
Cybersecurity: Amplified And Intensified
By Shiva Maharaj
Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents.
Shiva Maharaj
www.linkedin.com/in/shivamaharaj
twitter.com/kontinuummsp
www.kontinuum.com/
www.buymeacoffee.com/shivaemm

Cybersecurity: Amplified And IntensifiedMar 14, 2022

71 - Encrypted email and Web 3.0 with Gareth Harte of Telios
Gareth is the founder and CEO/CTO of a decentralized and encrypted email service called Telios. He's previously been a software engineer for over 13 years working in the automotive and banking industry, but in the last few years has shifted his focus towards building on the decentralized internet.
This episode is available on YouTube: https://youtu.be/LRYhz8kb4rg
gareth@corp.telios.io
https://discord.gg/xaHkmga9
https://www.linkedin.com/in/gareth-harte
https://telios.io
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

70 - Discovering and determining who owns your data
Today we're discussing where our data lives, how can we find most of it and who controls your data.
This episode is available on YouTube: https://www.youtube.com/watch?v=IkPftZRMgcA
Brian J. Weiss is the CEO of ITECH Solutions that provides IT Services across the United States.
Brian J. Weiss
https://www.linkedin.com/in/brianjweiss/
https://www.itech-solutions.com/
00:00 - Intro
00:10 - Where is your data?
38:03 - It's 5 o'clock somewhere man
38:18 - We are Zero trust 44:12 - Crystal Reports
46:29 - Greatest podcast in the galaxy
46:40 - Get VAM'd with ITECH-Solutions.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/

69 - White House: Cyber activity not against Russia policy
On this episode I'll share my thoughts on the recent White House announcement below.
This episode is available on YouTube: https://youtu.be/EHtnyGM0TCE
WASHINGTON, June 1 (Reuters) - The White House said on Wednesday that any offensive cyber activity against Russia would not be a violation of U.S. policy of avoiding direct military conflict with Russia over its invasion of Ukraine.
White House press secretary Karine Jean-Pierre commented on statements from U.S. cyber command chief General Paul Nakasone, who told Sky News on Wednesday the United States has conducted a series of digital operations in support of Ukraine.
https://www.reuters.com/world/white-house-cyber-activity-not-against-russia-policy-2022-06-01/
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

68 - Cybersecurity Round Table May 2022
On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future, Jon Murchison and Xavier Salinas of Blackpoint Cyber and John Wetzel of Recorded Future to discuss ongoing events and incidents as they relate to cybersecurity.
This episode is available on YouTube: https://www.youtube.com/watch?v=5WspCPjlFic
Check out the following podcasts.
Blackpoint Cyber
https://blackpointcyber.com/resources/podcast/
Recorded Future
https://therecord.media/podcast/
Matt Lee
https://www.youtube.com/c/CyberMattLee
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

67 - CISA vs. Snake Oil
Or at least that's my analysis of CISA Alert AA22-137A
It doesn't matter what fancy tools you have if you're using and configuring them incorrectly.
This episode is also available on YouTube: https://youtu.be/MJLpCTG_kqI
In this episode I'm going to review CISA Alert (AA22-137A)
https://www.cisa.gov/uscert/ncas/alerts/aa22-137a
Weak Security Controls and Practices Routinely Exploited for Initial Access
Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices and includes best practices to mitigate the issues. This advisory was coauthored by the cybersecurity authorities of the United States,[1],[2],[3] Canada,[4] New Zealand,[5],[6] the Netherlands,[7] and the United Kingdom.[8]

66 - CrowdStrike XDR with Cameron Buriani
With all of this enriched threat data filtered and condensed into a single console, XDR enables security teams to rapidly and efficiently hunt and eliminate security threats across multiple domains from one unified solution.
Cameron Buriani is a Sr. Solutions Architect at CrowdStrike.
This episode is available on YouTube: youtu.be/MOsiuzb3KBs
www.crowdstrike.com/products/endpoint-security/falcon-xdr/
If you'd like to find out more about CrowdStrike services you can get in touch with us via info@kontinuum.com

65 - Cybersecurity Reskilling with Max Shuftan, SANS Institute
Max Shuftan is the Director, Mission Programs & Partnerships at the SANS Institute.
Max leads a business unit at SANS Institute focused on (1) growing the global cybersecurity talent pipeline and increasing Diversity, Equity, and Inclusion (DEI) in the cyber workforce, and (2) fostering a stronger cybersecurity workforce through technical skills training and certification plus security awareness training of the State, Local, and Education (SLED) community.
https://www.linkedin.com/in/maxwell-shuftan-3786b21a/
SANS Mission: https://www.sans.org/mission/
SANS Academies: https://www.sans.org/scholarship-academies/
SANS.edu undergraduate program: https://www.sans.edu/acs/
CyberStart America (high school program): https://www.cyberstartamerica.org/
Cyber FastTrack (college competition): https://www.cyber-fasttrack.org/
New to Cyber: https://www.sans.org/cybersecurity-careers/?msc=main-nav

64 - Inside Intel Security with Tom Garrison & Camille Morhardt

Escalate, Exfiltrate and Encrypt - Round 15
These will be quick. I dive into questions submitted from listeners and discuss articles and/or evolving incidents.
This episode is available on YouTube: https://www.youtube.com/watch?v=LzMXur-vnw0
This weeks questions;
Should I invest in products or process? What threat that keeps you up at night? You’ve had a couple episodes where guest discussed how few management agents are installed. Where are you on agent count and why? Every major vendor is pushing EDR on us, should we do it? With Kaseya buying datto what are your thoughts on the vendor consolidation in the MSP industry?Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

63 - Remote workforce security at Zapier with Attila Török Head Of Security at Zapier

62 - Going Beyond XDR with Kiran Vangaveti
Today, cyber resilience is far more important than cybersecurity alone can be, and he genuinely believes that a proactive approach to defense can help organizations large and small cope with threats that emerge on a near-daily basis. Kiran’s work has given him the opportunity to interact with industry thought leaders and government agencies around the globe.
www.blusapphire.com/
www.linkedin.com/in/kiranvangaveti/
This episode is available on YouTube: www.youtube.com/watch?v=pUz-AjRlKsg

