PodcastsTechnologyCybersecurity: Amplified And Intensified

Cybersecurity: Amplified And Intensified

Shiva Maharaj
Cybersecurity: Amplified And Intensified
Latest episode

Available Episodes

5 of 87
  • 71 - Encrypted email and Web 3.0 with Gareth Harte of Telios
    Gareth is the founder and CEO/CTO of a decentralized and encrypted email service called Telios. He's previously been a software engineer for over 13 years working in the automotive and banking industry, but in the last few years has shifted his focus towards building on the decentralized internet. This episode is available on YouTube: https://youtu.be/LRYhz8kb4rg [email protected] https://discord.gg/xaHkmga9 https://www.linkedin.com/in/gareth-harte https://telios.io Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm
    --------  
    44:58
  • 70 - Discovering and determining who owns your data
    Today we're discussing where our data lives, how can we find most of it and who controls your data. This episode is available on YouTube: https://www.youtube.com/watch?v=IkPftZRMgcA Brian J. Weiss is the CEO of ITECH Solutions that provides IT Services across the United States. Brian J. Weiss https://www.linkedin.com/in/brianjweiss/ https://www.itech-solutions.com/ 00:00 - Intro 00:10 - Where is your data? 38:03 - It's 5 o'clock somewhere man 38:18 - We are Zero trust 44:12 - Crystal Reports 46:29 - Greatest podcast in the galaxy 46:40 - Get VAM'd with ITECH-Solutions.com Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/
    --------  
    47:08
  • 69 - White House: Cyber activity not against Russia policy
    On this episode I'll share my thoughts on the recent White House announcement below. This episode is available on YouTube: https://youtu.be/EHtnyGM0TCE WASHINGTON, June 1 (Reuters) - The White House said on Wednesday that any offensive cyber activity against Russia would not be a violation of U.S. policy of avoiding direct military conflict with Russia over its invasion of Ukraine. White House press secretary Karine Jean-Pierre commented on statements from U.S. cyber command chief General Paul Nakasone, who told Sky News on Wednesday the United States has conducted a series of digital operations in support of Ukraine. https://www.reuters.com/world/white-house-cyber-activity-not-against-russia-policy-2022-06-01/ Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm
    --------  
    4:49
  • 68 - Cybersecurity Round Table May 2022
    On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future, Jon Murchison and Xavier Salinas of Blackpoint Cyber and John Wetzel of Recorded Future to discuss ongoing events and incidents as they relate to cybersecurity. This episode is available on YouTube: https://www.youtube.com/watch?v=5WspCPjlFic Check out the following podcasts. Blackpoint Cyber https://blackpointcyber.com/resources/podcast/ Recorded Future https://therecord.media/podcast/ Matt Lee https://www.youtube.com/c/CyberMattLee Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm
    --------  
    58:41
  • 67 - CISA vs. Snake Oil
    Or at least that's my analysis of CISA Alert AA22-137A It doesn't matter what fancy tools you have if you're using and configuring them incorrectly. This episode is also available on YouTube: https://youtu.be/MJLpCTG_kqI In this episode I'm going to review CISA Alert (AA22-137A) https://www.cisa.gov/uscert/ncas/alerts/aa22-137a Weak Security Controls and Practices Routinely Exploited for Initial Access Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices and includes best practices to mitigate the issues. This advisory was coauthored by the cybersecurity authorities of the United States,[1],[2],[3] Canada,[4] New Zealand,[5],[6] the Netherlands,[7] and the United Kingdom.[8] Download the PDF version of this report (pdf, 430kb).
    --------  
    19:36

More Technology podcasts

About Cybersecurity: Amplified And Intensified

Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm
Podcast website

Listen to Cybersecurity: Amplified And Intensified, Lex Fridman Podcast and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features
Social
v8.1.2 | © 2007-2025 radio.de GmbH
Generated: 12/14/2025 - 10:23:47 AM