Skip to main content
Security Confidential

Security Confidential

By Dark Rhiino Security

Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
Available on
Apple Podcasts Logo
Google Podcasts Logo
Overcast Logo
Pocket Casts Logo
RadioPublic Logo
Spotify Logo
Currently playing episode

S2 E5 Hire Heros, They are Good for Business

Security ConfidentialNov 30, 2020

00:00
42:47
S14 E8 Throwing more technology at a problem doesn't solve it

S14 E8 Throwing more technology at a problem doesn't solve it

#SecurityConfidential #DarkRhiinoSecurity This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Daryl Donley. Daryl is currently a VP at Outcomes responsible for Security and IT. He has a passion for building and solving problems through secure software and embraces secure software development practices. He spent 20 years directly involved as a tester, developer, and architect building end-user solutions. For the last 15+ years, he has been working in Information Security, helping teams build secure and compliant solutions. In his spare time, he enjoys sports and tinkering with technology like blockchain and digital assets. 00:00 Introduction 00:17 Our Guest 06:15 How do you manage 3rd party risk? 07:48 The role of threat intelligence 09:34 Do the stakeholders understand? 12:10 Not replying solely on Open source 18:40 Convenience over security 20:30 It’s secure enough 26:20 Throwing technology at a problem doesn’t solve it 29:36 Can AI help? 46:50 More about Daryl ---------------------------------------------------------------------- To learn more about Daryl visit https://www.linkedin.com/in/daryl-donley-cissp-873156/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​

Apr 19, 202449:21
S14 E7 Cracking the Code: Password Manager Insights

S14 E7 Cracking the Code: Password Manager Insights

This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Troy Hunt. Troy is an Australian Microsoft Regional Director and MVP for Developer Security. He's known for his expertise in web security, as well as his creation of 'Have I Been Pwned?' He's a prolific author for Pluralsight, a sought-after speaker at global conferences, and has been featured in a number of articles with publications including Forbes, TIME magazine, Mashable, PCWorld, ZDNet and Yahoo! Tech. Aside from technology and security, Troy is an avid snowboarder, windsurfer and tennis player 00:00 Introduction 01:17 We’re going to outsource you 05:20 Have I Been Pwned? 10:10 Does the value length matter? 15:13 Convenience vs Security 20:20 Recovering an account 34:08 What is the effectivity of 2FA? 37:45 Artificial Intelligence and NLP 443:27 If you’re going to do nothing, at least do this 52:25 More about Troy

--------------------------------------------

To learn more about Troy visit https://www.troyhunt.com/ https://haveibeenpwned.com/ https://ndcoslo.com/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​

Apr 12, 202454:11
S14 E6 Either it works or it doesn't

S14 E6 Either it works or it doesn't

This week on Dark Rhiino Security’s Security Confidential podcast, Host Rory Meikle fills in for Manoj Tandon as he talks to Richard Hollis, the Founder and Chief Executive of Risk Crew. Richard is a seasoned cyber security expert and ardent privacy rights advocate who possesses over 30 years of “hands-on” skills and experience in designing, implementing, and testing the security integrity of business information technology systems. He lives and breathes cyber security and understands how to simplify it and make it relevant. 00:00 Introduction 00:17 Our Guest 06:25 People, process, and Technology 08:25 The cybersecurity community takes zero accountability 12:50 Cybersecurity vendors profit from the insecurity of computing 16:15 Either it works or it doesn’t 27:40 How do we get nontechnical people to understand? 34:24 Nothing is free 38:20 Until it’s personal 46:13 How did we get to this point? 50:25 How business owners can become more aware 54:08 Connecting with Richard ---------------------------------------------------------------------- To learn more about Richard visit https://www.linkedin.com/in/riskexpertrichardhollis/ To learn more about Risk Crew visit https://www.riskcrew.com/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com

Apr 05, 202455:12
S14 E5 Debunking Misconceptions in Cybersecurity

S14 E5 Debunking Misconceptions in Cybersecurity

This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Tom Eston. Tom’s work over his 17 years in cybersecurity has focused on information security, network, red team, and application penetration testing as well as security and privacy advocacy. Tom has led multiple projects in the cybersecurity community, improved industry-standard testing methodologies, and is an experienced team manager and leader. Tom is also a frequent speaker at security user groups and international cybersecurity conferences including Black Hat, DEF CON, DerbyCon, SANS, InfoSec World, OWASP AppSec, and ShmooCon.


00:00 Introduction

00:20 Our Guest

12:34 The leadership role

14:09 Would you redesign the internet?

18:55 The Golden age of education

22:03 why is it that the hacking community can be better than the OEM?

25:19 Do you think Cybersecurity adds value to the market offering?

29:48 The Hackback program

35:08 Misconceptions of cybersecurity 

48:56 More About Tom

Mar 29, 202451:09
S14 E4 Level up your Online Safety

S14 E4 Level up your Online Safety

Dorota Wrobel is the Chief Research and Devlopment Officer at G2A.com, the world's largest and most trusted marketplace for games, DLCs, in-game items, as well as software, and e-learning. She has worked in e-commerce for the last 9 years, is passionate about revolutionizing online shopping experiences, and a big advocate of women in tech. Dorota believes that the best work comes from diverse teams with interdisciplinary backgrounds. She is a cycling enthusiast and a big fan of documentaries. 00:00 Introduction 00:10 Our Guest 02:50 Listening to the customers 04:55 Selling to different cultures 08:15 Creating a secure platform on G2A 16:44 How to be safer online 19:06 Regulation for e-commerce 20:59 AI transforming e-commerce 31:40 Why do people game? 33:15 Keeping Personal data safe 35:30 Diversity in a team 43:51 More about Dorota and G2A ---------------------------------------------------------------------- To learn more about Dorota visit https://www.linkedin.com/in/dorota-wr%C3%B3bel-b653823b/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​

Mar 22, 202447:57
S14 E3 The FOUR truths about Cybersecurity

S14 E3 The FOUR truths about Cybersecurity

This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Scott Augenbaum. Scott is a Retired FBI Supervisory Special Agent, Author, Keynote Speaker, and Cybercrime Prevention Trainer. Scott spent most of his 30-year career handling Cybercrime investigations. In January 2019, he released a book called “The Secret to Cybersecurity, A Simple Plan to Protect Your Family and Business from Cybercriminals”. He says “It gave me an opportunity to share my thoughts about Cybercrime prevention with the world and also led to accomplish a major personal goal”. He has been featured on popular News broadcasting programs including Dr. Phil’s Talk Show. 


00:00 Introduction

00:40 Our Guest

4:57 Did you always want to be an FBI Agent

07:47 “Advanced” computer skills in 1997

13:03 Technology will solve all of our problems

17:41 How long until the FBI is involved?  

17:54 The FOUR truths about Cybersecurity

31:24 Magic Software solves our problems

38:45 The biggest takeaways from Scott

46:17 Connecting with Scott



Mar 15, 202448:40
S14 E2 The Correlation of Extreme Sports and Cyber Security

S14 E2 The Correlation of Extreme Sports and Cyber Security

This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Christian Espinosa. Christian is a bestselling author, certified high-performance coach, powerful keynote speaker, and the founder and CEO of Blue Goat Cyber, an organization designed to combat cybercrime through technical prowess and emotional intelligence. Christian is a US Air Force veteran with a BS in Engineering from the US Air Force Academy and MBA from Webster University. He holds multiple patents related to cybersecurity attack and defense. 00:00 Introduction 00:16 Our Guest 04:48 The Air Force Academy 07:07 The Culture and Operation at Blue Goat Cyber 08:18 Emotional Intelligence and Communicating with non-technical people 14:57 Hiring Personality 19:34 The Checklist should be Organized by Risk 22:33 Extreme Sports and it’s Correlation with Cyber 22:55 Translating Cybersecurity 35:50 Where does AI come into view? 42:03 Connecting with Christian ---------------------------------------------------------------------- To learn more about Christian visit https://christianespinosa.com/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​

