Best Pentesting podcasts we could find (Updated June 2018)
Related podcasts: Security Computersecurity Informationsecurity Regulatory Owasp Compliance Cissp Cisa Application Privacy Healthcare Legal Podcasts Web Technology Tech Podcasting Education Business Whitelisting  
Pentesting public [search 0]
show episodes
 
Quality Management consultant Warren Alford discusses topics such as Quality Management Systems (QMS) for products and services (hardware and software), Cyber Security, Quality Principles, ISO 9001 2015, Risk Management, Quality Tools, Process Improvement, Lean Six Sigma, Supply Chain Management, and Quality Auditing. Look for this podcast in the iTunes Store.
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
S
Securit13 Podcast
Monthly
 
Первый украинский подкаст об информационной безопасности
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
A podcast all about the world of Security, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security Professionals need to know, or refresh the memories of the seasoned veterans.
 
H
Hacker Dialogues
Rare
 
Hacker Dialogues is podcast where pentesters, hackers, blue teamers, and other miscreants join together to chat about breaking things, tell tales from the road, or bring up anything else that might spark an interest. It is hosted by Beau Bullock (@dafthack) and Derek Banks (@0xderuke). There are no scripts, no schedule, and will hopefully not be a complete waste of your time.
 
Drew Green (pentester and IT manager) and Sam Blevins (IT manager and security enthusiast) meet weekly to discuss the latest in security news, penetration testing, defensive security, best practices, hacking, and more. A podcast devoted to all aspects of information security, in a way that non-security pros can understand. Security TL;DR is sponsored by G-Factor Security, a security services firm headquartered in Raleigh, NC.
 
Loading …
show series
 
1. Pentesting vs Red Team – Where’s the line? 2. CCDC (College Cyber Defense Competition). - PCDC (Palmetto Cyber Defense Competition).4. Password Managers – To be or Not to be, a good thing?5. PWN2OWN competition. - China prevents InfoSec researchers from participating in tournaments.
 
In this episode Andy Davis talks to Killian Faughnan, the CISO at Interoute. They discuss the makeup of a typical security team. Killian tells Andy about how he stays ahead of security threats. Andy asks Killian about his responsibilities and why he chose to do an MBA.Killian is an information and cyber security professional with a background i ...…
 
A Peerlyst Peertalk podcast on API Security with industry experts.Show notes for this Peerlyst Information Security Peertalk:This podcast is about API Security, the participants were:Nicole Becher Pentester, Cyber Policy Enthusiast, Adjunct Faculty @ NYU, and member of the OWASP Brooklyn Chapter Leader, and New America Cyber FellowBernhard Harg ...…
 
DevOpsDays Chicago 2017 - Automating myself out of a job - A pentesters guide to left shifting security testing by Jahmel HarrisThe security industry works best with a waterfall approach to development and has not keep up with modern methodologies. This talk will look at tools and techniques to shift security testing left so software can be rel ...…
 
JOHANNESBURG — For years, South African Haroon Meer worked as a renowned ethical hacker, being paid by companies to run so-called 'pen' tests (penetration tests) on their networks to determine their vulnerabilities. It's a job that he relished in, but he soon began to realise that pen tests weren't necessarily completely safeguarding companies. ...…
 
JOHANNESBURG — For years, South African Haroon Meer worked as a renowned ethical hacker, being paid by companies to run so-called 'pen' tests (penetration tests) on their networks to determine their vulnerabilities. It's a job that he relished in, but he soon began to realise that pen tests weren't necessarily completely safeguarding companies. ...…
 
This is the inaugural episode of Hacker Dialogues. In this episode we talk about Bluetooth base lining, zip bombs, 2FA and password spraying, starting your own pentest company, and how the cloud is really just somebody else's system. Hacker Dialogues is podcast where pentesters, hackers, blue teamers, and other miscreants join together to chat ...…
 
In this talk, I will present a new version of my tool Tinfoleak, the most complete OSINT open-source tool for Twitter. I will show real examples of how to exploit the information in social networks for investigative tasks. The goal is to see, what kind of information can be extracted about a person or a location, and the purpose with which it c ...…
 
In this talk, I will present a new version of my tool Tinfoleak, the most complete OSINT open-source tool for Twitter. I will show real examples of how to exploit the information in social networks for investigative tasks. The goal is to see, what kind of information can be extracted about a person or a location, and the purpose with which it c ...…
 
