Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Hosted by Brent Canfield—a Christian, Marine, and successful business owner—Secure The Perimeter Podcast is your go-to resource for tackling the unique challenges of entrepreneurship. Designed for young and new entrepreneurs, this podcast provides practical solutions, actionable advice, and inspirational stories to help you build and grow your business with confidence. Drawing from his experiences as a Marine and a business leader, Brent combines discipline, faith, and a passion for service ...
…
continue reading
Welcome to Perimeter Perspective, the podcast where we explore the strategies, challenges, and innovations shaping the future of cybersecurity and IT management. Hosted by the experts at Next Perimeter, this show dives into zero trust principles, cloud-first solutions, and the evolving role of technology in modern businesses. Whether you’re an IT leader, business owner, or tech enthusiast, Perimeter Perspective offers actionable insights and engaging discussions to help you secure your digit ...
…
continue reading
The Trade Industry podcast is a voice for contractors. Created for the industry, by the industry.
…
continue reading
A fascinating discussion of current national and international security issues. I interview experts on different subjects. More often than not, the discussion ends with a heated (but friendly) debate between me and my guest. So far we have covered issues ranging from the future of NATO, violence and law enforcement in Mexico, defense policy in Canada, the US and Mexico, North Korea, cybersecurity, organized crime, PUTIN, afghanistan... you name it we have covered it or will eventually do so. ...
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans Frank Catucci and Dan Murphy, AppSec Serialized by Invicti puts a new spin on the ”two guys talking” format by starting each episode with a security-themed fiction story in the style of old-time radio shows. Each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a sol ...
…
continue reading
ISNR is the only event in Europe that allows you to network and do business with high security end users and sector professionals. ISNR brings together government, public sector, police and emergency response, transport and critical national infrastructure stakeholders with commercial and private security organisations. This focused event delivers a unique opportunity to learn from a comprehensive seminar program and high-level, industry leading conference. Showcasing the complete range of t ...
…
continue reading
Join CovertSwarm and special guests, as they discuss the latest Cyber Security news, trends, 0-day exploits and research. www.covertswarm.com
…
continue reading
Enterprise AI Defenders features exclusive conversations with the world's best security executives, who share how threat landscapes have changed due to the cloud and AI’s role in the future of cybersecurity. The show is hosted by Evan Reiser, the CEO & founder of Abnormal AI, and Mike Britton, the CIO & CISO of Abnormal AI.
…
continue reading
PublicPowerX is the new podcast from the American Public Power Association where key vendors and service providers explain their role in keeping public power safe, reliable, and secure. Subscribe to this feed to get these stories from public power’s service providers as they become available. If you are a company that does business with public power utilities and would like to host an episode of Public Power X, go to publicpower.org/podcasts to learn more.
…
continue reading
Podcast by J Kuht & H Willi
…
continue reading
Welcome to Beyond the Breach. A new series about how individuals and organizations manage change – with a focus on technology’s impact on humanity and the nature of cybersecurity risk. * The show is hosted by Jonathan Reiber, a writer and security strategist who served as a Speechwriter and Chief Strategy Officer for Cyber Policy in the Obama Defense Department, and co-hosted by D.J. Skelton, a combat veteran, retired Army officer, founder of Paradox Sports, and outdoorsman. * In each episod ...
…
continue reading
Where Automation Meets Security
…
continue reading
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
…
continue reading
Interarbor Solutions' Briefings Direct: Unique B2B informational podcasts that offer the value of objective perspectives from leading industry analyst Dana Gardner. Briefings Direct delivers actionable knowledge on the latest enterprise IT subjects to those who need to know the most about the business of IT now.
…
continue reading
Welcome to the Mix Zone by Infront Lab, a podcast that is all about sports technology and innovation. Join our host Merav Savir for candid chats with tech and sports leaders from around the globe, discussing the newest technologies, products, trends, business models, the innovation process and the do's and don'ts of the business.
…
continue reading
Expanding Your Horizon is the ultimate destination for business and technology enthusiasts who want to stay ahead of the curve. Join us as we explore the latest trends, innovations, and strategies in the world of business and technology. Our expert guests share their insights, experiences, and knowledge on a variety of topics, from digital transformation and entrepreneurship to leadership and innovation. Whether you’re an entrepreneur, executive, or simply curious about the intersection of b ...
…
continue reading

