Vancord logo
Vancord CyberSound Podcast

Protect your business with tips & tactics from our IT security experts

CyberSound
CyberSoundTM is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.

Where to Listen to CyberSoundTM

Enter Giveaway to Celebrate our 100th CyberSound Episode!

Learn how we work together with our clients to manage, defend, and respond to their infrastructure needs.

Most Recent Episode

100

Securing a Century: Reflecting on 100 Episodes of CyberSound

In the landmark 100th episode of CyberSound, Jason, Steve, and Michael reflect on the podcast’s growth and evolution over two years. The team celebrates the journey by reflecting on notable episodes, highlighting honorary guests, and discussing recent expansion into video and broader topics beyond cybersecurity.

With humor and enthusiasm, the team underscores CyberSound’s mission: to inform, educate, and engage with integrity while helping listeners navigate the ever-evolving landscapes of business and cybersecurity.

Meet the Hosts of CyberSoundTM

CyberSoundTM is hosted by cybersecurity professionals who work in the industry on a daily basis. Meet Vancord’s Jason Pufahl, Steven Maresca, and Matt Fusaro.
Jason Pufahl
VP Security Services
Steven Maresca
Senior Security Engineer
Matt Fusaro

Manager Security Services

Most Recent Episodes

Play Video
PODCAST EPISODE 40

The Latest: May 2022 News Segment

In other news, recent reports highlight challenges with the Common Vulnerability Exposure (CVE) model, especially as more companies switch to cloud computing. What are the challenges? Tune in to stay informed.
This week on CyberSound, Jason, Steve, and Matt give you the latest cybersecurity news, including Elon Musk’s recent purchase of Twitter. With this acquisition comes much speculation on the impending ripple effects.
Play Video
PODCAST EPISODE 39

The First 48 Hours: How to Know You’ve Been Attacked

When a cyber attack occurs, organizations typically react with panic and confusion about what to do next. Cyber attacks can severely damage a data system, but businesses can be proactive to, not only try to prevent an attack, but know how to immediately respond to a cyber attack.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they dive into the dos and don’ts of the first 48 hours after a cyber attack.
Play Video
PODCAST EPISODE 38

April News Segment

Recently, Google announced their 5.2 billion dollar acquisition of the cyber security firm Mandiant. Also, SISA made news by imposing stricter cyber security requirements that could affect several major industries nationwide.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they share more on these stories and the rest of April’s latest cybersecurity news.
Play Video
PODCAST EPISODE 37

The Ins and Outs of Cyber Warfare

As the war continues in Eastern Europe, questions regarding the idea and possibility of cyber warfare have risen to the surface. What is cyber warfare? Or what role will cyberattacks play in the future of how countries approach defending their nation?
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they give a primer on cyber warfare and what it could mean for us in the future.
Play Video
PODCAST EPISODE 36

What Does Network Segmentation Really Mean?

Network segmentation is a common practice organizations use daily to isolate and track traffic on their computer network. However, network segmentation is often taken for granted in cybersecurity discussions, or some people haven’t explored why it’s important. Network segmentation is a valuable component to any companies cybersecurity policy and procedures, so understanding the basics about what it is is essential.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they discuss the meaning and purpose of network segmentation. Listen to learn how companies can get the most of out of network segmentation, today.
Play Video
PODCAST EPISODE 35

Secure Access Service Edge

The evolution of cybersecurity correlates to both the security demands of organizations and technological changes in the world. In recent years, the growth of cloud based software and a growing remote workforce, has increased the need for solutions like what Gartner has coined Secure Access Service Edge, or SASE.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they discuss what is SASE and if it’s important for all organizations to consider. Listen to get tips on how companies can ensure they have secure networks, regardless of the location of their staff.
Play Video
PODCAST EPISODE 34

I’m Understaffed – What Do I Do Now?

Cybersecurity is not a luxury service, only for large companies with big budgets. Regardless of the size of a company, security services have become vital to determine the health of an organization’s infrastructure. However, many people still undervalue or don’t understand how to utilize security strategic services.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they share how both small and large companies can invest in cybersecurity services. Listen to hear why a lack of budget or staff limitations shouldn’t stop people from partnering with experts like Vancord.
Play Video
PODCAST EPISODE 33

The Mainframe

Today, cyberattacks happen more frequently and with greater sophistication than ever before. Organizations around the world search for the right tools, policies, and procedures to avoid the consequences of system vulnerabilities and malware.
In this episode of CyberSound, the team discusses recent cyber threats companies are facing, along with helpful commentary on how to defend against them. Join Jason Pufahl, Steve Maresca, and Matt Fusaro, as they report on recent attacks involving the American Red Cross, why people should beware of cybersecurity threats during tax season, and how hackers prey on collaboration tools like Microsoft Teams.
Play Video
PODCAST EPISODE 32

Incident Response and Event Automation

This is a special episode of Cybersound featuring the Founder of security IaaS LimaCharlie, Maxime Lamothe-Brassard. He is a proven computer scientist and information security specialist, formerly with CrowdStrike and Google X’s Chronicle Security.
Join Max, along with Jason Pufahl, Steve Maresca, and Matt Fusaro, as he reviews how automation can significantly help incident responders do their job better across the entire landscape of cybersecurity. Together, they discuss what automation can do for incident response and where the new generation of cybersecurity tools are leading the industry.
Play Video
PODCAST EPISODE 31

Risk Assessments for Small Business

Is your business prepared for an emergency, a crisis, or even a pandemic? How would you know? Risk assessments are essential to do annually, at the very least. Risks show up in the worst places and at the worst times. Natural or physical, accidental or environmental, technological or unexplainable–risks must be assessed, scoped, and mitigated.