Your pentesting goal: getting the data. You decide to do it physically. How to go about?#PhysicalSecurityabout this event: https://c3voc.de
 
Your pentesting goal: getting the data. You decide to do it physically. How to go about?#PhysicalSecurityabout this event: https://c3voc.de
 
Detecting a breach is hard, detecting someone who targets your network specifically is even harder. As pentesters, we notice that we often remain undetected and breaching an infrastructure via an external server generally goes unnoticed. However, indications of our breach could definitely have been picked up, we could have been detected. So, wh ...…
 
Detecting a breach is hard, detecting someone who targets your network specifically is even harder. As pentesters, we notice that we often remain undetected and breaching an infrastructure via an external server generally goes unnoticed. However, indications of our breach could definitely have been picked up, we could have been detected. So, wh ...…
 
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-023-Jay_Beale-selinux-apparmor-securing_lxc.mp3 Jay Beale works for a pentest firm called "Inguardians", and has always been a fierce friend of the show. He's running a class at both BlackHat and Defcon all about hardening various parts of the Linux OS. This week, we discuss some of t ...…
 
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-023-Jay_Beale-selinux-apparmor-securing_lxc.mp3 Jay Beale works for a pentest firm called "Inguardians", and has always been a fierce friend of the show. He's running a class at both BlackHat and Defcon all about hardening various parts of the Linux OS. This week, we discuss some of t ...…
 
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-023-Jay_Beale-selinux-apparmor-securing_lxc.mp3 Jay Beale works for a pentest firm called "Inguardians", and has always been a fierce friend of the show. He's running a class at both BlackHat and Defcon all about hardening various parts of the Linux OS. This week, we discuss some of t ...…
 
Doug and Russ talk about the difference in 4 pentesting certs that are very popular. Full Show Notes: https://wiki.securityweekly.com/SDL_episode22 Visit Our Website: securedigitallife.com
 
Doug and Russ talk about the difference in 4 pentesting certs that are very popular. Full Show Notes: https://wiki.securityweekly.com/SDL_episode22 Visit Our Website: https://www.securedigitallife.com
 
I was pleasantly surprised to see a Wordpress site fall into a pentest scope this past week. One helpful tool to get familiar with when attacking Wordpress sites is wpscan, which is built right into Kali - or you can grab it from GitHub. Get familiar with the command line flags as they can help you conduct a more gentle scan that recovers from ...…
 
What should we consider while building an internal penetration testing team? Would you still need external pen tests? Paul and John discuss the pros and cons! Full Show Notes: https://wiki.securityweekly.com/ES_Episode48 Visit http://securityweekly.com/esw for all the latest episodes!
 
Welcome to week 2 of our Planner Series! Today, we are talking with Helen Colebrook from Journal with Purpose and how she uses her Bullet Journal to plan her days. When I first found Helen on Instagram, I was completely enamored of her simple layout style, the way she combined work with home and her blog post on Using Your Bullet Journal to Get ...…
 
The O’Reilly Security Podcast: Key preparation before implementing a vulnerability disclosure policy, the crucial role of setting scope, and the benefits of collaborative relationships. In this episode, I talk with Kimber Dowsett, security architect at 18F. We discuss how to prepare your organization for a vulnerability disclosure policy, the b ...…
 
I know what you're thinking, Node.js is server-side right? Not exactly. It turns out many client-side applications have embedded Node.js. And its not always updated to the latest version. And, its vulnerable to attacks! Moses Hernandez is a Consulting Systems Engineer for Cisco Systems and an Instructor for pen testing courses at the SANS Insti ...…
 
In Episode 242, want and need, packing to travel, 10 tips for working with ballpoint ink, the Obsessive Consumption book, and more.
 
Intro I mentioned last week that I was speaking at the Secure360 conference here in the Twin Cities, and at that time I was preparing a talk called Pentesting 101: No Hoodie Required. I was so nervous that I've basically spent the last week breathing heavily into paper bags and wishing I was on sedatives. But I have good news to report in today ...…
 
The nervous butterflies are chewing up my organs this week. Why? Because I'm speaking at Secure360 next Tuesday and Wednesday. I'm trying to build a presentation that: Appeals to both techie nerds like me, as well as regular human people Strikes a healthy balance between fun and informative So, my outline is roughly as follows: Intros Lets talk ...…
 
Google login Twitter login Classic login