Cybersecurity: Amplified And Intensified artwork

Cybersecurity: Amplified And Intensified

162 episodes - English - Latest episode: almost 2 years ago - ★★★★★ - 2 ratings

Plans are useless but planning is indispensable and crisis will reveal how you operate.

Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents.

Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/support

Society & Culture Technology cybersecurity kontinuum amplified intensified cmmc compliance incident response shiva maharaj cybercast ransomware
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

16. Tactics and techniques with Brian Weiss.

June 16, 2021 08:00 - 1 hour - 41.8 MB

On this episode we are joined by Brian Weiss to discuss ransomware groups going dark, REvil making its presence known, vulnerability management, back-up and disaster recovery and setting up your cybersecurity team for success.  Eric Taylor | LinkedIn Twitter: barricadecyber Podcast Episode #16 - Tactics, techniques and ransomware with Brian Weiss. - YouTube www.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com    Brian J. Weiss | LinkedIn ITECH Solutions:...

15. Fear-mongering and ransomware.

June 09, 2021 08:00 - 38 minutes - 26.6 MB

On this episode we discuss the need to focus on security despite what compliance wants and dictates, CISO’s unrelenting quest for help from the government, the colonial pipeline and the fundamental lack of security employed by companies.  Eric Taylor | LinkedIn Twitter: barricadecyber Podcast Episode #15 - Talking more about Colonial Pipeline and Ransomware - YouTube www.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com    Articles Referenced; Hack...

Episode 15 - Fear-mongering and ransomware.

June 09, 2021 08:00 - 38 minutes - 26.6 MB

On this episode we discuss the need to focus on security despite what compliance wants and dictates, CISO’s unrelenting quest for help from the government, the colonial pipeline and the fundamental lack of security employed by companies.  Eric Taylor | LinkedIn Twitter: barricadecyber Podcast Episode #15 - Talking more about Colonial Pipeline and Ransomware - YouTube www.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com    Articles Referenced; Hack...

Episode 14 - Operating effectively with Todd Kane.

June 02, 2021 06:00 - 52 minutes - 36.1 MB

Todd Kane has spent over a decade creating a management framework that has resulted in massive value for the companies he has worked with. Millions in higher margin projects/operations, millions in saved cash reducing employee turnover, and massive increases in team morale. Todd has led groups for several of largest and high growth companies in western Canada. Experience with major businesses like EnCana, Canadian Natural Resources Ltd, WestJet, Bell Canada, Long View Systems, and Fully Man...

14. Operating effectively with Todd Kane.

June 02, 2021 06:00 - 52 minutes - 36.1 MB

Todd Kane has spent over a decade creating a management framework that has resulted in massive value for the companies he has worked with. Millions in higher margin projects/operations, millions in saved cash reducing employee turnover, and massive increases in team morale. Todd has led groups for several of largest and high growth companies in western Canada. Experience with major businesses like EnCana, Canadian Natural Resources Ltd, WestJet, Bell Canada, Long View Systems, and Fully Man...

13. Finding faster with Jon Murchison.

May 26, 2021 08:00 - 1 hour - 50.2 MB

Jonathan Murchison, the founder and CEO of Blackpoint, started his career in Network Engineering and IT operations, but quickly made the switch to the quiet world of the intelligence community. He has since spent over twelve years planning, conducting, and executing high-priority national security missions. As a former NSA computer operations expert and IT professional, he is bringing a unique perspective to the mission of developing cyber defense software effective at detecting and detaini...

Episode 13 - Finding faster with Jon Murchison.

May 26, 2021 08:00 - 1 hour - 50.2 MB

Jonathan Murchison, the founder and CEO of Blackpoint, started his career in Network Engineering and IT operations, but quickly made the switch to the quiet world of the intelligence community. He has since spent over twelve years planning, conducting, and executing high-priority national security missions. As a former NSA computer operations expert and IT professional, he is bringing a unique perspective to the mission of developing cyber defense software effective at detecting and detaini...

12. Taking action with Vince Crisler.

May 19, 2021 08:00 - 56 minutes - 39.1 MB

Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused on innovative solutions for small and midsize companies. He is on the IT Security Executive Council for CompTIA, the Executive Committee for the CompTIA ISAO, and a member of Embry-Riddle Aeronautical University's Worldwide Industry Advisory Board. Prior to...

