Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Big Pond Podcasts and MSP Radio. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Big Pond Podcasts and MSP Radio or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

CMMC Audits Expose Export Violations; Congress Tests AI; Cybersecurity Faces New AI Threats

12:01
 
Share
 

Manage episode 508304953 series 2555839
Content provided by Big Pond Podcasts and MSP Radio. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Big Pond Podcasts and MSP Radio or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

The Defense Department's Cybersecurity Maturity Model Certification (CMMC) effort has uncovered that many contractors are unaware of export control violations, which could lead to significant legal and financial penalties. As the certification becomes mandatory, early assessments indicate common violations of the International Traffic in Arms Regulation and Export Administration Regulations. Contractors are urged to map controlled, unclassified information and review data controls to identify and mitigate these violations before audits occur. This highlights the critical need to integrate export compliance with cybersecurity measures.

Meanwhile, Congress is experimenting with Microsoft's AI chatbot, CoPilot, as part of an initiative to incorporate artificial intelligence into legislative operations. This move has sparked concerns among critics regarding the potential risks of misinformation and privacy hazards associated with using experimental technology in governance. Additionally, Congress faces challenges in renewing a vital cyber threat information sharing program, which is set to expire soon, raising alarms about the implications for national cybersecurity efforts.

On the cybersecurity front, artificial intelligence is increasingly being exploited by criminal hackers, leading to a new era of sophisticated attacks. Generative AI technologies are being used to craft convincing phishing scams and manipulate everyday tools to execute attacks without triggering security alerts. Recent incidents have demonstrated the effectiveness of these tactics, emphasizing the need for heightened vigilance and advanced security measures to protect against evolving threats.

In the realm of technology, companies like Notion, Google, and Zoom are embedding powerful AI features into their platforms, fundamentally changing how users interact with these tools. Notion's new AI agent can autonomously perform tasks, while Google has integrated its Gemini AI into Chrome for enhanced usability and security. Zoom is set to introduce photorealistic AI avatars for meetings, showcasing the rapid adoption of AI in everyday applications. As these tools become the new baseline, IT service providers must adapt by focusing on governance, compliance, and security to ensure that their clients can safely navigate this evolving landscape.

Four things to know today

00:00 Compliance Blind Spots, Political Delays, and AI Experiments Show Why IT Providers Must Be the Steady Hand

05:02 Generative AI Fuels Phishing and Supply Chain Attacks While SonicWall and WatchGuard Struggle With Flaws

09:08 Notion, Google, and Zoom Push AI Deeper Into Everyday Tools

12:43 Ingram Micro Credits Xvantage for Ransomware Recovery, but MSPs Should Focus on Client Continuity

This is the Business of Tech.

Supported by: scalepad

Webinar: https://bit.ly/msprmail

All our Sponsors: https://businessof.tech/sponsors/

Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/

Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/

Support the show on Patreon: https://patreon.com/mspradio/

Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech

Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com

Follow us on:

LinkedIn: https://www.linkedin.com/company/28908079/

YouTube: https://youtube.com/mspradio/

Facebook: https://www.facebook.com/mspradionews/

Instagram: https://www.instagram.com/mspradio/

TikTok: https://www.tiktok.com/@businessoftech

Bluesky: https://bsky.app/profile/businessof.tech

Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

  continue reading

1767 episodes

Artwork
iconShare
 
Manage episode 508304953 series 2555839
Content provided by Big Pond Podcasts and MSP Radio. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Big Pond Podcasts and MSP Radio or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

The Defense Department's Cybersecurity Maturity Model Certification (CMMC) effort has uncovered that many contractors are unaware of export control violations, which could lead to significant legal and financial penalties. As the certification becomes mandatory, early assessments indicate common violations of the International Traffic in Arms Regulation and Export Administration Regulations. Contractors are urged to map controlled, unclassified information and review data controls to identify and mitigate these violations before audits occur. This highlights the critical need to integrate export compliance with cybersecurity measures.

Meanwhile, Congress is experimenting with Microsoft's AI chatbot, CoPilot, as part of an initiative to incorporate artificial intelligence into legislative operations. This move has sparked concerns among critics regarding the potential risks of misinformation and privacy hazards associated with using experimental technology in governance. Additionally, Congress faces challenges in renewing a vital cyber threat information sharing program, which is set to expire soon, raising alarms about the implications for national cybersecurity efforts.

On the cybersecurity front, artificial intelligence is increasingly being exploited by criminal hackers, leading to a new era of sophisticated attacks. Generative AI technologies are being used to craft convincing phishing scams and manipulate everyday tools to execute attacks without triggering security alerts. Recent incidents have demonstrated the effectiveness of these tactics, emphasizing the need for heightened vigilance and advanced security measures to protect against evolving threats.

In the realm of technology, companies like Notion, Google, and Zoom are embedding powerful AI features into their platforms, fundamentally changing how users interact with these tools. Notion's new AI agent can autonomously perform tasks, while Google has integrated its Gemini AI into Chrome for enhanced usability and security. Zoom is set to introduce photorealistic AI avatars for meetings, showcasing the rapid adoption of AI in everyday applications. As these tools become the new baseline, IT service providers must adapt by focusing on governance, compliance, and security to ensure that their clients can safely navigate this evolving landscape.

Four things to know today

00:00 Compliance Blind Spots, Political Delays, and AI Experiments Show Why IT Providers Must Be the Steady Hand

05:02 Generative AI Fuels Phishing and Supply Chain Attacks While SonicWall and WatchGuard Struggle With Flaws

09:08 Notion, Google, and Zoom Push AI Deeper Into Everyday Tools

12:43 Ingram Micro Credits Xvantage for Ransomware Recovery, but MSPs Should Focus on Client Continuity

This is the Business of Tech.

Supported by: scalepad

Webinar: https://bit.ly/msprmail

All our Sponsors: https://businessof.tech/sponsors/

Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/

Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/

Support the show on Patreon: https://patreon.com/mspradio/

Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech

Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com

Follow us on:

LinkedIn: https://www.linkedin.com/company/28908079/

YouTube: https://youtube.com/mspradio/

Facebook: https://www.facebook.com/mspradionews/

Instagram: https://www.instagram.com/mspradio/

TikTok: https://www.tiktok.com/@businessoftech

Bluesky: https://bsky.app/profile/businessof.tech

Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

  continue reading

1767 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play