06f_-XKHgT9Gg Vince Crisler https://www.linkedin.com/in/vincecrisler/ https://darkcubed.com/ Matt Lee https://cybermattlee.com https://www.twitter.com/cybermattlee https://www.linkedin.com/in/cybermattlee/ https://www.youtube.com/cybermattlee Allan Liska https://www.linkedin.com/in/allan2/ https://twitter.com/uuallan https://recordedfuture.com Jon Murchison   https://www.linkedin.com/in/jon-murchison-b92898b5/   https://www.blackpointcyber.com Xavier Salinas https://www.linkedin.com/in/xavier-salinas-security/ https://www.blackpointcyber.com Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemmvaemm  --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
2/23/202254 minutes, 52 seconds
Episode Artwork

53 - The Russians are coming. What should we expect? #Russia #Ukraine #NATO

On today's episode we discuss the potential fallout as it relates to cybersecurity and the current Ukraine situation. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
2/22/202243 minutes, 31 seconds
Episode Artwork

52 - Vendor Selection and why it's more important than you think

On today's episode we discuss Vendor Selection and why it's more important than you think.   Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor  Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
2/16/202251 minutes, 8 seconds
Episode Artwork

50 - Asset Management Matters

Asset management is mostly overlooked and garners little respect. Done right, it can save you more times than you can count. Join us as we sit down with Brian Weiss of I Tech Solutions to discuss the unsexy nature of IT hygiene. https://twitter.com/barricadecyber/status/1491821234212032512?s=20&t=pesziXKExz5nisA8Vd2QiQ Brian J. Weiss | LinkedIn https://www.linkedin.com/in/brianjweiss/ www.itech-solutions.com Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
2/9/202246 minutes, 49 seconds
Episode Artwork

49 - Cybersecurity Round Table Vince Crisler, Matt Lee, Allan Liska, Jon Murchison and John Wetzel.

On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future, Jon Murchison of Blackpoint Cyber and John Wetzel of Recorded Future to discuss ongoing events and incidents as they relate to cybersecurity. January 2022 Vince Crisler https://www.linkedin.com/in/vincecrisler/ https://darkcubed.com/ Matt Lee https://cybermattlee.com https://www.twitter.com/cybermattlee https://www.linkedin.com/in/cybermattlee/ https://www.youtube.com/cybermattlee Allan Liska https://www.linkedin.com/in/allan2/ https://twitter.com/uuallan https://recordedfuture.com Jon Murchison   https://www.linkedin.com/in/jon-murchison-b92898b5/   https://www.blackpointcyber.com John Wetzel https://www.linkedin.com/in/johnawetzel https://twitter.com/johnwetzel https://recordedfuture.com  Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemmvaemm  --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
1/26/202258 minutes, 32 seconds
Episode Artwork

48 - Actionable Disclosure Programs with Jon Murchison, Xavier Salinas, Matt Lee, Brian Weiss

On today's episode we're discussing the current issues and the best way forward to create actionable and accountable vulnerability disclosure. Jonathan Murchison, the founder and CEO of Blackpoint, started his career in Network Engineering and IT operations, but quickly made the switch to the quiet world of the intelligence community. He has since spent over twelve years planning, conducting, and executing high-priority national security missions. As a former NSA computer operations expert and IT professional, he is bringing a unique perspective to the mission of developing cyber defense software effective at detecting and detaining purposeful cyber intrusions and insider threats. Murchison holds multiple patents in methods of network analysis, defense, pattern analytics, and mobile platforms. Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has since taken on a new role as a force multiplier under Brad Fugitt as the Senior director of Security and Compliance at Pax8. He is driving the external thought leadership to empower MSPs to continue to grow in their security knowledge and operability. He lives to ensure his children maintain the same quality of life we do around technology, which is imperiled daily by threat actors. Jon Murchison https://www.linkedin.com/in/jon-murchison-b92898b5/ https://www.blackpointcyber.com Xavier Salinas https://www.linkedin.com/in/xavier-salinas-security/ https://www.blackpointcyber.com Matt Lee https://cybermattlee.com https://www.twitter.com/cybermattlee https://www.linkedin.com/in/cybermattlee/ https://www.youtube.com/cybermattlee Brian J. Weiss | LinkedIn ITECH Solutions: Overview | LinkedIn www.itech-solutions.com Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemmvaemm  --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
1/19/20221 hour, 6 minutes, 51 seconds
Episode Artwork

47 - Revil Arrested & Ukraine Under Threat

Joining us today are Matt Lee and Gerald Auger to discuss the recent actions against REvil and Ukraine under threat.   Dr. Auger is a 15+ year cybersecurity professional, academic, and author. He has been the cybersecurity architect at MUSC, a multi-billion dollar academic medical center. He is currently a partner in a cybersecurity consulting firm, adjunct faculty at The Citadel Military College, and chief content creator of the successful YouTube channel SimplyCyber where he aims to bring Cybersecurity Education At Scale. Dr. Auger holds a PhD in cyber operations and two Masters in Computer Science and Information Assurance. Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has since taken on a new role as a force multiplier under Brad Fugitt as the Senior director of Security and Compliance at Pax8. He is driving the external thought leadership to empower MSPs to continue to grow in their security knowledge and operability. He lives to ensure his children maintain the same quality of life we do around technology, which is imperiled daily by threat actors. Matt Lee https://cybermattlee.com https://www.twitter.com/cybermattlee https://www.linkedin.com/in/cybermattlee/ https://www.youtube.com/cybermattlee Gerald Auger Ph.D. https://www.linkedin.com/in/geraldauger/ https://www.youtube.com/c/GeraldAuger Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor  Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemmvaemm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
1/18/202241 minutes, 59 seconds
Episode Artwork

46 - Cybersecurity Education At Scale with Dr. Gerald Auger Ph.D.