Episode 12 - Taking action with Vince Crisler.

May 19, 2021 08:00 - 56 minutes - 39.1 MB

Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused on innovative solutions for small and midsize companies. He is on the IT Security Executive Council for CompTIA, the Executive Committee for the CompTIA ISAO, and a member of Embry-Riddle Aeronautical University's Worldwide Industry Advisory Board. Prior to...

12. Taking action with Vince Crisler, Founder & CEO Dark Cubed.

May 19, 2021 08:00 - 56 minutes - 39 MB

Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused on innovative solutions for small and midsize companies. He is on the IT Security Executive Council for CompTIA, the Executive Committee for the CompTIA ISAO, and a member of Embry-Riddle Aeronautical University's Worldwide Industry Advisory Board. Prior to...

11. Executive Order or Rosetta Stone?

May 17, 2021 08:00 - 30 minutes - 21.1 MB

Executive Order, Darkside ransomware group, the Colonial pipeline debacle and CMMC. Eric Taylor | LinkedIn  Twitter: barricadecyber  barricade cyber solutions - YouTube www.barricadecyber.com  Shiva Maharaj | LinkedIn  Twitter: kontinuummsp  www.kontinuum.com   Articles referenced; Executive Order on Improving the Nation's Cybersecurity | The White House Colonial Pipeline has no plan to pay ransom to hackers -sources | Reuters Colonial Pipeline paid a $5 million ransom—and kept ...

Episode 11 - Executive Order or Compliance Rosetta Stone?

May 17, 2021 08:00 - 30 minutes - 21.1 MB

Executive Order, Darkside ransomware group, the Colonial pipeline debacle and CMMC. Eric Taylor | LinkedIn  Twitter: barricadecyber  barricade cyber solutions - YouTube www.barricadecyber.com  Shiva Maharaj | LinkedIn  Twitter: kontinuummsp  www.kontinuum.com   Articles referenced; Executive Order on Improving the Nation's Cybersecurity | The White House Colonial Pipeline has no plan to pay ransom to hackers -sources | Reuters Colonial Pipeline paid a $5 million ransom—and kept ...

11. Compliance Rosetta Stone?

May 17, 2021 08:00 - 30 minutes - 21.1 MB

Executive Order, Darkside ransomware group, the Colonial pipeline debacle and CMMC. Eric Taylor | LinkedIn  Twitter: barricadecyber  barricade cyber solutions - YouTube www.barricadecyber.com  Shiva Maharaj | LinkedIn  Twitter: kontinuummsp  www.kontinuum.com   Articles referenced; Executive Order on Improving the Nation's Cybersecurity | The White House Colonial Pipeline has no plan to pay ransom to hackers -sources | Reuters Colonial Pipeline paid a $5 million ransom—and kept ...

11. Executive Order or Compliance Rosetta Stone?

May 17, 2021 08:00 - 30 minutes - 21.1 MB

Executive Order, Darkside ransomware group, the Colonial pipeline debacle and CMMC. Eric Taylor | LinkedIn  Twitter: barricadecyber  barricade cyber solutions - YouTube www.barricadecyber.com  Shiva Maharaj | LinkedIn  Twitter: kontinuummsp  www.kontinuum.com   Articles referenced; Executive Order on Improving the Nation's Cybersecurity | The White House Colonial Pipeline has no plan to pay ransom to hackers -sources | Reuters Colonial Pipeline paid a $5 million ransom—and kept ...

11. The Executive Order: Codified but unenforceable.

May 17, 2021 08:00 - 30 minutes - 21.1 MB

Executive Order or Rosetta Stone, Darkside ransomware group, the Colonial pipeline debacle and CMMC. Eric Taylor | LinkedIn  Twitter: barricadecyber  barricade cyber solutions - YouTube www.barricadecyber.com  Shiva Maharaj | LinkedIn  Twitter: kontinuummsp  www.kontinuum.com   Articles referenced; Executive Order on Improving the Nation's Cybersecurity | The White House Colonial Pipeline has no plan to pay ransom to hackers -sources | Reuters Colonial Pipeline paid a $5 million...

