Created with Sketch.
Cybersecurity: Amplified And Intensified
13 minutes | 5 days ago
9. Monopoly, it’s not just a game.
When it comes to choosing between your privacy and the commercialization of your data, vendors will invariably choose advancing their revenue using your data. Earlier this week the Managed Services vendor list got a bit smaller with Gary Pica’s TruMethods being acquired by Kaseya, a financial powerhouse in the MSP marketplace.With each vendor acquisition consolidating their powerbase and increasing their respective market share, the likelihood of Zero Knowledge being adopted diminishes.And of course CMMC popped up as a topic of discussion again. Eric TaylorTwitter: barricadecyberYoutube: barricade cyber solutions - YouTubewww.barricadecyber.comShiva MaharajTwitter: kontinuummspwww.kontinuum.com Links mentioned:Kaseya’s IT Glue Acquires TruMethods MSP Peer Groups, vCIO Software (channele2e.com)Kaseya Compliance Manager for CMMC Automates Defense Contractors’ Compliance Assessments Under New Federal Government Requirement | Kaseya BARRICADE CYBER Barricade Cyber provides Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM Because you're entitled to support that's actually supportive.Otter.ai Otter.ai provides audio transcriptions services to help you get your message across.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!
46 minutes | 7 days ago
8. Compliance, legislation and SolarWinds data restoration is just too slow.
Incident response, Babuk ransomware group targets the FBI, CISA and the United States, another supply chain breach this time with Passwordstate, Vendors' thirst for customer data will hold back progress with zero knowledge architecture. Microsoft 365 should be backed up and all backups are not created equally. And yes, self attestation is worthless.Eric TaylorTwitter: barricadecyberYoutube: barricade cyber solutions - YouTubewww.barricadecyber.comShiva MaharajTwitter: kontinuummspwww.kontinuum.com Articles mentioned:Ransomware gang Babuk claims DC's Metropolitan Police was last caper – then goes dark | SC Media (scmagazine.com)Illinois Attorney General computer system breached early Saturday morning | State and Regional News | qctimes.comPasswordstate users warned to ‘reset all passwords’ after attackers plant malicious update | TechCrunchA ransomware gang made $260,000 in 5 days using the 7zip utility (bleepingcomputer.com) BARRICADE CYBER Barricade Cyber provides Ransomware Remediation Services, Incident Response and Penetration Testing.KONTINUUM Because you're entitled to support that's actually supportive.Otter.ai Otter.ai provides audio transcriptions services to help you get your message across.FASTMAIL Your data is for you, no one else. That includes your email, calendars, contacts, notes, and files!
5 minutes | 13 days ago
Clip 1: A cybersecurity bare minimum.
This is not meant to be an exhaustive list of what you have to do for cybersecurity. It is meant to be more of a guide of what you should be doing and if you're not maybe it's time you gave someone a call to help you.
37 minutes | 21 days ago
6. Nuke and pave, there’s too many places to hide.
The supply chain is lost, Pulse Secure and Codecov used to compromise their clients, OEM hardware manufacturer Quanta breached by REvil, more Sonicwall zero-days. Eric TaylorTwitter: barricadecyberwww.barricadecyber.comShiva MaharajTwitter: kontinuummspwww.kontinuum.com Articles referenced;Multiple agencies breached by hackers using Pulse Secure vulnerabilities | TheHillHundreds of networks reportedly hacked in Codecov supply-chain attack (bleepingcomputer.com)REvil ransomware gang claims it stole top-secret tech designs – including Apple lappies – from Quanta Computer • The Register3 Zero-Day Exploits Hit SonicWall Enterprise Email Security Appliances (thehackernews.com)
31 minutes | a month ago
5. FBI Managed Security IT Services.
The FBI, sealed warrants, compromised Microsoft Exchange servers, cloud printing, RDP, less than secure SSO, daily patching and more. Eric Taylor Twitter: barricadecyber www.barricadecyber.com Shiva Maharaj Twitter: kontinuummsp www.kontinuum.com Bleeping Computer article referenced;https://www.bleepingcomputer.com/news/security/fbi-nuked-web-shells-from-hacked-exchange-servers-without-telling-owners/
27 minutes | a month ago
4. Technology is political.
Eric and Shiva discuss the Iranian nuclear facility hack, CMMC and those selling into the space. Eric Taylor - www.barricadecyber.comShiva M. - www.kontinuum.com
27 minutes | a month ago
3. Incidents, vendors and compliance.
On this episode, Eric and I discuss recent incidents (including Ubiquiti and you guessed it Solar Winds), how to vet your vendors, industrial control systems or at least what should be classified as ICS' and touched on our vision of what CMMC should look like. Eric Taylor is the Principal of Barricade Cyber, a pen-testing and incident response firm. Eric's Twitter is @itsimplifie Eric's Website: https://www.barricadecyber.com
33 minutes | a month ago
2. The Gatekeeper.
Overlooked as an annoyance by most, MFA is often the last line of defense between you and an account takeover or breach, giving MFA the distinction of being your gatekeeper. Join Eric Taylor and I as we discuss various implementations and how to best leverage MFA. Eric Taylor is the Principal of Barricade Cyber, a pen-testing and incident response firm. Eric's Twitter is @itsimplifie Eric's Website: https://www.barricadecyber.com
46 minutes | a month ago
1. Where do we go from here?
Join Eric Taylor and I as we discuss recent events and navigate the cybersecurity world as it is today. Eric is the principal of Barricade Cyber Solutions, an Incident Response and Pen-testing firm. Eric's Twitter is @itsimplifieWebsite: http://www.barricadecyber.comBuzzsprout - Let's get your podcast launched! Start for FREEDisclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you.
0 minutes | 2 months ago
Welcome to the Cybersecurity: Amplified And Intensified Podcast.
Join us as we discuss ongoing cybersecurity incidents, trends and best practices to secure everyday life.
Terms of Service
Do Not Sell My Personal Information
© Stitcher 2021