Our experiences inspired the creation of The CMMC Compliance Guide Podcast and its accompanying resources. The podcast began as a way to share what we learned through real-world challenges—like helping that aerospace machine shop—and to provide accessible education for businesses navigating DoD cybersecurity requirements. The CMMC Compliance Guide Podcast breaks down complex topics like NIST 800-171 and CMMC into actionable, easy-to-understand steps. Whether you’re a subcontractor struggling ...
…
continue reading
Fedramp Podcasts
Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at [email protected].
…
continue reading
Emagine the Future is a cybersecurity and technology podcast aimed to offer ambitious technology and national security professionals with actionable insights and unique stories from proven industry leaders. Each week, we release conversations with experts from the intelligence, defense, civilian, and private sectors where we discuss current events, career and skill development, technology and national security, and the future. Obtain the edge you need to stay current, to accelerate your deve ...
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
…
continue reading
Welcome to Compliance Therapy™. This informative podcast bridges the gap between regulatory compliance, risk assessment, and cybersecurity best practices, making complex topics accessible for technology, business, and legal leaders. Join us and our renowned guests as they offer valuable insights and actionable strategies to strengthen your organization’s security posture and maintain compliance with key regulations such as NIST, FedRAMP, CMMC, and FISMA. Stay ahead in the rapidly evolving la ...
…
continue reading
Step into the fascinating world of risk and achievement with The Paramify Podcast. Join us as we engage with inspiring individuals who have accomplished extraordinary feats in various fields. From daring entrepreneurs, innovative scientists, extreme sports athletes to pioneering artists, we delve into their incredible journeys and explore the structures and strategies that guided them. We dissect the frameworks, methodologies, and mindsets they’ve employed to conquer challenges, manage risks ...
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
Governance, Risk, and Compliance Academy (GRC) Academy is a training and research platform for GRC professionals, executives, and anyone else who wants to increase their knowledge in the GRC space!
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Disruptive SmackTalk is from Hassan River. Hassan River is an excellent source for United States discourse. For entrepreneurs, technologists, and the culturally conscious. The content spans very relevant topics whether it’s election season or not. Also, we have great recommendations for apps and books. We’re based in the United States, but I invite you to join our growing global community wherever you are. I can best describe the Hassan River digital publication as ‘Thoughtful citizens for f ...
…
continue reading
1
SOC 2, FedRAMP 20x, and the Future of Audits with Dixon Wright
57:05
57:05
Play later
Play later
Lists
Like
Liked
57:05Kenny and Mike sit down with Dixon Wright, Head of Delivery at Eden Data, for a grounded and insightful conversation on security, compliance, and building smarter systems. They cover: - Dixon’s journey from college football to leading security at Eden Data - What it takes to actually deliver cybersecurity — not just sell it - Why Eden Data joined t…
…
continue reading
“There’s this misconception in the marketplace that you need to be a coder to do GRC Engineering. You don’t. I don’t want people to be bogged down in scripting. I want them to be systems thinkers focusing on architecture and orchestration.” Kenny and Mike sit down with the GOATed pioneer of GRC Engineering, Ayoub Fandi. In case you’ve been living u…
…
continue reading
1
CMMC Paperwork Without the Pain: How to Simplify Policies, SSP, and Evidence (Level 1 vs Level 2)
54:10
54:10
Play later
Play later
Lists
Like
Liked
54:10Submit any questions you would like answered on the podcast! Most small and mid-sized manufacturers do not fail CMMC because of “tech.” They fail because their documentation does not match how the shop actually runs. In this episode, Austin and Brooke break down how to build CMMC documentation that is concise, accurate, and assessor-friendly withou…
…
continue reading
1
How CMMC Became a Competitive Advantage for DoD Contractors
26:09
26:09
Play later
Play later
Lists
Like
Liked