61 - Taking care of your most valuable assets with Jason Van Camp Deliberate Discomfort Challenge
Burnout and alert fatigue are likely at an all time high with the current state of events combined with the last two plus years. OOn this episode we explore the Deliberate Discomfort Challenge as a way to help take care of our most valuable assets, our people to get back in tune with themselves and life.
Jason and his team are running a Buy One Get One opportunity for the Deliberate Discomfort Challenge. Grab a body, sign up and we (Cybersecurity: Amplified and Intensified) will pay for the first ten (10) of our listeners/viewers that sign up.
Available on YouTube: https://www.youtube.com/watch?v=Ov9r8uO95ko
Jason B.A. Van Camp epitomizes leadership and a positive drive to excel. He has an exceptional never-quit attitude and a will to win, coupled with unique ability and desire to unlock the potential of others. He is a Forbes Business Council Member, a Wall Street Journal, Amazon, and USA Today best-selling author, a decorated Green Beret, a world traveler, and an entrepreneur. First and foremost, though, he is a dedicated husband, loving father, and loyal friend. Jason has mastered the art of storytelling that reflects many of his own life adventures.
Jason was born in Washington D.C. and raised across the Potomac River in Springfield, Virginia. In 1995, Jason was accepted to the United States Military Academy at West Point. While at West Point, Jason played Linebacker for the Army Black Knights football team, served a two-year LDS Church mission to Russia, and, upon graduation, won the prestigious General Loeffke Award for Excellence in Foreign Languages.
After graduating from West Point, Jason volunteered to attend U.S. Army Ranger School in Fort Benning, GA where he earned his Ranger tab in 2002. Jason then began a one year tour to Korea serving a few miles from the Demilitarized zone (DMZ) between South and North Korea. Immediately after serving in Korea, Jason was deployed with the 101st Airborne Division in the invasion of Iraq (2003). In 2006, Jason won the coveted Green Beret and began serving as a Detachment Commander with 10th Special Forces Group in Fort Carson, Colorado.
During his 14 years in the U.S. Army, Jason has won numerous awards, notably the Bronze Star with V device for Valor as well as two additional Bronze Stars during numerous combat rotations as a Special Forces Detachment Commander in the Middle East and Africa.
Jason then founded Mission Six Zero, a leadership consulting firm comprised of Medal of Honor recipients, U.S. Army Rangers, Navy SEALs and other Special Operations Forces team members, he founded in 2009. The company offers assessments, masterclasses, workshops, and live keynotes in a variety of industries: pharmaceutical, medical device, financial services, real estate, technology, governmental organizations (including law enforcement), as well as others.
Over the past 10 years, Jason is a seasoned speaker, having given hundreds of talks to corporate conferences, trade organizations, governmental agencies, military units and youth groups. He is a proponent of Mission Six Zero’s Total Warrior (TM) model.
Jason is also honored to be the Founder and Executive Director of Warrior Rising, which he started in 2015 to empower U.S. veterans and their immediate families by providing them opportunities to create sustainable businesses, perpetuate the hiring of fellow U.S. military veterans, and earn their future. Warrior Rising is a 501(c)(3) nonprofit dedicated to helping veterans achieve success in business through instruction, mentoring, funding access, and maintaining the veteran community. To date, Warrior Rising has had more than 3,000 veterans apply to its program.
Audio Podcast: https://anchor.fm/amplifiedandintensified
Jason Van Camp
https://missionsixzero.com/
https://missionsixzero.com/challenge/

60 - Insider threat hunting & Lapsus$ Groups tactics, techniques and procedures.
On todays episode I'm joined by Greg Linares and John Wetzel to discuss insider threats, what you should look for and how to help mitigate them.
We also discuss some of the tactics, techniques and procedures (TTPs) employed by the Lapsus$ Group over the last few months to help you build your insider threat hunting program.
The general consensus seems to be no data loss prevention (DLP) system gets you where you need to be in securing your data.
Greg Linares' professional career in cybersecurity began in 2006, when he joined eEye Digital Security as a Security Researcher. During his tenure, he was accredited with the discovery of several vulnerabilities in major vendors such as Microsoft, CA, Yahoo, Bitdefender and AFLAC, as well as doing development on the Retina Network Security Scanner. Over the next several years he performed many lead roles in reverse engineering, penetration testing, malware analysis, threat intelligence, and security software development. Currently he is a heading up a security team at a Venture Capital firm in CA and has a passion for helping and supporting others at all stages in their cybersecurity career.
John Wetzel is currently the Director of Intelligence Solutions at Recorded Future. John is an experienced security intelligence leader building strategic, global teams. Hands-on technical leader passionately merging technical, business, product knowledge to achieve strategic business outcomes. Strong communicator for boards of directors and C-suite to practitioners. Previously DOD counterintelligence and compliance officer (NISPOM, ITAR, EAR) with strong relationships to federal law enforcement. Writer and speaker on cyber threat intelligence applications, insider threat programs at SANS CTI Summit, Kaspersky SAS 2019, Predict host and trainer 2016-2020. Co-author, The Security Intelligence Handbook (available on Amazon).
This episode is available on YouTube: https://youtu.be/N4frDXTusBU
Greg Linares
https://twitter.com/laughing_mantis
https://www.youtube.com/channel/UCSnNQ4Rah04sokjkLI8NAJg
John Wetzel
https://www.linkedin.com/in/johnawetzel
https://twitter.com/johnwetzel
https://recordedfuture.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/

59 - Jeremy Kirk of The Ransomware Files
On this episode Shiva Maharaj sits down with Jeremy Kirk of The Ransomware Files for expert analysis of cybersecurity, ransomware, intelligence collection, threat intelligence, cyber attacks ,cyber crime, privacy, lapsus$ group, rEvil and Kaseya and more.
Jeremy Kirk is an executive editor with Information Security Media Group, a publishing company focused on computer security. He’s the creator of The Ransomware Files podcast, which tells the harrowing stories of IT pros who have fought back against ransomware, the greatest crime wave the Internet has ever seen.
This episode is available on YouTube: https://www.youtube.com/watch?v=Ysbwah8ldLM
Links:
https://twitter.com/ransomwarefiles
https://twitter.com/Jeremy_Kirk
https://anchor.fm/ransomwarefiles
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

58 - Securing DNS with Peter Lowe of DNSFilter
On this episode we discuss encrypted DNS, DNS over https, Russia Cyber Warfare, Lapsus$ Group and more.
Peter Lowe is the Principal Security Researcher at DNSFilter.
Peter has worked in primarily Internet focused roles throughout his career, in positions that include technical support, system administration, web development, and as Technical Director of a small company. Security has always been a passion.
This episode is also available on YouTube: https://www.youtube.com/watch?v=2S5msHMEmS4
Peter Lowe
https://www.linkedin.com/in/peterlowe/
https://www.dnsfilter.com/
Brian J. Weiss
https://www.linkedin.com/in/brianjweiss/
https://www.itech-solutions.com/
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/

57 - Daniel Stenberg Creator of cURL and libcurl
Daniel Stenberg is the founder and lead developer of cURL and libcurl. An internet protocol geek, an open source person and a developer. Daniel has been programming for fun and profit since 1985. You'll find lots of info about my various projects on these web pages and on his GitHub profile.
Daniel participates within the IETF, primarily in the HTTPbis and QUIC working groups, speaks in public every now and then.
Daniel currently works for wolfSSL doing commercial curl support. If you need help to fix curl problems, fix your app's use of libcurl, add features to curl, fix curl bugs, optimize your curl use or libcurl education for your developers... Then Daniel is your man. Contact him!
This episode is also available on YouTube: https://www.youtube.com/watch?v=sp5bYuFIi0Y
Daniel Stenberg
https://daniel.haxx.se/
https://twitter.com/bagder
https://github.com/bagder/
https://www.twitch.tv/curlhacker
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

56 - Greg Linares, cybersecurity before it became a hashtag
Greg Linares' professional career in cybersecurity began in 2006, when he joined eEye Digital Security as a Security Researcher. During his tenure, he was accredited with the discovery of several vulnerabilities in major vendors such as Microsoft, CA, Yahoo, Bitdefender and AFLAC, as well as doing development on the Retina Network Security Scanner. Over the next several years he performed many lead roles in reverse engineering, penetration testing, malware analysis, threat intelligence, and security software development. Currently he is a heading up a security team at a Venture Capital firm in CA and has a passion for helping and supporting others at all stages in their cybersecurity career.
This episode is also on YouTube: https://youtu.be/uy8_bAo9UxU
Greg Linares
https://twitter.com/laughing_mantis
https://www.youtube.com/channel/UCSnNQ4Rah04sokjkLI8NAJg
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