Mar 08, 202445:03
S14 E1 Lie like a Superhero

S14 E1 Lie like a Superhero

#SecurityConfidential #darkrhiinosecurity This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Adam Levin. Adam Adam Levin is a nationally recognized expert on cyber security, privacy, identity theft, fraud, and personal finance and has distinguished himself as a fierce consumer advocate for the past 40 years. Former Director of the New Jersey Division of Consumer Affairs, Levin is the founder of CyberScout and co-founder of Credit.com. He is the author of the critically acclaimed book, Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves. 00:00 Introduction 00:19 Our Guest 06:50 Agreeing to the terms 09:34 Why haven’t regulators caught up? 14:21 What can we do about Data companies? 18:55 Congress won’t deal with Privacy policies 27:20 Lie like a superhero 31:53 Virtual Kidnappings + Safe Words 34:26 Get your house in Order 50:25 More about Adam ---------------------------------------------------------------------- To learn more about Adam visit https://adamlevin.com/about-adam-k-levin/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​ ----------------------------------------------------------------------

Mar 01, 202452:37
S13 E10 Learning through Experience

S13 E10 Learning through Experience

This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Troy Fine. Troy is an industry-recognized thought leader (and meme creator) at the intersection of compliance, auditing, and cybersecurity. His expertise spans a range of frameworks, from SOC 2 and ISO 27001 to HIPAA, HITRUST, PCI, FedRAMP, CMMC, and privacy regulations. Through a holistic approach, Troy helps clients navigate the complexities of compliance and fosters a culture of continuous improvement within organizations. 00:00 Introduction 00:15 Our Guest 01:27 Finding a job during an Economic Crisis 06:26 Auditing is not Sexy 09:50 Learning by experience and teaching others 13:44 Top 3 most common questions 17:02 Does this do anything to improve security? 32:30 Why should I be liable? 39:35 Overbearing controls 44:42 Jumping from SOC2 type 1 to type 2 50:01 Book recommendations from Troy ---------------------------------------------------------------------- To learn more about Troy visit https://www.linkedin.com/in/troyjfine/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​ -----------------------------------------------------------

Feb 16, 202452:20
S13 E9 Will the SIEM ever be Automated by AI?

S13 E9 Will the SIEM ever be Automated by AI?


This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Chandra Pandey. Chandra is an expert with 20+ years of experience in the cybersecurity and networking domain. Chandra has been associated with multiple disruptive innovations for cybersecurity and networking domains. Current innovations at Seceon is already used by 6000+ customers around the globe and make industry’s best cybersecurity affordable to organizations of any size and eliminate the need for customers to buy 15+ products like SIEM, SOAR, NBAD, UEBA, MDR, Cloud Security, Container Security, IDS etc. 00:00 Introduction00:16 Our Guest06:57 The Culture at Seceon09:32 The culture one comes from or the culture that one finds oneself in, What’s more important?11:23 Transitioning from a technical engineer to a business leader12:45 Adapting to changes in the industry13:34 How to get the most out of Ai21:46 Will we ever be able to get rid of the human in the SOC and have the SIEM be automated by AI?23:40 Why develop a SIEM?27:35 Motivation from Chandra ---------------------------------------------------------------------- To learn more about Chandra visit Seceon.com To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​

Feb 09, 202434:10
S13 E8 When you’re Small, you’re the Easiest Target

S13 E8 When you’re Small, you’re the Easiest Target

This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to James Potter. James is an Active Directory veteran with nearly 25 years in the field. A native of Detroit, James started his career at the University of Michigan where at the tender age of 17, he helped U of M develop their computer systems. For the next two decades James earned his stripes in consulting with organizations like Ernst & Young and PwC before founding his own company, DSE, in 2019. At DSE, James leads a dynamic group of architects, engineers, and SMEs who help large international organizations secure and modernize their AD infrastructure. He currently resides in the Pacific Northwest where—like a true son of Michigan—he restores old cars in his spare time.  

 

00:00 Introduction

00:18 Our Guest

01:11 Starting in Active Directory

06:29 Has the security changed on a Jet Database?

08:06 The 3 tiers of security

11:44 What should SMBs do? Compliance vs Security

13:12 When you’re small, you’re the easiest target

16:40 Biggest risks that organizations face

20:02 Why do we still have Active Directory?

23:40 Foundational things that you should be doing

26:44 Escalation of Privileges 

29:55 Asset Inventory: how do you control anything if you don’t know what you have?

40:47 Mergers and acquisitions

43:50 DSE and Connecting with James

Feb 02, 202450:20
S13 E7 Why do 99% of Start-up's Die?

S13 E7 Why do 99% of Start-up's Die?

This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Matt Brown. Matt is a serial entrepreneur, author of the #1 Amazon Best Selling book: Your Inner Game, podcaster, and the host of the Matt Brown Show podcast. The Matt Brown Show has built a global following, with millions of downloads and a network of talent unrivaled by most other business podcasts. He has hosted more than 650 extraordinary guests, with billionaires on six continents, New York Times Best Selling authors, navy seals, professors, scientists, and many leading business thought leaders throughout his 800 episodes. He has also founded 14 startups in the last 25 years and now he’s on a mission to help startup founders, entrepreneurs, and the community of business to change the world for the better. 00:00 Introduction 00:20 Our Guest How do you build something of value? 05:57 Unlocking the human potential 09:21 Self-limiting themselves 10:00 Why do 99% of Startups Die? 16:30 Overcoming challenges and Influencing others 29:36 Ask better questions 34:10 Does success happen because of Education? 37:45 The law of attraction 42:03 Changing your mindset 47:17 More about Matt ---------------------------------------------------------------------- To learn more about Matt visit https://mattbrownshow.com/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​ ----------------------------------------------------------------------

Jan 26, 202449:59
S13 E6 Paving The Way for Latina's in Cyber

S13 E6 Paving The Way for Latina's in Cyber

This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Angela Bergsma. Angela is the Founder & President of Latinas In Cyber, an Entrepreneur, a Navy Veteran, and an executive leader with over 20+ years of diverse experience encompassing national security (federal intelligence agencies), strategic analytics, program management, and security and IT practice management. 

She founded Latinas in Cybersecurity (LAIC), a 501(c)3 non-profit with a mission to improve the representation of Latinas in within the cybersecurity industry. She is also an active advocate for veterans and neurodiversity in the workspace, as well as a member of cyber and defense women groups.


00:00 Introduction

00:18 Our Guest

01:12 Transitioning from Intelligence into Cyber Security

06:09 How did you target people?

08:59 Compromising an individual

09:45 The Psychology of Cybersecurity

16:44 Do I have to be a conspiracy theorist in order to understand Cybersecurity?

19:50 Teaching employee awareness

 21:59 Who makes those widgets?

23:50 IOT devices

27:23 Can you trust anything or anyone?

28:26 Being a Role Model for Latinas In Cyber

40:56 Connecting with Latinas In Cyber


Connecting with Latinas In Cyber:

https://beacons.ai/latinasincyber

https://www.linkedin.com/company/latinas-in-cyber/

Jan 19, 202445:22
S13 E5 Where Good CISOs Become World Class

S13 E5 Where Good CISOs Become World Class

#SecurityConfidential #DarkRhiinoSecurity This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Dr. Eric Cole. Dr. Eric Cole, Ph.D., is a cybersecurity expert, entrepreneur, public figure, and best-selling author. His career has advanced from starting as a professional hacker for the CIA to becoming the 44th President's commissioner on cyber security. His accomplishments have earned him an induction into the Information Security Hall of Fame and have awarded him as a Cyber Wingman from the US Air Force. His recognition has caught the interest of current clients, who include international banking institutions, Fortune 500 organizations, Bill Gates, and Saudi Aramco. His entrepreneurial accomplishments include three successful exits building eight-, nine-, and ten-figure organizations. Aside from his seasoned technical expertise, Dr. Cole recently released his eighth book, Cyber Crisis, which debuted at #1 on the Wall Street Journal's bestseller list. Dr. Cole's accomplishments are consequential to fulfilling his goal of providing relief in cybersecurity, and his mission: to make cyberspace a safe place to live, work and raise a family 00:00 Introduction 00:19 Our Guest 01:17 Lady Luck and the CIA 05:19 Revolutionary ideas 06:25 The prioritization of Security 08:45 Cybersecurity is not a technical problem 14:30 Paralyzing with Prevention 19:53 Where good CISOs become world class 26:59 Why is the government not responsible for Cyber? 29:44 What was your advice to President Obama? 35:19 The foundation of a cybersecurity program 41:11 BOOK: Cyber Crisis 43:15 Connecting with Eric ---------------------------------------------------------------------- To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​ ----------------------------------------------------------------------

Jan 05, 202444:46
S13 E4 Holiday Season Verification Attacks

S13 E4 Holiday Season Verification Attacks

This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Aaron Painter. Aaron is an Entrepreneur, Author, former VP of Microsoft in China, and is currently the CEO of Nametag Inc. This company invented “Sign in with ID” as a more secure alternative to passwords. Aaron has successfully integrated his human identity platform with major organizations such as Reddit and Web.com. In his 2017 best-selling book, LOYAL, he describes his key to leadership: fostering a culture of listening. Through codifying and implementing a business listening framework, Aaron has built success worldwide.