26:09Submit any questions you would like answered on the podcast! CMMC is no longer just a compliance requirement. It is now a competitive advantage that directly impacts who wins and who loses DoD contracts. In this episode of the CMMC Compliance Guide Podcast, Stacey and Brooke break down how the final 48 CFR rule has changed the contracting landscape…
…
continue reading
1
NIST 800-171 and CMMC 2.0: How Assessors Actually Score You
31:17
31:17
Play later
Play later
Lists
Like
Liked
31:17Submit any questions you would like answered on the podcast! Are assessors judging you on CMMC or NIST 800 171 when audit day arrives? In this episode of the CMMC Compliance Guide Podcast, Stacey and Brooke break down the real relationship between CMMC 2.0 and NIST 800 171 so you are not guessing when it matters most. We walk through how the 110 NI…
…
continue reading
1
The Access‑Trust Gap: Why security can’t see what work depends on
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35In our final episode of 2025, Dave Lewis, global advisory CISO for 1Password, joins Greg Otto to unpack the “access‑trust gap”: the growing mismatch between what employees (and tools like AI assistants) can access at work and what security teams can actually see, verify, and control. Dav explains how this gap shows up in everyday ways—logins that b…
…
continue reading
1
2025 Cybersecurity Macroeconomic Retrospective
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48In this episode of Resilient Cyber, I sit down with my friend and the Founder of Return on Security (RoS), 💰 Mike Privette. Mike is the among the best our community has to offer when it comes to analyzing the macroeconomic trends of the cybersecurity ecosystem, from M&A, fundraising, startups, innovation, and venture capital. We will dig into the m…
…
continue reading
1
Episode 155: Incident Response Testing in Cloud Forward Organizations with Matt Lea
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16By John Verry
…
continue reading
1
Resilient Cyber w/ Patrick Garrity - 2025 VulnMgt Research Roundup
38:33
38:33
Play later
Play later
Lists
Like
Liked
38:33In this episode I sit down with my friend and Vulnerability Researcher Patrick Garrity 👾🛹💙 of VulnCheck to do a roundup of the latest trends, analysis and insights into the vulnerability and exploitation ecosystem throughout the past year. We covered a lot of great topics, including: - The most notable vulnerability trends over 2025, including what…
…
continue reading
1
Top CMMC Myths Debunked: Cloud, Vendors, Firewalls, and MFA Mistakes Explained
16:59
16:59
Play later
Play later
Lists
Like
Liked
16:59Submit any questions you would like answered on the podcast! Today’s episode of the CMMC Compliance Guide Podcast dives into the biggest myths that machine shops, fabricators, CNC shops, and mid-sized defense contractors still believe about CMMC. From cloud misconceptions to vendor promises that fall short, Brooke breaks down why these misunderstan…
…
continue reading
1
How AI has complicated enterprise mobile security
38:49
38:49
Play later
Play later
Lists
Like
Liked
38:49In this episode of Safe Mode, Jim Dolce, CEO of Lookout, reveals that 40% of phishing attacks now target mobile devices—yet CISOs are drastically underspending on mobile security compared to email protection. Jim demonstrates how AI-powered attacks have become devastatingly effective, showing how his team created a voice-cloning impersonation attac…
…
continue reading
"The AI age we're in is going to force startups to compete in the higher upper echelon of risk assurance." Jack Rumsey Head of GRC at Swimlane explains why startups will no longer have the luxury of maturing later and how the AI era is pushing even early-stage teams into enterprise-grade security. This episode covers why assurance needs to evolve, …
…
continue reading
1
Plain English Guide to CMMC Level 1: Basic Cybersecurity Without the Headache
27:42
27:42
Play later
Play later
Lists
Like
Liked
27:42Submit any questions you would like answered on the podcast! CMMC Level 1 Self- Assessment Guide: https://dodcio.defense.gov/Portals/0/Documents/CMMC/AG_Level1_V2.0_FinalDraft_20211210_508.pdf In this episode of the CMMC Compliance Guide Podcast, Stacey and Austin from Justice IT Consulting break down CMMC Level 1 in clear, simple terms: what it is…
…
continue reading
1
Breaking down the latest era of Chinese cyberespionage with Booz Allen's Nate Beach-Westmoreland