55: PSA - Helping to secure those in need
In light of ongoing events in the Ukraine and inspired by Recorded Future and Grey Noise, we have teamed up with Dark Cubed to offer security services to company's in need to bolster security quickly and effectively.
Vince Crisler
https://www.linkedin.com/in/vincecrisler/
https://darkcubed.com/
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivamm

54 - Cybersecurity Round Table Vince Crisler, Matt Lee, Allan Liska and Xavier Salinas.
On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future and Xavier Salinas of Blackpoint Cyber to discuss ongoing events and incidents as they relate to cybersecurity. January 2022
Dark Cubed Webinar tomorrow Thursday February 24 2022 at 12 PM EST
https://darkcubed.zoom.us/webinar/register/WN_BJ-z_J72Q06f_-XKHgT9Gg
Vince Crisler
https://www.linkedin.com/in/vincecrisler/
https://darkcubed.com/
Matt Lee
https://cybermattlee.com
https://www.twitter.com/cybermattlee
https://www.linkedin.com/in/cybermattlee/
https://www.youtube.com/cybermattlee
Allan Liska
https://www.linkedin.com/in/allan2/
https://twitter.com/uuallan
https://recordedfuture.com
Jon Murchison
https://www.linkedin.com/in/jon-murchison-b92898b5/
https://www.blackpointcyber.com
Xavier Salinas
https://www.linkedin.com/in/xavier-salinas-security/
https://www.blackpointcyber.com
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemmvaemm

53 - The Russians are coming. What should we expect? #Russia #Ukraine #NATO
On today's episode we discuss the potential fallout as it relates to cybersecurity and the current Ukraine situation.
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

52 - Vendor Selection and why it's more important than you think
On today's episode we discuss Vendor Selection and why it's more important than you think.
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

50 - Asset Management Matters
Asset management is mostly overlooked and garners little respect. Done right, it can save you more times than you can count. Join us as we sit down with Brian Weiss of I Tech Solutions to discuss the unsexy nature of IT hygiene.
https://twitter.com/barricadecyber/status/1491821234212032512?s=20&t=pesziXKExz5nisA8Vd2QiQ
Brian J. Weiss | LinkedIn
https://www.linkedin.com/in/brianjweiss/
www.itech-solutions.com
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

49 - Cybersecurity Round Table Vince Crisler, Matt Lee, Allan Liska, Jon Murchison and John Wetzel.
On this episode we're joined by Vince Crisler of Dark Cubed, Matt Lee of PAX8, Allan Liska of Recorded Future, Jon Murchison of Blackpoint Cyber and John Wetzel of Recorded Future to discuss ongoing events and incidents as they relate to cybersecurity. January 2022
Vince Crisler
https://www.linkedin.com/in/vincecrisler/
https://darkcubed.com/
Matt Lee
https://cybermattlee.com
https://www.twitter.com/cybermattlee
https://www.linkedin.com/in/cybermattlee/
https://www.youtube.com/cybermattlee
Allan Liska
https://www.linkedin.com/in/allan2/
https://twitter.com/uuallan
https://recordedfuture.com
Jon Murchison
https://www.linkedin.com/in/jon-murchison-b92898b5/
https://www.blackpointcyber.com
John Wetzel
https://www.linkedin.com/in/johnawetzel
https://twitter.com/johnwetzel
https://recordedfuture.com
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemmvaemm

48 - Actionable Disclosure Programs with Jon Murchison, Xavier Salinas, Matt Lee, Brian Weiss
On today's episode we're discussing the current issues and the best way forward to create actionable and accountable vulnerability disclosure.
Jonathan Murchison, the founder and CEO of Blackpoint, started his career in Network Engineering and IT operations, but quickly made the switch to the quiet world of the intelligence community. He has since spent over twelve years planning, conducting, and executing high-priority national security missions. As a former NSA computer operations expert and IT professional, he is bringing a unique perspective to the mission of developing cyber defense software effective at detecting and detaining purposeful cyber intrusions and insider threats. Murchison holds multiple patents in methods of network analysis, defense, pattern analytics, and mobile platforms.
Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has since taken on a new role as a force multiplier under Brad Fugitt as the Senior director of Security and Compliance at Pax8. He is driving the external thought leadership to empower MSPs to continue to grow in their security knowledge and operability. He lives to ensure his children maintain the same quality of life we do around technology, which is imperiled daily by threat actors.
Jon Murchison
https://www.linkedin.com/in/jon-murchison-b92898b5/
https://www.blackpointcyber.com
Xavier Salinas
https://www.linkedin.com/in/xavier-salinas-security/
https://www.blackpointcyber.com
Matt Lee
https://cybermattlee.com
https://www.twitter.com/cybermattlee
https://www.linkedin.com/in/cybermattlee/
https://www.youtube.com/cybermattlee
Brian J. Weiss | LinkedIn
ITECH Solutions: Overview | LinkedIn
www.itech-solutions.com
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemmvaemm

47 - Revil Arrested & Ukraine Under Threat
Joining us today are Matt Lee and Gerald Auger to discuss the recent actions against REvil and Ukraine under threat.
Dr. Auger is a 15+ year cybersecurity professional, academic, and author. He has been the cybersecurity architect at MUSC, a multi-billion dollar academic medical center. He is currently a partner in a cybersecurity consulting firm, adjunct faculty at The Citadel Military College, and chief content creator of the successful YouTube channel SimplyCyber where he aims to bring Cybersecurity Education At Scale. Dr. Auger holds a PhD in cyber operations and two Masters in Computer Science and Information Assurance.
Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has since taken on a new role as a force multiplier under Brad Fugitt as the Senior director of Security and Compliance at Pax8. He is driving the external thought leadership to empower MSPs to continue to grow in their security knowledge and operability. He lives to ensure his children maintain the same quality of life we do around technology, which is imperiled daily by threat actors.
Matt Lee
https://cybermattlee.com
https://www.twitter.com/cybermattlee
https://www.linkedin.com/in/cybermattlee/
https://www.youtube.com/cybermattlee
Gerald Auger Ph.D.
https://www.linkedin.com/in/geraldauger/
https://www.youtube.com/c/GeraldAuger
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemmvaemm

46 - Cybersecurity Education At Scale with Dr. Gerald Auger Ph.D.
Dr. Auger is a 15+ year cybersecurity professional, academic, and author. He has been the cybersecurity architect at MUSC, a multi-billion dollar academic medical center. He is currently a partner in a cybersecurity consulting firm, adjunct faculty at The Citadel Military College, and chief content creator of the successful YouTube channel SimplyCyber where he aims to bring Cybersecurity Education At Scale. Dr. Auger holds a PhD in cyber operations and two Masters in Computer Science and Information Assurance.
https://www.linkedin.com/in/geraldauger/
https://www.youtube.com/c/GeraldAuger
https://twitter.com/Gerald_Auger
https://simplycyber.io
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemmvaemm

45 - FBI warns FIN7 BadUSB attacks and Yealink calling home
The FIN7 ransomware group has been sending malware laden BadUSB devices to targets in the United States.
https://therecord.media/fbi-fin7-hackers-target-us-companies-with-badusb-devices-to-install-ransomware/Yealink phones are communicating with Chinese based servers three times a day and are able to review and log all network traffic flowing through the headset.
https://www.defenseone.com/technology/2022/01/common-office-desk-phone-could-be-leaking-info-chinese-government-report-alleges/360500/
0:00 - Intro
0:38 - Yealink handsets calling home to Chinese servers
4:20 - Mitigating Yealink concerns
8:55 - FIN7 sending LilyGo branded malware laden BadUSB drives to American companies and agencies
12:00 - How to mitigate these two threats
21:36 - Outro
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemmvaemm

