MKG Marketing MKG Marketing Logo Quotation Marks

What's the Problem? with Mike Krass

Hang out with Mike Krass as he learns from cyber security experts on what problem they're facing right now.

Photo of Mike Krass

Join our weekly newsletter

Get industry news, articles, and tips-and-tricks straight from our experts.

We care about the protection of your data. Read our Privacy Policy.

What's the Problem

Cybersecurity in the Education System

Steve Fisher of IMS goes into great detail around the cybersecurity concerns that school systems have to face. He explains how high turnover environments produce opportunities for bad actors as well as dives into the solution: training that people actually a) take, and b) remember! (20 minutes)

What's the Problem

How to Secure Your Organization During Employee Turnover

Jack Borchgrevink of VMware discusses vendor’s responsibility to provide support in advance of a breach as well as how to secure your organization during times of employee turnover. (16 minutes)

What's the Problem

Case Study: An 85% Compromise Rate through Social Engineering

In this episode, Fares Mohammed joins What’s the Problem to discuss social engineering in the world of #cybersecurity. Email phishing scams about bitcoin or NFT projects all the way down to dropping flash drives in corporate offices to see who would plug them into company networked devices. (17 minutes)

What's the Problem

Creating A New Cybersecurity Category: Phishing Detection & Response (PDR)

Mike Krass chats with Christopher Gibbons to discuss the fact that in 2022 secure email gateways (SEG’s) don’t statistically provide any more protection than you already receive with Microsoft Office 365 or Google Business applications. (18 minutes)

What's the Problem

Speaking to “Technical” versus "Manager" Cybersecurity Buyers

This episode explores a key topic for security vendors to consider: how do I speak to a person in a Technical role versus a Business Manager role? (13 minutes)

What's the Problem

Unwrap the Layers of Password Cracking Attacks

Join security specialist Adil Ahmed as he discusses password cracking attacks such as brute force, password spraying as well as spear phishing when a hacker has gained access to 1 (or more) of your systems to use as hop points. (15 minutes)

What's the Problem

How to Avoid Pressure to Achieve Short Term Results at the Sacrifice of Long Term Strategy in Cyber Security

In this episode, Dani Woolf dives into the big H word: Honesty. More specifically, Dani spends time discussing how honesty and transparency around what your security product can or cannot do for the buyers organization is a critical currency to trade in and should not be taken lightly. (17 minutes)

What's the Problem

Open Source Cyber Security to Support Finding Missing Persons

In this episode, Mike Krass chats with Matthew Buhler about his security analysis work to assist in the recovery of missing persons as well as the removal of CSAM (Child Sexual Abuse Material) from the Internet. (11 minutes)

What's the Problem

Cyber Security for SMBs

In this episode, Mike Krass explores how Small-to-Midsize businesses are often targets of Cyber attacks with Marcela Denniston. Marcela is a security engineer, entrepreneur, and marketing leader with a background in the public and private sectors. (20 minutes)

What's the Problem?

Phishing

In this episode, Ebony Hall, a Systems Engineer with Cambium Learning who also has an IT background in the military (U.S. Army), discusses phishing attacks in the public sector as well as for commercial organizations. (10 minutes)

What's the Problem?

The Convergence of Cloud and Data

In this episode, Mike Krass chats with Andy Smith the Chief Marketing Officer at Laminar to discuss the problems of security buyers: the convergence of cloud transformation and data democratization. (10 minutes)

Join our weekly newsletter

Get industry news, articles, and tips-and-tricks straight from our experts.

We care about the protection of your data. Read our Privacy Policy.