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37In this episode, we sit down with Nate Beach-Westmoreland, Head of Strategic Cyber Threat Intelligence at Booz Allen, to explore the evolving sophistication of Chinese cyber operations and their implications for U.S. national security. Our guest breaks down how the PRC leverages trusted-relationship abuse, network edge exploitation, and AI-powered …
…
continue reading
1
Top 12 CMMC Level 2 Requirements Explained: Gap Assessments, Scope, SSP, and POA&M
42:31
42:31
Play later
Play later
Lists
Like
Liked
42:31Submit any questions you would like answered on the podcast! In this episode of the CMMC Compliance Guide Podcast, Stacey and Austin from Justice IT Consulting walk through the top 12 essentials every contractor needs to achieve CMMC Level 2 compliance especially small and mid-sized defense manufacturers. You’ll learn how to start compliance the ri…
…
continue reading
1
How Visa's CISO turns a 'paranoid and pessimisitic mindset' into positive security outcomes
46:21
46:21
Play later
Play later
Lists
Like
Liked
46:21Visa CISO Subra Kumaraswamy joins Safe Mode to discuss the global scale and complexities of cybersecurity at Visa, from managing a billion transactions daily to maintaining a resilient, “paranoid” defensive posture. Subra reveals how his team blends innovation, threat intelligence, and layered security architectures—not just to protect Visa, but to…
…
continue reading
1
Resilient Cyber w/ Jesus and John - Post-Quantum Cryptography for Engineers
22:39
22:39
Play later
Play later
Lists
Like
Liked
22:39In this episode of Resilient Cyber, I'm joined by Jesus Alejandro Cardenes Cabre, SVP of Product Architecture and John Xiaremba, Software Engineer, both from the VIA Knowledge Hub team to dig into all things post-quantum cryptography (PQC). This includes PQC standards, as well as practical steps developers must take today to mitigate future risks.…
…
continue reading
1
Deltek's Journey to FedRAMP Moderate Equivalency
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15I have a surprise for you --- the last GRC Academy podcast! In this last episode, Michael Greenman from Deltek shares the journey to FedRAMP Moderate Equivalency for Deltek Costpoint GovCon Cloud Moderate (GCC-M). And let me tell you, it's quite a story: changes in the control baseline, new policy from the DoW, and lessons learned. Here are some of…
…
continue reading
1
What security teams should do to prepare for the quantum computing future
40:26
40:26
Play later
Play later
Lists
Like
Liked
40:26Rebecca Krauthamer, CEO of QSecure, joins Safe Mode to delve into the rapidly shifting landscape of quantum computing and cybersecurity. The conversation covers the latest government and industry responses to the quantum threat, the urgency of adopting post-quantum encryption, and practical metrics for agencies and organizations. Listen in as the c…
…
continue reading
1
Resilient Cyber w/ Kamal Shah - The State of AI in SecOps
29:19
29:19
Play later
Play later
Lists
Like
Liked
29:19In this episode of Resilient Cyber, I sit down with Kamal Shah, Cofounder and CEO at Prophet Security, to discuss the State of AI in SecOps. There continues to be a tremendous amount of excitement and investment in the industry around AI and cybersecurity, with Security Operations (SecOps) arguably seeing the most investment among the various cyber…
…
continue reading
1
Resilient Cyber w/ Jeff & Naomi - The AI-Driven Shift to Runtime AppSec
35:28
35:28
Play later
Play later
Lists
Like
Liked
35:28In this episode of Resilient Cyber, I sit down with longtime industry AppSec leader and Founder/CTO of Contrast Security, Jeff Williams, along with Contrast Security's Sr. Director of Product Security Naomi Buckwalter, to discuss all things Application Detection & Response (ADR), as well as the implications of AI-driven development.…
…
continue reading
1
Cyber AB Town Hall Breakdown: Legal Lessons, Ecosystem Growth, and CMMC Phase 2 Progress
28:40
28:40
Play later
Play later
Lists
Like
Liked
28:40Submit any questions you would like answered on the podcast! In this episode of the CMMC Compliance Guide Podcast, Brooke and Stacey from Justice IT Consulting unpack the biggest updates from the Cyber AB’s October 2025 Town Hall and what they mean for defense contractors preparing for CMMC certification. You’ll learn: Why the government shutdown i…
…
continue reading
1
Ep 154: How DORA Will Impact US Companies with Dejan Kosutic
33:56
33:56
Play later
Play later
Lists
Like
Liked
33:56By John Verry
…
continue reading
On this week’s Safe Mode, Greg welcomes Jason Pufahl, VP of Security Services at Vancord. Jason shares deep insights into the evolving managed security landscape, focusing on challenges faced by small and mid-sized businesses and the practical fundamentals they need for strong cybersecurity. He also discusses the evolving role of CISA and the impor…
