MSSPs in the Healthcare vertical face many challenges and opportunities. I sat down with Russell Teague of Fortified Health Security to discuss providing Cybersecurity services in the healthcare space and how it stands out fr...
Navigating Frameworks and implementing the controls and safeguards within can be quite daunting. I sit down with Matt Lee to talk through the taxonomy project that so many have worked on and how it helps break down expectatio...
Attending my first Communities and Councils Forums (CCF) under the new brand Global Technology Industria Association was easily the best ever. An annual event with polos and no logos. I sit down with Charles love of Showtech ...
Cybersecurity doesn't happen overnight. It is a maturity process that often struggles with forward progress when the business core values are unclear or no longer aligned. I sit down with Jessica Millhiser of JMills Consultin...
Human risk within any organization is often not given enough attention when it comes to monitoring and tracking the behavior of employees, such as phishing attempts, security training, etc. I sat down with Mathias Zeumer, Nor...
If you are pursuing the GTIA Cybersecurity Trustmark, you will want to tune in. Matt Lee of Pax8 and I discuss the taxonomy and prompts that drive success in breaking down safeguards into actionable and obtainable tasks.
In recent weeks, we have seen the drama surrounding TicTok, Red Note, DeepSeek, and many other technologies that, in many cases, are used without any regard for the repercussions of using them for good or bad. I sit down with...
If you have ever worked with Construction Management, Manufacturing, Healthcare, and others where the technology that is in place is no longer supported. How do you help them move forward and when is it appropriate to continu...
Whether you travel domestically or internationally, there are things you can do to protect yourself. VPNs, Public Wi-Fi, and other considerations as you travel for work or life are some of the topics I discuss with my friend ...
So many words in the English language have more than one meaning. Some words are pronounced the same but are spelled differently. All of these are challenges in their own right, but what happens when you talk to someone who d...
Will 2025 be the year of natural selection for MSPs? I sit down with Matt Lee of Pax8 to chat about the cybersecurity picture for 2025 and it comes down to those that choose to make changes in their company to mature their cy...
Actual compliance challenges in 2025 are heating up with clients now asking for evidence and proof on how their MSP is helping them meet certain safeguards for regulatory requirements and insurance. Join Josh Hohbein of Centr...
I had the opportunity to sit down with Jeff McCullough and Brad Reinboldt of NetAlly to find out what is new. Having spent many years with my trusty Link Sprinter, I was keen to hear what evolutions of products and services t...
Last week, we discussed the highs and lows of 2024. This week, we will examine what we expect or predict to see in 2025 and how it might impact us. Thanks again to Joshua Smith of Reliaquest and Charles Love of ShowTech Solut...
Every year, we reflect on the good and the bad. What might give us pause as we get ready for the new year? As we prepare to embrace 2025, I sit down with the former leadership team of Untangled Solutions. Joshua Smith and Ch...
Matt Lee and I recap 2024 and the impact of Cybersecurity on the MSP community. We then look forward at what we might expect in 2025. This is an episode that will really get you thinking about your own cybersecurity posture a...
It's exciting times with Senteon. There is a big announcement, a discussion around endpoint hardening, and their roadmap for 2025. I hear firsthand from Henry and Zach about their adventures in bootstrapping Senteon to where ...
Your employees might already use AI for either work or personal, but are you using it for your business? I sit down with Jimmy Hatzel of Hatz.ai to discuss the challenges and impact of AI and its usage to improve productivity...
With FFIEC retiring the CAT assessment in August 2025, it might seem daunting to consider other frameworks as a path forward. I sat down with Dan Sitton of Guardian Technology Group to discuss his background in working with b...
The Last Control Domain discussed on the fireside chat is Physical and Environmental Security. This domain was taken directly from the CompTIA Cybersecurity Trustmark, and while it wasn't done in sequence like the majority of...
Whether you are aligning your cybersecurity to CIS Top 18, the Cybersecurity Trustmark, or any of the many other frameworks, you are bound to get stuck in an attempt to achieve perfection. I sit down with Charles Love of Show...
Many of us remember the days of trying to recover data off of a physically damaged drive, human error of deleted files, and many other scenarios. I sit down with Sarah Farrell and Andy Maus of Drive Savers to debunk a few myt...
As we wrap up Cybersecurity Month, I had a chance to sit down with Wayne Selk, VP of CompTIA Cybersecurity Programs and Executive Director of CompTIA ISAO, to discuss Risk Management and its role in cybersecurity—flashback to...
We have discussed what happens when a vendor is just gone. What happens when a vendor has an outage or some business disruption? Do you jump to another vendor? Do you plan to weather the storm, or do you pivot? Eric Hanson of...