10. Unrestricted warfare.

May 12, 2021 08:00 - 46 minutes - 31.8 MB

With the increase of ransomware activity across the US, every incident may be an act of war.  Eric Taylor | LinkedIn Twitter: barricadecyber Youtube: barricade cyber solutions - YouTube www.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com  Brian J. Weiss | LinkedIn ITECH Solutions: Overview | LinkedIn www.itech-solutions.com  Articles referenced;  Pipeline Cyberattack: Colonial remains mostly closed, working to restore service (cnbc.com)  Co...

10. Unrestricted warfare - Vol. I

May 12, 2021 08:00 - 46 minutes - 31.8 MB

With the increase of ransomware activity across the US, every incident may be an act of war.  Eric Taylor | LinkedIn Twitter: barricadecyber Youtube: barricade cyber solutions - YouTube www.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com  Brian J. Weiss | LinkedIn ITECH Solutions: Overview | LinkedIn www.itech-solutions.com  Articles referenced;  Pipeline Cyberattack: Colonial remains mostly closed, working to restore service (cnbc.com)  Co...

Episode 10 - Unrestricted warfare - Vol. I

May 12, 2021 08:00 - 46 minutes - 31.8 MB

With the increase of ransomware activity across the US, every incident may be an act of war.  Eric Taylor | LinkedIn Twitter: barricadecyber Youtube: barricade cyber solutions - YouTube www.barricadecyber.com Shiva Maharaj | LinkedIn Twitter: kontinuummsp www.kontinuum.com  Brian J. Weiss | LinkedIn ITECH Solutions: Overview | LinkedIn www.itech-solutions.com  Articles referenced;  Pipeline Cyberattack: Colonial remains mostly closed, working to restore service (cnbc.com)  Co...

9. Monopoly isn't just a game.

May 07, 2021 08:00 - 12 minutes - 8.9 MB

When it comes to choosing between your privacy and the commercialization of your data, vendors will invariably choose advancing their revenue using your data.  Earlier this week the Managed Services vendor list got a bit smaller with Gary Pica’s TruMethods being acquired by Kaseya, a financial powerhouse in the MSP marketplace. With each vendor acquisition consolidating their powerbase and increasing their respective market share, the likelihood of Zero Knowledge being adopted diminishes. ...

9. It’s all about market share.

May 07, 2021 08:00 - 12 minutes - 8.9 MB

With each acquisition vendors are consolidating their power-base to levels some would consider anti-trust, further diminishing the likelihood of Zero Knowledge being built into their products. Earlier this week the Managed Services vendor list got a bit smaller with Gary Pica’s TruMethods being acquired by Kaseya, a financial powerhouse in the MSP marketplace. When it comes to choosing between your privacy and the commercialization of your data, vendors will invariably choose advancing th...

Episode 9 - Zero Knowledge vs. Revenue.

May 07, 2021 08:00 - 12 minutes - 8.91 MB

When it comes to choosing between your privacy and the commercialization of your data, vendors will invariably choose advancing their revenue by using your data. Earlier this week Gary Pica’s TruMethods was acquired by Kaseya, a financial powerhouse in the MSP marketplace. With each acquisition, these market share leaders are consolidating their power-base to what some would consider anti-trust levels, further diminishing the likelihood of Zero Knowledge being built into their products. ...

9. Zero Knowledge vs. Revenue.

May 07, 2021 08:00 - 12 minutes - 8.91 MB

When it comes to choosing between your privacy and the commercialization of your data, vendors will invariably choose advancing their revenue by using your data. Earlier this week Gary Pica’s TruMethods was acquired by Kaseya, a financial powerhouse in the MSP marketplace. With each acquisition, these market share leaders are consolidating their power-base to what some would consider anti-trust levels, further diminishing the likelihood of Zero Knowledge being built into their products. ...

9. Zero knowledge is not zero trust.

May 07, 2021 08:00 - 12 minutes - 8.9 MB

With each acquisition, vendors are consolidating their power-base to levels some would consider anti-trust, further diminishing the likelihood of Zero Knowledge being built into their products. Earlier this week the Managed Services vendor list got a bit smaller with Gary Pica’s TruMethods being acquired by Kaseya, a financial powerhouse in the MSP marketplace. When it comes to choosing between your privacy and the commercialization of your data, vendors will invariably choose advancing t...