…
continue reading
1
Resilient Cyber w/ Ross Young - Mastering the Cybersecurity Budget
27:58
27:58
Play later
Play later
Lists
Like
Liked
27:58In this episode, I sit down with a friend and ex-CIA Officer turned Cybersecurity leader, Ross Young over at CISO Tradecraft. We will be unpacking the topic of mastering the cybersecurity budget. This includes examining whether most cyber budgets are wasted, determining where and how to make investments, justifying spending, and more. Don’t miss th…
…
continue reading
1
Highlights from CS5 East 2025: Operation Midnight Hammer, CMMC Updates, and AI Insights
46:32
46:32
Play later
Play later
Lists
Like
Liked
46:32Submit any questions you would like answered on the podcast! Get the inside scoop from CS5 East 2025, the largest cybersecurity and compliance event for the Defense Industrial Base. In this episode, Brooke and Stacey from Justice IT Consulting breaks down the biggest CMMC updates, Operation Midnight Hammer, and how AI is reshaping compliance. Learn…
…
continue reading
1
Mobilizing Main Street: Inside the Cyber Civic Engagement Program
30:01
30:01
Play later
Play later
Lists
Like
Liked
30:01In this episode of Safe Mode, Betsy Cooper, founding director of the Aspen Institute’s Policy Academy, details a new initiative designed to mobilize ordinary citizens as cybersecurity policy advocates. The Cyber Civic Engagement program, supported by Craig Newmark Philanthropies’ Take9 campaign, offers virtual training sessions to equip participant…
…
continue reading
1
The Giant Washing Machine of Open Source: Container Security with George Manuelian
51:56
51:56
Play later
Play later
Lists
Like
Liked
51:56Security isn’t sexy. It’s laundry. You know you need to do it, but you’d rather have a tool do it for you. Kenny Scott and Mike Schreiner from Paramify sit down with George Manuelian from RapidFort to talk about freeing the captives — the engineers buried in spreadsheets, patch tickets, and compliance chaos. They cover: Why security always seems at…
…
continue reading
Kevin Greene, chief cybersecurity technologist for the public sector at BeyondTrust, joins Greg to unpack the fallout from the recent lapse of the CISA information sharing bill and what it means for both public and private sector cyber defenses. The conversation dives into how the threat landscape has shifted since the bill’s original passage, the …
…
continue reading
1
Rethinking resilience with WatchTowr CEO Benjamin Harris
35:32
35:32
Play later
Play later
Lists
Like
Liked
35:32This episode of Safe Mode features a nuanced conversation with Ben Harris, CEO of Watchtower, who delves into the complexities of vulnerability management in today’s threat landscape. Harris discusses why traditional patching is no longer a guarantee of security, revealing how sophisticated attackers are staying persistent even after organizations …
…
continue reading
1
Resilient Cyber w/ Mitch Herckis - Securing the Public Sector
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02In this episode, I sit down with Mitchel Herckis, Global Head of Government Affairs at cloud security leader Wiz. We will be discussing all things public sector and cybersecurity, including the evolution of the FedRAMP program, modernizing vulnerability management, and the future of Continuous ATO (cATO). We covered a lot of ground, including: Mitc…
…
continue reading
1
CMMC in a Day? NtelSec’s “Enclave” Approach to Fast-Track Compliance
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06Send us a text In this episode of the Reckless Compliance podcast, Max talks with Justin Paquette from NtelSec about a bold idea: helping small contractors achieve “CMMC in a day” by working inside a pre-secured enclave—CUI Vault—instead of overhauling their entire enterprise. Justin explains how NtelSec’s government collaboration platform SectorNe…
…
continue reading
1
How to Prove CMMC Compliance to Prime Contractors (Before You Lose Contracts)
26:08
26:08
Play later
Play later
Lists
Like
Liked
26:08Submit any questions you would like answered on the podcast! 🎯 Get your Free SPRS Roadmap Session: https://cmmccomplianceguide.com/free-sprs-roadmap Our experts will review your SPRS score, documentation, and setup to help you hit 110 with a clear action plan at no cost. Prime contractors like Lockheed Martin, Raytheon, and Parker Hannifin are dema…
…
continue reading
1
What's it like to go through the FedRAMP process?
