show episodes
 
Artwork

1
Cyber Journeys

Dr Jason Edwards

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Cybersecurity is more than tools and threats — it’s the people who choose this path, and I’d love to hear how you found yours. Suppose you’re a student, early-career professional, veteran, career changer, or seasoned practitioner. In that case, you’re invited to share your story for a short, relaxed conversation that will be featured across Bare Metal Cyber channels. Use the form below to tell me a bit about your background, where you are in your journey, and what you’d like to talk about, a ...
  continue reading
 
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
  continue reading
 
Artwork

1
Tech Pulse

Tech Pulse Podcasters

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
  continue reading
 
Loading …
show series
 
TL;DR: On today's pod, Rob Allen of ThreatLocker makes his triumphant return to derail us straight into a conversation about legacy systems and why he's still supporting WindowsXP. Right, you read that right. A great conversation ensued, and I'm glad we were able to record this one. Enjoy. From us to you, thank you for following along this year, an…
  continue reading
 
In this journey from Darnley’s Cyber Café, we explore the chilling aftermath of one of the most talked-about data breaches in modern history: the LastPass incident. But this isn’t just a story about what happened. It’s about what never stopped. From crypto wallets vanishing in silence to digital vaults bleeding secrets over years, this slow-burn na…
  continue reading
 
Secure your future in the most critical career path in tech by enrolling in the Certified AI Security Professional (CAISP) course today! In this episode, we explore the definitive guide to the Top 10 Emerging AI Security Roles for 2026. The shift toward AI-integrated operations is not a future concern—it is happening now, and it has opened a "chasm…
  continue reading
 
A massive, unsecured database exposed billions of professional records such as names, emails, job roles, work history, and more...now quietly sitting open on the internet. In this episode of Darnley’s Cyber Café, we unpack how a leak this size changes the game for phishing, social engineering, and AI-powered scams, why professionals are now prime t…
  continue reading
 
TL;DR: In part 1 of 2, Gadi Evron joins the show and chats with Jim and Rafal on the topic of the "AI Cataclysm". What does that even mean? Listen in - but it's part to do with how AI is changing the attacker model (level of effort, expertise required, timeline) and what defenders should start to think about. Part 2 is coming soon, standby. YouTube…
  continue reading
 
A major data exposure tied to PornHub has raised serious questions about privacy, trust, and how personal information can surface in ways users never expect. In this episode of Darnley’s Cyber Café, we break down what happened, why it matters beyond adult websites, and what this incident reveals about data handling in the modern internet economy. I…
  continue reading
 
Enroll now in the Certified AI Security Professional (CAISP) course by Practical DevSecOps! This highly recommended certification is designed for the engineers , focusing intensely on the hands-on skills required to neutralize AI threats before attackers strike. The CAISP curriculum moves beyond theoretical knowledge, teaching you how to secure AI …
  continue reading
 
Artificial intelligence is evolving fast and even the people building it are raising red flags. In this episode of Darnley’s Cyber Café, we unpack OpenAI’s recent warning that upcoming AI models could pose high cybersecurity risks, including the potential to assist in zero-day exploits and advanced intrusion operations. We explore what this really …
  continue reading
 
TL;DR: This week's show features Aaron Costello, and is all about an analog from real-world attacks on humans, applied to AI "agents". I know what you're thinking - computers are supposed to be more difficult to trick, right? Right... no. Attacks such as this where computers try to be "helpful" (just like humans) are probably more common than we'd …
  continue reading
 
The cybersecurity market is currently experiencing a massive talent shortfall in the emerging field of Artificial Intelligence security, driving compensation for specialized roles to unprecedented heights. AI security roles are projected to pay between 180K–280K in 2026, but the majority of cybersecurity professionals lack the necessary qualificati…
  continue reading
 
Cybercrime doesn’t take holidays off. December is one of the busiest months for hackers. In this festive special of Darnley’s Cyber Café, we dig into why cyberattacks surge during the holidays, how scammers exploit online shopping hype, and why distracted employees and understaffed IT teams make the perfect storm for breaches. We also unpack the ps…
  continue reading
 
TL;DR: On this episode, it's just Jim and Rafal talking about how sometimes you just need to take a big step back from your day job and touch some grass. Our chosen profession is, demanding, to say the least. So let's take a minute to acknowledge what we're really thinking. Unfiltered, raw, and straight from our heads to your ears, enjoy. YouTube v…
  continue reading
 
