All Episodes

April 2, 2024 29 mins

In the past year, ransomware attacks have been up almost 300%, with over 50% targeting small businesses. To help mitigate this increase, Microsoft is launching their new Security Copilot, and we sat down with their SMB Security Strategy Head, Binil Pillai, to learn more.

We dive into the importance of SMBs assessing their security posture, how to leverage AI for efficient threat detection and response, and the role of Microsoft's partner ecosystem in providing comprehensive security solutions. The episode concludes with advice for SMB leaders on starting their security assessments and the benefits of integrating AI into their cybersecurity strategies.

Episode Highlights:

01:39 Why is SMB security a priority for Microsoft?
07:34 Key security challenges for SMBs
09:26 How can SMBs leverage AI within security?
16:28 How VPs of Engineering can use new tech to deal with threats
20:25 Microsoft Security Copilot
24:30 Where is the best place to learn about Microsoft's security strategy?

Show Notes:

Support the show:


Mark as Played

Episode Transcript

Available transcripts are automatically generated. Complete accuracy is not guaranteed.
Binil Pillai (00:00):
A couple of statistics.

Overall, ransomware attacks havebeen up almost 300 percent in
the past year and over 50percent targeting small
The economic cost of theseattacks for small and medium
business can be catastrophic.
With over 60 percent of smallbusinesses, uh, are not being

able to operate after they havebeen experienced a cyber attack.
This is a painful reality andthis is where Microsoft as a
company, together with ourpartner ecosystem, want to reach
out to the SMB customers andengage them to accelerate their
digital transformation journeywith security.
Is your engineering team focusedon efficiency, but struggling

with inaccessible or costly Dorametrics.
Insights into the health of yourengineering team, don't have to
be complicated or expensive.
That's why LinearB isintroducing free door metrics
for all.
Say goodbye to spreadsheets andmanual tracking or paying for
your door and metrics.
LinearB is giving away a free.
Comprehensive Dora dashboardpack the central insights,

including all Forkey Dorametrics tailored to your team's
Industry standard benchmarks forgauging performance and setting
data-driven goals.
Plus additional leading metrics,including emerge, frequency, and
pull request size.
Empower your team with themetrics they deserve.
Sign up for your free Doradashboard today at LinearB dot
IO slash Dora.
Or follow the link in the shownotes.

Conor Bronsdon (01:28):
Welcome back to Dev Interrupted, everyone.
I'm your host, Conor Bronsdon,and I'm here today with Benil
Benil is the worldwide SMBsecurity strategy head at
Thanks so much for joining me,Benil.

Binil Pillai (01:39):
Thanks for having me here.
Thank you.

Conor Bronsdon (01:40):
Yeah, it's great to catch up with you.
We've had some amazingconversations on security in the
past, and I'm so glad to haveyou on this show because this
conversation's importancecontinues to grow.
The evolving threat landscapethat we're seeing in
cybersecurity today can bereally concerning, and it's hard
to know how AI is going toimpact that.

And it's, we're really seeingthat change how security, uh,
functions in today's digitalspace.
The space is changing so rapidlyand the threats, but also
opportunities for businesses areevolving.
And this is a topic that I don'tthink we address often enough
here on Dev Interrupted.
It's an area of risk for manycompanies that are hyper focused
on building new features anddelivering customer value, but

maybe underestimating the risksof their security posture.
Uh, and with that in mind, butno, I'd love to ask you to
introduce yourself so theaudience gets to know you before
we dive into the meat of whythis matters so much.

Binil Pillai (02:33):
Again, thank you so much forhaving here.
My name is Binal Pillai, and Ilead the Microsoft security
business for small and mediumcustomer segments worldwide.
I've been with Microsoft foralmost 12 years, helping
customers transform digitallywith security value proposition.

Conor Bronsdon (02:51):
Fantastic, and Benil, I know this is something
you're really passionate aboutbecause, uh, you've seen, and I
know Microsoft has seen this,where security in SMB has not
always been a priority, and itseems like that's a major
concern for you and the workyou've done.

Binil Pillai (03:07):
Absolutely, so this is this is an area for a
high interest, not only from aMicrosoft as a company point of
view, it's from a worldwidestand.
This is a combinedresponsibility, including
Microsoft to address the needfor the customer and help them
to improve their securityposture.
So we took it as a mission.
How we can help customers toimprove the security posture.