9. Who controls your data?

May 07, 2021 08:00 - 12 minutes - 8.9 MB

With each acquisition, vendors are consolidating their power-base to levels some would consider anti-trust, further diminishing the likelihood of Zero Knowledge being built into their products. Earlier this week the Managed Services vendor list got a bit smaller with Gary Pica’s TruMethods being acquired by Kaseya, a financial powerhouse in the MSP marketplace. When it comes to choosing between your privacy and the commercialization of your data, vendors will invariably choose advancing t...

9. The game is on.

May 07, 2021 08:00 - 12 minutes - 8.9 MB

When it comes to choosing between your privacy and the commercialization of your data, vendors will invariably choose advancing their revenue using your data.  Earlier this week the Managed Services vendor list got a bit smaller with Gary Pica’s TruMethods being acquired by Kaseya, a financial powerhouse in the MSP marketplace. With each vendor acquisition consolidating their powerbase and increasing their respective market share, the likelihood of Zero Knowledge being adopted diminishes. ...

9. Monopoly, it’s not just a game.

May 07, 2021 08:00 - 12 minutes - 8.9 MB

When it comes to choosing between your privacy and the commercialization of your data, vendors will invariably choose advancing their revenue using your data.  Earlier this week the Managed Services vendor list got a bit smaller with Gary Pica’s TruMethods being acquired by Kaseya, a financial powerhouse in the MSP marketplace. With each vendor acquisition consolidating their powerbase and increasing their respective market share, the likelihood of Zero Knowledge being adopted diminishes. ...

8. Operate differently.

May 05, 2021 08:00 - 42 minutes - 29 MB

Compliance based legislation and Solarwinds data restoration is just too slow. Incident response, Babuk ransomware group targets the FBI, CISA and the United States, another supply chain breach this time with Passwordstate,  Vendors' thirst for customer data will hold back progress with zero knowledge architecture.  Microsoft 365 should be backed up and all backups are not created equally. And yes, self attestation is worthless. Eric Taylor Twitter: barricadecyber Youtube: barricade cyber s...

Episode 8 - Operating differently.

May 05, 2021 08:00 - 42 minutes - 29 MB

Compliance based legislation and Solarwinds data restoration is just too slow. Incident response, Babuk ransomware group targets the FBI, CISA and the United States, another supply chain breach this time with Passwordstate,  Vendors' thirst for customer data will hold back progress with zero knowledge architecture.  Microsoft 365 should be backed up and all backups are not created equally. And yes, self attestation is worthless. Eric Taylor Twitter: barricadecyber Youtube: barricade cyber s...

8. Think differently, move differently.

May 05, 2021 08:00 - 42 minutes - 29 MB

Compliance based legislation and Solarwinds data restoration is just too slow. Incident response, Babuk ransomware group targets the FBI, CISA and the United States, another supply chain breach this time with Passwordstate,  Vendors' thirst for customer data will hold back progress with zero knowledge architecture.  Microsoft 365 should be backed up and all backups are not created equally. And yes, self attestation is worthless. Eric Taylor Twitter: barricadecyber Youtube: barricade cyber s...

8. Operating differently.

May 05, 2021 08:00 - 42 minutes - 29 MB

Compliance based legislation and Solarwinds data restoration is just too slow. Incident response, Babuk ransomware group targets the FBI, CISA and the United States, another supply chain breach this time with Passwordstate,  Vendors' thirst for customer data will hold back progress with zero knowledge architecture.  Microsoft 365 should be backed up and all backups are not created equally. And yes, self attestation is worthless. Eric Taylor Twitter: barricadecyber Youtube: barricade cyber s...

Episode 7 - What’s essential.

April 28, 2021 08:00 - 4 minutes - 3.22 MB

There is no such thing as a minimum security standard. While this is not meant to be an exhaustive list of what you have to do to attain a comprehensive cybersecurity posture. It is meant to be more of a guide of what you should be doing and if you're not maybe it's time you did. Buy Eric a Coffee Eric Taylor is Educating folks around cyber security Buy Shiva a Coffee IT support that's actually supportive. --- Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandin...