44 - Bypassing Defender with DumpStack.log and Mimikatz
On this episode Eric shows us how to bypass Microsoft Windows Defender with DumpStack log and Mimikatz.
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

43 - Strategies to help prevent ransomware.
This episode is meant to spark ideas, stimulate thoughts and hopefully leave you with more questions than answers As you prepare your company for an incident or ransomware event.
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

42 - Avoiding Predatory Vendor Practices
We've all been there, vendors overpromising, underdelivering and tucking tail to run when confronted. This episode is meant to peel back how we deal with all vendors, and hopefully you can pick up a thing or three.
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

Khonsari Ransomware exploiting Log4J/Log4Shell with Allan Liska, CSIRT at Recorded Future - Escalate, Exfiltrate & Encrypt - Round 15
On today's episode Allan Liska of Recorded Future digs into the Khonsari Ransomware sample Eric submitted to Hybrid Analysis.
Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the coauthor of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.
Allan Liska
https://www.linkedin.com/in/allan2/
https://twitter.com/uuallan
https://recordedfuture.com
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm

Episode #41 - Incident Response Planning with Matt Lee
Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has since taken on a new role as a force multiplier under Brad Fugitt as the Senior director of Security and Compliance at Pax8. He is driving the external thought leadership to empower MSPs to continue to grow in their security knowledge and operability. He lives to ensure his children maintain the same quality of life we do around technology, which is imperiled daily by threat actors.
Matt Lee
https://cybermattlee.com
https://www.twitter.com/cybermattlee
https://www.linkedin.com/in/cybermattlee/
https://www.youtube.com/cybermattlee
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm
Have questions about CrowdStrike and/or Dark Cubed or just want to have a conversation? Please feel free to get in touch with us.

Mobile Security - Escalate, Exfiltrate & Encrypt - Round 14
On today's episode we are joined by Jonathan Scott, James Donaldson of CopperheadOS and Haseeb Awan of EFANI to discuss mobile security.
Copperhead is a cyber-security firm specializing in securing mobility solutions. Our product, CopperheadOS, is a secure Android available for Pixel devices in various deployments.
https://copperhead.co/android/
Haseeb Awan is CEO of EFANI Secure Mobile Service. He co-founded one of the first & largest bitcoin ATM networks in the world. He has been featured on NYT, WSJ, CoinDesk, TechCrunch, Mashable, Hulu & dozens of international media. Efani is the self proclaimed most secure mobile service provider that guarantees protection against SIM-Swaps, and encrypts personal information with $5m of insurance to back it up. Their basic SAFE plan offers unlimited voice, data & SMS, with 11- layers of proprietary verification to protect from hackers accessing your personal, business and financial assets. Efani also offers a premium Black Seal plan with additional security & privacy features and will be offered in 80 countries in early 2022.
Jonathan Scott is an American Phone & Cloud Hacker, founder of @haktree and @spyware_wiki. Human & Woman's Rights - Free Speech Activist Lead and currently the lead Mobile Pen-Tester for @cLabs.
https://twitter.com/jonathandata1
https://0hak.com
github.com/jonathandata1
https://youtube.com/jonathandata1
https://twitter.com/spyware_wiki
https://twitter.com/haktree
https://www.buymeacoffee.com/jonathandata1
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.

Episode #40 - Incident Response Orchestration with Maxime Lamothe-Brassard of LimaCharlie.io
As part of the Canadian Intelligence apparatus, Maxime worked in positions ranging from development of cyber defense technologies through Counter Computer Network Exploitation and Counter Intelligence. Maxime led the creation of an advanced cyber security program for the Canadian government and received several Director’s awards for his service.
After leaving the government, Maxime provided direct help to private and public organizations in matters of cyber defense and worked for CrowdStrike, Google and Google X. Maxime left Google X - where he was a founding member of Chronicle Security - in 2018 to found LimaCharlie.
Maxime Lamothe-Brassard
https://www.linkedin.com/in/maximelb/
https://limacharlie.io/
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm
Have questions about CrowdStrike and/or Dark Cubed or just want to have a conversation? Please feel free to get in touch with us.

Episode 39 - It is what it is. #DarkCubed
This video episode is available on Spotify and YouTube.
On today's episode;
EMOTET brought to you by LOCKBIT 2.0 Cybersecurity doesn't want Ransomware to go away Don't buy into the FUD MEAL Team SIX is on the case Every day is a day to look out for Ransomware attacks E-Commerce Linux servers hacked with shells PHISH and OSINT Targeting Packages by Russia, China, North Korea, Iran and more Chinese and Russian hackers are collaborating with each other General Nakasone of the Nation Security Agency (NSA) calls for collaboration between Public and Private sector companies Slash and burn with parallel construction to raise the tide Defense Industrial Base (DIB) security is at times insufficient and ineffective by nature CISA should create a site to report critical infrastructure and key resource companies with security failures CISA making stride to attract top talent President Biden's Executive Order from May 12 2021 Put Oprah in charge of MFA roll-out Dark Cubed identifies potentially malicious IP addresses from Linode and Digital Ocean VPN zero day vulnerabilities Lack of log visibility in applications MFA on local Administrator accounts Local Municipalities will plug anything into their CJIS connected systems and email admin credentials Eric is all in on SANS courses to improve his skill sets Are acronyms at the end of your name really worth it Eric starts poking at mobile devices thanks to Jonathan Scott Cell phones are insecure by nature despite using Signal, Telegram, WhatsApp and other encrypted chat applications META will be PALANTIR on steroids Enragement = Engagement This weeks movie pick: A Few Good MenEric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
https://www.buymeacoffee.com/erictaylor
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
https://www.buymeacoffee.com/shivaemm
Have questions about CrowdStrike and/or Dark Cubed or just want to have a conversation? Please feel free to get in touch with us.

Episode 37 - PEGASUS ID and more with Jonathan Scott
Buy Eric a Coffee
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.
Jonathan Scott is an American Phone & Cloud Hacker, founder of @haktree and @spyware_wiki. Human & Woman's Rights - Free Speech Activist Lead and currently the lead Mobile Pen-Tester for @cLabs.
https://twitter.com/jonathandata1
https://0hak.com
github.com/jonathandata1
https://youtube.com/jonathandata1
https://twitter.com/spyware_wiki
https://twitter.com/haktree
https://www.buymeacoffee.com/jonathandata1
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.

Episode 38 - Remote Monitoring & Management with David Weeks of N-Able
David Weeks is the senior director of partner experience for N-able. Weeks works side-by-side with top-performing N-Able MSPs and their global partner community. A big part of his role is to listen and engage with our partners so that we better understand their needs, share ideas more freely, and provide valuable insight into the current market conditions. Weeks also offers strategic sales and marketing recommendations along with tactical initiatives for N-able and externally to help partners and the wider market identify new trends and revenue opportunities. As a regular presenter at global, and regional events, he is all in on helping our partners scale their success and serve as the world’s best MSPs.
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Buy Eric a Coffee
Eric Taylor is Educating folks around cyber security
IT support that's actually supportive.

