Security Confidential S10 E6 Josh Mason
Josh Mason has 10 years of military experience, as an Air Force pilot and cyberwarfare officer. Currently, Josh is a Senior Technical Trainer for Neuvik Solutions, providing training, engagement management, penetration testing, risk assessments, and [...]
Security Confidential S10 E5 Shea Nangle
Shea Nangle has over 25 years in cybersecurity, risk, and technology. Including incident response planning, crisis management, security assessments, developing and maturing cybersecurity programs, and more. https://youtu.be/4vt8ns6EX5Q Chapter Titles: 00:00 Introduction 01:07 Our Guest [...]
Security Confidential S10 E4 Mike Rice pt 2
Host Rory Meikle chats with Mike Rice. Mike is a retired Navy Seal officer who started out his Military career as an enlisted marine corp infantry. This is part 2 of their conversation. https://youtu.be/Z0ZDCZVSYB8 [...]
Security Confidential S10 E3 Mike Rice pt 1
Host Rory Meikle chats with Mike Rice. Mike is a retired Navy Seal officer who started out his Military career as an enlisted marine corp infantry. This is part 1 of their conversation. https://youtu.be/mCMr-gI7aqY [...]
Security Confidential S10 E2 David Meece
David Meece is a SOC Analyst, Cyber Mentor, Educator, and Founder and Creator of CyberTech Dave. He holds a Master of Science degree in Information Systems and has a wide array of skills ranging from [...]
Security Confidential S10 E1 Jax Scott
Jax Scott is a cyber influencer, author, speaker, podcaster, President, and Founder of Outpost Gray. With over 13 years of experience working in IT and cyber, both private and public sectors. Jax spent a significant [...]
Women’s History Month
Happy Women's History Month. This month and every month, Dark Rhino Security celebrates Women worldwide who contribute daily to history, culture, and society. Throughout March, we'll shine a light on the incredible Women and female-owned [...]
Security Confidential S9 E10 Dr. Wendy Ng
Wendy Ng is a keynote speaker, Principal Cloud Security Architect, and senior security advisor. She has worked for Cisco, PWC, and Deloitte. Has a doctorate from the University of Oxford. She is currently with OneWeb. [...]
Security Confidential S9 E9 Bob Carver
Bob Carver CISM, CISSP, M.S. began his security career working in the financial industry. Later, Bob became the first full-time security employee hired to start the dedicated security monitoring and incident response team for Verizon [...]
Security Confidential S9 E8 Peter Warmka
Peter Warmka is a Keynote Speaker, Author, Cybersecurity/Insider Threat Consultant, Founder of Counterintelligence Institute, and a retired senior intelligence officer with the U.S. Central Intelligence Agency (CIA) where he specialized in clandestine HUMINT (human intelligence) [...]
Security Confidential S9 E7 Eric Allard
Eric Allard is an entrepreneur and the CTO of SOOS, a software technology company. He has 15+ years of experience in leadership, business strategy, and software team transformation with a broad set of skills. On [...]
Security Confidential S9 E6 Dallas Baker
Dallas Baker is a US Army Veteran and Cyber Professional. He has worked for many companies including PerimeterX, Blue Shield, PayPal, and HUMAN where he is currently the Threat Intelligence Analyst. He is skilled in [...]
How to Prevent Cybersecurity Attacks
Cybersecurity attacks are on the rise, expected to climb above 6 trillion attacks by the end of the year. Therefore, preventive tactics and safeguarding are so important. Every day, another attack is born and then [...]
Do Small Businesses Need Cybersecurity?
So many times, the public looks over small businesses and their needs. But just like any company, these businesses need security, especially cybersecurity. The lifeblood of small businesses is divided by brick-and-mortar establishments and internet [...]
What Is Cybersecurity?
We’ve never been busier in life than we are right now, especially since almost everyone’s integrated into the digital age. Therefore, there’s a need for true cybersecurity. One of the smallest nuisances online is profile [...]
