show episodes
 
Artwork

1
BarCode

Chris Glanden

Unsubscribe
Unsubscribe
Monthly
 
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

Unsubscribe
Unsubscribe
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Artwork

1
We think we know

Pentest-Tools.com

Unsubscribe
Unsubscribe
Monthly+
 
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we donโ€™t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
  continue reading
 
On WEโ€™RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Join an all-star cast โ€” including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE โ€” for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, weโ€™ll show off how PlexTrac empowers all types of security pros ...
  continue reading
 
Join an all-star cast โ€” including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE โ€” for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, weโ€™ll show off how PlexTrac empowers all types of security pros ...
  continue reading
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

Unsubscribe
Unsubscribe
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork
 
Welcome to CISO Tradecraftยฎ, your guide to mastering the art of being a top-tier Chief Information Security Officer (CISO). Our podcast empowers you to elevate your information security skills to an executive level. Join us on this journey through the domains of effective CISO leadership.
  continue reading
 
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP is in a unique position to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide. Operating as a communit ...
  continue reading
 
In cybersecurity, every move is critical. โ€œThe Security Strategistโ€ podcast delves into the depths of the cybercriminal underworld, revealing practical strategies to keep you one step ahead. We explore the latest trends and threats in cybersecurity, providing insights on how to protect your organisation effectively. Our discussions, featuring thought leaders and pioneering organisations, cover the most pressing issues businesses face today. Tune in as we dissect major threats, explore emergi ...
  continue reading
 
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
  continue reading
 
Welcome to the Bug Hunter Podcast by Pentesterland, a podcast for pentesters & bug bounty hunters. We tackle technical questions & inspirational topics to help you develop both a hacker skillset & mindset.
  continue reading
 
Artwork
 
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
  continue reading
 
Artwork

1
HackerHarbor Podcast

Yash Gorasiya, Anugrah SR, Meera Tamboli and Abhinav Pandey

Unsubscribe
Unsubscribe
Daily+
 
The podcast that sails through the waters of hacking and cyber security, with Yash Gorasiya, Anugrah SR, Meera Tamboli, and Abhinav Pandey as your captains. Welcome to The HackerHarbor Podcast, your one-stop shop for all things cybersecurity! We dive deep into the world of cybersecurity, covering everything from essential topics for beginners to unique, untouched areas that impact the industry. Here's what you can expect: ๐Ÿ”นCareer Guidance: Explore how to transition into cybersecurity or land ...
  continue reading
 
Artwork

1
Security Sandbox

Relativity's Calder7

Unsubscribe
Unsubscribe
Monthly
 
It takes a lot to solve complex data problems securely. A sandbox is the perfect space to discover new approaches. In season two of Security Sandbox, Relativity CSO & CIO Amanda Fennell chats with guests about maximizing security's greatest assetโ€”peopleโ€”through meaningful use of technology and process, creative and compassionate training, and the conviction that there is room for taking risk in security.โ€‹
  continue reading
 
Artwork

1
Humans of InfoSec

Humans of InfoSec

Unsubscribe
Unsubscribe
Monthly
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
  continue reading
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Loading …
show series
 
In this episode of CISO Tradecraft, host G Mark Hardy is joined by special guest Snehal Antani, co-founder of Horizon3.AI, to discuss the crucial interplay between offensive and defensive cybersecurity tactics. They explore the technical aspects of how observing attacker behavior can enhance defensive strategies, why traditional point-in-time pen tโ€ฆ
  continue reading
 
Today weโ€™re talking pentesting โ€“ specifically some mini gems that can help you escalate local/domain/SQL privileges: Check the C: drive! If you get local admin and the system itself looks boring, check root of C โ€“ might have some interesting scripts or folders with tools that have creds in them. Also look at Look at Get-ScheduledTasks Find ids and โ€ฆ
  continue reading
 
Traditional manual testing done once a year to meet your compliance requirements is no longer sufficient. The threat landscape is changing at lightning speed, and your defenses need to keep up. Thatโ€™s where automated network testing comes in! Itโ€™s like having a tactical SWAT team on standby, ready to spot exploitable vulnerabilities and provide youโ€ฆ
  continue reading
 
