Cybersecurity is more than tools and threats — it’s the people who choose this path, and I’d love to hear how you found yours. Suppose you’re a student, early-career professional, veteran, career changer, or seasoned practitioner. In that case, you’re invited to share your story for a short, relaxed conversation that will be featured across Bare Metal Cyber channels. Use the form below to tell me a bit about your background, where you are in your journey, and what you’d like to talk about, a ...
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
1
HACKED: Into the minds of Cybersecurity leaders
Talking cybersecurity with nexus IT Security group
We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.
…
continue reading
1
DtSR Episode 686 - An Unexpected Windows XP Conversation
49:30
49:30
Play later
Play later
Lists
Like
Liked
49:30TL;DR: On today's pod, Rob Allen of ThreatLocker makes his triumphant return to derail us straight into a conversation about legacy systems and why he's still supporting WindowsXP. Right, you read that right. A great conversation ensued, and I'm glad we were able to record this one. Enjoy. From us to you, thank you for following along this year, an…
…
continue reading
1
The LastPass Breach That Never Ended: How Weak Passwords Still Cost Millions
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19In this journey from Darnley’s Cyber Café, we explore the chilling aftermath of one of the most talked-about data breaches in modern history: the LastPass incident. But this isn’t just a story about what happened. It’s about what never stopped. From crypto wallets vanishing in silence to digital vaults bleeding secrets over years, this slow-burn na…
…
continue reading
1
Top 10 Emerging AI Security Roles in 2026
15:44
15:44
Play later
Play later
Lists
Like
Liked
15:44Secure your future in the most critical career path in tech by enrolling in the Certified AI Security Professional (CAISP) course today! In this episode, we explore the definitive guide to the Top 10 Emerging AI Security Roles for 2026. The shift toward AI-integrated operations is not a future concern—it is happening now, and it has opened a "chasm…
…
continue reading
1
The Biggest Professional Data Leak You’ve Never Heard Of (And Why It Matters)
10:10
10:10
Play later
Play later
Lists
Like
Liked
10:10A massive, unsecured database exposed billions of professional records such as names, emails, job roles, work history, and more...now quietly sitting open on the internet. In this episode of Darnley’s Cyber Café, we unpack how a leak this size changes the game for phishing, social engineering, and AI-powered scams, why professionals are now prime t…
…
continue reading
1
DtSR Episode 685 - Weaponized AI is Real Now What Pt 1
37:33
37:33
Play later
Play later
Lists
Like
Liked
37:33TL;DR: In part 1 of 2, Gadi Evron joins the show and chats with Jim and Rafal on the topic of the "AI Cataclysm". What does that even mean? Listen in - but it's part to do with how AI is changing the attacker model (level of effort, expertise required, timeline) and what defenders should start to think about. Part 2 is coming soon, standby. YouTube…
…
continue reading
1
The PornHub Data Exposure: What Was Leaked, Who’s at Risk, and Why It Matters Now
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49A major data exposure tied to PornHub has raised serious questions about privacy, trust, and how personal information can surface in ways users never expect. In this episode of Darnley’s Cyber Café, we break down what happened, why it matters beyond adult websites, and what this incident reveals about data handling in the modern internet economy. I…
…
continue reading
1
AI Security Interview Questions - AI Security Training and Certification - 2026
16:42
16:42
Play later
Play later
Lists
Like
Liked
16:42Enroll now in the Certified AI Security Professional (CAISP) course by Practical DevSecOps! This highly recommended certification is designed for the engineers , focusing intensely on the hands-on skills required to neutralize AI threats before attackers strike. The CAISP curriculum moves beyond theoretical knowledge, teaching you how to secure AI …
…
continue reading
1
When AI Learns to Hack: OpenAI’s Warning and the Future of Cybersecurity
14:18
14:18
Play later
Play later
Lists
Like
Liked
14:18Artificial intelligence is evolving fast and even the people building it are raising red flags. In this episode of Darnley’s Cyber Café, we unpack OpenAI’s recent warning that upcoming AI models could pose high cybersecurity risks, including the potential to assist in zero-day exploits and advanced intrusion operations. We explore what this really …
…
continue reading