00:00 Introduction

00:22 Our Guest

01:22 Motivated by cause

06:57 How do they handle cyber in Brazil or China?

09:12 Traditional vs Online ways of verifying your identity

11:34 NameTag Inc

20:31 Okta Breach

22:55 Holiday season attacks

24:15 Humans will be at fault

26:45 Flaws in SSMS

35:23 FaceID verification

37:56 Government help with verification

39:03 India's Aadhaar Verification

42:56 Book: LOYAL

46:03 Connecting with Aaron Painter ---------------------------------------------------------------------- To learn more about Aaron visit https://www.linkedin.com/in/aaronpainter/ https://www.amazon.com/LOYAL-Leaders-Winning-Customer-Employee/dp/161961751XNameTag Inc: https://www.getnametag.com/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​ ---------------------------------------------------------------------- #darkrhiinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Dec 15, 202348:29
S13 E3 Boring is Perception

S13 E3 Boring is Perception

#SecurityConfidential #DarkRhiinoSecurity

This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Dave Sobel. Dave is the host of the “Business of Tech” podcast, a leading IT services-focused news and analysis podcast and YouTube show, with thousands of listeners and subscribers. He also co-hosts the podcast “Killing IT”, and authored the book Virtualization: Defined. Dave has been recognized as one of the top virtualization experts globally as a Microsoft MVP for Virtualization. Dave has served on the executive council for Managed Services and Emerging Technologies, the Vendor Advisory Council, as the founding Chair for the Mobility Community for CompTIA.  00:00 Introduction00:22 Our Guest01:18 Business of Tech Podcast03:21 Dave’s Origin story05:19 Remaining positive06:30 Checklist before switching roles09:35 The market is brutal13:54 Boring is perception16:54 The adoption of Ai, User behavior, and applying common sense28:00 Why would I pay for security?30:25 Laws to protect your data43:52 Hackback47:08 Connecting with Dave---------------------------------------------------------------------- To learn more about Dave visit: https://www.businessof.tech/https://www.amazon.com/LOYAL-Leaders-Winning-Customer-Employee/dp/161961751X To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​ ---------------------------------------------------------------------- #darkrhiinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #darkrhinosecurity

Dec 08, 202348:31
S13 E2 Humans are the Achilles heel in Security

S13 E2 Humans are the Achilles heel in Security

#SecurityConfidential #DarkRhiinoSecurity This week on Dark Rhiino Security’s Security Confidential podcast, Host Manoj Tandon talks to Joseph Steinberg. Joseph is a Cybersecurity thought leader, CEO of SecureMySocial, and technology influencer. He has led businesses and divisions within the information-security industry for nearly two decades, and is one of the top 3 cybersecurity influencers worldwide He is also one of only 28 people worldwide to hold the suite of advanced information security certifications, CISSP, ISSAP, ISSMP, and CSSLP. 00:00 Introduction 00:15 Our Guest 01:57 Getting Computers to do what they are not supposed to do 03:14 Cybersecurity professionals are still making the same mistakes 05:57 Good advice that’s actually terrible 11:42 Government Regulations: Holding software developers accountable for breaches 15:16 Age restrictions for adult content 17:54: Smart Guns 19:22 Is Cybersecurity really relevant? 22:07 Not all about tech. 27:57 Humans are the Achilles heel in Security 30:07 A problem we can’t solve 33:54 Secure My Social 40:01 Connecting with Joseph ---------------------------------------------------------------------- To learn more about Joseph visit: https://josephsteinberg.com/cybersecuritybooks/ https://josephsteinberg.com/cybersecurity-privacy-ai-column-joseph-steinberg-totally-candid/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​ ---------------------------------------------------------------------- #darkrhiinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Dec 01, 202344:51
S13 E1 Shelf Babies: Killing and Birthing Someone Virtually

S13 E1 Shelf Babies: Killing and Birthing Someone Virtually

#SecurityConfidential #darkrhiinosecurity Chris Rock is no stranger to Security Confidential. He is a Cyber Mercenary, A three-time presenter at DEFCON, Author of The Baby Harvest, and Co-Founder of SIEMonster. Chris has spent the last 30 years in the Middle East, the US, and Asia preventing cyber attacks for governments and private organizations alike. 00:00 Introduction 00:16 Our Guest 01:19 What does the talent pool look like for our industry? 04:48 Do you see any non-traditional jobs entering the field? 06:01 Researching how companies and AI handle the finances 08:25 How money is moved through the drug trade 13:09 The Advancement of Natural Language Processes 18:03 How do you build trust? 18:59 The further we go into an automated environment, the easier it is to hack 23:07 Would you rather come up against a Bank teller or a Bot? 25:30 Ransomeware as a service 29:04 Defeating MFA and how we deal with it 38:14 Shelf Babies: Killing and Birthing someone virtually 50:02 More about Chris ---------------------------------------------------------------------- To learn more about Chris visit https://chrisrockhacker.com/ To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @Darkrhiinosecurity Facebook: @Dark-Rhiino-Security-Inc Twitter: @darkrhiinosec LinkedIn: @dark-rhiino-security Youtube: @DarkRhiinoSecurity ​ ---------------------------------------------------------------------- #darkrhiinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Nov 17, 202351:25
S12 E10 Bourbon Breakdown

S12 E10 Bourbon Breakdown

#SecurityConfidential #DarkRhinoSecurity 00:00 Introduction 01:10 Apple Zero-Day Exploited 06:14 TEMU App 09:42 Cisco to buy Splunk 13:35 Bookers Bourbon 14:50 F35 Hacked 21:47 MGM Breached 23:43 5 Lawsuits against MGM resorts 28:14 Sony Systems Hacked by new Group 32:53 Cyber Horror Stories ---------------------------------------------------------------------- Articles Mentioned: https://thehackernews.com/2023/09/latest-apple-zero-days-used-to-hack.html https://grizzlyreports.com/we-believe-pdd-is-a-dying-fraudulent-company-and-its-shopping-app-temu-is-cleverly-hidden-spyware-that-poses-an-urgent-security-threat-to-u-s-national-interests/ https://www.nytimes.com/2023/09/21/business/cisco-splunk-deal.html https://nybreaking.com/im-a-former-defense-official-who-warned-about-the-f-35s-catalogue-of-safety-and-security-problems-years-ago-this-is-why-it-may-have-been-hacked-or-malfunctioned/ https://www.reuters.com/technology/hackers-who-breached-casino-giants-mgm-caesars-also-hit-3-other-firms-okta-says-2023-09-19/ https://www.8newsnow.com/news/local-news/5-lawsuits-go-after-mgm-caesars-following-data-breaches-seek-ok-for-class-action-status/ https://kotaku.com/sony-playstation-hack-breach-ransomware-ransomed-vc-1850870993 ---------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Sep 29, 202333:42
S12 E9 What is Vishing?

S12 E9 What is Vishing?