At the same time, how we canhelp the community to understand
much about security.
So their position is much betterin terms of ensuring as a
consumer, as an enterprise, oras a small and medium business
So that's the big mission thatwe have in place at Microsoft

Conor Bronsdon (03:46):
Why is it that you see SMB as particularly at
risk for security compared toother segments?

Binil Pillai (03:53):
Yeah, I think you see small and medium business
account for the majority ofbusinesses worldwide and are
important contributors to jobcreation and global economic
They represent about 90 percentof businesses and more than 50
percent of employment worldwide.
If you look at in the U.
S., we have nearly 32 millionsmall businesses, which account

99 percent of all U.
So in this small and mediumbusiness driven world, things
are rapidly changing due to anurgency in digital
transformation enabled by cloudand AI services.
After COVID 19, majority of SMBsare following a hybrid work
environment where their workersare increasingly distributed,

able to work on.
Kind of more flexible schedulesin a variety of places with
increased mobility and acrossmore and more devices that might
be company provided or personaldevices.
For example, iPhone.
All this newfound freedom isrefreshing and great for the
But this distributed landscapecan also pose security

A couple of statistics.
Overall, ransomware attacks havebeen up almost 300 percent in
the past year and over 50percent targeting small
The economic cost of theseattacks for small and medium
business can be catastrophic.
With over 60 percent of smallbusinesses, uh, are not being

able to operate after they havebeen experienced a cyber attack.
This is a painful reality andthis is where Microsoft as a
company, together with ourpartner ecosystem, want to reach
out to the SMB customers andengage them to accelerate their
digital transformation journeywith security.

Conor Bronsdon (05:47):
It feels like a lot of small and medium sized
businesses underestimate thisbecause they're so focused on
delivering value to theircustomers and they think, oh
well I can worry about thislater.
It's the enterprises that reallyhave to worry about security.
They're the targets, but Uh, toyour point, there are
significant threats that arefacing SMB businesses and, uh,

it sounds like ransomware is amajor one of, Do you view like
zero trust as a concept that canhelp a lot of small businesses
improve on this by saying, okay,look, we have these devices that
our employees are using toaccess, you know, work data, you
know, maybe distribute acrossthe country or even worldwide,
We need to accelerate our kindof like baseline security or

what, how are the, how are youthinking about the postures that
are, are really gonna beimpactful for, SMBs?

Binil Pillai (06:35):
Yeah, absolutely.
You mentioned a very interestingpoint about zero trust, right?
I think that is the, theprinciple that we want every
organization to understand andadopt.
And there are multiple layerswhen you look at zero trust,
One is, uh.
Uh, you know, you know, inMicrosoft terminology, we say
that assume breach and then moveon to really measure, develop

the right cyber securitymeasurements to really do the
right thing, one, to improveyour security posture, and two,
how do we react to somethinghappens, uh, you know, to your
environment from a securitybreach standpoint.
So I think what is important isfor understanding at the
leadership level for everysmall, medium business, as well
as enterprise, What does itmean, you know, Zero Trust mean

for them.
How do we adopt that principleinto the organization?
And what kind of technology andtools that they should adopt?
There are a variety ofmethodologies and framework
available for organizations todevelop and design their own
Zero Trust architecture withinthe within their organization
limits, right?
So that is a key piece.

You have to define your own ZeroTrust journey and make sure you
take the right action to improveyour security posture.
So again, a summary, I would saythat it's a leadership decision.
It's the development andimplementation of your version
of Zero Trust that makes sensefor you, and then make sure how
do you really enable the toolsand framework and technology to

make that happen.
So for me, it's a journey andthat's exactly I was kind of a
Writing up in the book toexplain, uh, in a variety of
organizations, includingenterprises, small, medium
business, and even consumer,right?
To understand the methodologyand how do we learn and leverage
these to adopt, to minimize therisk in a day to day business

Conor Bronsdon (08:21):
Are there other key challenges that you see SMBs
having around security today?

Binil Pillai (08:26):
I think that there are two primary challenges.
One is definitely, like I said,the SMBs are unfortunately being
a target from an attacker'spoint of view because it's their
less effort, you know, becauseeasy to enter and they can
really do their You know, kindof work to really get maximum
output from a small uh, companypoint of view.