TL;DR: This week's show features Aaron Costello, and is all about an analog from real-world attacks on humans, applied to AI "agents". I know what you're thinking - computers are supposed to be more difficult to trick, right? Right... no. Attacks such as this where computers try to be "helpful" (just like humans) are probably more common than we'd …
…
continue reading
1
Best AI Security Certification Courses & Earn $280K Salary Premium in 2026
14:37
14:37
Play later
Play later
Lists
Like
Liked
14:37The cybersecurity market is currently experiencing a massive talent shortfall in the emerging field of Artificial Intelligence security, driving compensation for specialized roles to unprecedented heights. AI security roles are projected to pay between 180K–280K in 2026, but the majority of cybersecurity professionals lack the necessary qualificati…
…
continue reading
1
Holiday Hackers: Why Cybercrime Spikes in December, And How to Stay Safe
13:23
13:23
Play later
Play later
Lists
Like
Liked
13:23Cybercrime doesn’t take holidays off. December is one of the busiest months for hackers. In this festive special of Darnley’s Cyber Café, we dig into why cyberattacks surge during the holidays, how scammers exploit online shopping hype, and why distracted employees and understaffed IT teams make the perfect storm for breaches. We also unpack the ps…
…
continue reading
1
DtSR Episode 683 - Sometimes You Have to Step Away
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37TL;DR: On this episode, it's just Jim and Rafal talking about how sometimes you just need to take a big step back from your day job and touch some grass. Our chosen profession is, demanding, to say the least. So let's take a minute to acknowledge what we're really thinking. Unfiltered, raw, and straight from our heads to your ears, enjoy. YouTube v…
…
continue reading
1
The Psychology of Ignoring Cybersecurity: Why We Think It Won’t Happen to Us
10:30
10:30
Play later
Play later
Lists
Like
Liked
10:30Why do people ignore cybersecurity until it’s too late? In this episode of Darnley’s Cyber Café, we dive into the psychology behind cyber neglect, the illusion of “it won’t happen to me,” and why privacy still matters in a world where everything feels exposed. Using real data and relatable examples (including one about bathroom stalls…), we break d…
…
continue reading
1
When Your TV Turns Against You: The SmartTube Breach
9:03
9:03
Play later
Play later
Lists
Like
Liked
9:03A major breach hits SmartTube, the popular third-party YouTube app for smart TVs and suddenly millions of living rooms may have quietly become surveillance hubs. In this episode, we break down how the malicious update happened, what the hidden malware was doing behind the scenes, and why smart TVs are quickly becoming one of the biggest cybersecuri…
…
continue reading
1
Become an AI Security Engineer in 8 Weeks - Fast-Track Guide & Roadmap
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43Cybercrime drains trillions of dollars globally each year. Today's threat landscape is defined by smart, adaptable adversaries: 40% of all cyberattacks use AI to find hidden weaknesses, and nearly all companies (93%) now face these advanced threats daily. The Certified AI Security Professional (CAISP) course compresses the typical 2–4 years needed …
…
continue reading
1
DtSR Episode 682 - A Third Opinion on Vulnerability Ranking
48:48
48:48
Play later
Play later
Lists
Like
Liked
48:48TL;DR: This week's pod features a conversation with the Jay Jacobs, whom had previously been on the show talking about this very topic (vulnerability ranking/scoring) many, many years ago. If you missed Episode 297 check it out, it's crazy how far (or not) we've come since that conversation. YouTube Video: https://youtube.com/live/cpL9ZYbwkes Have …
…
continue reading
1
Biorobotics & Neuralink: How Tech Is Rewiring the Human Body
9:30
9:30
Play later
Play later
Lists
Like
Liked
9:30In this episode of Darnley’s Cyber Café, we dive into the fascinating, and slightly unsettling, world of biorobotics, where human biology meets advanced robotics and neural technology. From groundbreaking innovations like Neuralink, next-gen prosthetics, and brain-computer interfaces, to the hidden cybersecurity risks of merging technology directly…
…
continue reading
1
The Bad Apple Latte: How One Insider Nearly Brewed a Cyber Disaster
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17In this episode of Darnley’s Cyber Café, we dive into the real story behind CrowdStrike’s recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies. We break down how a “bad apple” employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detect…
…
continue reading
TL;DR: John Rafal & Jim as we welcome Dustin Lehr to talk about the state of AppSec and how we got here. We discuss vulnerabilities, accountability, culture, and a host of other things. It's a caffein-fueled episode, so buckle in! Youtube video: https://youtube.com/live/yoBIQ_sIawI Have something to say? Let's hear it. Support the show >>> Please c…