Dr. Auger is a 15+ year cybersecurity professional, academic, and author. He has been the cybersecurity architect at MUSC, a multi-billion dollar academic medical center. He is currently a partner in a cybersecurity consulting firm, adjunct faculty at The Citadel Military College, and chief content creator of the successful YouTube channel SimplyCyber where he aims to bring Cybersecurity Education At Scale. Dr. Auger holds a PhD in cyber operations and two Masters in Computer Science and Information Assurance. https://www.linkedin.com/in/geraldauger/ https://www.youtube.com/c/GeraldAuger https://twitter.com/Gerald_Auger https://simplycyber.io Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemmvaemm  --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
1/18/202235 minutes, 45 seconds
Episode Artwork

45 - FBI warns FIN7 BadUSB attacks and Yealink calling home

The FIN7 ransomware group has been sending malware laden BadUSB devices to targets in the United States. https://therecord.media/fbi-fin7-hackers-target-us-companies-with-badusb-devices-to-install-ransomware/ Yealink phones are communicating with Chinese based servers three times a day and are able to review and log all network traffic flowing through the headset. https://www.defenseone.com/technology/2022/01/common-office-desk-phone-could-be-leaking-info-chinese-government-report-alleges/360500/ 0:00 - Intro 0:38 - Yealink handsets calling home to Chinese servers 4:20 - Mitigating Yealink concerns 8:55 - FIN7 sending LilyGo branded malware laden BadUSB drives to American companies and agencies 12:00 - How to mitigate these two threats 21:36 - Outro Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemmvaemm  --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
1/11/202222 minutes, 19 seconds
Episode Artwork

44 - Bypassing Defender with DumpStack.log and Mimikatz

On this episode Eric shows us how to bypass Microsoft Windows Defender with DumpStack log and Mimikatz.   Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor  Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
1/7/20228 minutes, 13 seconds
Episode Artwork

43 - Strategies to help prevent ransomware.

This episode is meant to spark ideas, stimulate thoughts and hopefully leave you with more questions than answers As you prepare your company for an incident or ransomware event.  Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/  https://www.buymeacoffee.com/shivaemm  --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
12/27/20217 minutes, 27 seconds
Episode Artwork

42 - Avoiding Predatory Vendor Practices

We've all been there, vendors overpromising, underdelivering and tucking tail to run when confronted. This episode is meant to peel back how we deal with all vendors, and hopefully you can pick up a thing or three. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/  https://www.buymeacoffee.com/shivaemm  --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
12/20/202127 minutes, 26 seconds
Episode Artwork

Khonsari Ransomware exploiting Log4J/Log4Shell with Allan Liska, CSIRT at Recorded Future - Escalate, Exfiltrate & Encrypt - Round 15

On today's episode Allan Liska of Recorded Future digs into the Khonsari Ransomware sample Eric submitted to Hybrid Analysis. https://www.hybrid-analysis.com/sample/f2e3f685256e5f31b05fc9f9ca470f527d7fdae28fa3190c8eba179473e20789 Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the coauthor of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion. Allan Liska https://www.linkedin.com/in/allan2/ https://twitter.com/uuallan https://recordedfuture.com Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/  https://www.buymeacoffee.com/shivaemm  --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
12/17/202115 minutes, 52 seconds
Episode Artwork

Episode #41 - Incident Response Planning with Matt Lee

Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has since taken on a new role as a force multiplier under Brad Fugitt as the Senior director of Security and Compliance at Pax8. He is driving the external thought leadership to empower MSPs to continue to grow in their security knowledge and operability. He lives to ensure his children maintain the same quality of life we do around technology, which is imperiled daily by threat actors.   Matt Lee https://cybermattlee.com https://www.twitter.com/cybermattlee https://www.linkedin.com/in/cybermattlee/ https://www.youtube.com/cybermattlee Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Have questions about CrowdStrike and/or Dark Cubed or just want to have a conversation? Please feel free to get in touch with us. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
12/13/202146 minutes, 43 seconds
Episode Artwork

Mobile Security - Escalate, Exfiltrate & Encrypt - Round 14

On today's episode we are joined by Jonathan Scott, James Donaldson of CopperheadOS and Haseeb Awan of EFANI to discuss mobile security. Copperhead is a cyber-security firm specializing in securing mobility solutions. Our product, CopperheadOS, is a secure Android available for Pixel devices in various deployments. https://copperhead.co/android/ Haseeb Awan is CEO of EFANI Secure Mobile Service. He co-founded one of the first & largest bitcoin ATM networks in the world. He has been featured on NYT, WSJ, CoinDesk, TechCrunch, Mashable, Hulu & dozens of international media. Efani is the  self proclaimed most secure mobile service provider that guarantees protection against SIM-Swaps, and encrypts personal information with $5m of insurance to back it up.  Their basic SAFE plan offers unlimited voice, data & SMS, with 11- layers of proprietary verification to protect from hackers accessing your personal, business and financial assets.  Efani also offers a premium Black Seal plan with additional security & privacy features and will be offered in 80 countries in early 2022. https://efani.com Jonathan Scott is an American Phone & Cloud Hacker, founder of @haktree and @spyware_wiki.  Human & Woman's Rights - Free Speech Activist Lead and currently the lead Mobile Pen-Tester for @cLabs. https://twitter.com/jonathandata1 https://0hak.com github.com/jonathandata1 https://youtube.com/jonathandata1 https://twitter.com/spyware_wiki https://twitter.com/haktree https://www.buymeacoffee.com/jonathandata1 Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/  https://www.buymeacoffee.com/shivaemm If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
12/9/20211 hour, 32 minutes, 50 seconds
Episode Artwork

Episode #40 - Incident Response Orchestration with Maxime Lamothe-Brassard of LimaCharlie.io

As part of the Canadian Intelligence apparatus, Maxime worked in positions ranging from development of cyber defense technologies through Counter Computer Network Exploitation and Counter Intelligence. Maxime led the creation of an advanced cyber security program for the Canadian government and received several Director’s awards for his service. After leaving the government, Maxime provided direct help to private and public organizations in matters of cyber defense and worked for CrowdStrike, Google and Google X. Maxime left Google X - where he was a founding member of Chronicle Security - in 2018 to found LimaCharlie. Maxime Lamothe-Brassard https://www.linkedin.com/in/maximelb/ https://limacharlie.io/ Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Have questions about CrowdStrike and/or Dark Cubed or just want to have a conversation? Please feel free to get in touch with us. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
12/6/20211 hour, 2 minutes, 53 seconds
Episode Artwork