Dmytro Bielievtsov is the CTO and Co-founder of Respeecher. Respeecher focuses on high-fidelity voice cloning and their synthetic speech technology was the first one to be adopted by big Hollywood production studios in 2019. Respeecher's has already shown up in major Feature films, TV projects, and Video Games. Animation studios, Localization and media agencies, in Healthcare, and other areas are using it. Some of their projects include artificially voicing God of War Ragnarok, de-aging Mark Hamill’s voice in The Mandalorian and The Book of Boba Fett, and James Earl Jones’s voice for the Obi-Wan Kenobi series. They have also been featured in Forbes, The Guardian, TechCrunch, VentureBeat, to name a few.00:00 Introduction00:19 Our Guest01:33 Running a company in the Ukraine04:55 Respeecher07:24 How does Respeecher work?10:37 How did Hollywood find you?12:10 Voice work for Star Wars14:55 Do you keep the voice?16:23 Deep Fake in the Election22:02 Vishing23:25 Luke Skywalkers Voice25:26 De-Aging Mark Hamill’s voice26:15 Animal Voices28:02 The Future for Respeecher30:11 Electrolarynx devices ---------------------------------------------------------------------- To learn more about Respeecher visit https://www.respeecher.com/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Sep 22, 202331:54
S12 E8 The Human Factor is the Weakest Link

S12 E8 The Human Factor is the Weakest Link

Frank is a cybersecurity and privacy expert and former C-level executive with 25 years of experience developing compliance and privacy programs for large healthcare systems. Riccardi has held positions as Chief Compliance and Privacy Officer overseeing high-profile data breaches and cybersecurity investigations. His book, “Mobilizing the C-suite: Waging War Against Cyberattacks,” urges C-suite leaders to take action against cyberattacks by deploying basic cybersecurity controls and supporting frontline cybersecurity professionals with companywide cyber hygiene training. It also introduces real-world cybersecurity principles to college students, our future generation of cyber-savvy leaders.


00:00 Introduction

00:19 Our Guest

01:20 Frank’s Background

02:05 2021 Events, Motivation, and the Colonial Pipeline

07:28 Regulations in Healthcare 

10:14 Does the C-suite understand that Cyber is a business problem or an I.T. problem?

17:53 The trickery behind the technology

21:17 The Human Factor is the weakest link in Cybersecurity

23:27 Why do Healthcare organizations ask for Social Security?

28:15 Why can’t the healthcare industry solve the problem?

31:55 Bills from Hospitals. What percentage do they get?

35:38 Mobilizing the C-suite: Waging War Against Cyberattacks

36:55 Connect with Frank!



Frank https://www.linkedin.com/in/frank-riccardi-jd-chc-261831b1/

Sep 15, 202338:18
Streaming Services vs. Cable | Confidential Happy Hour

Streaming Services vs. Cable | Confidential Happy Hour

Taking a break from our regularly scheduled Security Confidential episodes to talk about Streaming services, important skills that need to be taught in schools, an Okta Breach, and "Owning" DVDs. To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #disneyplus #hulu #hbomax #netflix #streamingservices #entertainmentnews #movies #actionmovies #jamesbond #schooleducation #oktabreach

Sep 08, 202331:05
S12 E7 More Than The Original Voice Of SIRI

S12 E7 More Than The Original Voice Of SIRI

Her career started with music. From then on, she did hundreds of commercial jingles (famously, Tillie the All-Time Teller for the first successful ATM in the US) and sang backup vocals on tour with Burt Bacharach and Roy Orbison. She got into voiceover and acting work at Doppler Studios in Atlanta, when the voice actor hired for a particular commercial didn't show up, and studio owner Pete Caldwell suggested she do the spot instead. She ended up doing spots for Coca-Cola, IBM, Papa John's Pizza, McDonald's, AT&T, Wendy's, Goodyear, Ford, Chiquita, etc., for both radio and TV. She also ended up working on camera for such clients as Morrison's, Ford, GA Pacific, IBM, Kimberly Clark, etc. But she’s Best known as the original VOICE OF SIRI. 00:00 Introduction 00:18 Our Guest 01:18 Her background 03:01 How Apple Took Her Voice 04:55 Remaining positive 05:16 Working with Roy Orbison 06:55 Perfect Pitch 07:40 Learning to play the Piano 08:40 How Siri affected her career 09:31 A Siri-like voice 10:07 Future acting jobs 11:45 Are you tech-savvy? 12:33 Remaining Positive 14:44 AI taking over voice work 16:53 Have you ever not been selected as the voice of Siri? 18:18 Hire Susan for your speaker events 19:00 A message to anyone in Tech ---------------------------------------------------------------------- To learn more about Susan or to hire her for your next event, visit https://susancbennett.com/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #Voicework #SAGAFTRAstrike #SAGstrike #Actorstrike #Siri #voiceacting #appleceo #susancbennett #susanbennett #mcdonalds #voicecloning ---------------------------------------------------------------------- Photos used: McDonald's logo: https://www.flickr.com/photos/neeky_b/24814690583 Coca-Cola logo: Viktaur, Public domain, via Wikimedia Commons

Sep 01, 202320:39
S12 E6 A Senior Survival Guide

S12 E6 A Senior Survival Guide

Peter Warmka is a Keynote Speaker, Author, Cybersecurity/Insider Threat Consultant, Founder of Counterintelligence Institute, and a retired senior intelligence officer with the U.S. Central Intelligence Agency (CIA) where he specialized in clandestine HUMINT (human intelligence) collection. He was on previously to talk about his book “Confessions of a CIA Spy” and now he’s here to promote his new book “Why Are You Messing With Me? - Senior Survival Guide on Fraud, Privacy, and Security". 00:00 Introduction 00:19 Our Guest 02:06 ChatGPT and Generative Ai: How they’re used 06:14 Evil ChatGPT 07:16 How do we remain secure with Ai? 12:18 Why you shouldn’t be giving out your SSN 13:35 Sim Swapping Case 16:26 U.A.E Voice Cloning Case 23:07 What measurements does the CIA take? 25:55 Facial recognition 27:03 Educating the Public 29:38 Why are you messing with me? - Senior survival guide 43:28 More about Peter --------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- Links Mentioned: $24M AT&T Sim Swapping Case: https://blockworks.co/news/att-crypto-sim-swap-lawsuit Voice Cloning U.A.E Case: https://www.forbes.com/sites/thomasbrewster/2021/10/14/huge-bank-fraud-uses-deep-fake-voice-tech-to-steal-millions/?sh=4e5cb5507559 Peters Books: https://www.amazon.com/stores/Peter-Warmka/author/B08QZ8C7S6?ref=ap_rdr&store_ref=ap_rdr&isDramIntegrated=true&shoppingPortalEnabled=true ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Aug 25, 202344:40
S12 E5 Building Awareness About Your Startup

S12 E5 Building Awareness About Your Startup

#SecurityConfidential #DarkRhinoSecurity Dan Wachtler is the CEO of DarkLight Inc and an accomplished entrepreneur with over 20 years of experience serving in both executive and sales leadership roles. Previously, he was the President of root9B Holdings, Inc., a NASDAQ-listed advanced cybersecurity firm and creator of the first-ever commercial HUNT platform. Dan has led numerous capital raises and managed large corporate realignment efforts including international expansion efforts. 00:00 Disclaimer 00:09 Introduction 00:25 Our Guest 01:18 Journey into Becoming an Entrepreneur 03:44 What is success to you? 08:21 What’s the secret to bringing awareness to your startup? 12:22 How do you differentiate? 16:43 What does DarkLight do? 22:53 How does your system differentiate between industries? 28:30 Understanding Risk 31:09 Does A.I. have a role in this? 36:07 Getting a Demo with DarkLight 37:44 More about Dan and DarkLight ---------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Aug 18, 202343:16
S12 E4 Understand, Manage, and Measure Cyber Risk

S12 E4 Understand, Manage, and Measure Cyber Risk

Ryan is the CEO of Neuvik and the author of the book “Understand, Manage, and Measure Cyber Risk”. His past adventures include growing a cyber research and development company, formerly serving as Chief of Staff and Associate Director of Cyber for the U.S. Department of Defense, a cybersecurity strategist for McKinsey, and a technologist at IBM. 00:00 Introduction 00:17 Our Guest 01:08 Behind the name Neuvik 02:20 What does Neuvik do? 03:29 Imperfect Technology layered on Imperfect Technology 05:35 Is the next gadget worth it? 07:54 Guiding a newbie CXO 10:50 What is it that you're protecting? 22:54 Which framework has worked the best? 25:56 Understand, Manage, and Measure Cyber Risk 35:39 Leveraging vulnerabilities for offensive purposes 40:35 Connecting with Ryan --------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com --------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ --------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #riskmanagement #cyberrisk #cybernews #cyberbook #Neuvik