1
Enhance Physical Security with Smart Perimeter Solutions & Line of Sight Technology
42:08
42:08
Play later
Play later
Lists
Like
Liked
42:08Learn how 3B Protection is redefining perimeter security with its innovative smart perimeter solutions and advanced line of sight engineering technology. The speakers will walk you through real-world applications, system capabilities, and how 3B’s customizable solutions can meet your site-specific needs—without breaking your budget. You will discov…
…
continue reading

1
Top Strategies to Streamline Business Operations and Boost Productivity | STP Episode 35
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25🎙️ Episode Title: Top Strategies to Streamline Business Operations and Boost Productivity Hosted by Brent Canfield—a Christian, Marine, and seasoned business owner—Secure, The Perimeter Podcast is dedicated to helping young and aspiring entrepreneurs navigate the real-world challenges of starting and growing a business. In this episode, “Top Strate…
…
continue reading

1
Zero Trust Isn’t a Tool — It’s Everything with George Finney
40:15
40:15
Play later
Play later
Lists
Like
Liked
40:15What if Zero Trust isn’t a framework, but the only viable cybersecurity strategy—more about people than products? In this episode, George Finney, CISO at the University of Texas System and author of Project Zero Trust, reveals the human-first truth behind the Zero Trust movement, and why it’s not something you buy but something you build. George sh…
…
continue reading

1
Beyond the Perimeter: How Attackers Use Domains, Phishing & AI and How to Fight Back
1:08:24
1:08:24
Play later
Play later
Lists
Like
Liked
1:08:24Welcome to a special RSAC 2025 episode of the Breaking Badness Cybersecurity Podcast!Today, we delve into the critical role of domains in modern cyber attacks. From sophisticated nation-state operations to AI-powered phishing kits and malicious browser extensions, domains are the foundational infrastructure for threat actors. Host Kali Fencl is joi…
…
continue reading
The future of generative AI might very well be agentic workloads. Fresh from Build 2025, we take a look at Agent IDs in Entra ID. What are they, and why would even need to know how they work? What's the difference from Enterprise Applications? We consider compliance, reporting, licensing and other aspects on Agent IDs. (00:00) - Intro and catching …
…
continue reading

1
Your Two-Year Edge Starts Now with Marco Figueroa
36:34
36:34
Play later
Play later
Lists
Like
Liked
36:34You won’t be replaced by AI—you’ll be replaced by someone using it better. Returning guest Marco Figueroa is back with a frontline report on the AI agent boom. This isn’t a prediction—it’s a tactical update from someone tracking every release, every benchmark battle, and every edge worth chasing. In this episode, Ron is joined by Marco as he breaks…
…
continue reading
In this episode of Breaking Badness, we sit down with Raji Vannianathan, a cybersecurity leader at Microsoft driving the charge on AI security and safety. Raji shares her experience leading the team responsible for managing the end-to-end lifecycle of AI vulnerability disclosures, building proactive safety frameworks, and cultivating a global commu…
…
continue reading
Today, we're taking an initial look at Azure Service Groups. We're already familiar with Resource Groups and have discussed Management Groups and governance in general in previous episodes over the years. Service Groups provide a new approach to governing and managing your resources operationally. We'll share our thoughts on governance, this new ca…
…
continue reading

1
Behavior Is the Battlefield: Rethinking the Cyber Perimeter with Expeditors VP & CISO Rob Nolan
29:41
29:41
Play later
Play later
Lists
Like
Liked
29:41On the 28th episode of Enterprise AI Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal AI, talk with Rob Nolan, Vice President and Chief Information Security Officer at Expeditors. Expeditors is a Fortune 500 freight and logistics company, powering over 25% of all U.S. customs clearance. They enable global trade and supply …
…
continue reading

1
Badge Cloning, Alarm Triggers & Getting Hired to Hack with Greg Hatcher & John Stigerwalt
37:31
37:31
Play later
Play later
Lists
Like
Liked
37:31Most people think red teaming is digital—until someone bypasses your locks, plants a Raspberry Pi in your server room, and walks out with your data. That’s not sci-fi. That’s White Knight Labs. In this episode, Ron talks with Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, a boutique offensive security firm built on real-world a…
…
continue reading