Episode 39 - It is what it is. #DarkCubed

This video episode is available on Spotify and YouTube. On today's episode; EMOTET brought to you by LOCKBIT 2.0 Cybersecurity doesn't want Ransomware to go away Don't buy into the FUD MEAL Team SIX is on the case Every day is a day to look out for Ransomware attacks E-Commerce Linux servers hacked with shells PHISH and OSINT Targeting Packages by Russia, China, North Korea, Iran and more Chinese and Russian hackers are collaborating with each other General Nakasone of the Nation Security Agency (NSA) calls for collaboration between Public and Private sector companies Slash and burn with parallel construction to raise the tide Defense Industrial Base (DIB) security is at times insufficient and ineffective by nature CISA should create a site to report critical infrastructure and key resource companies with security failures CISA making stride to attract top talent President Biden's Executive Order from May 12 2021 Put Oprah in charge of MFA roll-out Dark Cubed identifies potentially malicious IP addresses from Linode and Digital Ocean VPN zero day vulnerabilities Lack of log visibility in applications MFA on local Administrator accounts Local Municipalities will plug anything into their CJIS connected systems and email admin credentials Eric is all in on SANS courses to improve his skill sets Are acronyms at the end of your name really worth it Eric starts poking at mobile devices thanks to Jonathan Scott Cell phones are insecure by nature despite using Signal, Telegram, WhatsApp and other encrypted chat applications META will be PALANTIR on steroids Enragement = Engagement This weeks movie pick: A Few Good Men Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com https://www.buymeacoffee.com/erictaylor Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Have questions about CrowdStrike and/or Dark Cubed or just want to have a conversation? Please feel free to get in touch with us. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
11/29/202144 minutes, 43 seconds
Episode Artwork

Episode 37 - PEGASUS ID and more with Jonathan Scott

Buy Eric a Coffee Eric Taylor is Educating folks around cyber security Buy Shiva a Coffee IT support that's actually supportive. Jonathan Scott is an American Phone & Cloud Hacker, founder of @haktree and @spyware_wiki.  Human & Woman's Rights - Free Speech Activist Lead and currently the lead Mobile Pen-Tester for @cLabs. https://twitter.com/jonathandata1 https://0hak.com github.com/jonathandata1 https://youtube.com/jonathandata1 https://twitter.com/spyware_wiki https://twitter.com/haktree https://www.buymeacoffee.com/jonathandata1 Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/  If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
11/26/20211 hour, 32 minutes, 28 seconds
Episode Artwork

Episode 38 - Remote Monitoring & Management with David Weeks of N-Able

David Weeks is the senior director of partner experience for N-able. Weeks works side-by-side with top-performing N-Able MSPs and their global partner community. A big part of his role is to listen and engage with our partners so that we better understand their needs, share ideas more freely, and provide valuable insight into the current market conditions. Weeks also offers strategic sales and marketing recommendations along with tactical initiatives for N-able and externally to help partners and the wider market identify new trends and revenue opportunities.  As a regular presenter at global, and regional events, he is all in on helping our partners scale their success and serve as the world’s best MSPs. Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/  If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security   Buy Shiva a Coffee IT support that's actually supportive.  --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
11/22/202144 minutes, 12 seconds
Episode Artwork

The US Ransomware Response and CMMC with Vince Crisler - Escalate, Exfiltrate & Encrypt - Round 13

Today we're joined by Vince Crisler to discuss recent US actions against ransomware and the evolution of CMMC. Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused on innovative solutions for small and midsize companies. He is on the IT Security Executive Council for CompTIA, the Executive Committee for the CompTIA ISAO, and a member of Embry-Riddle Aeronautical University's Worldwide Industry Advisory Board. Prior to founding Dark Cubed, Co-Founded Fortalice Solutions, an innovative cyber security consulting company that supported Fortune 500 and Government Agencies.  Crisler previously supported the Department of Homeland Security (DHS) and Sandia National Laboratories in the development of cyber security protection programs to defend the networks of Federal Departments and Agencies, as well as those belonging to critical infrastructure and key resources (CI/KR) owners and operators. Crisler was the primary author for the five-year technical vision for the National Cybersecurity Protection System, a $3B cyber security program within DHS.  He was also a co-author of the DHS Enhanced Cyber Services (ECS) Program, establishing a critical cyber security information-sharing program, which was formally announced in Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity.   Crisler also served as the CISO for the White House's Executive Office of the President and was responsible for the creation of the first ever cyber security operations center to protect White House networks.   Prior to the White House, Crisler served in the United States Air Force in organizations to include the White House Communications Agency, the National Military Command Center in the Pentagon, and Ramstein Air Base in Germany.  Crisler earned a Bachelor of Science in Computer and Information Science from the Ohio State University and a Master of Science in Management from Embry Riddle Aeronautical University.  He currently lives in the Washington D.C. area. Vince Crisler https://www.linkedin.com/in/vincecrisler/ https://darkcubed.com/ Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security   Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
11/12/202133 minutes, 54 seconds
Episode Artwork

Episode 36 - Allan Liska, CSIRT at Recorded Future - Ransomware & Incident Response

Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the coauthor of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.Allan Liskahttps://www.linkedin.com/in/allan2/https://twitter.com/uuallanhttps://recordedfuture.comEric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
11/8/202149 minutes, 54 seconds
Episode Artwork

Escalate, Exfiltrate & Encrypt - Round 12

These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.Eric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber security.Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
11/5/202129 minutes, 54 seconds
Episode Artwork

Episode 35 - Bob Henderson with Intelligence Services Group

Bob Henderson is the founder and CEO of Intelligence Services Group.Bob's innate purpose for defending and protecting people led them to form ISG.Intelligence Services Group understands companies are facing criminal entities, rogue nation states, internal threats and everyday attempts or carelessness which causes harm and puts their data at risk. Their intelligence/law enforcement DNA allows us to think differently and offers a unique approach to helping their clients.Bob Hendersonhttps://www.linkedin.com/in/bobwhnj/Eric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
11/1/202144 minutes, 47 seconds
Episode Artwork

Escalate, Exfiltrate & Encrypt - Round 11

These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.Eric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/Robert Nelsonhttps://www.linkedin.com/in/robert-nelson-45b1342/https://twitter.com/techplanet4uhttps://techplanetnow.com If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
10/29/202132 minutes, 6 seconds
Episode Artwork

Episode 34 - Cybersecurity basics.

We spent the last couple weeks going through all of our tools and systems in an effort to find weaknesses. This is what we learned.Eric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
10/25/202137 minutes, 53 seconds
Episode Artwork

Episode 33 - Vulnerability Disclosure Programs (VDP) with Matt Lee

Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has since taken on a new role as a force multiplier under Brad Fugitt as the Senior director of Security and Compliance at Pax8. He is driving the external thought leadership to empower MSPs to continue to grow in their security knowledge and operability. He lives to ensure his children maintain the same quality of life we do around technology, which is imperiled daily by threat actors.Matt Leehttps://cybermattlee.comhttps://www.twitter.com/cybermattleehttps://www.linkedin.com/in/cybermattlee/https://www.youtube.com/cybermattleeEric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
10/18/202145 minutes, 10 seconds
Episode Artwork

Episode 32 - Ransomware recourse.