7. What’s essential.

April 28, 2021 08:00 - 4 minutes - 3.15 MB

There is no such thing as a minimum security standard. While this is not meant to be an exhaustive list of what you have to do to attain a comprehensive cybersecurity posture. It is meant to be more of a guide of what you should be doing and if you're not maybe it's time you did. KONTINUUM IT support that's actually supportive. FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

7. Start with security.

April 28, 2021 08:00 - 4 minutes - 3.15 MB

There is no such thing as a minimum security standard. While this is not meant to be an exhaustive list of what you have to do to attain a comprehensive cybersecurity posture. It is meant to be more of a guide of what you should be doing and if you're not maybe it's time you did. KONTINUUM Because you're entitled to support that's actually supportive. Otter.ai Otter.ai provides audio transcriptions services to help you get your message across. FASTMAIL Your data is for you, no one els...

7. Security is easy.

April 28, 2021 08:00 - 4 minutes - 3.15 MB

There is no such thing as a minimum security standard. While this is not meant to be an exhaustive list of what you have to do to attain a comprehensive cybersecurity posture. It is meant to be more of a guide of what you should be doing and if you're not maybe it's time you did. KONTINUUM Because you're entitled to support that's actually supportive. Otter.ai Otter.ai provides audio transcriptions services to help you get your message across. FASTMAIL Your data is for you, no one els...

7. Security essentials.

April 28, 2021 08:00 - 4 minutes - 3.15 MB

There is no such thing as a minimum security standard. While this is not meant to be an exhaustive list of what you have to do to attain a comprehensive cybersecurity posture. It is meant to be more of a guide of what you should be doing and if you're not maybe it's time you did. KONTINUUM Because you're entitled to IT support that's actually supportive. Otter.ai Otter.ai provides audio transcriptions services to help you get your message across. FASTMAIL Your data is for you, no one ...

7. Fundamentals to begin with.

April 28, 2021 08:00 - 4 minutes - 3.15 MB

There is no such thing as a minimum security standard. While this is not meant to be an exhaustive list of what you have to do to attain a comprehensive cybersecurity posture. It is meant to be more of a guide of what you should be doing and if you're not maybe it's time you did. KONTINUUM Because you're entitled to support that's actually supportive. Otter.ai Otter.ai provides audio transcriptions services to help you get your message across.

Fundamentals # 1: Where do we begin?

April 26, 2021 08:00 - 4 minutes - 3.16 MB

There is no such thing as a minimum security standard. This is not meant to be an exhaustive list of what you have to do to attain a cybersecurity posture. It is meant to be more of a guide of what you should be doing and if you're not maybe it's time you gave someone a call to help you. KONTINUUM Because you're entitled to support that's actually supportive.

Fundamentals Episode 1: Where to begin?

April 26, 2021 08:00 - 4 minutes - 3.15 MB

There is no such thing as a minimum security standard. While this is not meant to be an exhaustive list of what you have to do to attain a comprehensive cybersecurity posture. It is meant to be more of a guide of what you should be doing and if you're not maybe it's time you did. KONTINUUM Because you're entitled to support that's actually supportive.

6. Winning the lost battle.

April 21, 2021 09:00 - 36 minutes - 25.2 MB

The supply chain is lost, Pulse Secure and Codecov used to compromise their clients, OEM hardware manufacturer Quanta breached by REvil, more Sonicwall zero-days. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com  Articles referenced; Multiple agencies breached by hackers using Pulse Secure vulnerabilities | TheHill Hundreds of networks reportedly hacked in Codecov supply-chain attack (bleepingcomputer.com) REvil ransomwar...

6. Reclaiming the supply chain.

April 21, 2021 09:00 - 36 minutes - 25.2 MB

The supply chain is lost, Pulse Secure and Codecov used to compromise their clients, OEM hardware manufacturer Quanta breached by REvil, more Sonicwall zero-days. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com  Articles referenced; Multiple agencies breached by hackers using Pulse Secure vulnerabilities | TheHill Hundreds of networks reportedly hacked in Codecov supply-chain attack (bleepingcomputer.com) REvil ransomwar...