1
291 - Reflections from Microsoft Build 2025
25:02
25:02
Play later
Play later
Lists
Like
Liked
25:02* NOTE: It seems like Microsoft Teams recording messed up big time. This episode has an audio distortion issue around the 16-minute to 20-minute mark. Apologies! * This week, we'll have our initial reflections and thoughts from major Microsoft Build 2025 announcements. What caught our eye? It's AI all the way, but we find other aspects as well. Tob…
…
continue reading

1
Building Cyber Resilience Through Culture with David Shipley
44:30
44:30
Play later
Play later
Lists
Like
Liked
44:30What if fixing cybersecurity wasn’t about more tools, but about unlocking human potential? In this episode, Ron Eddings welcomes back David Shipley, CEO and Field CSO of Beauceron Security, for a conversation on the real force behind security resilience: people. Together they expose the failure of "reactive" cybersecurity strategies, drawing parall…
…
continue reading

1
Navigating the Five Phases of Business Growth with Eddie Wilson | STP Episode 34
53:38
53:38
Play later
Play later
Lists
Like
Liked
53:38In this episode of the Secure the Perimeter podcast, host Brent Canfield interviews entrepreneur Eddie Wilson, who shares his journey from military service to becoming a successful business leader. They discuss the importance of personal growth, financial awareness, and the five phases of business growth. Eddie emphasizes the significance of leader…
…
continue reading
This week, we'll tackle the basics of Azure AI Foundry. First, we'll talk about what it is and who it aims for. We will also walk you through the options and capabilities, like reviewing models, fine-tuning, and managing your data and indexes. We'll also consider the different aspects of building your apps before wrapping up with considerations on …
…
continue reading

1
Building Secure Campaigns and Better Humans: A Conversation with Mick Baccio
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03In this episode of Breaking Badness, Kali Fencl sits down with Mick Baccio, Global SecurityAdvisor at Splunk and former CISO for Pete Buttigieg’s 2020 presidential campaign. Mickshares his journey from aspiring Navy nuclear engineer to leading security in some of thehighest-stakes environments, including the White House.They explore how threat inte…
…
continue reading

1
Ditch the Spreadsheets: Smarter Crypto Security with Michael Klieman
29:48
29:48
Play later
Play later
Lists
Like
Liked
29:48Still tracking certificates in a spreadsheet? You’re not alone—and there’s a better way. In this special episode from RSA 2025, Ron sits down with Michael Klieman, Global Vice President of Product Management for Digital Security Solutions at Entrust, to discuss how leading organizations are rethinking cryptographic security. From simplifying certif…
…
continue reading

1
What Do We Do Now? Reasons You SHOULD Start Your Own Business | STP Episode 33
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25Do you find yourself at a crossroads in your life, wondering which path to take? In this episode, Brent discusses some of the paths he has traveled, their pros and cons.By Brent Canfield
…
continue reading

1
Hacking the Stage: John Donovan on RSAC, BSides SF, and the Human Side of Cybersecurity
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13In this episode of Breaking Badness, we sit down with John Donovan of ZEDEDA to unpack thelighter and more profound sides of cybersecurity’s biggest gatherings. From RSA’s unexpectedbaby goats and vendor booth antics to BSides San Francisco’s community-driven keynotestage, John shares personal stories, industry insights, and valuable advice on how …
…
continue reading

1
289 - Expectations on Microsoft Build 2025
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35In this week's episode, we ponder what to expect from Microsoft Build 2025. Is it worth traveling to Seattle for the event, that takes place May 19-22? We reflect on the possible announcements, the breakout session topics, as well as the keynotes. (00:00) - Intro and catching up. (04:56) - Show content starts. Show links - Microsoft Build 2025 - DE…
…
continue reading

1
Inside Morphing Meerkat and Proton66: How Cybercrime Is Getting Easier
39:39
39:39
Play later
Play later
Lists
Like
Liked
39:39In this episode of Breaking Badness, the crew investigates two escalating threats in the cybercrime ecosystem: the cleverly named phishing-as-a-service platform Morphing Meerkat, and the bulletproof hosting provider Proton66, a favorite among amateur cybercriminals.First, they dig into how Morphing Meerkat uses DNS-over-HTTPS (DoH) and clever phish…
…
continue reading

