Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Jack Recider

๐Ÿ‘ค Speaker
4533 total appearances

Appearances Over Time

Podcast Appearances

Darknet Diaries
149: Mini-Stories: Vol 3

The average organization has tens of millions of unique permissions and sharing links. Even if you could visualize your cloud data exposure, it would take an army of admins years to right-size privileges. With how quickly data is created and shared, it's like painting the Golden Gate Bridge. That's why Varonis built Least Privilege Automation.

Darknet Diaries
149: Mini-Stories: Vol 3

Varonis continuously eliminates data exposure while you sleep by making intelligent decisions about who needs access to data and who doesn't. Because Varonis knows who can and who does access data, their automation safely remediates risky permissions and links, making your data more secure by the minute.

Darknet Diaries
149: Mini-Stories: Vol 3

Varonis continuously eliminates data exposure while you sleep by making intelligent decisions about who needs access to data and who doesn't. Because Varonis knows who can and who does access data, their automation safely remediates risky permissions and links, making your data more secure by the minute.

Darknet Diaries
149: Mini-Stories: Vol 3

Even when you're not logged in, Varonis is classifying more data, revoking permissions, enforcing policies, and triggering alerts to their IR team to review on your behalf. To see how Varonis can reduce risk while removing work from your plate, head on over to Varonis.com slash Darknet and start your free trial today. That's Varonis spelled V-A-R-O-N-I-S dot com slash Darknet.

Darknet Diaries
149: Mini-Stories: Vol 3

Even when you're not logged in, Varonis is classifying more data, revoking permissions, enforcing policies, and triggering alerts to their IR team to review on your behalf. To see how Varonis can reduce risk while removing work from your plate, head on over to Varonis.com slash Darknet and start your free trial today. That's Varonis spelled V-A-R-O-N-I-S dot com slash Darknet.

Darknet Diaries
149: Mini-Stories: Vol 3

This episode is sponsored by ThreatLocker. Ransomware, supply chain attacks, and zero-day exploits can strike without warning, leaving your business's sensitive data and digital assets vulnerable. But imagine a world where your cybersecurity strategy could prevent these threats. That's the power of ThreatLocker Zero Trust Endpoint Protection Platform.

Darknet Diaries
149: Mini-Stories: Vol 3

This episode is sponsored by ThreatLocker. Ransomware, supply chain attacks, and zero-day exploits can strike without warning, leaving your business's sensitive data and digital assets vulnerable. But imagine a world where your cybersecurity strategy could prevent these threats. That's the power of ThreatLocker Zero Trust Endpoint Protection Platform.

Darknet Diaries
149: Mini-Stories: Vol 3

ThreatLocker implements a proactive, deny-by-default approach to cybersecurity, blocking every action, process, and user unless specifically authorized by your team. This least-privileged strategy mitigates the exploitation of trusted applications and ensures 24-7, 365 protection for your organization.

Darknet Diaries
149: Mini-Stories: Vol 3

ThreatLocker implements a proactive, deny-by-default approach to cybersecurity, blocking every action, process, and user unless specifically authorized by your team. This least-privileged strategy mitigates the exploitation of trusted applications and ensures 24-7, 365 protection for your organization.

Darknet Diaries
149: Mini-Stories: Vol 3

The core of ThreatLocker is its Protect Suite, including application, allow listing, ring fencing, and network control. Additional tools like the ThreatLocker detect EDR, storage control, elevation control, and configuration manager enhance your cybersecurity posture and streamline internal IT and security operations.

Darknet Diaries
149: Mini-Stories: Vol 3

The core of ThreatLocker is its Protect Suite, including application, allow listing, ring fencing, and network control. Additional tools like the ThreatLocker detect EDR, storage control, elevation control, and configuration manager enhance your cybersecurity posture and streamline internal IT and security operations.

Darknet Diaries
149: Mini-Stories: Vol 3

To learn more about how ThreatLocker can help mitigate unknown threats in your digital environment and align your organization with respected compliance frameworks, visit ThreatLocker.com. That's ThreatLocker.com. So what should we call you? Evil Mog is fine. Okay, we'll call you Evil Mog. How do you get that name? Where does that come from?

Darknet Diaries
149: Mini-Stories: Vol 3

To learn more about how ThreatLocker can help mitigate unknown threats in your digital environment and align your organization with respected compliance frameworks, visit ThreatLocker.com. That's ThreatLocker.com. So what should we call you? Evil Mog is fine. Okay, we'll call you Evil Mog. How do you get that name? Where does that come from?

Darknet Diaries
149: Mini-Stories: Vol 3

IRC, I remember those days. We were young then. Did you do any stupid things when you were young and on IRC?

Darknet Diaries
149: Mini-Stories: Vol 3

IRC, I remember those days. We were young then. Did you do any stupid things when you were young and on IRC?

Darknet Diaries
149: Mini-Stories: Vol 3

A stern knock sounded urgent and menacing. He opened the door and saw the police were standing at his front door.

Darknet Diaries
149: Mini-Stories: Vol 3

A stern knock sounded urgent and menacing. He opened the door and saw the police were standing at his front door.

Darknet Diaries
149: Mini-Stories: Vol 3

Okay, so hold on a second. I've pirated. Mm-hmm. And I've done some freaking. The cops never came to my house. It sounds like you might have done more than that or went over the line.

Darknet Diaries
149: Mini-Stories: Vol 3

Okay, so hold on a second. I've pirated. Mm-hmm. And I've done some freaking. The cops never came to my house. It sounds like you might have done more than that or went over the line.

Darknet Diaries
149: Mini-Stories: Vol 3

They were... Did they work at all? Because I can't even imagine this work.