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07This week on Safe Mode, we talk with Scott Montgomery, VP of Federal at Island, about the realities of achieving FedRAMP authorization. Scott demystifies the often daunting FedRAMP process, shares lessons learned from real-world experience, and reveals the biggest pitfalls organizations face. From data sensitivity requirements to the growing import…
…
continue reading
1
Resilient Cyber w/ Kenny Scott - Following the Future of FedRAMP
42:16
42:16
Play later
Play later
Lists
Like
Liked
42:16By Chris Hughes
…
continue reading
1
Resilient Cyber w/ Snehal Antani - AI and Autonomous Pen Testing
38:46
38:46
Play later
Play later
Lists
Like
Liked
38:46In this episode of Resilient Cyber, I sit down with repeat guest Snehal Antani, who serves as the Co-Founder & CEO of Autonomous Pen Testing leader Horizon3.ai. We will discuss the latest developments in AI and Autonomous Pen Testing, as well as the tremendous growth and success of Horizon3.ai, as Snehal balances technical topics with business-cent…
…
continue reading
1
Cyber AB Town Hall September 2025: Key CMMC Compliance Updates
33:55
33:55
Play later
Play later
Lists
Like
Liked
33:55Submit any questions you would like answered on the podcast! The September 2025 Cyber AB Town Hall dropped big updates for contractors navigating CMMC and NIST 800-171 compliance. In this episode of the CMMC Compliance Guide Podcast, Brooke and Austin break down what the final CMMC rule (Title 48A) means for defense contractors, subcontractors, and…
…
continue reading
1
Andesite's Brian Carbaugh on how lessons from the CIA can power an AI-powered SOC
27:06
27:06
Play later
Play later
Lists
Like
Liked
27:06In this week's episode of Safe Mode, Greg Otto talks with Brian Carbaugh, CEO of Andesite, who reveals how lessons learned in the CIA are transforming Andesite’s unique, human-first approach to AI-driven cybersecurity. Carbaugh shares behind-the-scenes stories about building a “bionic SOC,” where cutting-edge artificial intelligence works seamlessl…
…
continue reading
1
Resilient Cyber w/ Alon Jackson - Enterprise Agentic Security
18:46
18:46
Play later
Play later
Lists
Like
Liked
18:46In this episode of Resilient Cyber, I sit down with Astrix Security Co-Founder and CEO Alon Jackson to discuss the need for secure agentic adoption across the enterprise. This includes Astrix’s approach, which involves enabling enterprises to discover, secure, and deploy AI agents responsibly at scale.…
…
continue reading
1
Handling CUI Correctly: Compliance Risks and Best Practices
17:06
17:06
Play later
Play later
Lists
Like
Liked
17:06Submit any questions you would like answered on the podcast! Worried about mishandling Controlled Unclassified Information (CUI)? In this episode of the CMMC Compliance Guide Podcast, Brooke and Stacey break down what CUI really is, why it matters in defense contracting, and the biggest mistakes contractors make when handling it. You’ll also learn …
…
continue reading
1
Censys’ Silas Cutler on how adversaries chain vulns together for big attacks
26:55
26:55
Play later
Play later
Lists
Like
Liked
26:55In this episode of Safe Mode, Greg talks with Silas Cutler, principal security researcher at Census, how ransomware attackers chain together overlooked vulnerabilities, especially in platforms like SharePoint, and why patch fatigue leaves defenders at risk. Silas breaks down advanced ways criminals maintain access even after patches, and explains w…
…
continue reading
1
Resilient Cyber w/ Emre Tinaztepe - Forensics at the Frontline
20:44
20:44
Play later
Play later
Lists
Like
Liked
20:44In this episode of Resilient Cyber, I sit down with Binalyze Founder/CEO Emre Tinaztepe. We will discuss how AI and automation are impacting the future of the SOC and the role that forensics-level data can play in incident response and recovery, as well as proactive threat hunting.By Chris Hughes