1
288 - Review your environments with checklists!
30:46
30:46
Play later
Play later
Lists
Like
Liked
30:46This week, we take a look at Azure Review Checklists. Relatively unbeknownst to us, this interesting capability allows you to really supercharge the reviews on your Azure environments! (00:00) - Intro and catching up. (03:03) - Show content starts. Show links - Azure Review Checklists - Azure Resource Inventory - Give us feedback!…
…
continue reading

1
Powering the Future: How Public Utilities Can Lead the AI Revolution
1:00:20
1:00:20
Play later
Play later
Lists
Like
Liked
1:00:20We sit down with Nur Bernhardt, Vice President at Cloverleaf Infrastructure, to explore how public utilities can collaborate with Cloverleaf to attract new large loads. We’ll dive into the surging electricity demand driven by AI-powered data centers, the challenges and opportunities for utilities, and the critical role of grid infrastructure in sha…
…
continue reading

1
Protecting People, Not Just Perimeters with Andrey Suzdaltsev
45:21
45:21
Play later
Play later
Lists
Like
Liked
45:21AI is reshaping the cybersecurity battlefield, and cyber adversaries are getting smarter. In this episode, Ron Eddings welcomes Andrey Suzdaltsev, Co-Founder and CEO of Brightside AI, for a look into the evolution of social engineering, AI’s role in personalized phishing, and how Brightside is turning the tables with automation and human-centric pr…
…
continue reading

1
Focus on These Essential Factors to Succeed in Business | STP Episode 32
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13Success in business doesn't happen by luck—it’s built on mastering the right fundamentals. In this episode, we break down the essential factors every entrepreneur must focus on to grow, scale, and thrive in today’s competitive landscape. Whether you're just starting out or looking to level up your game, these core principles will help guide your wa…
…
continue reading

1
Simple Leadership Principals for Entrepreneurs | STP Episode 31
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50No matter what industry you work in, good leadership skills are essential for success. Learning the skills for leadership is simple; mastering the application of those skills requires tenacity, practice, and humility.By Brent Canfield
…
continue reading

1
DFIR Foundations: Real-World Lessons in Containment, Eradication, and Recovery
54:45
54:45
Play later
Play later
Lists
Like
Liked
54:45In this powerful continuation of our DFIR series, cybersecurity experts Daniel Schwalbe, DavidBianco, Lesley Carhart, and Sarah Sabotka dissect the heart of effective incident response,containment, eradication, recovery, and lessons learned. Packed with firsthand war stories,sharp tactical advice, and honest debates, this episode is a must-listen f…
…
continue reading

1
Real World Risks: AI & Cybersecurity in Crisis Zones with Save the Children International Global CISO Gareth Packham
32:11
32:11
Play later
Play later
Lists
Like
Liked
32:11On the 27th episode of Enterprise AI Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal AI, talk with Gareth Packham, Chief Information Security Officer at Save the Children International. Save the Children is one of the world's largest nonprofit organizations focused on protecting the rights and well-being of children. Oper…
…
continue reading
In this week's episode, we look at recent Microsoft Tech updates. By popular request, we're expanding the scope beyond just Azure to include Microsoft 365, Power Platform, and similar Microsoft platforms and capabilities. What's new? What's interesting? What's retiring? (00:00) - Intro and catching up. (03:45) - Show content starts. Show links - Wh…
…
continue reading

1
DFIRside Chat: Lessons from the Frontlines of Incident Response
42:36
42:36
Play later
Play later
Lists
Like
Liked
42:36In Part 1 of this special two-part panel, the Breaking Badness podcast gathers leadingcybersecurity experts to explore the foundations of DFIR - Digital Forensics and IncidentResponse. Featuring Daniel Schwalbe (DomainTools), Lesley Carhart (Dragos), David Bianco(Splunk), and Sarah Sabotka (Proofpoint), the panel dives into what makes an effective …
…
continue reading