So that's a, that's a one bigchallenges.
The, the second challenge is inthe adoption of the tool, uh,
you know, probably somethingSMBs need to, you know, to
completely leverage on, uh,partners.
And the idea Microsoft wouldlove to bring in, we have a
partner ecosystem that isavailable to support our SMBs to

make sure.
How do we get the customeraccess to the best tools and
technologies from a proactive,you know, threat protection
So the partners can provide thebest, you know, tools and
solution, like we know, EndpointDetection and Response Service
or Managed Detection andResponse Service and, you know,
Security Operations Center typeof services.

That could be a huge value forSMB because we know that
majority of the SMBs do not havethe right level of resources.
I mean the cyber securityresources in place, so they have
to heavily, you know, rely onthe partner.
So we would love to encourageevery SMP to work with the
partner ecosystem, um, you know,so that they get maximum

coverage from a securityperspective through the services
they provided today.

Conor Bronsdon (09:54):
So this is really interesting in the
context of our two audiences ofthis podcast.
We have the leadership audience,which is, you know, VPs of
engineering at those SMBs, maybea director of engineering
And then we have the seniorsoftware engineer who wants to
become a leader, the juniorsoftware engineer who sees these
And one of the big things thatwe've heard about, you know,

both broadly in softwaredevelopment in society and
definitely in security isgenerative AI and its impact.
I know it's having a majorimpact on the security
landscape, particularly for SMB.
How should those two kind ofaudiences who are listening be
thinking about leveraging AIwithin software development and
within the security landscape inparticular?

Binil Pillai (10:38):
Small and medium businesses are are at an
increased risk of cyber attacksdue to their lack of basic
security measure.
As I explained earlier, uh,cybercriminals are drawn into
this business as an easy targetfor low risk high reward attack
point of view.
And SMBs are keen to explore thepossibilities that generative AI

can bring to to accelerate theirgrowth beyond what they could
significantly add value from acybersecurity perspective.
As a branch of artificialintelligence, generative AI
offered several benefits forSMBs in general.
As AI technologies become moreperversive across various
domains, Ensuring their securitybecomes crucial, uh, even though

we believe AI powered securitysolutions offer cost effective
alternatives for SMBs withlimited, uh, with limited budget
and resources.
In another aspect, generative AIcan be crucial in SMB
cybersecurity by providingadvanced capabilities.
to detect, analyze, and respondto potential threat.

Putting aside these risks,Generative AI offers an
outstanding opportunity tochange the balance between
attackers and defenders,especially for SMBs that lack
I think to the audience youmentioned earlier, I just wanted
to call out some of the exampleshow this really make it happen
in real time.
Let's take some of the, uh,let's take some of the, uh, cool

Number one is anomaly detection.
Uh, Gen AI can be used as a toolto discover patterns and
behaviors of normal networktraffic and user activities or
even system operations within ITinfrastructure.
The second one is a rapidmonitoring.
It can also help a securityanalyst doing the work to reason

over the massive data stores anddetect and respond faster.
The last one, but not the least,is fast learning.
It can enhance education andquicker understanding of the
people they do have working inIT and security.
This will be a great advantage,especially for SMBs lack skilled

cyber security resources.
what actually Microsoft does inthis space is basically we kind
of bring these insights into ourexisting product.
For example, for SMBs, if theyare interested in AI, we do have
existing capabilities such asautomatic attack disruption and
automated investigation andremediation in Microsoft

Defender for Business, BusinessPremium, and MME3.
Maybe we'll go a little bitdetail into those capabilities
to to share some insight for theaudience here.
The first one is, automaticattack disruption is designed to
contain attacks in progress,limit the impact on organization
asset and provide more time forthe SOC analyst to remediate the

attack fully.
It identifies assets controlledby the attacker and used to
spread the attack.
It automatically takesresponses, uh, action across
relevant Microsoft Defenderproducts to contain the attack
in real time by isolatingaffected assets.
You know, assets.
This is a game changingcapability, uh, limits a threat

actor's progress early on anddramatically reduces the overall
impact of an attack fromassociated cost to loss of
The, the second capability isautomated investigation and
This uses a variety, uh, andvarious inspection algorithm and
is based on A process is thatare used by security analyst,

AIR, you know, capabilities aredesigned to examine alerts and
take immediate action to resolvebreaches.
It operates in three key, threekey stages.
The first one, it starts when analert is triggered and incident
is created.
For example, suppose a maliciousfile is, uh, file resides on a

When that file is detected, analert is triggered and an
incident is created.
While the investigation isrunning, uh, any other alerts
generated from the device areadded to the ongoing automated
investigation until thatinvestigation is completed.
In addition, if the same threadis seen on other devices, those

devices are also added to theinvestigation.
That is how it expands the scopewhile running.
And as alerts are triggered andan automated investigation runs,
a verdict is generated for eachpiece of evidence investigated.
Verdicts can be malicious,suspicious, or no threat found.