The US Ransomware Response and CMMC with Vince Crisler - Escalate, Exfiltrate & Encrypt - Round 13
Today we're joined by Vince Crisler to discuss recent US actions against ransomware and the evolution of CMMC.
Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused on innovative solutions for small and midsize companies. He is on the IT Security Executive Council for CompTIA, the Executive Committee for the CompTIA ISAO, and a member of Embry-Riddle Aeronautical University's Worldwide Industry Advisory Board.
Prior to founding Dark Cubed, Co-Founded Fortalice Solutions, an innovative cyber security consulting company that supported Fortune 500 and Government Agencies. Crisler previously supported the Department of Homeland Security (DHS) and Sandia National Laboratories in the development of cyber security protection programs to defend the networks of Federal Departments and Agencies, as well as those belonging to critical infrastructure and key resources (CI/KR) owners and operators. Crisler was the primary author for the five-year technical vision for the National Cybersecurity Protection System, a $3B cyber security program within DHS. He was also a co-author of the DHS Enhanced Cyber Services (ECS) Program, establishing a critical cyber security information-sharing program, which was formally announced in Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity.
Crisler also served as the CISO for the White House's Executive Office of the President and was responsible for the creation of the first ever cyber security operations center to protect White House networks.
Prior to the White House, Crisler served in the United States Air Force in organizations to include the White House Communications Agency, the National Military Command Center in the Pentagon, and Ramstein Air Base in Germany. Crisler earned a Bachelor of Science in Computer and Information Science from the Ohio State University and a Master of Science in Management from Embry Riddle Aeronautical University. He currently lives in the Washington D.C. area.
Vince Crisler
https://www.linkedin.com/in/vincecrisler/
https://darkcubed.com/
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Buy Eric a Coffee
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 36 - Allan Liska, CSIRT at Recorded Future - Ransomware & Incident Response
Allan Liska is an intelligence architect at Recorded Future. Allan has more than 15 years experience in the world of security and has worked as both a security practitioner and an ethical hacker. Through his work at Symantec, iSIGHT Partners, FireEye, and Recorded Future, Allan has helped countless organizations improve their security posture using more effective intelligence. He is the author of The Practice of Network Security, Building an Intelligence-Led Security Program, and Securing NTP: A Quickstart Guide and the coauthor of DNS Security: Defending the Domain Name System and Ransomware: Defending Against Digital Extortion.
Allan Liska
https://www.linkedin.com/in/allan2/
https://twitter.com/uuallan
https://recordedfuture.com
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Escalate, Exfiltrate & Encrypt - Round 12
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security.
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 35 - Bob Henderson with Intelligence Services Group
Bob Henderson is the founder and CEO of Intelligence Services Group.
Bob's innate purpose for defending and protecting people led them to form ISG.
Intelligence Services Group understands companies are facing criminal entities, rogue nation states, internal threats and everyday attempts or carelessness which causes harm and puts their data at risk. Their intelligence/law enforcement DNA allows us to think differently and offers a unique approach to helping their clients.
Bob Henderson
https://www.linkedin.com/in/bobwhnj/
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Escalate, Exfiltrate & Encrypt - Round 11
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
Robert Nelson
https://www.linkedin.com/in/robert-nelson-45b1342/
https://twitter.com/techplanet4u
https://techplanetnow.com
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 34 - Cybersecurity basics.
We spent the last couple weeks going through all of our tools and systems in an effort to find weaknesses. This is what we learned.
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 33 - Vulnerability Disclosure Programs (VDP) with Matt Lee
Matt Lee has dedicated the last 10 years to raising the security tide in the SMB market. His efforts have served in every capacity in a growing MSP that grew to support 20,000 endpoints. His leadership around technology direction and security/compliance protected and elevated over 17,000 people in Small to midsize businesses in five states. He has since taken on a new role as a force multiplier under Brad Fugitt as the Senior director of Security and Compliance at Pax8. He is driving the external thought leadership to empower MSPs to continue to grow in their security knowledge and operability. He lives to ensure his children maintain the same quality of life we do around technology, which is imperiled daily by threat actors.
Matt Lee
https://cybermattlee.com
https://www.twitter.com/cybermattlee
https://www.linkedin.com/in/cybermattlee/
https://www.youtube.com/cybermattlee
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 32 - Ransomware recourse.
After a one week hiatus Eric and Shiva are back discussing what needs to be done to bring meaningful and lasting change to our security posture.
Articles referenced are listed below.
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Escalate, Exfiltrate & Encrypt - Round 10
Steve Taylor runs an MSP while podcasting at The RocketMSP Podcast with new episodes being released weekly. The RocketMSP podcast interviews great guests from around the industry while having some fun along the way! You can also find Steve in the RocketMSP peer community, coaching MSP business owners through changes to operate a more successful company.
https://www.rocketmsp.io
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 31 - Security and compliance guidelines with Vince Crisler
Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused on innovative solutions for small and midsize companies. He is on the IT Security Executive Council for CompTIA, the Executive Committee for the CompTIA ISAO, and a member of Embry-Riddle Aeronautical University's Worldwide Industry Advisory Board.
Prior to founding Dark Cubed, Co-Founded Fortalice Solutions, an innovative cyber security consulting company that supported Fortune 500 and Government Agencies. Crisler previously supported the Department of Homeland Security (DHS) and Sandia National Laboratories in the development of cyber security protection programs to defend the networks of Federal Departments and Agencies, as well as those belonging to critical infrastructure and key resources (CI/KR) owners and operators. Crisler was the primary author for the five-year technical vision for the National Cybersecurity Protection System, a $3B cyber security program within DHS. He was also a co-author of the DHS Enhanced Cyber Services (ECS) Program, establishing a critical cyber security information-sharing program, which was formally announced in Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity.
Crisler also served as the CISO for the White House's Executive Office of the President and was responsible for the creation of the first ever cyber security operations center to protect White House networks.
Prior to the White House, Crisler served in the United States Air Force in organizations to include the White House Communications Agency, the National Military Command Center in the Pentagon, and Ramstein Air Base in Germany. Crisler earned a Bachelor of Science in Computer and Information Science from the Ohio State University and a Master of Science in Management from Embry Riddle Aeronautical University. He currently lives in the Washington D.C. area.
Vince Crisler
https://www.linkedin.com/in/vincecrisler/
https://darkcubed.com/
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Allstate to block Datto, Ninja RMM and Kaseya - Escalate, Exfiltrate & Encrypt - Round 9
It would appear Allstate has decided to block RMM platforms from Datto, Ninja and Kaseya effective September 27th without any clear indication as to why.
https://www.reddit.com/r/msp/comments/pte6av/allstate_to_block_datto_rmm_ninja_and_kaseya/Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 30 - COVID-19 and its effect on cybersecurity with Scott Davis
Scott is an innovative senior technology professional with over twenty years in leading IT infrastructure and network security compliance for businesses of all sizes, including six years in managed services.
Scott has in-depth knowledge of multi-year business continuity planning, cybersecurity planning, technology documentation, workflow design, project management, and network design.
Scott’s background and knowledge of PCI-DSS, HIPAA, NIST, GDPR, CIS Controls, CCPA and other state breach notification laws allows Scott the ability to quickly identify and develop a plan to bring organizations to compliance quickly.
Scott is currently a Sales Engineer with Liongard, a Adjunct Professor with NuPaths, and Scott also produces and records a twice a week video podcast, called The Morning Breach.
Scott Davis
https://www.linkedin.com/in/scottrdavispa/
https://twitter.com/scottrdavis
https://themorningbreach.com/
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Escalate, Exfiltrate & Encrypt - Round 8
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.
https://www.theregister.com/2021/09/15/grief_corp_ransomware_negotiator_rage/https://threatpost.com/revil-sodinokibi-ransomware-universal-decryptor/169498/https://threatpost.com/azure-zero-day-supply-chain/169508/https://www.microsoft.com/security/blog/2021/09/15/analyzing-attacks-that-exploit-the-mshtml-cve-2021-40444-vulnerability/https://techcommunity.microsoft.com/t5/exchange-team-blog/how-to-update-ad-schema-to-address-cve-2021-34470-if-exchange-is/ba-p/2617083Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 29 - Identifying NSO Pegasus breaches with CrowdStrike Mobile - Cameron Buriani
Recorded September 6, 2021
On this episode we discuss using CrowdStrike tools to identify and help mitigate mobile and USB borne attacks.
https://github.com/AmnestyTech/investigations
Cameron Buriani is a cyber security professional who works as a Senior Solutions Architect at Crowdstrike over 3 years now. Over the last two years , he’s dedicated his efforts to building out the Crowdstrike MSSP offering from the ground up to the full blown solution it is today.
In his spare time, he works on his land in Texas raising livestock, growing annual crops, and working the peach orchard with his Wife and Daughter.
Eric Taylor | LinkedIn
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Escalate, Exfiltrate & Encrypt - Round 7
Shiva and Eric will talk about the latest Pax8 incident and the response that they have given.
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Escalate, Exfiltrate & Encrypt - Round 6
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.
https://securityaffairs.co/wordpress/121985/cyber-crime/groove-gang-fortinet-leaks.htmlhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-40444https://securityintelligence.com/posts/lockbit-ransomware-attacks-surge-affiliate-recruitment/
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 28 - Cyber Insurance & Loss Prevention with Joseph Brunsman
Joseph Brunsman joined the cyber and professionally liability realm in 2015 after serving as a Lieutenant in the United States Navy, working as an Anti-Terrorism / Force Protection Officer responsible for a billion dollars of equipment and 280+ military personnel. Prior to that he served tours as a Combat Information Center Officer and an Electronic Warfare Officer. During his enlisted time he was an Information Systems Technician dealing with Unix database management and network security.
Joseph is a 2003 graduate of New Mexico Military Institute and a 2010 graduate of the U.S. Naval Academy in Annapolis, MD where he obtained a degree in Systems Engineering with a focus on robotics system interoperability. He is the resident expert in cyber law, insurance and compliance—writing 2 consecutive books on the subject. He enjoys Jiu-Jitsu, powerlifting, business theory, and biohacking.
Joseph Brunsman
www.youtube.com/josephbrunsman
https://www.thebrunsgroup.com/
www.thebrunsgroup.com/book2
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Buy Eric a Coffee
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Unpacking the tech and gear left in Afghanistan. Escalate, Exfiltrate & Encrypt - Round 5
On todays episode we're joined by John Wetzel the Director of Intelligence Solutions at Recorded Future and we discuss:
Technology and gear left in Afghanistan, ARM chips and more.
John is an experienced security intelligence leader building strategic, global teams. Hands-on technical leader passionately merging technical, business, product knowledge to achieve strategic business outcomes. Strong communicator for boards of directors and C-suite to practitioners. Previously DOD counterintelligence and compliance officer (NISPOM, ITAR, EAR) with strong relationships to federal law enforcement.
Writer and speaker on cyber threat intelligence applications, insider threat programs at SANS CTI Summit, Kaspersky SAS 2019, Predict host and trainer 2016-2020. Co-author, The Security Intelligence Handbook (available on Amazon).
John Wetzel
https://www.linkedin.com/in/johnawetzel
https://recordedfuture.com
https://twitter.com/johnwetzel
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Buy Eric a Coffee
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 27 - Training with James McQuiggen of KnowBe4
James is Security Awareness Advocate is responsible for amplifying messaging related to the importance of, effectiveness of, and the need for security awareness and training within organizations through social media, webinars, in-person presentations, industry trade shows and traditional media outlets.
Information Security Awareness: manage Internal Awareness Program to inform and provide training to enterprise employees through department experts in the areas of Phishing, Intellectual Property Classification, Data Protection, Information Security Policies, and Workstation Audits.
Training: create training programs in various aspects of Information Security. Training programs used throughout the business for Customs Transport Awareness, Security Awareness, Physical Security and Internal Processes.
Project Management and coordination across multiple sectors and departments within the organization relating to Product & Solution Security, governance and NERC CIP standards.
NERC Compliance: provide internal and external customer support in the areas of the North American Electric Reliability Corporation (NERC) Critical Infrastructure Program (CIP). Support areas include Policy Creation, contract negotiation, Application Support Compliance, and Training.
James McQuiggan
https://www.linkedin.com/in/jmcquiggan/
https://twitter.com/james_mcquiggan
https://www.knowbe4.com/
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Buy Eric a Coffee
Eric Taylor is Educating folks around cyber security.
Buy Shiva a Coffee
IT support that's actually supportive.