6. Too many places to hide.

April 21, 2021 09:00 - 36 minutes - 25.3 MB

Nuke and pave the lost supply chain, Pulse Secure and Codecov used to compromise their clients, OEM hardware manufacturer Quanta breached by REvil, more Sonicwall zero-days. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com  Articles referenced; Multiple agencies breached by hackers using Pulse Secure vulnerabilities | TheHill Hundreds of networks reportedly hacked in Codecov supply-chain attack (bleepingcomputer.com) REvi...

Episode 6 - Too many places to hide.

April 21, 2021 09:00 - 36 minutes - 25.3 MB

Nuke and pave the lost supply chain, Pulse Secure and Codecov used to compromise their clients, OEM hardware manufacturer Quanta breached by REvil, more Sonicwall zero-days. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com  Articles referenced; Multiple agencies breached by hackers using Pulse Secure vulnerabilities | TheHill Hundreds of networks reportedly hacked in Codecov supply-chain attack (bleepingcomputer.com) REvi...

5. FBI Managed Security IT Services.

April 14, 2021 14:00 - 31 minutes - 21.6 MB

The FBI, sealed warrants, compromised Microsoft Exchange servers, cloud printing, RDP, less than secure SSO, daily patching and more. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com Bleeping Computer article referenced; https://www.bleepingcomputer.com/news/security/fbi-nuked-web-shells-from-hacked-exchange-servers-without-telling-owners/ BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetr...

Episode 5 - FBI Managed Security IT Services.

April 14, 2021 14:00 - 31 minutes - 21.6 MB

The FBI, sealed warrants, compromised Microsoft Exchange servers, cloud printing, RDP, less than secure SSO, daily patching and more. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com Bleeping Computer article referenced; https://www.bleepingcomputer.com/news/security/fbi-nuked-web-shells-from-hacked-exchange-servers-without-telling-owners/ Buy Eric a Coffee Eric Taylor is Educating folks around cyber security Buy Shi...

4. Technology has always been political.

April 12, 2021 14:00 - 26 minutes - 18.2 MB

The Iranian nuclear facility hack, CMMC and those selling into the DOD compliance space. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com 

4. Compliance is ephemeral.

April 12, 2021 14:00 - 26 minutes - 18.2 MB

The Iranian nuclear facility hack, CMMC and those selling into the DOD compliance space. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com 

4. Technology is political.

April 12, 2021 14:00 - 26 minutes - 18.2 MB

The Iranian nuclear facility hack, CMMC and those selling into the DOD compliance space. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com 

3. Incidents, vendors and compliance.

April 07, 2021 23:00 - 26 minutes - 18.6 MB

On this episode, Eric and I discuss recent incidents (including Ubiquiti and you guessed it Solar Winds), how to vet your vendors, industrial control systems or at least what should be classified as ICS' and touched on our vision of what CMMC should look like.  Eric Taylor is the Principal of Barricade Cyber, a pen-testing and incident response firm. Eric's Twitter is @itsimplifie Eric's Website: https://www.barricadecyber.com 

4. Industrial control systems are the low hanging fruit.

April 07, 2021 14:00 - 26 minutes - 18.3 MB

The Iranian nuclear facility hack, CMMC and those selling into the DOD compliance space. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com  BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing. KONTINUUM IT support that's actually supportive. FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 4 - Industrial control systems are the low hanging fruit.

April 07, 2021 14:00 - 26 minutes - 18.3 MB

The Iranian nuclear facility hack, CMMC and those selling into the DOD compliance space. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com  BARRICADE CYBER Ransomware Remediation Services, Incident Response and Penetration Testing. KONTINUUM IT support that's actually supportive. FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files! --- Support this podcast: ...

Twitter Mentions

@kontinuummsp 139 Episodes
@barricadecyber 126 Episodes
@bweiss805 11 Episodes
@uuallan 9 Episodes
@techplanet4u 7 Episodes
@cybermattlee 6 Episodes
@johnwetzel 5 Episodes
@haktree 2 Episodes
@jonathandata1 2 Episodes
@laughing_mantis 2 Episodes
@clabs 2 Episodes
@spyware_wiki 2 Episodes
@scottrdavis 2 Episodes
@james_mcquiggan 2 Episodes
@jimmyhatzell 2 Episodes
@jeremy_kirk 1 Episode
@gerald_auger 1 Episode
@ransomwarefiles 1 Episode
@bagder 1 Episode
@vxunderground 1 Episode