Aug 11, 202342:50
S12 E3 Your guide to SBOMs

S12 E3 Your guide to SBOMs

Eric is an entrepreneur and the CTO of SOOS, a software technology company. He has 15+ years of experience in leadership, business strategy, and software team transformation with a broad set of skills. On top of that, Eric has formal training as a software and mechanical engineer 00:00 Introduction 00:16 Our Guest 02:11 Open Source is Everywhere. Even Healthcare 04:45 Legal Risk using Open Source 06:05 Reading the Terms and Conditions 07:55 Would development time increase if you don’t use Open Source? 09:16 26,448 New CVEs Reported in 2022 11:03 Equifax Attack affected 143 Million 13:01 Therac-25 Medical Device Tragedy 14:53 What is a SBOM? 18:53 You need an FBOM 20:21 Knowing your “ingredients” 21:53 Is this a blockchain problem? 23:42 How does an SBOM help me? 31:48 Embedded Systems 40:28 Forking a project 43:10 How is SOOS staying up to date 47:40 Holding companies responsible 53:15 News from Eric

Aug 04, 202354:52
S12 E2 Who is Responsible for Cybersecurity?

S12 E2 Who is Responsible for Cybersecurity?

Robert Black is a Lecturer in Information Activities at Cranfield University on behalf of the UK Defence Academy. He is also the former Deputy Director of the UK’s National Cyber Deception Laboratory. At the Defence Academy, he helps educate senior military leaders about Warfare in the Information Age. His interests are several interests one of them being the role of influence and deception in cyber. 00:00 Introduction 00:19 Our Guest: Robert Black 01:28 Rob's Journey into Cyber 06:20 The weakest link is designing systems that don’t appreciate humans are integrated as a part of the system 09:17 Taking an insurance mindset 10:36 Does the Lock and Key model for Cyber work on bad actors? 16:12 Legality and Kinetic Response (Hack back, WannaCry attack, Liam Neeson, Crowdstrike report, U.S. Military) 22:30 Striking Fear into the Hackers 28:00 Does that help the SOC team? 29:45 Arguing with Attorneys and Hackers 33:19 Use of Deception in Tech 35:32 The psychology of the adversary 41:41 Who is responsible for Cybersecurity? 52:43 Connecting with Rob ---------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Jul 28, 202355:26
S12 E1 Tech Talk Overwhelms the NonTechnical

S12 E1 Tech Talk Overwhelms the NonTechnical

Marius is also a public speaker, mentor, and non-executive director for many cybersecurity businesses. He was the former Cloud Security Architect and Analyst at Domino’s Pizza UK & Ireland, Analyst at Burberry, and many more. 00:00 Introduction 00:18 Our Guest: Marius Poskus 01:03 Physical Security to Cybersecurity 04:14 Tech talk overwhelms the nontechnical 11:00 How do you go about assessing risk? 17:20 A message to the executives 21:56 Cyber basics: How do you connect the dots? 26:39 Understanding the techniques from the 3 letter agencies 42:47 The Role of Offense 48:58 What can we do to implement processes to look out for configurations? 53:55 More about Marius ---------------------------------------------------------------------- To learn more about Marius visit https://www.linkedin.com/in/marius-poskus-92611b22/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #informationsecurity #defense #depth #ciso #risk #malware #ransomware #technews #informationtechnology #oilandgas #mssp #entrepreneur #invest #businesstips #dublinohio #digitalmarketing #socialmediamarketing#follow #foryoupage #Computerscience #Security #Cyberattack #Cloudcomputing

Jul 21, 202357:33
S11 E10 Can Cyber Mercenaries Overthrow the Government?

S11 E10 Can Cyber Mercenaries Overthrow the Government?

#SecurityConfidential #DarkRhinoSecurity Chris Rock is a Cyber Mercenary, A three-time presenter at DEFCON, Author of The Baby Harvest, and Co-Founder of SIEMonster. Chris has spent the last 30 years in the Middle East, the US, and Asia preventing cyber attacks for governments and private organizations alike. Chris and his team excel at countering sophisticated cyber threats with the implementation of advanced SIEM methods for all types of organizations. Chris is passionate about raising the public’s awareness of modern cybersecurity threats and trends. 00:19 Can Cyber Mercenaries overthrow the government? 04:32 What can we do about it? 09:50 SIEM logic for engineers 12:43 Could the government apply policies to help? 14:32 Refusing to loose Power 17:55 Chris’ Research

Jul 14, 202322:12
S11 E9 Terminated From Speaking at TED Global

S11 E9 Terminated From Speaking at TED Global

Chris Rock is a Cyber Mercenary, A three-time presenter at DEFCON, Author of The Baby Harvest, and Co-Founder of SIEMonster. Chris has spent the last 30 years in the Middle East, the US, and Asia preventing cyber attacks for governments and private organizations alike. Chris and his team excel at countering sophisticated cyber threats with the implementation of advanced SIEM methods for all types of organizations. Chris is passionate about raising the public’s awareness of modern cybersecurity threats and trends. 00:00 Introduction 00:24 Our Guest 01:18 How many Chris Rocks are there? 02:58 3 Cyber Threats to Society 05:56 Can you use Genralative Ai for malicious reasons? 09:00 The Third Cyber Threat to Society 12:26 Looking for flaws in the process 16:15 The Gartner Model 18:16 Is it Laziness, Apathy, or Indifference? 23:59 Terminated from speaking at TED Global ---------------------------------------------------------------------- Order his book here: https://www.amazon.com/Baby-Harvest-terrorist-criminal-laundering/dp/1515014576 To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Jul 07, 202330:01
S11 E8 The Recovery of Missing and Exploited Children

S11 E8 The Recovery of Missing and Exploited Children


#SecurityConfidential #DarkRhinoSecurity --------------------------------------------------------------------------- Your life is important to everyone around you. If you have had Suicidal thoughts, please call or chat the: 988 Suicide and Crisis Lifeline Hours: Available 24 hours. Languages: English, Spanish You can also chat with them online: https://988lifeline.org/ --------------------------------------------------------------------------- Kevin Metcalf is a former federal agent turned prosecutor, author, and founder of the National Child Protection Task Force, which brings together recognized experts in fields such as strategic legal applications, OSINT, cellular mapping and analysis, dark web investigations, and cryptocurrency to aid law enforcement agencies everywhere. Kevin has assisted with the recovery of numerous missing and exploited children and the identification and apprehension of sexual predators in multiple states. 00:00 Disclaimer 00:10 Introduction 00:23 Our guest 01:30 What is OSINT? How does it work? 05:10 Privacy laws 11:30 Sextortion 17:51 Financial Sextortion: How it works 20:00 When does it become statistically significant 21:33 What lead Kevin to help children 22:37 What role does law enforcement play? 25:52 A special case 28:45 OSINT, Mobile devices, and Kevins Books 34:53 Kevin's thoughts on the ADPPA 41:19 News from Kevin ---------------------------------------------------------------------- To learn more about The National Child Protection Task Force (NCPTF) visit: https://www.ncptf.org/ Read more of Kevins Work: https://www.amazon.com/Books-Kevin-Metcalf/s?rh=n%3A283155%2Cp_27%3AKevin+Metcalf To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #missingchildren #NationalChildProtectionTaskForce



Jun 30, 202343:32
S11 E7 What makes a great DevOps team?

S11 E7 What makes a great DevOps team?

