Transcript
Dr. Gerald Ozer (0:01)
What's. Good morning, everybody. Welcome to the party. Hope you're doing well. This is simply Cyber Staley Cyber Threat Brief Podcast. I'm your host, Dr. Gerald Ozer, coming to you live from the Buffer Oer Flow studio. Welcome to the show, guys. If you're looking to stay current in the next hour, your top cyber security stories are going to be broken down by myself and I'm going to go deeper and further past the headlines to give you additional value and insight or that you will not be getting anywhere else. This is simply Cyber's daily Cyber Threat Brief. I can't wait to get into it. Let's get cooking. All right, good morning, everybody. You got to give me a second. I forgot to connect the live chat into the front end. So all of you guys who are chatting right now live in the studio are not being seen. There we go. Now I've cast a magic spell and chat is on there. Let's cook, baby. Guys, I. I'm super pumped. It is Thursday. We're almost through the week. All about good times here. Stories have been popping off. You guys have been popping off. It's all about good times. I hope we had several first timers who should. I just realized I don't have my coffee, bro. I. Listen, I'll tell you what. When I run the threat locker ad today, I'm going to try to make an Olympic sprint to go get my coffee and back. No one will ever know. Guys, hey, if you're a first timer here, for your first time, drop a hashtag first timer in chat. I'm all interested in welcoming first timers so they know that this is a safe, awesome spot to be asking questions, getting resources, and generally everybody in chat is pretty much pre screened as good times. Not spam, not bots. No one in chat's going to be asking you about do you need an AI developer or go to. Let's go to DM so I can tell you about my sick crypto project. Ain't nobody got time for that. Ain't nobody got time for that. Well, we do have time. Larry Shervington Jr. What's up, Larry? Heck. Yeah, listen, I gotta tell you. Oh, wait, hold on. Why is my name on the screen? Dude, we're doing all sorts of things today that are kind of wacky. All right, hey, listen, if you're a first timer, drop a hashtag first timer. I want you to know I don't research or prep for any of the show because I don't have time for it. And it's just Disingenuous. No one does that in. Ain't nobody got time for this in practice, so I don't know what we're going to be talking about. Long timer here. Good to have you, Neilana on the chat, guys. Every episode of the Daily Cyber Threat Brief, by the way, just for production note, I'm trying to speak further away from the microphone. I've been watching on replay a little bit for Q quality assurance, and I've noticed that my audio kind of sounds a little like. What's it called when it. When you like, blown out? Like I'm peing djb. Second. Am I using the right terms here? So I'm trying to speak further away from the microphone in hopes that it sounds better. Let me know in chat, I guess, if it sounds better or not. Angular 777. I'm drinking Starbucks French roast. It's pretty much my only speed. For better or for worse, that's what I do. And I French press it because I'm extra like that. All right. Hey. Oh, my God. Telegram. Can we. I don't know if you guys are hearing it, but, like, can I. I don't want tell. Can we quit? Telegram, bruh. Give me one second. I gotta. Okay. All right, first. Hey. Every episode's worth half a cpe, so it's very simple. Say what's up in chat. Just like it's. Lavinia. BW5542 is doing simply. Cyber Community member Robert Hendrickson is doing. It's very easy. Say what's up in chat. Grab a screenshot. Once a year, count up the number of screenshots, divide by two, and that is how many CPEs. And if you might be like, oh, why? Why is this a cpe, dude, we're gonna go through the top news. I'm going to be educating on lessons learned and just check. This is like a threat intelligence briefing. Okay, so I'm a qualified instructor. You know, this is cyber focused. So this will qualify as an instructor LED webinar. Nerd. But hey, you know what? It's better than sitting through like a crappy webinar and being like, ugh, ugh. Can I share this right now? Haircut Fish? It seems very timely to share this one. Let me know. Dude, Haircut Fish is out of control. I gotta tell you guys, I got something for you if he allows me the right to share this. Okay, so, hey, every single day of the week has a special segment. And Thursdays is. What's your meme? Thursday. This guy right here, Dan Reardon. AKA the Haircut Fish. If you know him, you know him and if you don't, you want to get to know him. He puts up a piping hot fresh meme every week for the channel and for the community. And he's very good at it. He's been doing it for like over a year, maybe two years. Dan. And I just said, I just said, oh, I'm so up on the mic, I'm trying to not be so close to it. Let me know in chat. And Dan, within, like, I don't know, 45 seconds, just like produces this thing. Lady and the tramp. Me and the microphone having a moment, getting closer, like, just short of like me in the microphone, like. All right, thanks, Dan. So you get a double shot of. You get a double shot of memes today. All right, guys. Hey. Every single episode of the Daily Cyber Threat brief, including this one, is worth half a cpe. I already said that the show is sponsored and I'm very, very grateful for the show. Sponsors, don't sleep on them. If you want to support the channel, if you like what we do here and you want more of it, the channel has to be funded. I mean, like, let's just be, you know, adults about it. So the sponsors, they help. Clicking on the links in the description, you know, basically shows some love to me and to the sponsors who are generous enough to support, support the channel. Let me tell you about material security guys. Easy peasy lemon squeezy. Go To Simply cyber IO/ material. Simply cyber IO/ material. All right. Stop email attacks, Protect sensitive data, all the things you want to do. Listen, your cloud workspace is more than just email, obviously. So why does your security stop there? Good question. Material delivers complete protection for Google Workspace. Microsoft 365 going beyond perimeter defense to secure both email files and bonus account across your environment with advanced AI detections and automated threat response. Material correlates signals across the workspace to identify risks others miss. It protects sensitive data in inboxes and shared files, monitors account access and third party apps, and automates remediation from phishing response to user user report triaging. And what's the result, everybody? What's the impact statement? You mature your security posture, which is a win, and you scale protection without adding headcount, without adding FTEs, without adding labor, without adding additional expense. Ready to secure your best friends?