After a one week hiatus Eric and Shiva are back discussing what needs to be done to bring meaningful and lasting change to our security posture. Articles referenced are listed below.https://www.bleepingcomputer.com/news/security/us-unites-30-countries-to-disrupt-global-ransomware-attacks/https://therecord.media/two-members-of-a-ransomware-gang-were-arrested-in-ukraine-following-a-joint-international-law-enforcement-operation/https://securityaffairs.co/wordpress/122892/cyber-crime/e-m-i-t-aviation-consulting-ransomware.htmlhttps://www.theregister.com/2021/10/01/amnesty_website_impersonator_trojan_pegasus/Eric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
10/11/202149 minutes, 30 seconds
Episode Artwork

Escalate, Exfiltrate & Encrypt - Round 10

Steve Taylor runs an MSP while podcasting at The RocketMSP Podcast with new episodes being released weekly. The RocketMSP podcast interviews great guests from around the industry while having some fun along the way! You can also find Steve in the RocketMSP peer community, coaching MSP business owners through changes to operate a more successful company.https://www.rocketmsp.io These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.https://www.cyberscoop.com/fin12-mandiant-hospitals-300-million/https://therecord.media/nsa-chief-predicts-u-s-will-face-ransomware-every-single-day-for-years-to-comehttps://www.nextgov.com/cybersecurity/2021/10/national-cyber-adviser-lays-out-goals-upcoming-30-nation-meeting-ransomware/185867/https://thehackernews.com/2021/10/us-justice-dept-launches-civil-cyber.htmlEric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
10/8/202131 minutes, 13 seconds
Episode Artwork

Episode 31 - Security and compliance guidelines with Vince Crisler

Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused on innovative solutions for small and midsize companies. He is on the IT Security Executive Council for CompTIA, the Executive Committee for the CompTIA ISAO, and a member of Embry-Riddle Aeronautical University's Worldwide Industry Advisory Board.Prior to founding Dark Cubed, Co-Founded Fortalice Solutions, an innovative cyber security consulting company that supported Fortune 500 and Government Agencies.  Crisler previously supported the Department of Homeland Security (DHS) and Sandia National Laboratories in the development of cyber security protection programs to defend the networks of Federal Departments and Agencies, as well as those belonging to critical infrastructure and key resources (CI/KR) owners and operators. Crisler was the primary author for the five-year technical vision for the National Cybersecurity Protection System, a $3B cyber security program within DHS.  He was also a co-author of the DHS Enhanced Cyber Services (ECS) Program, establishing a critical cyber security information-sharing program, which was formally announced in Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity.  Crisler also served as the CISO for the White House's Executive Office of the President and was responsible for the creation of the first ever cyber security operations center to protect White House networks.  Prior to the White House, Crisler served in the United States Air Force in organizations to include the White House Communications Agency, the National Military Command Center in the Pentagon, and Ramstein Air Base in Germany.  Crisler earned a Bachelor of Science in Computer and Information Science from the Ohio State University and a Master of Science in Management from Embry Riddle Aeronautical University.  He currently lives in the Washington D.C. area. Vince Crislerhttps://www.linkedin.com/in/vincecrisler/https://darkcubed.com/ Eric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
9/27/202146 minutes, 57 seconds
Episode Artwork

Allstate to block Datto, Ninja RMM and Kaseya - Escalate, Exfiltrate & Encrypt - Round 9

It would appear Allstate has decided to block RMM platforms from Datto, Ninja and Kaseya effective September 27th without any clear indication as to why.https://www.reddit.com/r/msp/comments/pte6av/allstate_to_block_datto_rmm_ninja_and_kaseya/Eric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
9/23/202123 minutes, 23 seconds
Episode Artwork

Episode 30 - COVID-19 and its effect on cybersecurity with Scott Davis

Scott is an innovative senior technology professional with over twenty years in leading IT infrastructure and network security compliance for businesses of all sizes, including six years in managed services. Scott has in-depth knowledge of multi-year business continuity planning, cybersecurity planning, technology documentation, workflow design, project management, and network design. Scott’s background and knowledge of PCI-DSS, HIPAA, NIST, GDPR, CIS Controls, CCPA and other state breach notification laws allows Scott the ability to quickly identify and develop a plan to bring organizations to compliance quickly. Scott is currently a Sales Engineer with Liongard, a Adjunct Professor with NuPaths, and Scott also produces and records a twice a week video podcast, called The Morning Breach.Scott Davishttps://www.linkedin.com/in/scottrdavispa/https://twitter.com/scottrdavishttps://themorningbreach.com/Eric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
9/20/202157 minutes, 42 seconds
Episode Artwork

Escalate, Exfiltrate & Encrypt - Round 8

These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.https://www.theregister.com/2021/09/15/grief_corp_ransomware_negotiator_rage/https://threatpost.com/revil-sodinokibi-ransomware-universal-decryptor/169498/https://threatpost.com/azure-zero-day-supply-chain/169508/https://www.microsoft.com/security/blog/2021/09/15/analyzing-attacks-that-exploit-the-mshtml-cve-2021-40444-vulnerability/https://techcommunity.microsoft.com/t5/exchange-team-blog/how-to-update-ad-schema-to-address-cve-2021-34470-if-exchange-is/ba-p/2617083Eric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
9/17/202129 minutes, 38 seconds
Episode Artwork

Episode 29 - Identifying NSO Pegasus breaches with CrowdStrike Mobile - Cameron Buriani

Recorded September 6, 2021On this episode we discuss using CrowdStrike tools to identify and help mitigate mobile and USB borne attacks.https://github.com/AmnestyTech/investigationsCameron Buriani is a cyber security professional who works as a Senior Solutions Architect at Crowdstrike over 3 years now. Over the last two years , he’s dedicated his efforts to building out the Crowdstrike MSSP offering from the ground up to the full blown solution it is today. In his spare time, he works on his land in Texas raising livestock, growing annual crops, and working the peach orchard with his Wife and Daughter. Eric Taylor | LinkedInTwitter: barricadecyberwww.barricadecyber.comShiva Maharaj | LinkedInTwitter: kontinuummspwww.kontinuum.com   If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
9/13/202131 minutes, 59 seconds
Episode Artwork

Escalate, Exfiltrate & Encrypt - Round 7

Shiva and Eric will talk about the latest Pax8 incident and the response that they have given. Eric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
9/11/202114 minutes, 34 seconds
Episode Artwork