1
286 - A look at GitHub Copilot in practice in 2025
37:08
37:08
Play later
Play later
Lists
Like
Liked
37:08This week, we're revisiting GitHub Copilot. We talked about it a few years ago, when it was fresh. Has anything changed? How are we using it? Prepare to be blown away by one specific capability now in preview. (00:00) - Intro and catching up. (03:38) - Show content starts. Show links - GitHub Copilot - Visual Studio Code Insiders - Agent mode in Gi…
…
continue reading

1
Why Cloud Identity is Your New Front Line in Cybersecurity
9:04
9:04
Play later
Play later
Lists
Like
Liked
9:04Stolen credentials. Risky login behavior. Shared accounts with no audit trail. Businesses that overlook identity management face serious security gaps, compliance challenges, and operational inefficiencies. Most cybersecurity strategies focus on firewalls and endpoint tools—but today, your real perimeter is every login. In this episode of Perimeter…
…
continue reading

1
Digital Clutter and the Death of Passwords with Collin Sweeney & Chase Cunningham
43:26
43:26
Play later
Play later
Lists
Like
Liked
43:26Passwords are the original digital clutter—messy, overstuffed, and way too easy to forget. Like a junk drawer full of old keys and cables, we keep tossing more into them, hoping they’ll somehow keep working. But what if it’s time to throw the whole thing out? In this episode, Ron Eddings is joined by Collin Sweeney of ZKX Solutions and Dr. Chase Cu…
…
continue reading

1
How to Deal with Competition in Business | STP Episode 30
11:00
11:00
Play later
Play later
Lists
Like
Liked
11:00Are you feeling the heat from competitors in your industry? This video breaks down strategic ways to handle business competition and turn it into a growth opportunity. Whether you're a startup founder, small business owner, or an entrepreneur looking to sharpen your edge, these insights will help you stay ahead.…
…
continue reading

1
How Russian Disinformation Campaigns Exploit Domain Registrars and AI
38:57
38:57
Play later
Play later
Lists
Like
Liked
38:57In this episode of Breaking Badness, host Kali Fencl is joined by DomainTools' Daniel Schwabeand disinformation expert Scot Terban to uncover how modern Russian disinformationcampaigns are using domain registrars, homoglyph attacks, and generative AI to mimiclegitimate news outlets and manipulate public perception. From the eerie sophistication ofD…
…
continue reading

1
285 - Considerations when services are being deprecated
33:22
33:22
Play later
Play later
Lists
Like
Liked
33:22This week, we'll talk about services that are being deprecated, and what to think of that. How to best prepare when you get an announcement that something is going away? What are the business perspective, and the perspectives on security? (00:00) - Intro and catching up. (03:57) - Show content starts. Show links - Entra Permissions Management retir…
…
continue reading

1
What Most Cybersecurity Advice Misses—And How to Fix It with Robert Hansen
0:36
0:36
Play later
Play later
Lists
Like
Liked
0:36What if the biggest threat to cybersecurity isn’t attackers—but the defenders themselves? Why are we still building tools for experts in a world where technical skills are fading fast? In this episode, Ron Eddings sits down with legendary hacker and investor Robert Hansen (aka RSnake) to talk about startup strategy, LLM-powered workflows, and the u…
…
continue reading

1
284 - Understanding Network Security Perimeter in Azure
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46This week, we look at Network Security Perimeter, which is currently in public preview. It's a nifty capability for controlling inbound and outbound traffic for your PaaS resources. (00:00) - Intro and catching up. (05:01) - Show content starts. Show links - Creating a network security perimeter in the Azure Portal - Tobias' device: ZTE U50, 5G Por…
…
continue reading

1
Approaching AI, Identity, and Scale with Former Unilever CISO Kirsten Davies
26:12
26:12
Play later
Play later
Lists
Like
Liked
26:12On the 26th episode of Enterprise AI Defenders, hosts Evan Reiser and Mike Britton, both executives at Abnormal Security, talk with Kirsten Davies, former Chief Information Security Officer at The Estée Lauder Companies and Unilever and founder of The Institute for Cyber. Kirsten's storied career has given her a front-row seat to understanding the …
…
continue reading
Many common sayings or phrases help motivate, challenge, encourage, and guide soldiers in the military. Many lessons can be learned from these sayings. In this episode, Brent takes a common saying from the Mairnes and applies the concept to the business world. This is a valuable season for all entrepreneurs.…
…
continue reading