Benjamin Johnson is a serial entrepreneur with a track record of success and hands-on open-source programming experience. With 20+ years as a software developer and leader, Benjamin is the CEO & Founder of Particle41, a dev firm founded by industry veterans that aims to help companies accelerate their initiatives through Software Development, DevOps, and Data Science. 00:00 Introduction 00:20 Our Guest 01:25 Behind the name: Particle41 03:07 Ben’s Origin story 05:14 Where did the ideas come from? 08:20 Outsourcing DevOps 10:45 What makes a great DevOps team? 16:50 Extreme Ownership 19:50 “Bridge” Personality 21:30 Is there a benefit to being first to market? 22:55 Monetizing Open Source 28:22 Characteristics that make successful people 34:02 More about Ben ---------------------------------------------------------------------- To learn more about Ben visit https://www.linkedin.com/in/benjaminrjohnson/https://particle41.com/ https://www.linkedin.com/company/particle41/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday

Jun 23, 202336:11
S11 E6 You CAN Train Your Mind

S11 E6 You CAN Train Your Mind

#SecurityConfidential #DarkRhinoSecurity This is part 2 of our discussion. Bec McKeown is a Chartered Psychologist with twenty years experience of in researching and evaluating human performance in high-risk, high-stakes organizations, including the UK Ministry of Defence. She is an expert on the ways humans behave when working in complex, uncertain, and ambiguous environments and human performance in cybersecurity. She established Mind Science which assists companies at an operational and strategic level. 00:00 Introduction 00:10 Does a person have the ability to pause their thoughts before taking action? 05:18 What is Resilience? 10:32 You can Train your mind 12:34 Why do teams still fall apart under pressure? 14:42 What would you say to the executive? 17:26 What to do if you get the same results again? 19:00 The Wicked Problem 21:04 The Chain of Command 28:01 Mandatory Security Awareness training: What does that have to do with me? 33:30 More about Bec Thinking, Fast and Slow by Daniel Kahneman https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555 ---------------------------------------------------------------------- To learn more about Bec McKeown visit https://www.linkedin.com/in/rebeccamckeowncpsychol/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #psychology #techpsychology #cyberchoices #trainingyourthinking

Jun 16, 202335:13
S11 E5 The Psychology behind our Cybersecurity Choices and Teams - Part 1

S11 E5 The Psychology behind our Cybersecurity Choices and Teams - Part 1

This is part 1 of our discussion. Bec McKeown is a Chartered Psychologist with twenty years’ experience of researching and evaluating human performance in high-risk, high-stakes organizations, including the UK Ministry of Defence.  She is an expert on the ways humans behave when working in complex, uncertain and ambiguous environments and human performance in cybersecurity. She established Mind Science which assists companies at an operational and strategic level.


00:00 Introduction 

00:20 Our Guest

01:27 What is a chartered Psychologist?

03:40 How do you control chaos?

07:08 How we compare to mIlitary Training?

09:20 The baseline of response: How does the brain work?

13:31 So how do we structure a team?

17:10 Cognitive Agility: Passing along that knowledge

20:29 Getting Comfortable with being uncomfortable 


Thinking, Fast and Slow by Daniel Kahneman

https://www.amazon.com/Thinking-Fast-Slow-Daniel-Kahneman/dp/0374533555


--------------------------------------------------------------------- To learn more about Bec McKeown visit https://www.linkedin.com/in/rebeccamckeowncpsychol/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #cybersecurity #cyberpodcast #ai #artificialintelligence #securitypodcast #cybernews #technews #techsoftware #informationtechnology #infosec #cybersecurityforbeginners #technewstoday #psychology #techpsychology #cyberchoices

Jun 09, 202325:24
S11 E4 Once Wrestling a 750lb Bear, Now a Penetration Tester

S11 E4 Once Wrestling a 750lb Bear, Now a Penetration Tester

#SecurityConfidential #DarkRhinoSecurity

Phillip is an offensive security professional, educator, mentor, author, and frequent public speaker. His passions outside of the technical side of cybersecurity are sharing resources, professional networking, and bringing people together. He is also the host of The Hacker Factory Podcast and his new podcast, the Phillip Wylie Show. Phillip is the concept creator and coauthor of The Pentester Blueprint: Starting a Career as an Ethical Hacker.

00:00 Introduction

00:18 Our Guest

01:45 Phillips Origin Story

04:06 Wrestling a 750 pound bear

07:41 From Wresting to Cyber

10:12 What motivated Phillip to pursue Ethical Hacking?

11:43 Vulnerability management: What are we getting wrong?

14:52 Changing the Mindset

26:51 What is the role of Threat Intel?

28:08 Asset Intel approaches31:05 Ransomware: It’s still growing34:35 The Hacker Factory Podcast34:59 The Phillip Wylie Show36:17 News from Phillip37:44 Connecting with Phillip ---------------------------------------------------------------------- To learn more about Phillip visit :https://www.linkedin.com/in/phillipwylie/https://www.thehackermaker.com/Podcasts:https://www.thehackermaker.com/the-hacker-factory-podcast/https://www.thehackermaker.com/phillip-wylie-show/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​

Jun 02, 202338:47
S11 E3 From Disinformation to AI - Pt 2

S11 E3 From Disinformation to AI - Pt 2

George Kamide was once an anthropologist, a rock climbing instructor, a wedding photographer, and a creative writer. He’s the host of the cybersecurity podcast First Watch and the podcast Bare Knuckles and Brass Tacks. As an advocate for greater representation in information security, he sits on the advisory board for Vision & Voice, a community dedicated to lifting women into cyber leadership positions. He has briefed US Cyber Command and the Congressional Cyber Caucus. 


00:10 Changing the vulnerability landscape

01:48 Voice Cloning and email chat hacking

05:55 How does a machine generate context?

07:58 Social Media bots

10:06 What jobs will go away with AI?15:40 Whose fault is it?

20:40 Can you 100% trust something?

23:03 Work from Home

26:11 Connecting with George

 

----------------------------------------------------------------------


To learn more about George visit https://www.linkedin.com/in/george-ka...


To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

----------------------------------------------------------------------


SOCIAL MEDIA:

Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!


Instagram: @securityconfidential and @OfficialDarkRhinoSecurity

Facebook: @Dark-Rhino-Security-Inc

Twitter: @darkrhinosec

LinkedIn: @dark-rhino-security

Youtube:  @Dark Rhino Security ​


----------------------------------------------------------------------

https://www.zdnet.com/article/watch-o...


https://www.wsj.com/articles/i-cloned...


https://www.washingtonpost.com/techno...


https://abcnews.go.com/GMA/Family/mom...


----------------------------------------------------------------------

May 26, 202328:51
S11 E2 From Disinformation to AI - Pt 1

S11 E2 From Disinformation to AI - Pt 1

George Kamide is a Senior Director at SafeGuard Cyber. He was once an anthropologist, a rock climbing instructor, a wedding photographer, and a creative writer. He’s the host of the cybersecurity podcast First Watch and the podcast Bare Knuckles and Brass Tacks. As an advocate for greater representation in information security, he sits on the advisory board for Vision & Voice, a community dedicated to lifting women into cyber leadership positions. He has briefed US Cyber Command and the Congressional Cyber Caucus. 00:00 Introduction 00:18 Our Guest 01:30 George’s Origin story 05:04 Twitter bots controlled by Russia 07:37 Does Congress understand the cyber risks? 09:57 First Watch 13:03 Bare knuckles and Brass Tacks 14:15 Bad practices vendors make 18:40 Developing trust with People virtually 20:43 Using AI for Marketing ---------------------------------------------------------------------- To learn more about George visit https://www.linkedin.com/in/george-kamide/https://www.zdnet.com/article/twitter-bot-activity-spiked-after-the-release-of-the-mueller-report/https://www.cyberdefensemagazine.com/russian-twitter-bot-activity-increased-in-the-wake-mueller-report-release/https://www.safeguardcyber.com/podcasts To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- #darkrhinosecurity #securityconfidential #twitterbot #cybersecurity #cyberpodcast #ai #artificialintelligence #marketingusingai #securitypodcast #firstwatchpodcast #bareknucklesandbasstackspodcast #cybernews

May 19, 202327:30
S11 E1 Having ACCURATE Asset Inventory

S11 E1 Having ACCURATE Asset Inventory

Huxley Barbee is a Security Evangelist at runZero (formerly Rumble Network Discovery), a company founded by Metasploit creator HD Moore that helps companies discover unmanaged devices for asset inventory. Huxley previously worked for Cisco, Sparkpost, and most recently, Datadog – where he formulated the Datadog Cloud Security Platform. He has spent over 20 years as a software engineer and security consultant. He attended his first DEF CON in 1999 and holds both CISSP and CISM certifications. On top of that, he’s also an organizer of BSidesNYC.  