Escalate, Exfiltrate & Encrypt - Round 4
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.
President Biden meets with top tech CEO's. https://www.whitehouse.gov/briefing-room/statements-releases/2021/08/25/fact-sheet-biden-administration-and-private-sector-leaders-announce-ambitious-initiatives-to-bolster-the-nations-cybersecurity/ U.S. to work with Big Tech, finance sector on new cybersecurity guidelines https://www.reuters.com/world/us/cyber-threats-top-agenda-white-house-meeting-with-big-tech-finance-executives-2021-08-25/Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Buy Eric a Coffee
Eric Taylor is Educating folks around cyber security.
Buy Shiva a Coffee
IT support that's actually supportive.

Escalate, Exfiltrate & Encrypt - Round 3
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.
State Department potentially hacked. https://gizmodo.com/the-state-department-has-reportedly-been-hacked-1847536299 Virginia Defense Force data leaked. https://twitter.com/vxunderground/status/1429185341194444805Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Buy Eric a Coffee
Eric Taylor is Educating folks around cyber security.
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 26 - Matthé Smit Director of Product Management, Datto RMM
As Director of Product Management for RMM, Matthé is responsible for driving the RMM product roadmap and managing the product management team. He plays a critical role in making Datto RMM one of the most scalable remote management platforms in the world.
Over the last 15 years, Matthé has exclusively worked in the managed services market working for leading software vendors. Having worked with countless MSPs across the world, Matthé has a deep understanding of the space and a strong focus on finding simple solutions to complex technical problems. Matthé is located in Amsterdam, Netherlands.
Matthé Smit
https://www.linkedin.com/in/matthe/
https://twitter.com/matthesmit
https://datto.com
Brian J. Weiss
https://www.linkedin.com/in/brianjweiss
https://twitter.com/bweiss805
www.itech-solutions.com
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Buy Eric a Coffee
Eric Taylor is Educating folks around cyber security.
Buy Shiva a Coffee
IT support that's actually supportive.