In this episode of Cybersound, Jason Pufahl and Steve Maresca join Vancord’s risk assessment expert, Carrie Bonin, who shares her insight about the importance of considering risks, making a plan, and ensuring everyone sticks to it.

Most Recent Episodes

CyberSound Episode 40
40

The Latest: May 2022 News Segment

In other news, recent reports highlight challenges with the Common Vulnerability Exposure (CVE) model, especially as more companies switch to cloud computing. What are the challenges? Tune in to stay informed.
This week on CyberSound, Jason, Steve, and Matt give you the latest cybersecurity news, including Elon Musk’s recent purchase of Twitter. With this acquisition comes much speculation on the impending ripple effects.
Play Video
39

The First 48 Hours: How to Know You’ve Been Attacked

When a cyber attack occurs, organizations typically react with panic and confusion about what to do next. Cyber attacks can severely damage a data system, but businesses can be proactive to, not only try to prevent an attack, but know how to immediately respond to a cyber attack.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they dive into the dos and don'ts of the first 48 hours after a cyber attack.
Play Video
CyberSound episode 38
38

April News Segment

Recently, Google announced their 5.2 billion dollar acquisition of the cyber security firm Mandiant. Also, SISA made news by imposing stricter cyber security requirements that could affect several major industries nationwide.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they share more on these stories and the rest of April's latest cybersecurity news.
Play Video
CyberSound episode 37
37

The Ins and Outs of Cyber Warfare

As the war continues in Eastern Europe, questions regarding the idea and possibility of cyber warfare have risen to the surface. What is cyber warfare? Or what role will cyberattacks play in the future of how countries approach defending their nation?
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they give a primer on cyber warfare and what it could mean for us in the future.
Play Video
36

What Does Network Segmentation Really Mean?

Network segmentation is a common practice organizations use daily to isolate and track traffic on their computer network. However, network segmentation is often taken for granted in cybersecurity discussions, or some people haven’t explored why it’s important. Network segmentation is a valuable component to any companies cybersecurity policy and procedures, so understanding the basics about what it is is essential.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they discuss the meaning and purpose of network segmentation. Listen to learn how companies can get the most of out of network segmentation, today.
Play Video
CyberSound Episode 35
35

Secure Access Service Edge

The evolution of cybersecurity correlates to both the security demands of organizations and technological changes in the world. In recent years, the growth of cloud based software and a growing remote workforce, has increased the need for solutions like what Gartner has coined Secure Access Service Edge, or SASE.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they discuss what is SASE and if it's important for all organizations to consider. Listen to get tips on how companies can ensure they have secure networks, regardless of the location of their staff.
Play Video
CyberSound Episode 34
34

I’m Understaffed – What Do I Do Now?

Cybersecurity is not a luxury service, only for large companies with big budgets. Regardless of the size of a company, security services have become vital to determine the health of an organization’s infrastructure. However, many people still undervalue or don’t understand how to utilize security strategic services.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they share how both small and large companies can invest in cybersecurity services. Listen to hear why a lack of budget or staff limitations shouldn't stop people from partnering with experts like Vancord.
Play Video
CyberSound Episode 33
33

The Mainframe

Today, cyberattacks happen more frequently and with greater sophistication than ever before. Organizations around the world search for the right tools, policies, and procedures to avoid the consequences of system vulnerabilities and malware.
In this episode of CyberSound, the team discusses recent cyber threats companies are facing, along with helpful commentary on how to defend against them. Join Jason Pufahl, Steve Maresca, and Matt Fusaro, as they report on recent attacks involving the American Red Cross, why people should beware of cybersecurity threats during tax season, and how hackers prey on collaboration tools like Microsoft Teams.
Play Video
CyberSound Episode 32
32

Incident Response and Event Automation

This is a special episode of Cybersound featuring the Founder of security IaaS LimaCharlie, Maxime Lamothe-Brassard. He is a proven computer scientist and information security specialist, formerly with CrowdStrike and Google X’s Chronicle Security.
Join Max, along with Jason Pufahl, Steve Maresca, and Matt Fusaro, as he reviews how automation can significantly help incident responders do their job better across the entire landscape of cybersecurity. Together, they discuss what automation can do for incident response and where the new generation of cybersecurity tools are leading the industry.
Play Video
CyberSound Episode 31
31

Risk Assessments for Small Business

Is your business prepared for an emergency, a crisis, or even a pandemic? How would you know? Risk assessments are essential to do annually, at the very least. Risks show up in the worst places and at the worst times. Natural or physical, accidental or environmental, technological or unexplainable–risks must be assessed, scoped, and mitigated.

In this episode of Cybersound, Jason Pufahl and Steve Maresca join Vancord's risk assessment expert, Carrie Bonin, who shares her insight about the importance of considering risks, making a plan, and ensuring everyone sticks to it.

Play Video

Sign Up for More

Subscribe for the latest updates from the Vancord team