Dark Rhino Security’s Top 10 Cybersecurity Best Practices
With years of experience, a solid team of highly trained experts and access to cutting-edge technology, we, at Dark Rhino Security (DRS), know cybersecurity best practices inside out. After seeing common mistakes repeated in multiple [...]
The Advantages of Identity Access Management Tools in the Modern Workplace
Identity and Access Management (IAM) describes the technologies, frameworks and policies used to manage user identities and govern access within an organization. IAM tools are highly beneficial for the IT administration workforce and reinforce an [...]
Client Success Story: How DRS Implemented a Robust IAM Solution with Minimal Operational Downtime
Client Success Story: How Dark Rhino Security Implemented a Robust IAM Solution on Complex Legacy Systems with Minimal Operational Downtime Our client, a major player in North American cross-border trade, has service locations at major [...]
Client Success Story: Protecting Healthcare Data with Cybersecurity
Client Success Story: Clinisync Clinisync is a nonprofit, independent private organization launched in 2009 with HITECH grant funding from the Office of the National Coordinator for Health Information Technology. With the help [...]
7 Ways to Make Your iPhone More Secure
Top 7 Ways to Make Your iPhone More Secure iPhone security plays an important part in the life of your phone. Even though the iPhone is more secure than the Android, there are essential security [...]
Reduce Risks Associated with Ripple20 (R20)
Reduce Risks Associated with Ripple20 (R20) Ripple20, CVE-2020-11896 – CVE-2020-11914, is a group of 19 exploitable flaws discovered by researchers Moshe Kol and Shlomi Oberman. Both researchers are of an independent security research group, JSOF, in code created by a company named Treck. According to Treck’s website, the [...]
Quantum Computing Concerns
Quantum Computing Concerns and Race to the Top Concerns with Cybersecurity The development of quantum computing goes hand in hand with the development of growing concern about the future of cybersecurity. Quantum computing is predicted [...]
Increase Work Efficiency With A Remote Workforce
How To Keep Work Efficiency Up With A Remote Workforce In this time of social distancing, it is essential to have high efficiency with a remote workforce. Central to the success of a remote workforce [...]
Healthcare Companies & MSSPs
Healthcare Companies & MSSPs: Achieve Your Goals Healthcare organizations can utilize MSSPs like Dark Rhino Security to achieve business goals while also reducing legal, reputational, and financial risks. This can be done through the prevention [...]
Security Confidential S10 E3 Mike Rice pt 1
Host Rory Meikle chats with Mike Rice. Mike is a retired Navy Seal officer who started out his Military career as an enlisted marine corp infantry. This is part 1 of their conversation. https://youtu.be/mCMr-gI7aqY [...]
Security Confidential S10 E2 David Meece
David Meece is a SOC Analyst, Cyber Mentor, Educator, and Founder and Creator of CyberTech Dave. He holds a Master of Science degree in Information Systems and has a wide array of skills ranging from [...]
Security Confidential S10 E1 Jax Scott
Jax Scott is a cyber influencer, author, speaker, podcaster, President, and Founder of Outpost Gray. With over 13 years of experience working in IT and cyber, both private and public sectors. Jax spent a significant [...]
Security Confidential S9 E10 Dr. Wendy Ng
Wendy Ng is a keynote speaker, Principal Cloud Security Architect, and senior security advisor. She has worked for Cisco, PWC, and Deloitte. Has a doctorate from the University of Oxford. She is currently with OneWeb. [...]
Security Confidential S9 E9 Bob Carver
Bob Carver CISM, CISSP, M.S. began his security career working in the financial industry. Later, Bob became the first full-time security employee hired to start the dedicated security monitoring and incident response team for Verizon [...]
Security Confidential S9 E8 Peter Warmka
Peter Warmka is a Keynote Speaker, Author, Cybersecurity/Insider Threat Consultant, Founder of Counterintelligence Institute, and a retired senior intelligence officer with the U.S. Central Intelligence Agency (CIA) where he specialized in clandestine HUMINT (human intelligence) [...]