Why do people ignore cybersecurity until it’s too late? In this episode of Darnley’s Cyber Café, we dive into the psychology behind cyber neglect, the illusion of “it won’t happen to me,” and why privacy still matters in a world where everything feels exposed. Using real data and relatable examples (including one about bathroom stalls…), we break d…
  continue reading
 
A major breach hits SmartTube, the popular third-party YouTube app for smart TVs and suddenly millions of living rooms may have quietly become surveillance hubs. In this episode, we break down how the malicious update happened, what the hidden malware was doing behind the scenes, and why smart TVs are quickly becoming one of the biggest cybersecuri…
  continue reading
 
Cybercrime drains trillions of dollars globally each year. Today's threat landscape is defined by smart, adaptable adversaries: 40% of all cyberattacks use AI to find hidden weaknesses, and nearly all companies (93%) now face these advanced threats daily. The Certified AI Security Professional (CAISP) course compresses the typical 2–4 years needed …
  continue reading
 
TL;DR: This week's pod features a conversation with the Jay Jacobs, whom had previously been on the show talking about this very topic (vulnerability ranking/scoring) many, many years ago. If you missed Episode 297 check it out, it's crazy how far (or not) we've come since that conversation. YouTube Video: https://youtube.com/live/cpL9ZYbwkes Have …
  continue reading
 
In this episode of Darnley’s Cyber Café, we dive into the fascinating, and slightly unsettling, world of biorobotics, where human biology meets advanced robotics and neural technology. From groundbreaking innovations like Neuralink, next-gen prosthetics, and brain-computer interfaces, to the hidden cybersecurity risks of merging technology directly…
  continue reading
 
In this episode of Darnley’s Cyber Café, we dive into the real story behind CrowdStrike’s recent insider scandal, and what it teaches us about the hidden dangers brewing inside modern companies. We break down how a “bad apple” employee allegedly leaked internal information to a notorious hacking collective, why insider threats are so hard to detect…
  continue reading
 
TL;DR: John Rafal & Jim as we welcome Dustin Lehr to talk about the state of AppSec and how we got here. We discuss vulnerabilities, accountability, culture, and a host of other things. It's a caffein-fueled episode, so buckle in! Youtube video: https://youtube.com/live/yoBIQ_sIawI Have something to say? Let's hear it. Support the show >>> Please c…
  continue reading
 
Episode: Securing AI Systems - A Deep Dive into AI Security with Marudhamaran Gunashekaran In this episode, Jeremy Daly, Cybersecurity Lead at Lumifi, sits down with Marudhamaran Gunashekaran, Principal Security Consultant and Lead Author of the Certified AI Security Professional (CAISP) course at Practical DevSecOps (a Hysn Technologies company). …
  continue reading
 
Welcome to the Cyber Journey Podcast. This is where real people in cybersecurity share how they actually got here, what they learned along the way, and what they wish someone had told them at the start. If you are trying to break into cyber, change directions in your career, or just figure out what is real in all the noise, you are in the right pla…
  continue reading
 
In this episode of Darnley's Cyber Café, Darnley exposes how everyday people around the world are unknowingly helping hackers infiltrate global companies. We break down fake remote job scams, identity laundering, and the red flags that businesses and individuals need to watch for. Learn how cybercriminals recruit ordinary citizens, why these scheme…
  continue reading
 
TL;DR: We heard RSnake's take on CVSS and CVEs and such, now let's hear Brian "Jericho" Martin's take. The gloves are off, and the opinions go native when we take this episode live. Brian doesn't pull any punches, and apparently I'm the only one without a pocket full of $2 bills? Sorry for the explicit rating, that's Brian's fault. YouTube Video: h…
  continue reading
 
Swipe right… but at what cost? 💔 In this episode of Darnley’s Cyber Café, Darnley steps into the world of online dating: where romance meets algorithms and your heart isn’t the only thing on the line. From catfishing to data leaks, location exposure to emotional manipulation, we unpack the hidden cybersecurity risks behind modern love. You’ll hear …
  continue reading
 
InfoSec Black Friday Deals 2025: Securing the Future of Cybersecurity This special offer broadcast details the InfoSec Black Friday 2025 deals, presenting a limited-time chance to advance cybersecurity careers when the demand for security professionals continues to grow. Tune in to discover how to save up to $500 on certification bundles and receiv…
  continue reading
 