Escalate, Exfiltrate & Encrypt - Round 6

These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.https://securityaffairs.co/wordpress/121985/cyber-crime/groove-gang-fortinet-leaks.htmlhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444https://securityintelligence.com/posts/lockbit-ransomware-attacks-surge-affiliate-recruitment/Eric Taylorhttps://www.linkedin.com/in/ransomware/https://twitter.com/barricadecyberhttps://www.barricadecyber.comShiva Maharajhttps://www.linkedin.com/in/shivamaharajhttps://twitter.com/kontinuummsphttps://www.kontinuum.com/If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
9/10/202118 minutes, 20 seconds
Episode Artwork

Episode 28 - Cyber Insurance & Loss Prevention with Joseph Brunsman

Joseph Brunsman joined the cyber and professionally liability realm in 2015 after serving as a Lieutenant in the United States Navy, working as an Anti-Terrorism / Force Protection Officer responsible for a billion dollars of equipment and 280+ military personnel. Prior to that he served tours as a Combat Information Center Officer and an Electronic Warfare Officer. During his enlisted time he was an Information Systems Technician dealing with Unix database management and network security. Joseph is a 2003 graduate of New Mexico Military Institute and a 2010 graduate of the U.S. Naval Academy in Annapolis, MD where he obtained a degree in Systems Engineering with a focus on robotics system interoperability. He is the resident expert in cyber law, insurance and compliance—writing 2 consecutive books on the subject.  He enjoys Jiu-Jitsu, powerlifting, business theory, and biohacking. Joseph Brunsman  www.youtube.com/josephbrunsman https://www.thebrunsgroup.com/ www.thebrunsgroup.com/book2 Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security   Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
9/6/20211 hour, 29 minutes, 18 seconds
Episode Artwork

Unpacking the tech and gear left in Afghanistan. Escalate, Exfiltrate & Encrypt - Round 5

On todays episode we're joined by John Wetzel the Director of Intelligence Solutions at Recorded Future and we discuss: Technology and gear left in Afghanistan, ARM chips and more. John is an experienced security intelligence leader building strategic, global teams. Hands-on technical leader passionately merging technical, business, product knowledge to achieve strategic business outcomes. Strong communicator for boards of directors and C-suite to practitioners. Previously DOD counterintelligence and compliance officer (NISPOM, ITAR, EAR) with strong relationships to federal law enforcement. Writer and speaker on cyber threat intelligence applications, insider threat programs at SANS CTI Summit, Kaspersky SAS 2019, Predict host and trainer 2016-2020. Co-author, The Security Intelligence Handbook (available on Amazon). John Wetzel https://www.linkedin.com/in/johnawetzel https://recordedfuture.com https://twitter.com/johnwetzel Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security   Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
9/3/20211 hour, 28 seconds
Episode Artwork

Episode 27 - Training with James McQuiggen of KnowBe4

James is Security Awareness Advocate is responsible for amplifying messaging related to the importance of, effectiveness of, and the need for security awareness and training within organizations through social media, webinars, in-person presentations, industry trade shows and traditional media outlets. Information Security Awareness: manage Internal Awareness Program to inform and provide training to enterprise employees through department experts in the areas of Phishing, Intellectual Property Classification, Data Protection, Information Security Policies, and Workstation Audits. Training: create training programs in various aspects of Information Security. Training programs used throughout the business for Customs Transport Awareness, Security Awareness, Physical Security and Internal Processes. Project Management and coordination across multiple sectors and departments within the organization relating to Product & Solution Security, governance and NERC CIP standards. NERC Compliance: provide internal and external customer support in the areas of the North American Electric Reliability Corporation (NERC) Critical Infrastructure Program (CIP). Support areas include Policy Creation, contract negotiation, Application Support Compliance, and Training. James McQuiggan https://www.linkedin.com/in/jmcquiggan/ https://twitter.com/james_mcquiggan https://www.knowbe4.com/ Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security. Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
8/30/202150 minutes, 46 seconds
Episode Artwork

Escalate, Exfiltrate & Encrypt - Round 4

These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. President Biden meets with top tech CEO's.  https://www.whitehouse.gov/briefing-room/statements-releases/2021/08/25/fact-sheet-biden-administration-and-private-sector-leaders-announce-ambitious-initiatives-to-bolster-the-nations-cybersecurity/ U.S. to work with Big Tech, finance sector on new cybersecurity guidelines https://www.reuters.com/world/us/cyber-threats-top-agenda-white-house-meeting-with-big-tech-finance-executives-2021-08-25/ Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security. Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
8/27/202129 minutes, 24 seconds
Episode Artwork

Escalate, Exfiltrate & Encrypt - Round 3

These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. State Department potentially hacked. https://gizmodo.com/the-state-department-has-reportedly-been-hacked-1847536299 Virginia Defense Force data leaked. https://twitter.com/vxunderground/status/1429185341194444805 Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security. Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
8/23/202120 minutes, 2 seconds
Episode Artwork

Episode 26 - Matthé Smit Director of Product Management, Datto RMM

As Director of Product Management for RMM, Matthé is responsible for driving the RMM product roadmap and managing the product management team. He plays a critical role in making Datto RMM one of the most scalable remote management platforms in the world. Over the last 15 years, Matthé has exclusively worked in the managed services market working for leading software vendors. Having worked with countless MSPs across the world, Matthé has a deep understanding of the space and a strong focus on finding simple solutions to complex technical problems. Matthé is located in Amsterdam, Netherlands. Matthé Smit https://www.linkedin.com/in/matthe/ https://twitter.com/matthesmit https://datto.com Brian J. Weiss https://www.linkedin.com/in/brianjweiss https://twitter.com/bweiss805 www.itech-solutions.com Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security. Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
8/23/20211 hour, 7 minutes, 41 seconds
Episode Artwork

Elevate, Exfiltrate & Encrypt - Round 2

These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents. https://www.bleepingcomputer.com/news/security/cisco-won-t-fix-zero-day-rce-vulnerability-in-end-of-life-vpn-routers https://www.bleepingcomputer.com/news/security/chase-bank-accidentally-leaked-customer-info-to-other-customers/ https://www.govinfosecurity.com/banking-groups-object-to-breach-notification-bill-provisions-a-17312 https://www.inforisktoday.com/does-abandoning-embassy-in-kabul-pose-cybersecurity-risks-a-17309 Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security. Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
8/20/202122 minutes, 38 seconds
Episode Artwork

Episode 25 - Threat Intelligence with John Wetzel of Recorded Future.