In this conversation, Kyser Clark interviews Ryan Daub, an Offensive Security Analyst Associate, about his journey in cybersecurity and his current role as an internal penetration tester for healthcare organizations. They discuss topics such as landing a job in cybersecurity, the role of AI in penetration testing, the differences between internal aโ€ฆ
  continue reading
 
Understanding the key differences between approaches in the EU and the US can help unlock maximum value with the right security strategies. Traditional methods often fall short, but integrating Machine Learning (ML) into your security framework can transform your defence against modern threats. Embrace a dynamic approach to security that adapts to โ€ฆ
  continue reading
 
Sara Mosley, technical director for the Bureau of Diplomatic Security's Cybersecurity and Technology Services, works with the U.S. State Department to help identify threats and potential compromises. In her role, she advocates for a Zero Trust approach that focuses on protecting critical data rather than trying to secure everything equally. She recโ€ฆ
  continue reading
 
In this conversation, Kyser Clark interviews Nathan Rice, a senior penetration tester, about his background and experience in cybersecurity. They discuss the differences between penetration testing and red team operations, the importance of starting with penetration testing before moving to red teaming, and the challenges and rewards of obtaining cโ€ฆ
  continue reading
 
In the post-pandemic world, relying solely on perimeter-based identity security is no longer sufficient. Increased cloud adoption, expanded access permissions, and the complexities of modern cloud environments have exposed vulnerabilities that traditional methods can't address. Issues like VPN weaknesses and inadequate security controls highlight tโ€ฆ
  continue reading
 
In this episode of CISO Tradecraft, host G Mark Hardy delves into the intricate world of Identity and Access Management (IAM). Learn the essentials and best practices of IAM, including user registration, identity proofing, directory services, identity federation, credential issuance, and much more. Stay informed about the latest trends like proximiโ€ฆ
  continue reading
 
Hello friends, Iโ€™m excited to release BPATTY[RELOADED] into the world at https://bpatty.rocks! โ€“ which stands for Brianโ€™s Pentesting and Technical Tips for You! Itโ€™s a knowledge base of IT and security bits that help me do a better job doing security stuff! Today I do an ACTUAL 7-minute episode (GASPโ€ฆwhat a concept!) covering my favorite bits on thโ€ฆ
  continue reading
 
In this milestone episode, Chris reconnects with old friends at the bar, reflecting on his journey from starting a humble podcast to launching a thriving security firm. The episode sets the stage for the live event in Vegas, where Chris is joined by an impressive lineup of experts, including George Gerchow, Justin Hutchins, Len Neo, Chris Wright, Mโ€ฆ
  continue reading
 
In this interview, we sat down with Greg Smith (Head of Global Product and Solution Marketing, Certinia) to get his insights into the stages of data maturity within the AI adoption journey. Greg advices that a key distinction in the nature of data handling between generative and predictive AI. Unlike predictive AI, which primarily analyzes existingโ€ฆ
  continue reading
 
We speak with Nick McKenzie, CI&SO and Sunil Joshi, Head of Digital & Communication Solutions, APJC, Orange Business about the CISO perspectives in the Asia Pacific Region. #mysecuritytv #bugcrowd For the full interview and to join the series visit https://mysecuritymarketplace.com/bugcrowd-register-to-access/โ€ฆ
  continue reading
 
Kyser Clark interviews Aaron Tran, a military veteran who successfully transitioned into a career in cybersecurity. They discuss Aaron's journey from the military to becoming a penetration tester, the challenges he faced, and the steps he took to bridge the gap between non-cyber and cyber roles. They also touch on the importance of having a plan anโ€ฆ
  continue reading
 
Zero Trust architecture is a modern security approach that enhances protection by focusing on network segmentation and granular access control, moving away from traditional perimeter defences. This model helps prevent breaches and limits the spread of threats within a network. While transitioning to Zero Trust can be challenging, it can be implemenโ€ฆ
  continue reading
 
Nick McKenzie, CI&SO with Bugcrowd & Sumit Bansal, VP Asia Pacific & Japan, BlueVoyant discuss CxO perspectives on supply chain defence and Third Party Risk Management (TPRM). To join the series visit https://mysecuritymarketplace.com/bugcrowd-register-to-access/ #bugcrowd #mysecuritytvBy MySecurity Media
  continue reading
 
Unlock the secrets of effective threat management with cybersecurity experts plus representatives from the Hacker community. This series will dive into the realm of cybersecurity and cybercrime analytics as our line-up of hackers and technologists debate the crucial role ethical hacking plays in fortifying digital defences. This includes exploring โ€ฆ
  continue reading
 
