The team encourages listeners to educate themselves on the importance of implementing robust security measures to maintain privacy, including setting up separate networks, updating router firewalls, and researching device security features. As the conversation broadens to include considerations for small businesses and the expanding range of internet-enabled devices, the team concludes by underscoring the importance of privacy in the IoT era.
CyberSoundTM is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
Where to Listen to CyberSoundTM
Enter Giveaway to Celebrate our 100th CyberSound Episode!
Learn how we work together with our clients to manage, defend, and respond to their infrastructure needs.
Most Recent Episode
101
Home Smart Home: Security vs. Convenience in IoT
In this episode of CyberSound, co-hosts Jason and Michael sit down with Brian Brehart of Vancord to delve into the complexities of securing smart home devices within the context of the Internet of Things (IoT). The conversation explores the balance between convenience and security when integrating smart technology into homes, touching on topics such as wireless thermostats, smart TVs, and voice-activated assistants like Alexa.
Meet the Hosts of CyberSoundTM
CyberSoundTM is hosted by cybersecurity professionals who work in the industry on a daily basis. Meet Vancord’s Jason Pufahl, Steven Maresca, and Matt Fusaro.
Most Recent Episodes
Play Video
PODCAST EPISODE 41
Vancord: Securing a More Connected Future
If you haven’t heard the news, Vancord and TBNG are now unified as Vancord—and together, we’re securing a more connected future.
Tune into today’s episode of CyberSound with Jason Pufahl and Michael Grande to learn why we’re bringing the best and brightest security and engineering professionals together under one roof. As global defenders in a world where good wins, we are excited to step into this next chapter with dedicated team members, loyal customers, colleagues, and listeners like you, who have continuously supported us.
Play Video
PODCAST EPISODE 40
The Latest: May 2022 News Segment
In other news, recent reports highlight challenges with the Common Vulnerability Exposure (CVE) model, especially as more companies switch to cloud computing. What are the challenges? Tune in to stay informed.
This week on CyberSound, Jason, Steve, and Matt give you the latest cybersecurity news, including Elon Musk’s recent purchase of Twitter. With this acquisition comes much speculation on the impending ripple effects.
Play Video
PODCAST EPISODE 39
The First 48 Hours: How to Know You’ve Been Attacked
When a cyber attack occurs, organizations typically react with panic and confusion about what to do next. Cyber attacks can severely damage a data system, but businesses can be proactive to, not only try to prevent an attack, but know how to immediately respond to a cyber attack.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they dive into the dos and don’ts of the first 48 hours after a cyber attack.
Play Video
PODCAST EPISODE 38
April News Segment
Recently, Google announced their 5.2 billion dollar acquisition of the cyber security firm Mandiant. Also, SISA made news by imposing stricter cyber security requirements that could affect several major industries nationwide.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they share more on these stories and the rest of April’s latest cybersecurity news.
Play Video
PODCAST EPISODE 37
The Ins and Outs of Cyber Warfare
As the war continues in Eastern Europe, questions regarding the idea and possibility of cyber warfare have risen to the surface. What is cyber warfare? Or what role will cyberattacks play in the future of how countries approach defending their nation?
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they give a primer on cyber warfare and what it could mean for us in the future.
Play Video
PODCAST EPISODE 36
What Does Network Segmentation Really Mean?
Network segmentation is a common practice organizations use daily to isolate and track traffic on their computer network. However, network segmentation is often taken for granted in cybersecurity discussions, or some people haven’t explored why it’s important. Network segmentation is a valuable component to any companies cybersecurity policy and procedures, so understanding the basics about what it is is essential.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they discuss the meaning and purpose of network segmentation. Listen to learn how companies can get the most of out of network segmentation, today.
Play Video
PODCAST EPISODE 35
Secure Access Service Edge
The evolution of cybersecurity correlates to both the security demands of organizations and technological changes in the world. In recent years, the growth of cloud based software and a growing remote workforce, has increased the need for solutions like what Gartner has coined Secure Access Service Edge, or SASE.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they discuss what is SASE and if it’s important for all organizations to consider. Listen to get tips on how companies can ensure they have secure networks, regardless of the location of their staff.
Play Video
PODCAST EPISODE 34
I’m Understaffed – What Do I Do Now?
Cybersecurity is not a luxury service, only for large companies with big budgets. Regardless of the size of a company, security services have become vital to determine the health of an organization’s infrastructure. However, many people still undervalue or don’t understand how to utilize security strategic services.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they share how both small and large companies can invest in cybersecurity services. Listen to hear why a lack of budget or staff limitations shouldn’t stop people from partnering with experts like Vancord.
Play Video
PODCAST EPISODE 33
The Mainframe
Today, cyberattacks happen more frequently and with greater sophistication than ever before. Organizations around the world search for the right tools, policies, and procedures to avoid the consequences of system vulnerabilities and malware.
In this episode of CyberSound, the team discusses recent cyber threats companies are facing, along with helpful commentary on how to defend against them. Join Jason Pufahl, Steve Maresca, and Matt Fusaro, as they report on recent attacks involving the American Red Cross, why people should beware of cybersecurity threats during tax season, and how hackers prey on collaboration tools like Microsoft Teams.