John Wetzel is currently the Director of Intelligence Solutions at Recorded Future. John is an experienced security intelligence leader building strategic, global teams. Hands-on technical leader passionately merging technical, business, product knowledge to achieve strategic business outcomes. Strong communicator for boards of directors and C-suite to practitioners. Previously DOD counterintelligence and compliance officer (NISPOM, ITAR, EAR) with strong relationships to federal law enforcement. Writer and speaker on cyber threat intelligence applications, insider threat programs at SANS CTI Summit, Kaspersky SAS 2019, Predict host and trainer 2016-2020. Co-author, The Security Intelligence Handbook (available on Amazon). John Wetzel https://www.linkedin.com/in/johnawetzel https://recordedfuture.com https://twitter.com/johnwetzel Eric Taylor https://www.linkedin.com/in/ransomware/ https://twitter.com/barricadecyber https://www.barricadecyber.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security. Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
8/16/202148 minutes, 19 seconds
Episode Artwork

Episode 24 - Where is the risk?

On this episode we dig into where responsibility and accountability, compromised hardware beaconing, Senators lobbying for APT's, defining a breach with two words, how much should you have to push your vendors security development, zero knowledge and more. Eric Taylor | LinkedIn  Twitter: barricadecyber  www.barricadecyber.com  Shiva Maharaj | LinkedIn  Twitter: kontinuummsp  www.kontinuum.com    Brian J. Weiss | LinkedIn Twitter: bweiss805 www.itech-solutions.com  Robert Nelson | LinkedIn Twitter: techplanet4u techplanetnow.com  If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
8/9/202155 minutes, 18 seconds
Episode Artwork

Elevate, Exfiltrate & Encrypt - Round 1

These will be quick. We dive into questions submitted from listeners and/or evolving incidents.  Lockbit 2.0 is seeking to leverage insider threats.  Conti TTP’s are leaked.  If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security. Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
8/6/202132 minutes, 35 seconds
Episode Artwork

Episode 23 - Stopping breaches with Crowdstrike’s Cameron Buriani.

The best way to stop an encryption incident is by stopping the breach. Cameron Buriani is a cyber security professional who works as a Senior Solutions Architect at Crowdstrike over 3 years now. Over the last two years , he’s dedicated his efforts to building out the Crowdstrike MSSP offering from the ground up to the full blown solution it is today.  In his spare time, he works on his land in Texas raising livestock, growing annual crops, and working the peach orchard with his Wife and Daughter.   Eric Taylor | LinkedIn Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com   If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
8/2/202148 minutes, 23 seconds
Episode Artwork

Episode 22 - Peeling an XDR onion with Jimmy Hatzell.

James Hatzell is a channel marketing professional with hands on experience in IT and cybersecurity. As Director of Marketing for SKOUT Cybersecurity, James uses his technical and marketing knowledge to build content and tools to help MSPs sell cybersecurity as a service. Prior to his time at SKOUT, James served as the CTO for a healthcare start-up and holds degrees in both Information Sciences and Cybersecurity from Penn State UniversityAnd that is how an IT Guy who went to college for cybersecurity ends up in marketing.Jimmy Hatzell | LinkedIn Twitter: JimmyHatzell Home | SKOUT Cybersecurity (getskout.com) Eric Taylor | LinkedInTwitter: barricadecyberwww.barricadecyber.comShiva Maharaj | LinkedInTwitter: kontinuummspwww.kontinuum.com   Brian J. Weiss | LinkedInTwitter: bweiss805www.itech-solutions.com BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
7/26/202158 minutes, 30 seconds
Episode Artwork

Episode 21 - Tides of change with Dave Sobel.

Dave is the host of the Business of Tech podcast, and owner of MSP Radio. Dave is regarded as a leading expert in the delivery of technology services, with broad experience in both technology and business. He owned and operated an IT Solution Provider and MSP for over a decade, both acquiring other organizations and eventually being acquired. This firm was a winner of multiple awards, including being a finalist for Microsoft’s Worldwide Partner of the Year in the Small Business Specialist category. After his MSP experience, he has worked for multiple vendors at such companies as Level Platforms, GFI, LogicNow, and SolarWinds, leading community, event, marketing, and product strategies, as well as several M&A activities.Dave Sobel | LinkedInHome - MSP Radio: The Voice of the Solution ProvidersEric Taylor | LinkedIn Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com   Brian J. Weiss | LinkedInTwitter: bweiss805www.itech-solutions.com BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
7/19/20211 hour, 26 minutes, 53 seconds
Episode Artwork

Episode 20 - Understated or Overblown: A Kaseya saga.

On this episode Brian Weiss and Robert Nelson join us to discuss how the Kaseya incident has affected its MSP customers and their customers, the failings of most compliance regimes, Kaseya choosing Fire Eye over its own recent acquisition Rocket Cyber and the effects of this incident on Municipalities whose providers use Kaseya on CJIS regulated systems and data.  Eric Taylor | LinkedIn  Twitter: barricadecyber  www.barricadecyber.com  Shiva Maharaj | LinkedIn  Twitter: kontinuummsp  www.kontinuum.com    Brian J. Weiss | LinkedIn Twitter: bweiss805 www.itech-solutions.com  Robert Nelson | LinkedIn Twitter: techplanet4utechplanetnow.com BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
7/12/20211 hour, 14 minutes, 10 seconds
Episode Artwork

Episode 19 - Unpacking the Kaseya VSA incident.

On this episode we’re joined by Brian Weiss, Founder of ITech Solutions as we unpack the third REvil and Kaseya incident that began Friday July 2nd 2021. Despite Kaseya VSA not being FedRAMP, by it’s own disclosure VSA was being used by Federal Agencies. While details continue to emerge we're getting the outline of what may have caused potentially over one million computers to have been encrypted and an initial ransom request for 70 millions dollars. Eric Taylor | LinkedInTwitter: barricadecyberwww.barricadecyber.comShiva Maharaj | LinkedInTwitter: kontinuummspwww.kontinuum.com   Brian J. Weiss | LinkedInITECH Solutions: Overview | LinkedInwww.itech-solutions.com Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
7/5/20211 hour, 27 seconds
Episode Artwork

Episode 18 - Building trust without trust.

On this episode we begin to talk about the difference between zero trust and zero knowledge, ransomware groups going dark for the moment and recent tactics and techniques.Eric Taylor | LinkedInTwitter: barricadecyberwww.barricadecyber.comShiva Maharaj | LinkedInTwitter: kontinuummspwww.kontinuum.com   BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
6/28/202138 minutes, 42 seconds
Episode Artwork

Episode 17 - No one cares.

Taxing ransom payments to help secure companies, why legacy systems and are low hanging fruit and incident response. Eric Taylor | LinkedInTwitter: barricadecyberwww.barricadecyber.comShiva Maharaj | LinkedInTwitter: kontinuummspwww.kontinuum.com   BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
6/23/202155 minutes, 45 seconds
Episode Artwork

Episode 16 - Tactics and techniques with Brian Weiss.