…
continue reading
1
The End of FedRAMP as We Know It? Mike Craig on 20x, DoD, and What’s Next
56:05
56:05
Play later
Play later
Lists
Like
Liked
56:05FedRAMP as we know it is changing. In this episode, Mike and Kenny sit down with Mike “Waffle” Craig, founder and CEO of Vanaheim Security and longtime cloud and cybersecurity leader, to unpack what FedRAMP 20x means for agencies and vendors across FedCiv and DoD. We get into compliance philosophy, how to define your boundary the right way, why spo…
…
continue reading
1
Ep 153: Inside ISO 42001: The Future of AI Governance with Danny Manimbo
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09By John Verry
…
continue reading
1
CMMC Final Rule Explained: Deadlines, Requirements, and Next Steps for Defense Contractors
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33Submit any questions you would like answered on the podcast! The wait is over: the Department of Defense has finalized the CMMC rule, officially making it part of DFARS. That means compliance isn’t “coming soon”, it’s now in your contracts. In this episode of the CMMC Compliance Guide Podcast, Austin and Brooke from Justice IT Consulting break down…
…
continue reading
1
Veracode’s Chris Wysopal on the security issues with AI code development
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14On this episode of Safe Mode, we’re joined by a renowned cybersecurity expert and CyberScoop 50 winner, Veracode co-founder and CTO Chris Wysopal, to discuss the fast-evolving landscape of AI-assisted software development. Chris shares insights from a recent study examining over 100 large language models and their tendency to introduce security vul…
…
continue reading
1
Resilient Cyber w/ Andy Ellis - Effective Cyber Marketing, Sales & Leadership
45:03
45:03
Play later
Play later
Lists
Like
Liked
45:03In this episode, I sit down with Andy Ellis, a longtime industry security leader who has turned investor, advisor, and mentor. We will discuss how security vendors can build effective marketing and sales teams and Andy's experience identifying and investing in industry-leading security startups. Don't miss this chance to hear from an industry legen…
…
continue reading
1
The Role of NIST 800-171 in Your CMMC Assessment
29:46
29:46
Play later
Play later
Lists
Like
Liked
29:46Submit any questions you would like answered on the podcast! Confused about where NIST 800-171 fits into your CMMC 2.0 assessment? You’re not alone. In this episode of the CMMC Compliance Guide, Brooke and Stacey from Justice IT Consulting break it all down in plain English. We cover the foundation of NIST 800-171, how it maps into the CMMC levels,…
…
continue reading
1
Phosphorus’ Sonu Shankar on IoT Vulnerabilities and Salt Typhoon Tactics
23:50
23:50
Play later
Play later
Lists
Like
Liked
23:50In this episode, Greg Otto talks with Sonu Shankar, President at Phosphorus, to discuss the unique security challenges facing today’s rapidly expanding Internet of Things landscape, where traditional endpoint protections are ineffective. The episode explores how everyday devices with default passwords and outdated firmware open organizations up to …
…
continue reading
1
Resilient Cyber w/ Cory Michal (AppOmni) - Unpacking the SaaS Security Supply Chain Landscape
24:52
24:52
Play later
Play later
Lists
Like
Liked
24:52- One of the biggest SaaS security incidents recently of course is the Salesloft Drive/Salesforce incident, which impacted hundreds of organizations and involved compromised OAuth tokens. Can you tell us a bit about the incident and the fallout? - In an AppOmni blog on the incident, you all discuss attackers taking advantage of persistent OAuth acc…
…
continue reading