Artificial hype alert! Iโ€™m working on a NEW version of BPATTY (Brianโ€™s Pentesting and Technical Tips for You), but it is delayed because of a weird domain name hostage negotiation situation. Itโ€™s weird. But in the meantime I want to talk about the project (which is a pentest documentation library built on Docusaurus) and how I think it will be biggโ€ฆ
  continue reading
 
In this comprehensive episode of CISO Tradecraft, host G Mark Hardy sits down with Christian Hyatt, author of 'The Security Team Operating System'. Together, they delve into the five essential components needed to transform your cyber security team from reactive to unstoppable. From defining purpose and values to establishing clear roles, rhythms, โ€ฆ
  continue reading
 
Hot on the heels of Bugcrowd recently achieving Unicorn status, following their recent USD $102 million fund raise, Bugcrowd's CEO Dave Gerry and founder and Chief Strategy Officer, Casey Ellis outline Bugcrowdโ€™s vision for the future and plans for growth and expansion throughout the Asia Pacific region in 2024/5 and beyond. Dave Gerry has been in โ€ฆ
  continue reading
 
Prior to Joining Seaco as CIO, Damian Leach held the position of Chief Technology Officer for Workday Asia Pacific and Japan. Prior to his CTO position at Workday Damian spent 13 years in the Banking and Finance industry in Global Technology roles, most recently working for Standard Chartered Bank based in Singapore. Damian led the Digital Transforโ€ฆ
  continue reading
 
A reputable human systems engineer and PhD candidate, Lisa Flynnโ€™s background encompasses launching technology startups and C-suite executive roles. Her expertise spans information systems, business models, psychology, marketing, and entrepreneurship, all foundational to cognitive security advancements. We examined the dual-edged nature of AI, addrโ€ฆ
  continue reading
 
Join host G Mark Hardy in this episode of CISO Tradecraft as he welcomes Olivia Rose, an experienced CISO and founder of the Rose CISO Group. Olivia discusses her journey in cybersecurity from her start in marketing to becoming a VCISO. They delve into key topics including the transition from CISO to VCISO, strategies for managing time and stress, โ€ฆ
  continue reading
 
In cybersecurity, manual processes such as using spreadsheets for application security are becoming increasingly inadequate. These traditional methods are time-consuming and error-prone and struggle to scale with the growing volume of threat sophistication. Automation, particularly in Software Composition Analysis (SCA), is a beacon of hope in the โ€ฆ
  continue reading
 
Today weโ€™re talking about eating the security dog food โ€“ specifically: Satisfying critical security control #1 Using the Atlassian family of tools to create a ticketing/change control system and wrap it into an asset inventory Leveraging Wazuh as a security monitoring system (with eventual plans to leverage its API to feed Atlassian inventory data)โ€ฆ
  continue reading
 
Cybersecurity has a complexity problem. A tangled web of technical, psychological, economic and geopolitical factors enable and motivate malicious actors. Michael Daniel, CEO and president of the Cyber Threat Alliance, is helping public and private organizations decode these complex motivations with information sharing, including the Ransomware Tasโ€ฆ
  continue reading
 
Understanding Cybersecurity Compliance: PCI DSS 4.0, NIS2, and DORA Directives Explained Compliance with cybersecurity standards is essential for any organisation to protect sensitive information, maintain customer trust, and mitigate the risks associated with data breaches and cyber threats. Adhering to recognized frameworks and regulations, not oโ€ฆ
  continue reading
 
In this conversation, Kyser Clark interviews Mike Finkel, a penetration tester, about his background and experiences in the cybersecurity field. They discuss certifications, the importance of customer service skills in pentesting, and the role of AI in the industry. Mike shares his hot take on AI, expressing his excitement for its potential in pentโ€ฆ
  continue reading
 
Who knew that improv could revolutionise your cybersecurity strategies? Imagine your team, prepared and ready, responding to threats with the quick wit and adaptability of seasoned improvisers! Communication and collaboration are the secret sauce of robust cybersecurity. Improv supercharges team communication and cranks up problem-solving skills toโ€ฆ
  continue reading
 