00:00 Introduction

00:15 Our Guest

01:00 Huxleys Origin Story

02:27 Proactive Security, Risk, and Asset Inventory: What’s the connection?

04:56 Using the right tools

07:17 IPv4 and IPv6

11:15 What do you need in terms of an ACCURATE Asset inventory?

21:56 Asset Inventory Playing a role in ransomware

26:17 Connecting with Huxley 


https://www.runzero.com/

https://www.linkedin.com/in/jhbarbee/

https://www.helpnetsecurity.com/2023/02/24/bsidesnyc-2023/



May 12, 202327:30
S10 E10 How Do You Build A Successful Video Games

S10 E10 How Do You Build A Successful Video Games

Tom Dusenberry has spent 30 years of his career as an interactive entertainment executive and was the CEO of Hasbro Interactive, Games.com, and Atari. He is currently the CEO of Dusenberry Entertainment. Tom is closely associated with great game brands like Monopoly, Trivial Pursuit, Frogger, Star Wars, and Roller Coaster Tycoon.


00:00 Introduction

00:22 Our Guest

01:26 Are you a gamer?

01:55 Tom's Favorite Games in different eras

04:54 Elements for a good game

07:02 Streaming Games

09:55 The Blue Ocean Strategy

12:03 Controlling the Gaming Market

14:20 Dusenberry Entertainment

16:35 The Process needed to create a game

19:54 Is creating a gaming community part of the process?

22:20 Gaming Franchises

23:27 Ai and it’s Role in the gaming world

25:03 Does violence in games cause violence in real life?

27:30 Advice for being successful in gaming

29:33 Got a game idea? Contact Tom! (Tom@tomdusenberry.com) ---------------------------------------------------------------------- To learn more about Tom visit Dusenberryentertainment.com To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security

​----------------------------------------------------------------------

Frogger:https://www.amazon.com/Frogger-Classic-Arcade-Poster-Vintage/dp/B098TPZRNL


Sonic the Hedgehog:

https://www.bbc.com/news/newsbeat-57566746

https://play.google.com/store/apps/details?id=com.sega.sonic1px&hl=en_US&pli=1


First Nintendo System:

https://www.amazon.com/Nintendo-Entertainment-System-NES-Classic/dp/B01IFJBQ1E


Nintendo 64 Console: GoldenEye 007

https://retrovgames.com/n64-console-goldeneye-007/


RollerCoaster Tycoon:

https://store.steampowered.com/app/683900/RollerCoaster_Tycoon_Classic/


Forza: https://store.steampowered.com/app/1551360/Forza_Horizon_5/

Apr 28, 202331:12
S10 E9 April 14th News of the Week: Discord, Putin, and Chinese Data

S10 E9 April 14th News of the Week: Discord, Putin, and Chinese Data

Chris and Rory are BACK! This time with Tech news that you should know about. 00:00 Introduction 02:53 War Thunder Discord Documents 11:54 U.S. taking your Data vs. Chinese taking your Data 13:49 Apple Has Weird Terms and Conditions 15:23 A Guide to Understanding the Hoax of the Century 22:00 Russia’s Electronic Draft Bill ---------------------------------------------------------------------- To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- https://www.cnn.com/2023/04/14/politics/discord-chatrooms-leaked-pentagon-documents/index.html Understanding the Hoax of the Century: https://www.tabletmag.com/sections/news/articles/guide-understanding-hoax-century-thirteen-ways-looking-disinformationhttps://apnews.com/article/russia-ukraine-war-draft-mobilization-conscription-notices-bf18ad64dd08c9d11aab2e222cabfee9https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/on-the-internet ---------------------------------------------------------------------- #warthunder #apple #termsandconditions #cybernews #technews #russiannews #electronicdraft#militarydraft #chinesedata #chineseapps #discord #itunes #media #politicsnews

Apr 21, 202326:14
S10 E8 How Do You Build A Leader

S10 E8 How Do You Build A Leader


Melissa Thornley is a leadership consultant who focuses on using emotional intelligence to drive better results. She has years of experience as an advertising/film industry executive and has worked with McDonald’s, Walgreens, Anheuser Busch, Nike, Capital One, Coca-Cola, and PBS. She's known for her contagious energy and passion for turning intangible concepts into tangible outcomes. 00:00 Introduction 00:18 Our Guest 01:15 Starting off in Tech 06:58 Working with Celebrities 09:05 Celebrity leadership 10:20 How do you create a leader? 14:07 Emotional intelligence: What is it? 19:37 Managing your triggers 22:20 Have a system or process 30:25 Personal and Team Accountability 32:38 “Your baby’s Ugly” 40:12 More about Melissa ---------------------------------------------------------------------- To learn more about Melissa visit https://www.melissathornley.com/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- Read More About Melissa: https://reelchicago.com/article/reel-women-author-leadership-expert-melissa-thornley/https://medium.com/authority-magazine/melissa-thornley-emotional-intelligence-what-it-is-why-it-is-so-essential-and-how-we-can-2f75525bec62https://cceglobal.org/event/global-industry-spotlight-melissa-thornley/

Apr 14, 202342:43
S10 E7 Stop Playing the Victim Role

S10 E7 Stop Playing the Victim Role

Joel Beasley is a well-known figure in the tech industry. In 2017, he founded the Modern CTO Podcast while writing the Modern CTO book, with the goal of interviewing CTOs and sharing their experiences with others in the tech community. From there, Joel founded ProSeries Media to help companies worldwide create their own podcasts. Through his work on the Modern CTO Podcast and ProSeries Media, Joel has inspired others to share their knowledge and insights with the wider community. His passion for creating engaging content that informs, inspires, and entertains has made him a sought-after speaker and advisor on all things tech. 00:00 Introduction 00:22 Our Guest 01:04 Joel’s Origin Story 05:45 Motivation to keep you going 07:18 Maintaining a positive attitude 08:49 What does a CTO do? 12:09 The Role of Failure in Success 15:51 What if Success happens easily? 17:02 Is there a secret sauce to say motivated through the failures. 21:11 Self-awareness 22:25 Playing the Victim 22:52 Nashville shooting 30:18 Modern CTO 30:22 Joel Beasley Tech Titans 30:34 Joel Beasley Tech and Science ---------------------------------------------------------------------- To learn more about Joel visit https://www.linkedin.com/in/joelbeasleyleader/https://proseriesmedia.com/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​

Apr 07, 202332:46
S10 E6 U.S. Air Force Academy to Teaching Cyber

S10 E6 U.S. Air Force Academy to Teaching Cyber

Josh has 10 years of military experience, as an Air Force pilot and cyberwarfare officer. Currently, Josh is a Senior Technical Trainer for Neuvik Solutions, providing training, engagement management, penetration testing, risk assessments, and business consulting for clients 00:00 Introduction 00:22 Our Guest 01:06 U.S Air Force Academy to Cyber 07:28 Is there a bias against Veterans entering Cybersecurity? 08:49 What are clients getting wrong with Infosec? 13:14 Learning Lessons 16:58 People like “Free” 17:35 Constantly Changing 20:43 More about Josh ---------------------------------------------------------------------- To learn more about Josh visit https://www.linkedin.com/in/joshuacmason/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​ ---------------------------------------------------------------------- Images: https://www.military.com/equipment/marine-corps-aircrafthttps://www.zuora.com/billing-topics/annual-recurring-revenue/#:~:text=Annual%20Recurring%20Revenue%2C%20or%20ARR,for%20a%20single%20calendar%20year.

Mar 31, 202324:25
S10 E5 What is Hack-back?

S10 E5 What is Hack-back?

