2 episode summariesNew episodes added hourly8 unique signals extracted
Podcasts/Newsletter Operator
Newsletter Operator

Newsletter Operator

Hosted by Matt McGarry and Ryan Carr

About

<p>Learn how to grow and monetize your newsletter! We interview the best newsletter operators, founders, and creators on how they grow their audiences and make money.&nbsp;<br><br>Hosted by Matt McGarry and Ryan Carr.</p>

Host

Matt McGarry and Ryan Carr

Host of Newsletter Operator

Want more? Subscribe to go deeper! โ†’

โ€œThey're using blockchain, which is an immutable record, which is accessible from all over the place because it's decentralized, in order to pass the command and control commands. It's kind of brilliant because you can't take the blockchain down.โ€

โ€” Dr. Gerald Auger
#2
APR 6, 2026Matt McGarry and Ryan Carr

The New Media Model Live Workshop This Thursday

WATCH BLOCKCHAINSECURE CLOUDMONITOR VULNERABILITIESFUND RESEARCH
  • โ€ข

    Blockchain-based botnets are nearly impossible to dismantle - the Glukhtsaba botnet uses decentralized blockchain records for command and control, creating an immutable and decentralized infrastructure that traditional authorities cannot take down.

    โ€œThey're using blockchain, which is an immutable record, which is accessible from all over the place because it's decentralized, in order to pass the command and control commands. It's kind of brilliant because you can't take the blockchain down.โ€

    โ€” Dr. Gerald Auger
  • โ€ข

    Ransomware groups are funding original zero-day research - criminal organizations are moving upstream by offering researchers high-payout 'first-look' agreements for unpatched vulnerabilities, outbidding traditional bug bounty programs.

    โ€œTrend Micro published a report... It predicts that ransomware organizations will increasingly shift strategy to develop their own vulnerability research rather than using pen test teams or purchasing access credentials.โ€

    โ€” Host/Guest
  • โ€ข

    Threat actors are pivoting to cloud-native ransomware families - as data migrates, attackers are optimizing operations to target and encrypt unique cloud services rather than relying on traditional endpoint-focused malware.

    โ€œThe report also believes that ransomware groups will better optimize operations to focus on targeting cloud infrastructure. This could include development of cloud specific ransomware families designed for unique cloud services.โ€

    โ€” Host/Guest
#1
APR 2, 2026Matt McGarry and Ryan Carr

How Trade Shows Make Millions

SCALE OPERATIONSPERFECT SALESMINIMIZE OVERHEADHIRE AGGRESSIVELY
  • โ€ข

    Scaling from zero to $10M is driven by blind hustle - reaching the first eight figures requires aggressive sales and high energy, whereas growing to $20M and beyond requires marketing discipline and operational structure.

    โ€œThe zero to 10 is just fucking blind. It's getting up every day, closing deals, having an aggressive sales team... After from 10 to 20, it requires a little bit more marketing, more discipline in your marketing.โ€

    โ€” Ismael Valdez
  • โ€ข

    The tech turnover process is the key lever for mid-stage growth - moving from $20M to $40M in revenue depends on perfecting the service department's ability to identify and pass sales opportunities to the project team.

    โ€œThe 20 to 30 mark is a special mark because that's when you start bringing in the tech turnover... it was perfecting the tech turnover and perfecting the tech experience.โ€

    โ€” Ismael Valdez
  • โ€ข

    High-intensity early operations can thrive with zero overhead - starting in a garage allows for extreme focus and capital efficiency, enabling over $1M in revenue in just a few months by focusing purely on labor and subcontracting.

    โ€œWe did close to 1.7 million dollars in revenue in my garage in four months. That was probably one of the dopest shit that I have ever heard.โ€

    โ€” Ismael Valdez

Stay in the Loop

Get Newsletter Operator summaries and more, delivered free.