On this episode we are joined by Brian Weiss to discuss ransomware groups going dark, REvil making its presence known, vulnerability management, back-up and disaster recovery and setting up your cybersecurity team for success. Eric Taylor | LinkedInTwitter: barricadecyberPodcast Episode #16 - Tactics, techniques and ransomware with Brian Weiss. - YouTubewww.barricadecyber.comShiva Maharaj | LinkedInTwitter: kontinuummspwww.kontinuum.com   Brian J. Weiss | LinkedInITECH Solutions: Overview | LinkedInwww.itech-solutions.com Articles referenced;Avaddon ransomware shuts down and releases decryption keys (bleepingcomputer.com)JBS paid $11 million to REvil ransomware, $22.5M first demanded (bleepingcomputer.com)REvil Hits US Nuclear Weapons Contractor: Report | ThreatpostUS-based organizations are under constant ransomware attacks (pandasecurity.com)BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
6/16/20211 hour, 47 seconds
Episode Artwork

Episode 15 - Fear-mongering and ransomware.

On this episode we discuss the need to focus on security despite what compliance wants and dictates, CISO’s unrelenting quest for help from the government, the colonial pipeline and the fundamental lack of security employed by companies.  Eric Taylor | LinkedIn Twitter: barricadecyber Podcast Episode #15 - Talking more about Colonial Pipeline and Ransomware - YouTubewww.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com   Articles Referenced;Hackers Breached Colonial Pipeline Using Compromised VPN Password (thehackernews.com)New Evil Corp ransomware mimics PayloadBin gang to evade US sanctions (bleepingcomputer.com)Ransomware response: What CISOs really want from the federal government | CSO OnlineRansomware attacks are closing schools, delaying chemotherapy and derailing everyday life - Anchorage Daily News (adn.com)Revenge of the SaaS: Mandiant uses services to escape FireEye - TechRepublicBuy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
6/9/202138 minutes, 40 seconds
Episode Artwork

Episode 14 - Operating effectively with Todd Kane.

Todd Kane has spent over a decade creating a management framework that has resulted in massive value for the companies he has worked with. Millions in higher margin projects/operations, millions in saved cash reducing employee turnover, and massive increases in team morale.Todd has led groups for several of largest and high growth companies in western Canada. Experience with major businesses like EnCana, Canadian Natural Resources Ltd, WestJet, Bell Canada, Long View Systems, and Fully Managed.His work has been recognized with numerous awards, both technical and business.Microsoft, Small Business BC, Globe and Mail, Venture MagazinePodcast #14 - Operating effectively with Todd Kane - YouTubeTodd Kane | LinkedInEvolved (evolvedmgmt.com)Evolved Radio Podcast (evolvedmgmt.com)MSP Productivity Accelerator (evolvedmgmt.com)Service Manager Boot Camp (evolvedmgmt.com)Eric Taylor | LinkedInTwitter: barricadecyberbarricade cyber solutions - YouTubewww.barricadecyber.comShiva Maharaj | LinkedInTwitter: kontinuummspwww.kontinuum.com   BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
6/2/202152 minutes, 26 seconds
Episode Artwork

Episode 13 - Finding faster with Jon Murchison.

Jonathan Murchison, the founder and CEO of Blackpoint, started his career in Network Engineering and IT operations, but quickly made the switch to the quiet world of the intelligence community. He has since spent over twelve years planning, conducting, and executing high-priority national security missions.As a former NSA computer operations expert and IT professional, he is bringing a unique perspective to the mission of developing cyber defense software effective at detecting and detaining purposeful cyber intrusions and insider threats. Murchison holds multiple patents in methods of network analysis, defense, pattern analytics, and mobile platforms.Jon Murchison | LinkedInBlackpoint Cyber | 24/7 Managed Detection and ResponseEric Taylor | LinkedIn Twitter: barricadecyber barricade cyber solutions - YouTubewww.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com   Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
5/26/20211 hour, 13 minutes
Episode Artwork

Episode 12 - Taking action with Vince Crisler.

Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused on innovative solutions for small and midsize companies. He is on the IT Security Executive Council for CompTIA, the Executive Committee for the CompTIA ISAO, and a member of Embry-Riddle Aeronautical University's Worldwide Industry Advisory Board.Prior to founding Dark Cubed, Co-Founded Fortalice Solutions, an innovative cyber security consulting company that supported Fortune 500 and Government Agencies.  Crisler previously supported the Department of Homeland Security (DHS) and Sandia National Laboratories in the development of cyber security protection programs to defend the networks of Federal Departments and Agencies, as well as those belonging to critical infrastructure and key resources (CI/KR) owners and operators. Crisler was the primary author for the five-year technical vision for the National Cybersecurity Protection System, a $3B cyber security program within DHS.  He was also a co-author of the DHS Enhanced Cyber Services (ECS) Program, establishing a critical cyber security information-sharing program, which was formally announced in Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity.  Crisler also served as the CISO for the White House's Executive Office of the President and was responsible for the creation of the first ever cyber security operations center to protect White House networks.  Prior to the White House, Crisler served in the United States Air Force in organizations to include the White House Communications Agency, the National Military Command Center in the Pentagon, and Ramstein Air Base in Germany.  Crisler earned a Bachelor of Science in Computer and Information Science from the Ohio State University and a Master of Science in Management from Embry Riddle Aeronautical University.  He currently lives in the Washington D.C. area.Vince Crisler | LinkedIn  Dark Cubed™ Cybersecurity Solution  Eric Taylor | LinkedIn  Twitter: barricadecyber  barricade cyber solutions - YouTube www.barricadecyber.com  Shiva Maharaj | LinkedIn  Twitter: kontinuummsp  www.kontinuum.com   Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
5/19/202156 minutes, 47 seconds
Episode Artwork

Episode 11 - Executive Order or Compliance Rosetta Stone?