Elevate, Exfiltrate & Encrypt - Round 2
These will be quick. We dive into questions and articles submitted from listeners and/or evolving incidents.
https://www.bleepingcomputer.com/news/security/cisco-won-t-fix-zero-day-rce-vulnerability-in-end-of-life-vpn-routers https://www.bleepingcomputer.com/news/security/chase-bank-accidentally-leaked-customer-info-to-other-customers/ https://www.govinfosecurity.com/banking-groups-object-to-breach-notification-bill-provisions-a-17312 https://www.inforisktoday.com/does-abandoning-embassy-in-kabul-pose-cybersecurity-risks-a-17309
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Buy Eric a Coffee
Eric Taylor is Educating folks around cyber security.
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 25 - Threat Intelligence with John Wetzel of Recorded Future.
John Wetzel is currently the Director of Intelligence Solutions at Recorded Future.
John is an experienced security intelligence leader building strategic, global teams. Hands-on technical leader passionately merging technical, business, product knowledge to achieve strategic business outcomes. Strong communicator for boards of directors and C-suite to practitioners. Previously DOD counterintelligence and compliance officer (NISPOM, ITAR, EAR) with strong relationships to federal law enforcement.
Writer and speaker on cyber threat intelligence applications, insider threat programs at SANS CTI Summit, Kaspersky SAS 2019, Predict host and trainer 2016-2020. Co-author, The Security Intelligence Handbook (available on Amazon).
John Wetzel
https://www.linkedin.com/in/johnawetzel
https://recordedfuture.com
https://twitter.com/johnwetzel
Eric Taylor
https://www.linkedin.com/in/ransomware/
https://twitter.com/barricadecyber
https://www.barricadecyber.com
Shiva Maharaj
https://www.linkedin.com/in/shivamaharaj
https://twitter.com/kontinuummsp
https://www.kontinuum.com/
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Buy Eric a Coffee
Eric Taylor is Educating folks around cyber security.
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 24 - Where is the risk?
On this episode we dig into where responsibility and accountability, compromised hardware beaconing, Senators lobbying for APT's, defining a breach with two words, how much should you have to push your vendors security development, zero knowledge and more.
Eric Taylor | LinkedIn
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
Brian J. Weiss | LinkedIn
Twitter: bweiss805
www.itech-solutions.com
Robert Nelson | LinkedIn
Twitter: techplanet4u
techplanetnow.com
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Elevate, Exfiltrate & Encrypt - Round 1
These will be quick. We dive into questions submitted from listeners and/or evolving incidents.
Lockbit 2.0 is seeking to leverage insider threats. Conti TTP’s are leaked.If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Buy Eric a Coffee
Eric Taylor is Educating folks around cyber security.
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 23 - Stopping breaches with Crowdstrike’s Cameron Buriani.
The best way to stop an encryption incident is by stopping the breach.
Cameron Buriani is a cyber security professional who works as a Senior Solutions Architect at Crowdstrike over 3 years now. Over the last two years , he’s dedicated his efforts to building out the Crowdstrike MSSP offering from the ground up to the full blown solution it is today.
In his spare time, he works on his land in Texas raising livestock, growing annual crops, and working the peach orchard with his Wife and Daughter.
Eric Taylor | LinkedIn
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
If you are interested in CrowdStrike and/or Dark Cubed or just want to have a conversation, please feel free to get in touch with us.
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 22 - Peeling an XDR onion with Jimmy Hatzell.
James Hatzell is a channel marketing professional with hands on experience in IT and cybersecurity. As Director of Marketing for SKOUT Cybersecurity, James uses his technical and marketing knowledge to build content and tools to help MSPs sell cybersecurity as a service. Prior to his time at SKOUT, James served as the CTO for a healthcare start-up and holds degrees in both Information Sciences and Cybersecurity from Penn State University
And that is how an IT Guy who went to college for cybersecurity ends up in marketing.
Jimmy Hatzell | LinkedIn
Twitter: JimmyHatzell
Home | SKOUT Cybersecurity (getskout.com)
Eric Taylor | LinkedIn
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
Brian J. Weiss | LinkedIn
Twitter: bweiss805
www.itech-solutions.com
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 21 - Tides of change with Dave Sobel.
Dave is the host of the Business of Tech podcast, and owner of MSP Radio. Dave is regarded as a leading expert in the delivery of technology services, with broad experience in both technology and business. He owned and operated an IT Solution Provider and MSP for over a decade, both acquiring other organizations and eventually being acquired. This firm was a winner of multiple awards, including being a finalist for Microsoft’s Worldwide Partner of the Year in the Small Business Specialist category. After his MSP experience, he has worked for multiple vendors at such companies as Level Platforms, GFI, LogicNow, and SolarWinds, leading community, event, marketing, and product strategies, as well as several M&A activities.
Dave Sobel | LinkedIn
Home - MSP Radio: The Voice of the Solution Providers
Eric Taylor | LinkedIn
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
Brian J. Weiss | LinkedIn
Twitter: bweiss805
www.itech-solutions.com
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 20 - Understated or Overblown: A Kaseya saga.
On this episode Brian Weiss and Robert Nelson join us to discuss how the Kaseya incident has affected its MSP customers and their customers, the failings of most compliance regimes, Kaseya choosing Fire Eye over its own recent acquisition Rocket Cyber and the effects of this incident on Municipalities whose providers use Kaseya on CJIS regulated systems and data.
Eric Taylor | LinkedIn
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
Brian J. Weiss | LinkedIn
Twitter: bweiss805
www.itech-solutions.com
Robert Nelson | LinkedIn
Twitter: techplanet4u
techplanetnow.com
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 19 - Unpacking the Kaseya VSA incident.
On this episode we’re joined by Brian Weiss, Founder of ITech Solutions as we unpack the third REvil and Kaseya incident that began Friday July 2nd 2021.
Despite Kaseya VSA not being FedRAMP, by it’s own disclosure VSA was being used by Federal Agencies. While details continue to emerge we're getting the outline of what may have caused potentially over one million computers to have been encrypted and an initial ransom request for 70 millions dollars.
Eric Taylor | LinkedIn
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
Brian J. Weiss | LinkedIn
ITECH Solutions: Overview | LinkedIn
www.itech-solutions.com
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 18 - Building trust without trust.
On this episode we begin to talk about the difference between zero trust and zero knowledge, ransomware groups going dark for the moment and recent tactics and techniques.
Eric Taylor | LinkedIn
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 17 - No one cares.
Taxing ransom payments to help secure companies, why legacy systems and are low hanging fruit and incident response.
Eric Taylor | LinkedIn
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 16 - Tactics and techniques with Brian Weiss.
On this episode we are joined by Brian Weiss to discuss ransomware groups going dark, REvil making its presence known, vulnerability management, back-up and disaster recovery and setting up your cybersecurity team for success.
Eric Taylor | LinkedIn
Twitter: barricadecyber
Podcast Episode #16 - Tactics, techniques and ransomware with Brian Weiss. - YouTube
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
Brian J. Weiss | LinkedIn
ITECH Solutions: Overview | LinkedIn
www.itech-solutions.com
Articles referenced;
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 15 - Fear-mongering and ransomware.
On this episode we discuss the need to focus on security despite what compliance wants and dictates, CISO’s unrelenting quest for help from the government, the colonial pipeline and the fundamental lack of security employed by companies.
Eric Taylor | LinkedIn
Twitter: barricadecyber
Podcast Episode #15 - Talking more about Colonial Pipeline and Ransomware - YouTube
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
Articles Referenced;
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 14 - Operating effectively with Todd Kane.
Todd Kane has spent over a decade creating a management framework that has resulted in massive value for the companies he has worked with. Millions in higher margin projects/operations, millions in saved cash reducing employee turnover, and massive increases in team morale.
Todd has led groups for several of largest and high growth companies in western Canada. Experience with major businesses like EnCana, Canadian Natural Resources Ltd, WestJet, Bell Canada, Long View Systems, and Fully Managed.
His work has been recognized with numerous awards, both technical and business.
Microsoft, Small Business BC, Globe and Mail, Venture Magazine
Podcast #14 - Operating effectively with Todd Kane - YouTube
Todd Kane | LinkedIn
Evolved (evolvedmgmt.com)
Evolved Radio Podcast (evolvedmgmt.com)
MSP Productivity Accelerator (evolvedmgmt.com)
Service Manager Boot Camp (evolvedmgmt.com)
Eric Taylor | LinkedIn
Twitter: barricadecyber
barricade cyber solutions - YouTube
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 13 - Finding faster with Jon Murchison.
Jonathan Murchison, the founder and CEO of Blackpoint, started his career in Network Engineering and IT operations, but quickly made the switch to the quiet world of the intelligence community. He has since spent over twelve years planning, conducting, and executing high-priority national security missions.
As a former NSA computer operations expert and IT professional, he is bringing a unique perspective to the mission of developing cyber defense software effective at detecting and detaining purposeful cyber intrusions and insider threats. Murchison holds multiple patents in methods of network analysis, defense, pattern analytics, and mobile platforms.
Jon Murchison | LinkedIn
Blackpoint Cyber | 24/7 Managed Detection and Response
Eric Taylor | LinkedIn
Twitter: barricadecyber
barricade cyber solutions - YouTube
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 12 - Taking action with Vince Crisler.
Vince Crisler has more than 20 years of IT and cyber security leadership within the Department of Defense, federal civilian government, and private sector. He is the CEO and Founder of Dark Cubed, a cyber security product company focused on innovative solutions for small and midsize companies. He is on the IT Security Executive Council for CompTIA, the Executive Committee for the CompTIA ISAO, and a member of Embry-Riddle Aeronautical University's Worldwide Industry Advisory Board.
Prior to founding Dark Cubed, Co-Founded Fortalice Solutions, an innovative cyber security consulting company that supported Fortune 500 and Government Agencies. Crisler previously supported the Department of Homeland Security (DHS) and Sandia National Laboratories in the development of cyber security protection programs to defend the networks of Federal Departments and Agencies, as well as those belonging to critical infrastructure and key resources (CI/KR) owners and operators. Crisler was the primary author for the five-year technical vision for the National Cybersecurity Protection System, a $3B cyber security program within DHS. He was also a co-author of the DHS Enhanced Cyber Services (ECS) Program, establishing a critical cyber security information-sharing program, which was formally announced in Executive Order (EO) 13636, Improving Critical Infrastructure Cybersecurity.
Crisler also served as the CISO for the White House's Executive Office of the President and was responsible for the creation of the first ever cyber security operations center to protect White House networks.
Prior to the White House, Crisler served in the United States Air Force in organizations to include the White House Communications Agency, the National Military Command Center in the Pentagon, and Ramstein Air Base in Germany. Crisler earned a Bachelor of Science in Computer and Information Science from the Ohio State University and a Master of Science in Management from Embry Riddle Aeronautical University. He currently lives in the Washington D.C. area.
Vince Crisler | LinkedIn
Dark Cubed™ Cybersecurity Solution
Eric Taylor | LinkedIn
Twitter: barricadecyber
barricade cyber solutions - YouTube
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 11 - Executive Order or Compliance Rosetta Stone?
Executive Order, Darkside ransomware group, the Colonial pipeline debacle and CMMC.
Eric Taylor | LinkedIn
Twitter: barricadecyber
barricade cyber solutions - YouTube
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
Articles referenced;
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 10 - Unrestricted warfare - Vol. I
With the increase of ransomware activity across the US, every incident may be an act of war.
Eric Taylor | LinkedIn
Twitter: barricadecyber
Youtube: barricade cyber solutions - YouTube
www.barricadecyber.com
Shiva Maharaj | LinkedIn
Twitter: kontinuummsp
www.kontinuum.com
Brian J. Weiss | LinkedIn
ITECH Solutions: Overview | LinkedIn
www.itech-solutions.com
Articles referenced;
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 9 - Zero Knowledge vs. Revenue.
When it comes to choosing between your privacy and the commercialization of your data, vendors will invariably choose advancing their revenue by using your data.
Earlier this week Gary Pica’s TruMethods was acquired by Kaseya, a financial powerhouse in the MSP marketplace.
With each acquisition, these market share leaders are consolidating their power-base to what some would consider anti-trust levels, further diminishing the likelihood of Zero Knowledge being built into their products.
And of course what's a podcast without CMMC?
Eric Taylor
Twitter: barricadecyber
Youtube: barricade cyber solutions - YouTube
www.barricadecyber.com
Shiva Maharaj
Twitter: kontinuummsp
www.kontinuum.com
Links mentioned:
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 8 - Operating differently.
Compliance based legislation and Solarwinds data restoration is just too slow. Incident response, Babuk ransomware group targets the FBI, CISA and the United States, another supply chain breach this time with Passwordstate, Vendors' thirst for customer data will hold back progress with zero knowledge architecture. Microsoft 365 should be backed up and all backups are not created equally. And yes, self attestation is worthless.
Eric Taylor
Twitter: barricadecyber
Youtube: barricade cyber solutions - YouTube
www.barricadecyber.com
Shiva Maharaj
Twitter: kontinuummsp
www.kontinuum.com
Articles mentioned:
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 7 - What’s essential.
There is no such thing as a minimum security standard. While this is not meant to be an exhaustive list of what you have to do to attain a comprehensive cybersecurity posture. It is meant to be more of a guide of what you should be doing and if you're not maybe it's time you did.
Buy Eric a CoffeeEric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.