…
continue reading
1
AI Security Certification: The Ultimate Guide to the Certified AI Security Professional (CAISP) course
50:35
50:35
Play later
Play later
Lists
Like
Liked
50:35Episode: Securing AI Systems - A Deep Dive into AI Security with Marudhamaran Gunashekaran In this episode, Jeremy Daly, Cybersecurity Lead at Lumifi, sits down with Marudhamaran Gunashekaran, Principal Security Consultant and Lead Author of the Certified AI Security Professional (CAISP) course at Practical DevSecOps (a Hysn Technologies company). …
…
continue reading
Welcome to the Cyber Journey Podcast. This is where real people in cybersecurity share how they actually got here, what they learned along the way, and what they wish someone had told them at the start. If you are trying to break into cyber, change directions in your career, or just figure out what is real in all the noise, you are in the right pla…
…
continue reading
1
How Ordinary People Are Accidentally Helping Hackers Break Into Global Companies
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00In this episode of Darnley's Cyber Café, Darnley exposes how everyday people around the world are unknowingly helping hackers infiltrate global companies. We break down fake remote job scams, identity laundering, and the red flags that businesses and individuals need to watch for. Learn how cybercriminals recruit ordinary citizens, why these scheme…
…
continue reading
1
DtSR Episode 680 - Debating Patching and Vulnerability Scoring
55:57
55:57
Play later
Play later
Lists
Like
Liked
55:57TL;DR: We heard RSnake's take on CVSS and CVEs and such, now let's hear Brian "Jericho" Martin's take. The gloves are off, and the opinions go native when we take this episode live. Brian doesn't pull any punches, and apparently I'm the only one without a pocket full of $2 bills? Sorry for the explicit rating, that's Brian's fault. YouTube Video: h…
…
continue reading
1
Love, Lies, and Data: The Risks of Online Dating
15:36
15:36
Play later
Play later
Lists
Like
Liked
15:36Swipe right… but at what cost? 💔 In this episode of Darnley’s Cyber Café, Darnley steps into the world of online dating: where romance meets algorithms and your heart isn’t the only thing on the line. From catfishing to data leaks, location exposure to emotional manipulation, we unpack the hidden cybersecurity risks behind modern love. You’ll hear …
…
continue reading
1
InfoSec Black Friday Certification Deals 2025
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56InfoSec Black Friday Deals 2025: Securing the Future of Cybersecurity This special offer broadcast details the InfoSec Black Friday 2025 deals, presenting a limited-time chance to advance cybersecurity careers when the demand for security professionals continues to grow. Tune in to discover how to save up to $500 on certification bundles and receiv…
…
continue reading
1
#71 Metasploit Creator: Why CVEs Won’t Save You in 2025 ft. HD Moore
38:41
38:41
Play later
Play later
Lists
Like
Liked
38:41In this episode of The Hacker’s Cache, Kyser Clark sits down with HD Moore, the legendary creator of Metasploit and CEO of RunZero, to discuss why relying on CVEs is putting organizations at risk in 2025. They unpack the truth about vulnerabilities that never get CVEs, the hidden dangers of SSH exposures, and why attackers are outpacing defenders t…
…
continue reading
TL;DR: Patching. Your least favorite thing. Well, it turns out that most of the work we have been doing in the last 20+ years has been for nothing. Robert "RSnake" Hansen's theory, backed by a lot of data, seems to point to a much bigger problem in cyber, and it's time we talk about it. Rob's Closing Keynote that started this conversation: https://…
…
continue reading
1
Ghosts in the Chat: The Teams Message Manipulation Flaw
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Researchers have uncovered flaws that allow Microsoft Teams messages to be manipulated, letting hackers impersonate executives, forge notifications, and alter private chats. In this episode of Darnley’s Cyber Café, we explore how these vulnerabilities work, why they exist, and how to protect yourself from deception hiding behind familiar names. For…
…
continue reading
1
#70 From Teen Hacker to Professional Pentester: The Journey of Kyle Hoehn
37:34
37:34
Play later
Play later
Lists
Like
Liked
37:34In this episode of The Hacker’s Cache, Kyser Clark sits down with seasoned penetration tester Kyle Hoehn to unpack the journey from a curious teen experimenting online to a full time professional in offensive security. Kyle shares how early exposure to computer tinkering and real world troubleshooting shaped his path, why foundational IT knowledge …