Executive Order, Darkside ransomware group, the Colonial pipeline debacle and CMMC.Eric Taylor | LinkedIn  Twitter: barricadecyber  barricade cyber solutions - YouTube www.barricadecyber.com  Shiva Maharaj | LinkedIn  Twitter: kontinuummsp  www.kontinuum.com  Articles referenced;Executive Order on Improving the Nation's Cybersecurity | The White HouseColonial Pipeline has no plan to pay ransom to hackers -sources | ReutersColonial Pipeline paid a $5 million ransom—and kept a vicious cycle turning | Ars TechnicaDarkSide ransomware's Iranian hosting raises U.S. sanction concerns (bleepingcomputer.com)DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized – Krebs on SecurityBARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
5/17/202130 minutes, 35 seconds
Episode Artwork

Episode 10 - Unrestricted warfare - Vol. I

With the increase of ransomware activity across the US, every incident may be an act of war.  Eric Taylor | LinkedIn Twitter: barricadecyber Youtube: barricade cyber solutions - YouTube www.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com  Brian J. Weiss | LinkedIn ITECH Solutions: Overview | LinkedIn www.itech-solutions.com Articles referenced; Pipeline Cyberattack: Colonial remains mostly closed, working to restore service (cnbc.com) Colonial pipeline shutdown highlights need for better OT cybersecurity practices | CSO Online Dark Reading | Security | Protect The Business Ryuk Ransomware Operators have Updated their Attack Techniques | Cyware Alerts - Hacker News DHS to hire 200 more cyber pros as Biden administration grapples with hacking threats - CyberScoop US spy agencies review software suppliers' ties to Russia following SolarWinds hack - CyberScoop SolarWinds says Russian group likely took data during cyber-attack, World News & Top Stories - The Straits Times Debating Law Enforcement's Role in the Fight ... (darkreading.com) DOD expands vulnerability disclosure program, giving hackers more approved targets - CyberScoop BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
5/12/202146 minutes, 14 seconds
Episode Artwork

Episode 9 - Zero Knowledge vs. Revenue.

When it comes to choosing between your privacy and the commercialization of your data, vendors will invariably choose advancing their revenue by using your data.Earlier this week Gary Pica’s TruMethods was acquired by Kaseya, a financial powerhouse in the MSP marketplace.With each acquisition, these market share leaders are consolidating their power-base to what some would consider anti-trust levels, further diminishing the likelihood of Zero Knowledge being built into their products. And of course what's a podcast without CMMC? Eric TaylorTwitter: barricadecyberYoutube: barricade cyber solutions - YouTubewww.barricadecyber.comShiva MaharajTwitter: kontinuummspwww.kontinuum.com Links mentioned:Kaseya’s IT Glue Acquires TruMethods MSP Peer Groups, vCIO Software (channele2e.com)Kaseya Compliance Manager for CMMC Automates Defense Contractors’ Compliance Assessments Under New Federal Government Requirement | KaseyaBARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
5/7/202112 minutes, 53 seconds
Episode Artwork

Episode 8 - Operating differently.

Compliance based legislation and Solarwinds data restoration is just too slow. Incident response, Babuk ransomware group targets the FBI, CISA and the United States, another supply chain breach this time with Passwordstate,  Vendors' thirst for customer data will hold back progress with zero knowledge architecture.  Microsoft 365 should be backed up and all backups are not created equally. And yes, self attestation is worthless.Eric TaylorTwitter: barricadecyberYoutube: barricade cyber solutions - YouTubewww.barricadecyber.comShiva MaharajTwitter: kontinuummspwww.kontinuum.com Articles mentioned:Ransomware gang Babuk claims DC's Metropolitan Police was last caper – then goes dark | SC Media (scmagazine.com)Illinois Attorney General computer system breached early Saturday morning | State and Regional News | qctimes.comPasswordstate users warned to ‘reset all passwords’ after attackers plant malicious update | TechCrunchA ransomware gang made $260,000 in 5 days using the 7zip utility (bleepingcomputer.com)BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
5/5/202142 minutes, 11 seconds
Episode Artwork

Episode 7 - What’s essential.

There is no such thing as a minimum security standard. While this is not meant to be an exhaustive list of what you have to do to attain a comprehensive cybersecurity posture. It is meant to be more of a guide of what you should be doing and if you're not maybe it's time you did.Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
4/28/20214 minutes, 35 seconds
Episode Artwork

Episode 6 - Too many places to hide.

Nuke and pave the lost supply chain, Pulse Secure and Codecov used to compromise their clients, OEM hardware manufacturer Quanta breached by REvil, more Sonicwall zero-days. Eric TaylorTwitter: barricadecyberwww.barricadecyber.comShiva MaharajTwitter: kontinuummspwww.kontinuum.com Articles referenced;Multiple agencies breached by hackers using Pulse Secure vulnerabilities | TheHillHundreds of networks reportedly hacked in Codecov supply-chain attack (bleepingcomputer.com)REvil ransomware gang claims it stole top-secret tech designs – including Apple lappies – from Quanta Computer • The Register3 Zero-Day Exploits Hit SonicWall Enterprise Email Security Appliances (thehackernews.com)Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
4/21/202136 minutes, 42 seconds
Episode Artwork

Episode 5 - FBI Managed Security IT Services.

The FBI, sealed warrants, compromised Microsoft Exchange servers, cloud printing, RDP, less than secure SSO, daily patching and more. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com Bleeping Computer article referenced;https://www.bleepingcomputer.com/news/security/fbi-nuked-web-shells-from-hacked-exchange-servers-without-telling-owners/Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
4/14/202131 minutes, 26 seconds
Episode Artwork

Episode 4 - Industrial control systems are the low hanging fruit.

The Iranian nuclear facility hack, CMMC and those selling into the DOD compliance space. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
4/7/202126 minutes, 29 seconds
Episode Artwork

Episode 3 - What we can endure with current standards.

On this episode, Eric and I discuss recent incidents (including Ubiquiti and you guessed it Solar Winds), how to vet your vendors, industrial control systems or at least what should be classified as ICS' and touched on our vision of what CMMC should look like.  Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
3/31/202127 minutes
Episode Artwork

Episode 2 - The gatekeeper.

Overlooked as an annoyance by most, MFA is often the last line of defense between you and an account takeover or breach, giving MFA the distinction of being your gatekeeper.  Eric Taylor  Twitter: barricadecyberwww.barricadecyber.comShiva MaharajTwitter: kontinuummspwww.kontinuum.com Buy Eric a Coffee Eric Taylor is Educating folks around cyber securityBuy Shiva a Coffee IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
3/24/202131 minutes, 51 seconds
Episode Artwork

Episode 1 - Where do we go from here?

 Join Eric Taylor and I as we discuss recent events and navigate the cybersecurity world as it is today. Eric Taylor  Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM IT support that's actually supportive.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
3/17/202146 minutes, 6 seconds
Episode Artwork

Welcome to the Cybersecurity: Amplified And Intensified Podcast.

Join us as we discuss ongoing cybersecurity incidents, trends and best practices to secure everyday life. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security.Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support
3/16/202123 seconds