As verdicts are reached,automated investigation can
result in one or moreremediation action.
So I have gone through some ofthe existing capability, I mean
security, AI capability, that wehave in our current products.
With these capabilities, we canact now together with our
partner ecosystem as they have asignificant role to play in

today's business.

Conor Bronsdon (15:52):
This is really interesting because, uh, I mean,
this is something you and Iwrote about and talked about a
lot back in 2018 2019 when wewere working together at
Microsoft was this possibilityof how AI can extend the
capability of security andengineering leaders worldwide.
Now it feels like it's all kindof coming to fruition and

there's this huge opportunityfrom, from what you're saying
for, uh, SMB technical leadersto, uh, level up and leverage AI
solutions to, uh, make a biggerimpact for themselves, make
their companies more secure andmaybe get promoted in the

Binil Pillai (16:30):
I think that's a, that's anevolution, we have been going
through, especially in the lastthree, four years, the AI become
a predominant, focus and drivingthat motion in a high impactful
way, uh, and customer point ofview, partner point of view, as
well as the technology providerpoint of view.
And, uh, this is going to be agame changing, uh, in the future

of cybersecurity for sure.

Conor Bronsdon (16:53):
So if I was a technical leader at an SMB and
I'm listening to this and I'msaying, okay, uh, maybe I, I run
our engineering team or I'm theCTO and our security team
reports into my org.
And I'm thinking, how should Ibe leveraging AI for security?
What's the strategy approach Ishould be taking?

What would be kind of theframework that you would suggest
to that CTO, that VP ofengineering as they think
Um, how to take advantage ofthese new technical capabilities
and also how to address thesenew threats.

Binil Pillai (17:29):
Yeah, absolutely.
So that's a good question.
The first one is to really, um,you know, understand and unlock,
uh, the product capability.
That's the first thing.
would, I would ask from a CTOand technology leader
perspective, understand thesecurity posture is the step
Um, there are various ways youcan do that.

The first one is, you know, runa maturity or, uh, you know,
posture assessment.
Where they are in the securitymaturity are they in one or two?
Maybe we can have it like one tofive ranking and that will help
us to understand the gap in yourcurrent security maturity.
That's the first step and thenthe second step is potentially

look at.
The conversation we had a fewminutes ago about the zero trust
architecture to bring that in toreally make sure how do we
really address and build a planto address the gap, right?
Based on the maturity assessmentor cyber security solution
assessment, whatever, uh, andbased on the outcome.
A recommendation from thatassessment we can identify what

is the next step in order toaddress the gap in your security
And the third element I wouldreally suggest is basically uh,
you know, work with the partnerecosystem.
Basically this is a big step forSMBs.
Like I said, they may not havethe right resources in place to
do internally, so they need theskill resources from an expert
and who does all this on a dayto day basis.

So that is the third element tobring the partner ecosystem into
you know, provide thattechnology solution to address
the gap, as well as how do wemaintain that technology from a
day to day security coveragestandpoint, right?
Because the threat can happenanytime to anyone.
So we have to have a constantmonitoring of your environment,

both from internally as well asexternally, so that someone who
does that job from a regularmonitoring standpoint is super
And that also comes with threathunting, threat monitoring.
As well as remediation action,right?
So that's actually the thirdstep.
So from a technology leader, tohave that end to end picture is
super important.
So they can actually lean in andsupport where they need to

prioritize things across theorganization and across the
technology they have in place.
Now, interestingly, uh, liketypically in SMB world, you may
not have an individual like aCTO or CIO.
And perhaps what I see inmajority of the cases, the owner
of the company himself orherself is kind of a CTO and

technology leader.
So it's, it's important for themto really learn and understand
the challenges and how do weminimize the risk from a
business angle and then leveragethe technology, including AI to
mitigate the risk and improvethe security portion.
I think that's what I wouldencourage for the leaders to
And then.
Pull all delivers tools andtechnologies and framework to

support you in order to improveyour security posture, as well
as minimize the risk.