Episode 6 - Too many places to hide.
Nuke and pave the lost supply chain, Pulse Secure and Codecov used to compromise their clients, OEM hardware manufacturer Quanta breached by REvil, more Sonicwall zero-days.
Eric Taylor
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj
Twitter: kontinuummsp
www.kontinuum.com
Articles referenced;
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 5 - FBI Managed Security IT Services.
The FBI, sealed warrants, compromised Microsoft Exchange servers, cloud printing, RDP, less than secure SSO, daily patching and more.
Eric Taylor
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj
Twitter: kontinuummsp
www.kontinuum.com
Bleeping Computer article referenced;
https://www.bleepingcomputer.com/news/security/fbi-nuked-web-shells-from-hacked-exchange-servers-without-telling-owners/
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 4 - Industrial control systems are the low hanging fruit.
The Iranian nuclear facility hack, CMMC and those selling into the DOD compliance space.
Eric Taylor
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj
Twitter: kontinuummsp
www.kontinuum.com
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 3 - What we can endure with current standards.
On this episode, Eric and I discuss recent incidents (including Ubiquiti and you guessed it Solar Winds), how to vet your vendors, industrial control systems or at least what should be classified as ICS' and touched on our vision of what CMMC should look like.
Eric Taylor
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj
Twitter: kontinuummsp
www.kontinuum.com
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 2 - The gatekeeper.
Overlooked as an annoyance by most, MFA is often the last line of defense between you and an account takeover or breach, giving MFA the distinction of being your gatekeeper.
Eric Taylor
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj
Twitter: kontinuummsp
www.kontinuum.com
Eric Taylor is Educating folks around cyber security
Buy Shiva a Coffee
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Episode 1 - Where do we go from here?
Join Eric Taylor and I as we discuss recent events and navigate the cybersecurity world as it is today.
Eric Taylor
Twitter: barricadecyber
www.barricadecyber.com
Shiva Maharaj
Twitter: kontinuummsp
www.kontinuum.com
BARRICADE CYBER
Ransomware Remediation Services, Incident Response and Penetration Testing.
KONTINUUM
IT support that's actually supportive.
FASTMAIL
Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!

Welcome to the Cybersecurity: Amplified And Intensified Podcast.
Join us as we discuss ongoing cybersecurity incidents, trends and best practices to secure everyday life.
Buy Eric a CoffeeEric Taylor is Educating folks around cyber security.
Buy Shiva a Coffee
IT support that's actually supportive.