In this episode of The Hacker’s Cache, Kyser Clark sits down with HD Moore, the legendary creator of Metasploit and CEO of RunZero, to discuss why relying on CVEs is putting organizations at risk in 2025. They unpack the truth about vulnerabilities that never get CVEs, the hidden dangers of SSH exposures, and why attackers are outpacing defenders t…
  continue reading
 
TL;DR: Patching. Your least favorite thing. Well, it turns out that most of the work we have been doing in the last 20+ years has been for nothing. Robert "RSnake" Hansen's theory, backed by a lot of data, seems to point to a much bigger problem in cyber, and it's time we talk about it. Rob's Closing Keynote that started this conversation: https://…
  continue reading
 
Researchers have uncovered flaws that allow Microsoft Teams messages to be manipulated, letting hackers impersonate executives, forge notifications, and alter private chats. In this episode of Darnley’s Cyber Café, we explore how these vulnerabilities work, why they exist, and how to protect yourself from deception hiding behind familiar names. For…
  continue reading
 
In this episode of The Hacker’s Cache, Kyser Clark sits down with seasoned penetration tester Kyle Hoehn to unpack the journey from a curious teen experimenting online to a full time professional in offensive security. Kyle shares how early exposure to computer tinkering and real world troubleshooting shaped his path, why foundational IT knowledge …
  continue reading
 
Executives say they’re confident in their cybersecurity, but their teams aren’t so sure. In this episode of Darnley’s Cyber Café, we explore the growing cybersecurity perception gap between leadership and practitioners, why it matters, how to fix it, and what it reveals about the state of cyber resilience in 2025. Tune in to uncover how confidence …
  continue reading
 
TL;DR: This week's pod features your favorite hosts reflecting on how security has lost its way. When everything is a catastrophe, nothing is. When every breach is world-ending, none of them matter. Have we completely lost the plot? Prepare to have a good think. YouTube Video: Have something to say? Let's hear it. Support the show >>>…
  continue reading
 
In this episode of The Hacker’s Cache, Kyser Clark sits down with Jim Schultz, an OSCP-certified penetration tester, cybersecurity instructor, and consultant with over 15 years of experience. Jim shares his journey from taking apart his first family computer in the 90s to teaching hundreds of students and returning full-time to the world of ethical…
  continue reading
 
The new wave of AI browsers: Atlas and Comet gives the promise to “think for you” while you browse. They summarize, interpret, and filter the web in real time. But what happens when the assistant inside your browser can’t tell the difference between your command and a malicious instruction coming from the page itself? In this episode of Darnley’s C…
  continue reading
 
TL;DR: On this week's pod - Sean Scranton and Shawn Tuma make a return appearance to talk about Cyber (Security) Insurance. Some see it as the answer to cyber's problems, while others see it as just another question. Which is it? Is it just a matter of perspective? Listen in and find out! YouTube Video: https://youtube.com/live/GiuheFiFO78 Have som…
  continue reading
 
This special Playbook episode distills the most important lessons from previous discussions — not as stories, but as rules. A framework for those who still believe digital safety is something they possess rather than something they must earn. If you think you understand the risk, start here and test that belief. Click here to send future episode re…
  continue reading
 
In this episode of The Hacker’s Cache Podcast, Kyser Clark answers real cybersecurity career questions from whether the OSCP or Hack The Box CPTS is better for breaking into pentesting, to how to renew your Security+ the smart way, and why cybersecurity isn’t for those who hate learning. He also exposes the truth behind bootcamps, entry-level job m…
  continue reading
 
A nation-state attacker quietly lived inside F5’s network and walked away with BIG-IP source code and undisclosed vulnerability details. In this episode we pull apart why a breach of a cybersecurity company is far more dangerous than a breach of a bank or retailer — and what individuals and businesses can do to protect themselves when even the “exp…
  continue reading
 
TL;DR: This week's pod is all about healthcare-related data that is bought and sold the world over - and how you this data can be utilized while still preserving privacy. In this mind-blowing segment, John Kuhn of Integral joins Jim and I to talk about the vast quantities of data that's bought, sold, and aggregated for healthcare research - and how…
  continue reading
 
How independent is Europe in the digital world? Join Darnley as we explore the hidden forces, technological risks, and global influences quietly shaping Europe’s data and markets. Sometimes the greatest friend is also the most formidable obstacle. Click here to send future episode recommendation Support the show Subscribe now to Darnley's Cyber Caf…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play