Conor Bronsdon (20:29):
Thank you for those actionable takeaways.
I hope that, you know, they helpsome leaders in this audience to
kind of take these next stepsand think through their strategy
here, because to your point,it's always easier to Understand
and address security at thebaseline level to, you know,
have endpoint defense, to setthat zero trust posture, to do

these things before you build alot, before you, uh, push
forward, because otherwise youmay have a breach that you have
to address.
You may have to come back and,and fix something that's already
It's better to Build with, uh,security in mind and have it be
like a basic principle of theorganization of how you're, you
know, developing software, howyou're transitioning in the
cloud, whatever it may be.

An area that I know a lot of ouraudience is already investing
time and resources in isleveraging GitHub Copilot to
improve the speed of codegeneration and, uh, improve the
ROI of their engineering teamsby just increasing efficiency
across the board.
And I've heard that MicrosoftSecurity Copilot is very soon

going to be launching to publicavailability, maybe even by the
time this episode actuallypublishes.
Uh, could you share someinformation and maybe insights
with our audience about whatthey can expect from that.

Binil Pillai (21:42):
Like all of you, I'm also super excited to see
that product coming up.
Just to give you a little bit ofa, you know, overview about the
security co pilot.
It is the first generative AIsecurity product designed to
defend our customers at machinespeed and scale.
It combines the most advancedGPT 4 model from OpenAI With a

Microsoft developed securityspecific model powered by
Microsoft Security's uniqueexpertise, global threat
intelligence, and comprehensivesecurity product portfolio.
Security Co Pilot is designed tohelp security operations center
analysts to be more effectiveand efficient at all roles they
play across security.

That's a key.
And I think, uh, from our earlycustomer experience.
Feedback on the product is veryexciting and very interesting.
They see huge value in thenatural language model we use
because with security copilot,the analysts don't need to write
a complex script.
They can simply ask questions inEnglish.

And Security Co Pilot understandthe context, set the plan in
motion, and provide prescriptiveguidance resulting in
significant productivity gains.
And what I kind of learned, uh,you know, the Microsoft Security
Co Pilot advantage is a fewthings.
Number one, uh, the designbehind Security Co Pilot is not
just about talking OpenAI androlling it with, with it.

Microsoft Mechanics And thesecond one is SecurityCopilot
runs on our security and privacycompliant hyperscale
infrastructure that is unique toMicrosoft and brings the full
benefit of being on the Azurecloud.
And the third one, if we add ourcyber specific model, which
works to create a cloud looplearning system that has an ever

growing set of security specificskill.
Microsoft And finally, thesecurity co pilot is at the
heart of Microsoft's securityproduct portfolio.
It deeply integrates with ourexisting product experiences and
workflow across Defender,Sentinel, Intune, Entra,
Purview, and Priva so thatsecurity professionals see the

full benefit of Uh, you know,security, uh, co pilots,
assistants as they go aboutdaily work.
I'm super excited to see theproduct coming to reality, for
addressing the world's problem,for our customers and partners.

Conor Bronsdon (24:10):
It sounds like we could even see Security Co
Pilot enable less seniorengineers and less senior
security analysts to increasetheir effectiveness, which,
particularly for SMBs, can behugely impactful given that, you
know, SMB may not have severalsecurity analysts at the road a

Binil Pillai (24:28):
Yeah, I'm with you.
If I look at the productcapability, it helps a lot for
the customers as well aspartners.
I think one, it's a one product.
It can actually provide a lot ofvalue from an end to end
customer point of view, end toend security threat point of
For the partner, it's a toolthey're going to definitely
leverage a lot, uh, to have aninsightful view in the product

Customer environment, connectingwhatever the product they are
It's pull the information andprovide the end to end, uh, you
know, capability to analyze thedata and then provide the right
practice step.
So it's kind of a game changingtool for everyone, um, uh, you
know, as a solution.

Conor Bronsdon (25:08):
This has been a wonderful conversation, Benil.
I think there's a lot of valuein here for our audience as they
think about security,particularly for folks in the
Could you share where the bestplace for folks to go to learn
more from you and aboutMicrosoft security strategy?

