A (138:01)
Which friends with state the cabin is in. Alex Wilhelm is here. He's doing things in a cabin. Harry McCracken is the technologizer. He's not. And our show will continue in a moment. But first a word from this little doohickey. Let me show you. This thing is. This thing is so cool. This is my thinkst canary. I'm going to show you. That looks like a little, I don't know, external USB drive maybe, but it's, it's got an ethernet connection on it. It's got a hardwire on it. But let me tell you something. This thing is the best security device ever. Our sponsor today, thinkst Canary. I'll go to Canary Tools and show you what I can do with my Thinkst Canary. I'm gonna log in here it is a honeypot. Just so you understand what we're talking about here. This. This is a device that looks benign, looks simple, but it composes almost anything. Now, right now, it's set up for me to look like a Windows server. But you know, I was just thinking the other day that'd probably be better if it were an old SharePoint server. This is the interface at Canary Tools. You see, it's right Now Windows Server 2019. But, oh, this is so cool. Watch. I can configure this to be almost anything I want. And when I say configure it, it looks exactly like it. It could be iis, it could be a Microsoft AD domain controller. Oh, you know, you want vulnerable. Nothing better than SharePoint 2010, baby. Point is, it isn't really obviously a CentOS server or Oracle Enterprise Server or a Jupyter Fortigate security device or a Microtik router. It's a honeypot. Look, it can even be a skated device. I'm going to make it a Hirschman RS20 industrial switch. Now, the thing about this is it. It isn't, you know, it personates it perfectly. It's got the Mac address of Hirschman Automation. It's. It's got a fingerprint in the IP stack. Everything looks exactly right. So a bad guy doesn't see a honeypot. Bad guy doesn't see the things Canary. The bad guy sees something vulnerable and valuable. Thinks canaries are honeypots that can be deployed in minutes. And why would you do this? Well, if somebody is inside your network brute forcing your fake internal SCADA device or your SSH server or your web server, your thinks Canary will immediately tell you you have a problem. No false alerts, just the alerts that matter things. Canaries can also create Canary tokens, an unlimited number of fake phony files. It could be anything from an AWS login to a credit card to an Excel spreadsheet. I've got Excel spreadsheet. You can put them anywhere, including on your cloud. So I've got on my Google Drive an Excel spreadsheet that says employee payroll information. Now, I know it's phony, it's bogus, but bad guys, if they open it up, bang, I get an alert and I get the alert in a way that makes sense to me. Whether it's email, text, syslog, they have. They support web hooks, they have an API. Any way you want, you're going to get the notification that matters, that tells you somebody is inside your network. Whether it's a bad guy, hacker who's in there, or a malicious insider. Just choose a profile and you'll see. It's so easy to do. You could change your profile every day if you want. Choose a profile for Things Canary device. You register it with a hosted console. It does the rest. It monitors, it gives you the notifications, and then you just sit back, you're done. Attackers who breached your network cannot help but make themselves known by accessing your Thinks Canary. Visit Canary Tools twit. For just $7,500 per year, you're going to get five things Canaries, your own hosted console. You get the upgrades, the support, the maintenance. If you use the code TWIT in the how did you hear about us? Box, you're going to get 10% off the price for life. Other good news, you can always return your thinkscanaries with their 2 months money back guarantee for a full refund, so there's no risk. But I gotta tell you, during all the years we partnered with Thinks Canary, their refund guarantee has never been claimed. Visit Canary Tools Twit. Don't forget to enter the code TWIT in the how did you hear about us? Box. This is a device. Once you get one, you will see. How did I live without it? It is a big part of your layered security strategy. How do you know? Ask yourself, if somebody were inside my network today, how would I know? I know. I've got to think. Scanner. I may have more than one. I'm not telling. I'm not telling. Canary Tools slash Twit. Don't forget the offer code TW I T. So, Bretton woods is back. He's big on monetary policy. He says a slightly corrected version of my former comment. Sale and leaseback deals switches capex to opex, thus lowering investment assets subject to taxation. Lowering investment assets subject to taxation. So it's a. It's a tax deal as well. There's some benefit, tax wise. You're watching twit Harry McCracken. Yeah. Alex, you knew. You knew that all along. All right.