In this episode of CISO Tradecraft, host G Mark Hardy continues an in-depth discussion with cybersecurity attorney Thomas Ritter on the legal considerations for cybersecurity leaders. The episode touches on essential topics such as immediate legal steps after a data breach, the importance of using correct terminology, understanding attorney-client โ€ฆ
  continue reading
 
Hi, todayโ€™s tale of pentest pwnage covers a few wins and one loss: A cool opportunity to drop Farmer โ€œcropsโ€ to a domain adminโ€™s desktop folder via PowerShell remote session Finding super sensitive data by dumpster-diving into a stale C:\Users\Domain-Admin profile Finding a vCenter database backup and being unable to pwn it using vcenter_saml_loginโ€ฆ
  continue reading
 
In this conversation, George Raileanu discusses the importance of mentoring, strategies for finding a mentor, and the benefits of building a strong network in cybersecurity. He also shares advice on continuous learning, dealing with imposter syndrome and burnout, and the value of paying it forward in the industry. Connect with George Raileanu on Liโ€ฆ
  continue reading
 
Podcasts are revolutionising how we raise awareness about cybersecurity. They offer an interactive and engaging way to bring essential topics like AI, zero trust, and the human element into everyday conversations. By breaking down these complex issues into relatable and exciting discussions, podcasts make cybersecurity accessible and understandableโ€ฆ
  continue reading
 
In this episode of CISO Tradecraft, host G Mark Hardy interviews cybersecurity lawyer Thomas Ritter. They discuss key legal topics for CISOs, including regulatory compliance, managing third-party risk, responding to data breaches, and recent legislative impacts. Thomas shares his journey into cybersecurity law and provides practical advice and realโ€ฆ
  continue reading
 
Today's episode is a little different. We have the opportunity to speak to the host of ITPodcast.Club, available on major podcasting platforms and who is in their last year of university. This episode is a bit longer around 30 minutes, but Alwin and I talk about a few topics including, paid and free learning resources, how we learn, entry level worโ€ฆ
  continue reading
 
Hey friends, weโ€™re doing a little departure from our normal topics and focusing on how to create a security knowledgebase (is that one word or two?) using Docusaurus! Itโ€™s cool, itโ€™s free, itโ€™s from Meta and you can get up and going in just a few commands โ€“ check out their getting started guide to get rockinโ€™ in about 5 minutes. Important files incโ€ฆ
  continue reading
 
In this episode of ๐‚๐ฒ๐›๐ž๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ž๐ฒ๐จ๐ง๐ ๐๐ž๐ง๐ญ๐ž๐ฌ๐ญ๐ข๐ง๐ , we have ๐ƒ๐ข๐ฏ๐š๐ค๐š๐ซ ๐๐ซ๐š๐ฒ๐š๐ ๐š joining us as a guest. Divakar is a seasoned leader with nearly two decades of robust experience managing cyber risks across different business functions. He has built cyber defence capability ground up 5 times hiring & nurturing high-performance teams for Banking & Fintecโ€ฆ
  continue reading
 
Anand Prakash on cloud security startups and next-gen hacking Anand Prakash, founder of startup PingSafe, shares his insights on building a successful cybersecurity business and his experience as a top bug bounty hunter. He emphasizes the importance of fast execution, accountability and learning from mistakes when growing the company acquired by Seโ€ฆ
  continue reading
 
Kyser Clark and Kristopher Johnson's conversation covers various topics related to offensive security, certifications, career progression, and distinguishing between vulnerability assessments and penetration tests. Kristopher shares his journey into offensive security, his challenges, and the importance of continuous learning and perseverance. The โ€ฆ
  continue reading
 
Emotional Intelligence for Cybersecurity Leaders | CISO Tradecraft In this episode of CISO Tradecraft, host G Mark Hardy delves into the essential topic of emotional intelligence (EI) for cybersecurity leaders. He explores the difference between IQ and EI, the origins and significance of emotional intelligence, and its impact on leadership effectivโ€ฆ
  continue reading
 
In this interview at SINCON 2024, Dr. Joshua James, a Regional Counter Cyber Crime Coordinator for the United Nations Office on Drugs and Crime (UNODC), shared his insights on the Regional Counter-cybercrime programme at UNODC. Dr. James argued that while law enforcement agencies are getting better at responding to cybercrime, the cyber criminals aโ€ฆ
  continue reading
 
Loading …

Quick Reference Guide