Security Confidential S9 E7 Eric Allard
Eric Allard is an entrepreneur and the CTO of SOOS, a software technology company. He has 15+ years of experience in leadership, business strategy, and software team transformation with a broad set of skills. On [...]
Security Confidential S9 E6 Dallas Baker
Dallas Baker is a US Army Veteran and Cyber Professional. He has worked for many companies including PerimeterX, Blue Shield, PayPal, and HUMAN where he is currently the Threat Intelligence Analyst. He is skilled in [...]
Security Confidential S9 E5 Philippe Humeau
Philippe Humeau is the Founder and CEO of CrowdSec, an open-source multiplayer firewall that is able to analyze visitor behavior & provide an adapted response to all kinds of attacks. Phillipe has also received an [...]
Security Confidential S9 E4 John Shegerian
John Shegerian (pronounced "SHUH-GARE-EE-UHN") is the co-founder and Chairman/CEO of ERI, the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States. He is also the co-author [...]
Security Confidential S9 E3 Brian Davis
Brian Davis joins Host Manoj Tandon in this week's episode of Dark Rhino Security's Security Confidential. started his career as a systems analyst for the United States Army then became a Senior Systems Analyst for [...]
Security Confidential S9 E2 Kenneth Ellington
Kenneth Ellington is a Senior Cyber Security Consultant at EY where he specializes in SIEM and SOAR technologies. He is also the Founder and owner of Ellington Cyber Academy, an E-Learning platform that teaches and [...]
Cyber Horror Story #3 Malfunction
Cyber Horror Story #3 https://youtu.be/sXUW23ItmM8 Cyber Horror Stories: This October, Dark Rhino Security wanted to have some fun with Halloween and Cybersecurity. So we thought, Why not combine the two? We gathered up some of [...]
Cyber Horror Story #2 Data
Cyber Horror Story #2 https://youtu.be/w-VwkRl5AFA Cyber Horror Stories: This October, Dark Rhino Security wanted to have some fun with Halloween and Cybersecurity. So we thought, Why not combine the two? We gathered up some of [...]
Cyber Horror Story #1 SLIders
Cyber Horror Story #1 https://youtu.be/6wJrnMp2cjg Cyber Horror Stories: This October, Dark Rhino Security wanted to have some fun with Halloween and Cybersecurity. So we thought, Why not combine the two? We gathered up some of [...]
Why Do People Get Hacked?
Why do People get Hacked? For individuals to get hacked is very common. You may click on a suspicious link that could lead to hackers gathering all your personal information. Or suddenly your password isn't [...]
What is Ransomware?
https://www.youtube.com/watch?v=HdUQfywWJ3E 00:00 Intro 00:05 Definition of Ransomware 00:29 Crypto-Ransomware 00:44 Locker Ransomware 01:03 Destructive Ransomware 01:17 What to do? 02:16 FBI Internet Crime Complaint Center 02:42 FBI Tips to Avoid Ransomware 03:14 Contact Dark Rhino [...]
Myth Busting in Cybersecurity
https://www.pghtech.org/podcasts/TechVibeRadio_June19 With massive cyber attacks dominating our headlines over the last month, it's always good form to review the basics of cybersecurity at work and at home. We're busting some of the most common cybersecurity [...]
Data Loss Prevention programs are NOT just a Security Tool
This past May, Jack Thomas, director of cloud security at Dark Rhino Security, spoke to the USA Government about Data Loss Prevention Programs. Here is a snippet from his presentation. https://www.youtube.com/watch?v=2-LmznRULOM&feature=emb_title
Dark Rhino Security, Okta, and Bitglass host Bourbon and Business night
Bourbon and Business Night Dark Rhino Security partnered with Okta, Inc. and Bitglass, Inc. to host a fun night of Bourbon and Business. Check out the highlights from the eventful evening. https://www.youtube.com/watch?v=Z2_82fzKuWc Who is [...]
Client Success Story: Protecting Healthcare Data with Cybersecurity
Client Success Story: Clinisync Clinisync is a nonprofit, independent private organization launched in 2009 with HITECH grant funding from the Office of the National Coordinator for Health Information Technology. With the help [...]