Shea has over 25 years in cybersecurity, risk, and technology. Including incident response planning, crisis management, security assessments, developing and maturing cybersecurity programs, and more. 00:00 Introduction 01:07 Our Guest 02:39 The policy question that made me pause my vacation 05:16 Diversity in Cyber 06:22 Echelon Risk 07:05 Has the Executive Mindset changed? 12:52 Hack-Back and the Biden administration 18:50 News from Shea ---------------------------------------------------------------------- 2023 Central Ohio InfoSec Summit (https://www.infosecsummit.com/website/44575/home/) – it’s titled “Beyond Checking the Box: Putting Compliance at the Forefront of Decision-Making” being presented by Amelia Fisher https://echeloncyber.com/ Hack-Back https://www.techdirt.com/2023/01/27/biden-administration-declares-war-on-the-internet-clears-path-for-offensive-hacking-efforts-by-federal-agencies/https://www.securityweek.com/us-national-cyber-strategy-pushes-regulation-aggressive-hack-back-operations/https://www.darkreading.com/ics-ot/bidens-cybersecurity-strategy-calls-for-software-liability-tighter-critical-infastructure-securityhttps://slate.com/news-and-politics/2023/01/biden-cybersecurity-inglis-neuberger.htmlhttps://www.newyorker.com/magazine/2018/05/07/the-digital-vigilantes-who-hack-backhttps://techbeacon.com/security/why-hack-back-still-worst-idea-cybersecurity --------------------------------------------------------------------- To learn more about Shea visit https://www.linkedin.com/in/sheanangle/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com ---------------------------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: @securityconfidential and @OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @dark-rhino-security Youtube: @Dark Rhino Security ​

Mar 24, 202320:48
S10 E4 Why is the U.S Banning Tiktok?

S10 E4 Why is the U.S Banning Tiktok?

Continuing our Conversation with Navy SEAL, Mike Rice  


00:00 Introduction 

00:18 Our Guest 

00:30 The Future of War 

05:06 Is China our biggest threat?

 09:13 TikTok and other Chinese Apps 

11:40 Spy Balloons? Weather balloons? What was it? 

16:13 Where do you see the war in Ukraine headed?

 17:58 Who is the Wagner group? 

18:41 Russia

Mar 17, 202323:30
S10 E3 How Smartwatches lead Iran to US Troops

S10 E3 How Smartwatches lead Iran to US Troops

Host Rory Meikle chats with Mike Rice. Mike is a retired Navy Seal officer who started out his Military career as an enlisted marine corp infantry. This is part 1 of their conversation.


00:00 Introduction

00:18 Our Guest

00:33 The Navy SEAL Team

04:05 What made you shift to SEAL Team?

08:16 What was the atmosphere like in BUD/S?

11:09 How was the SEAL Team Technology after 9/11?

13:21 Leveraging Technology

17:39 Where do you see technology affect you the most?

21:40 Stories with Mike

Mar 10, 202325:00
S10 E2 The Secrets of Linkedin's Algorithm

S10 E2 The Secrets of Linkedin's Algorithm

David is a SOC Analyst, Cyber Mentor, Educator, and Founder and Creator of CyberTech Dave. He holds a Master of Science degree in Information Systems and has a wide array of skills ranging from Teaching to Virus Removal. David is passionate about Cybersecurity and enjoys using his platform to teach people how to protect themselves and stay safe online.  


00:00 Introduction 

00:17 Our Guest  

01:12 Using LinkedIn to break into Cybersecurity 

07:30 Fake Profiles on Linkedin 

08:30 Having a complete profile 

10:19 the LinkedIn Algorithm  

14:20 Useful Certifications and Resources 

26:39 Davids Book about Women in Cyber 

32:28 SOC fatigue

 36:27 What role does Automation has? 

37:46 Will Automation replace a SOC Analyst? 

39:30 How can Clients improve their Cybersecurity? 

42:35 Risk Assessments: Who should be leading? 

45:20 Connecting with David


---------------------------------------------------------------------- 

To learn more about David visit https://www.linkedin.com/in/david-meece-cybertech-dave/ 

To learn more about Dark Rhino Security at https://www.darkrhinosecurity.com

----------------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on social media, where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc

 Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security ​ 

----------------------------------------------------------------------

  https://securityplus.training/

Mar 03, 202349:36
S10 E1 Helping Pave the way for Women in Cyber

S10 E1 Helping Pave the way for Women in Cyber

#SecurityConfidential #DarkRhinoSecurity 

Jax is a cyber influencer, author, speaker, podcaster, President, and Founder of Outpost Gray. With over 13 years of experience working in IT and cyber, both private and public sectors. Jax spent a significant portion of her life serving in the Special Operations Command, spearheading global Cyber, Electronic Warfare, and Intelligence operations. She is also the co-host of the cybersecurity podcast 2CyberChicks.   


00:00 Introduction 

00:16 Our Guest 

01:52 Being in the Special Forces as a Woman 

04:30 Cultural Support Team Program 

07:47 Jaxs’ Current Mission 

09:29 What is an Entry-Level Job? 

11:49 How Jax began her journey into Cybersecurity 

16:07 Data Breaches: What’s broken? 

18:07 Company Policies and Bringing Awareness 

19:38 Compliance isn’t security 

23:17 NIST vs CMMC vs ISO 

27:03 Who uses CMMC? 

30:56 Resources for CMMC  

32:12 What should the Federal Government be adopting? 

36:45 HackBack 

41:58 Connect with Jax

 ---------------------------------------------------------------------- 

 To learn more about Jax visit https://www.linkedin.com/in/iamjax/ 

https://twitter.com/outpostgray 

https://iamjax.me/ 

To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com

----------------------------------------------------------------------  

SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio!  

Instagram: @securityconfidential and @OfficialDarkRhinoSecurity 

Facebook: @Dark-Rhino-Security-Inc 

Twitter: @darkrhinosec 

LinkedIn: @dark-rhino-security 

Youtube:  @Dark Rhino Security ​ 

---------------------------------------------------------------------- 

Articles and Resources Mentioned in this Video:  

Jaxs' Book: https://www.amazon.com/Cybersecurity-Career-Master-Plan-cybersecurity/dp/1801073562/ref=sr_1_2?crid=2NPCHKN8K746B&keywords=jaclyn+scott&qid=1645818712&sprefix=jaclyn+scott%2Caps%2C181&sr=8-2&redirectFromSmile=1 


Cultural Support Team Program: https://arsof-history.org/articles/v12n2_cst_timeline_page_1.html 


NICE and NIST Frameworks: 

https://resources.infosecinstitute.com/topic/what-is-the-nice-cybersecurity-workforce-framework/ 

https://www.cisa.gov/nice-cybersecurity-workforce-framework 

https://www.securityprogram.io/a-guide-to-common-security-standards/ 


Target Breach: https://www.darkreading.com/attacks-breaches/target-ignored-data-breach-alarms 

JP Morgan Breach: https://archive.nytimes.com/dealbook.nytimes.com/2014/10/02/jpmorgan-discovers-further-cyber-security-issues/ 


HackBack: https://foresite.com/blog/what-is-the-proposed-hack-back-bill/ 

Computer Fraud and Abuse Act: https://www.sciencedirect.com/topics/computer-science/computer-fraud-and-abuse-act#:~:text=The%20Computer%20Fraud%20and%20Abuse%20Act%20of%201986%20makes%20it,or%20foreign%20commerce%20or%20communication.  


Active Cyber Defense Certainty Act https://www.billtrack50.com/BillDetail/1133039

Feb 24, 202343:39
S9 E10 Biological Viruses vs Computer Viruses

S9 E10 Biological Viruses vs Computer Viruses

Wendy is a keynote speaker, Principal Cloud Security Architect, and senior security advisor. She has worked for Cisco, PWC, and Deloitte. Has a doctorate from the University of Oxford. She is currently with OneWeb. Prior to joining OneWeb, Wendy was Experian’s DevSecOps Security Managing Adviser and defined the strategy for the organization's global DevSecOps transformation initiative.  Wendy is active in the community, regularly sharing experiences through keynotes, Blogs, and Black Hat.  

00:00 Introduction 

00:21 Our Guest 

01:40 Transitioning from Medical Genetics to Cyber 

04:50 The importance of having people from different fields 

07:41 Comparisons between Biological Virus and Breach 

12:09 Low Earth Orbit Constellation 

18:18 Hackers are Collaborative  

22:01 100% Security 

26:30 Understanding the Risk

 30:40 Building a Culture of Awareness  

35:35 DevSecOps 

38:50 Controlling that 3rd party risk 

43:15 Connecting with Wendy


VkzkH79NmeR5yCZidDzz

Feb 17, 202346:23