…
continue reading
1
The Cybersecurity Perception Gap: Why Executives and IT Teams Don’t See Risk the Same Way
16:44
16:44
Play later
Play later
Lists
Like
Liked
16:44Executives say they’re confident in their cybersecurity, but their teams aren’t so sure. In this episode of Darnley’s Cyber Café, we explore the growing cybersecurity perception gap between leadership and practitioners, why it matters, how to fix it, and what it reveals about the state of cyber resilience in 2025. Tune in to uncover how confidence …
…
continue reading
1
DtSR Episode 678 - CyberSecurity Has Lost the Plot
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32TL;DR: This week's pod features your favorite hosts reflecting on how security has lost its way. When everything is a catastrophe, nothing is. When every breach is world-ending, none of them matter. Have we completely lost the plot? Prepare to have a good think. YouTube Video: Have something to say? Let's hear it. Support the show >>>…
…
continue reading
1
#69 Why He Left a Safe Job to Hack Companies for a Living ft. Jim Schultz
33:13
33:13
Play later
Play later
Lists
Like
Liked
33:13In this episode of The Hacker’s Cache, Kyser Clark sits down with Jim Schultz, an OSCP-certified penetration tester, cybersecurity instructor, and consultant with over 15 years of experience. Jim shares his journey from taking apart his first family computer in the 90s to teaching hundreds of students and returning full-time to the world of ethical…
…
continue reading
1
AI Browsers Can’t Tell Friend From Foe: Use Them at Your Own Risk
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25The new wave of AI browsers: Atlas and Comet gives the promise to “think for you” while you browse. They summarize, interpret, and filter the web in real time. But what happens when the assistant inside your browser can’t tell the difference between your command and a malicious instruction coming from the page itself? In this episode of Darnley’s C…
…
continue reading
1
DtSR Episode 677 - Is Cyber Insurance the Answer or A Question
48:25
48:25
Play later
Play later
Lists
Like
Liked
48:25TL;DR: On this week's pod - Sean Scranton and Shawn Tuma make a return appearance to talk about Cyber (Security) Insurance. Some see it as the answer to cyber's problems, while others see it as just another question. Which is it? Is it just a matter of perspective? Listen in and find out! YouTube Video: https://youtube.com/live/GiuheFiFO78 Have som…
…
continue reading
1
The Cyber Café Playbook: Safety Is a Story We Tell Ourselves
9:27
9:27
Play later
Play later
Lists
Like
Liked
9:27This special Playbook episode distills the most important lessons from previous discussions — not as stories, but as rules. A framework for those who still believe digital safety is something they possess rather than something they must earn. If you think you understand the risk, start here and test that belief. Click here to send future episode re…
…
continue reading
1
#68 Q&A: Why You’ll Fail in Cybersecurity if You Stop Learning
35:51
35:51
Play later
Play later
Lists
Like
Liked
35:51In this episode of The Hacker’s Cache Podcast, Kyser Clark answers real cybersecurity career questions from whether the OSCP or Hack The Box CPTS is better for breaking into pentesting, to how to renew your Security+ the smart way, and why cybersecurity isn’t for those who hate learning. He also exposes the truth behind bootcamps, entry-level job m…
…
continue reading
A nation-state attacker quietly lived inside F5’s network and walked away with BIG-IP source code and undisclosed vulnerability details. In this episode we pull apart why a breach of a cybersecurity company is far more dangerous than a breach of a bank or retailer — and what individuals and businesses can do to protect themselves when even the “exp…
…
continue reading
1
DtSR Episode 676 - Privacy and Healthcare Data at Crossroads
43:58
43:58
Play later
Play later
Lists
Like
Liked
43:58TL;DR: This week's pod is all about healthcare-related data that is bought and sold the world over - and how you this data can be utilized while still preserving privacy. In this mind-blowing segment, John Kuhn of Integral joins Jim and I to talk about the vast quantities of data that's bought, sold, and aggregated for healthcare research - and how…
…
continue reading
1
Europe’s Digital Tug of War: The Fight for Cyber Independence
8:17
8:17
Play later
Play later
Lists
Like
Liked
8:17How independent is Europe in the digital world? Join Darnley as we explore the hidden forces, technological risks, and global influences quietly shaping Europe’s data and markets. Sometimes the greatest friend is also the most formidable obstacle. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Caf…
…
continue reading