1
Protect Yourself from Material Price Increases
30:53
30:53
Play later
Play later
Lists
Like
Liked
30:53The truth about escalation clauses with Brian and special guest Isaac Alexander Your Bid Helper!By Brian T. Frederiksen
…
continue reading
In this exciting episode, we have all kinds of guests... You have to listen to find out more! This is the second episode of this series, and we have more to come!By Brian T. Frederiksen
…
continue reading
What's really behind your fence price spike?By Brian T. Frederiksen
…
continue reading

1
DNS Masterclass: Attacks, Defenses, and the Day the Internet Was Saved
41:17
41:17
Play later
Play later
Lists
Like
Liked
41:17In this special DNS Masterclass episode of Breaking Badness, hosts Kali Fencl, Tim Helming, and Taylor Wilkes-Pierce take a deep dive into the Domain Name System often dubbed the backbone and battleground of the internet. From its humble beginnings with host files to its critical role in modern security, the episode unpacks DNS’s evolution, vulnera…
…
continue reading

1
DBT & ASD Deep Dive with Critical Infrastructure Security Experts
41:00
41:00
Play later
Play later
Lists
Like
Liked
41:00Is safeguarding your critical infrastructure and utility assets a top priority? In an era of increasing threats, understanding vulnerabilities and implementing robust security measures are no longer optional—they are essential. This comprehensive session will give you actionable insights into two pivotal tools in modern physical security planning: …
…
continue reading

1
Hackers Have HR Now? featuring Christopher Budd
36:59
36:59
Play later
Play later
Lists
Like
Liked
36:59The internet once came this close to crashing—and Microsoft was on the front line. In this episode, cybersecurity veteran Christopher Budd takes us inside the Microsoft Security Response Center during one of the most chaotic cyber events in modern history. From the Nimda worm of 2001 to ransomware turf wars, and the weird future where threat actors…
…
continue reading

1
283 - Getting started with Azure Firewall
26:14
26:14
Play later
Play later
Lists
Like
Liked
26:14This week, we're considering when and how to use Azure Firewall in your deployments. What are the features, SKUs, and capabilities? When should you choose Azure Firewall, and when should you choose something else? Considerations on enterprise architectures also. (00:00) - Intro and catching up. (02:59) - Show content starts. Show links - Azure Fire…
…
continue reading

1
Fence Social – The Ultimate Networking Platform for the Fence and Gate Industry
36:18
36:18
Play later
Play later
Lists
Like
Liked
36:18In this episode, we introduce Fence Social, the game-changing networking platform built exclusively for the fence and gate industry. Whether you’re a contractor, supplier, or manufacturer, Fence Social connects you with the people and opportunities that can grow your business. Plus, we’re talking about the platform’s FREE business card scanning too…
…
continue reading

1
Muppets, Marriage, and Making It Work – Brian & Rowdy Live
57:30
57:30
Play later
Play later
Lists
Like
Liked
57:30Brian catches up with Rowdy from NW Quikpull while he's in town for the American Rental Association (ARA) show. The conversation goes off the rails as Rowdy throws some shade and calls Susan a muppet (all in good fun, of course). The two also dive into how they managed to survive life before they got married, plus a few laughs about business, life …
…
continue reading

1
The Future of Work: Why the Modern Desktop Experience Changes Everything
10:27
10:27
Play later
Play later
Lists
Like
Liked
10:27Slow device setups. Frustrating VPN issues. Former employees still accessing company data. Businesses relying on outdated IT models face major security risks, lost productivity, and unnecessary costs. Most organizations focus on cybersecurity tools but ignore a foundational shift that could improve security, streamline operations, and boost employe…
…
continue reading

1
From ValleyRAT to Silver Fox: How Graph-Based Threat Intel is Changing the Game
57:53
57:53
Play later
Play later
Lists
Like
Liked
57:53In this episode of Breaking Badness, host Kali Fencl welcomes Wes Young of CSIRT Gadgets and Daniel Schwalbe, CISO and head of investigations at DomainTools, dive into a recent DomainTools Investigations (DTI) analysis involving ValleyRAT and Silver Fox, and how new tools are enabling faster, more accessible analysis for junior and seasoned analyst…
…
continue reading