Play Video
PODCAST EPISODE 32
Incident Response and Event Automation
This is a special episode of Cybersound featuring the Founder of security IaaS LimaCharlie, Maxime Lamothe-Brassard. He is a proven computer scientist and information security specialist, formerly with CrowdStrike and Google X’s Chronicle Security.
Join Max, along with Jason Pufahl, Steve Maresca, and Matt Fusaro, as he reviews how automation can significantly help incident responders do their job better across the entire landscape of cybersecurity. Together, they discuss what automation can do for incident response and where the new generation of cybersecurity tools are leading the industry.
Most Recent Episodes
41
Vancord: Securing a More Connected Future
If you haven’t heard the news, Vancord and TBNG are now unified as Vancord—and together, we’re securing a more connected future.
Tune into today's episode of CyberSound with Jason Pufahl and Michael Grande to learn why we're bringing the best and brightest security and engineering professionals together under one roof. As global defenders in a world where good wins, we are excited to step into this next chapter with dedicated team members, loyal customers, colleagues, and listeners like you, who have continuously supported us.
Play Video
40
The Latest: May 2022 News Segment
In other news, recent reports highlight challenges with the Common Vulnerability Exposure (CVE) model, especially as more companies switch to cloud computing. What are the challenges? Tune in to stay informed.
This week on CyberSound, Jason, Steve, and Matt give you the latest cybersecurity news, including Elon Musk’s recent purchase of Twitter. With this acquisition comes much speculation on the impending ripple effects.
Play Video
39
The First 48 Hours: How to Know You’ve Been Attacked
When a cyber attack occurs, organizations typically react with panic and confusion about what to do next. Cyber attacks can severely damage a data system, but businesses can be proactive to, not only try to prevent an attack, but know how to immediately respond to a cyber attack.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they dive into the dos and don'ts of the first 48 hours after a cyber attack.
Play Video
38
April News Segment
Recently, Google announced their 5.2 billion dollar acquisition of the cyber security firm Mandiant. Also, SISA made news by imposing stricter cyber security requirements that could affect several major industries nationwide.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they share more on these stories and the rest of April's latest cybersecurity news.
Play Video
37
The Ins and Outs of Cyber Warfare
As the war continues in Eastern Europe, questions regarding the idea and possibility of cyber warfare have risen to the surface. What is cyber warfare? Or what role will cyberattacks play in the future of how countries approach defending their nation?
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they give a primer on cyber warfare and what it could mean for us in the future.
Play Video
36
What Does Network Segmentation Really Mean?
Network segmentation is a common practice organizations use daily to isolate and track traffic on their computer network. However, network segmentation is often taken for granted in cybersecurity discussions, or some people haven’t explored why it’s important. Network segmentation is a valuable component to any companies cybersecurity policy and procedures, so understanding the basics about what it is is essential.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they discuss the meaning and purpose of network segmentation. Listen to learn how companies can get the most of out of network segmentation, today.
Play Video
35
Secure Access Service Edge
The evolution of cybersecurity correlates to both the security demands of organizations and technological changes in the world. In recent years, the growth of cloud based software and a growing remote workforce, has increased the need for solutions like what Gartner has coined Secure Access Service Edge, or SASE.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they discuss what is SASE and if it's important for all organizations to consider. Listen to get tips on how companies can ensure they have secure networks, regardless of the location of their staff.
Play Video
34
I’m Understaffed – What Do I Do Now?
Cybersecurity is not a luxury service, only for large companies with big budgets. Regardless of the size of a company, security services have become vital to determine the health of an organization’s infrastructure. However, many people still undervalue or don’t understand how to utilize security strategic services.
Join Jason Pufahl, Steve Maresca, and Matt Fusaro on this episode of CyberSound, as they share how both small and large companies can invest in cybersecurity services. Listen to hear why a lack of budget or staff limitations shouldn't stop people from partnering with experts like Vancord.
Play Video
33
The Mainframe
Today, cyberattacks happen more frequently and with greater sophistication than ever before. Organizations around the world search for the right tools, policies, and procedures to avoid the consequences of system vulnerabilities and malware.
In this episode of CyberSound, the team discusses recent cyber threats companies are facing, along with helpful commentary on how to defend against them. Join Jason Pufahl, Steve Maresca, and Matt Fusaro, as they report on recent attacks involving the American Red Cross, why people should beware of cybersecurity threats during tax season, and how hackers prey on collaboration tools like Microsoft Teams.
Play Video
32
Incident Response and Event Automation
This is a special episode of Cybersound featuring the Founder of security IaaS LimaCharlie, Maxime Lamothe-Brassard. He is a proven computer scientist and information security specialist, formerly with CrowdStrike and Google X’s Chronicle Security.
Join Max, along with Jason Pufahl, Steve Maresca, and Matt Fusaro, as he reviews how automation can significantly help incident responders do their job better across the entire landscape of cybersecurity. Together, they discuss what automation can do for incident response and where the new generation of cybersecurity tools are leading the industry.
Play Video
Sign Up for More
Subscribe for the latest updates from the Vancord team