Binil Pillai (25:25):
The first thing I would love to encourage and look
at the Microsoft securitylanding page.
And we have a blog site forsecurity and we'll.
I'll see a lot of Microsoft tallleadership documents, uh, and
from a from a looking forwardperspective that what we see in
the market in every market todayand what we can do better to

support the customer needs.
That's number one.
We have a product portfolio thatcategorized by capability as
well as by segment.
Uh, majority of the products areavailable for enterprise
We do have a special, uh,product designed for small
medium business customers.
Like I mentioned, uh, BusinessPremium is a great example.

Microsoft Defender for Businessis another product designed for,
uh, small and medium business.
So, uh, yes, absolutelyMicrosoft security product
portfolio landing page, uh,provide the entire portfolio
view of, uh, infra Microsoft.
I think that may be a betterplace.
The other one I will encourage,uh, an audience to look at it,
especially from SMB point ofview.

We have a cybersecurity solutionassessment that's available for,
And what it does is basicallyit's a, it's a self-service.
Cyber Security SolutionAssessment means the customer
can, click on it and answer afew questions and, you will get
a report from, uh, Microsoft,approved vendor in terms of

providing what actually thesecurity posture of your, uh,
Your environment and if youdon't have a, you know,
security, you know, personal inyour organization and definitely
your partner can also do a cybersecurity assessment on behalf of
you and that is also availablein our, you know, cyber security

assessment in our publicwebsite.

Conor Bronsdon (27:15):
Great, we'll be sure to include links to that in
the episode description.
Banil, do you have any closingadvice for our audience around

Binil Pillai (27:23):
Yeah, absolutely.
So I wanted to say that securityis a foundational capability for
successful business andoperations.
And we hate to see a situationwhere customers business
operations are being interruptedand their reputation is being
challenged due to lack ofsecurity capability.

For small, medium businesscustomers, they may not have a
second chance if somethingsimilar happened to them.
So first, we wanted to make surecustomers assess their security
posture so that you take theright step to mitigate, uh, you
know, their risk.
Uh, and gaps.
So please make sure securityhygiene as a first step.

The second one, we have AIcapabilities in our existing
Security products for SMB, uh,we discussed some of them
briefly, like automatic attackdisruption and, uh, and others.
Uh, AI and automation, uh, canbe implemented to ensure speedy
investigation and remediationroutines.

We believe AI powered securitysolutions offer cost effective
alternatives for SMBs withlimited budget and resources.
So, by embracing AIcapabilities, SMBs can can
harness the power of generativeAI to enhance cyber security
Our partners can ensure theirsupport for SMP customers by

leveraging cyber security basedAI product.

Conor Bronsdon (28:50):
Well, Banil, I've really enjoyedthis conversation.
It's great to catch up with youand to see the fruits of kind of
all this labor these last yearscome thank you to, uh, you know,
fruition for, for Microsofthere, because it's clear there's
a huge opportunity to improvethe security of businesses
worldwide, particularly in SMB,uh, given the attack surfaces
they're seeing.
So thank you so much for joiningme for this conversation.

Binil Pillai (29:13):
Thanks a lot, Conor.
Really appreciate and thanks forhaving me here.

Conor Bronsdon (29:16):
And if you want to get more conversations like
this and get in depth articlesas well, remember to check out
our Substack at devinterrupted.
And that's all for this week.
We'll talk soon all..
Advertise With Us

Popular Podcasts

1. Start Here
2. Dateline NBC

2. Dateline NBC

Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations.

3. Amy and T.J. Podcast

3. Amy and T.J. Podcast

"Amy and T.J." is hosted by renowned television news anchors Amy Robach and T. J. Holmes. Hosts and executive producers Robach and Holmes are a formidable broadcasting team with decades of experience delivering headline news and captivating viewers nationwide. Now, the duo will get behind the microphone to explore meaningful conversations about current events, pop culture and everything in between. Nothing is off limits. “Amy & T.J.” is guaranteed to be informative, entertaining and above all, authentic. It marks the first time Robach and Holmes speak publicly since their own names became a part of the headlines. Follow @ajrobach, and @officialtjholmes on Instagram for updates.

Music, radio and podcasts, all free. Listen online or download the iHeart App.


© 2024 iHeartMedia, Inc.