show episodes
 
Coffee Pods is a podcast designed to fuel your difference by by opening up access to the insights, stories and experiences of remarkable people, who've marched to the beat of their own drum and created a positive butterfly effect in their wake. We believe that in the mere amount of time it takes to have a cup of coffee with someone we can learn from a lifetime of experience. So, come have a coffee break with us, and get the inspirational fuel and practical toolkit you need to be the change y ...
 
The Virgin Disruptors Podcast is a melting pot for disruptive thinking, designed to inspire, provoke and activate change in the world of business and beyond. Presented by Holly Ransom, the show features a series of talks from influential entrepreneurs, who like Richard Branson, share a ‘screw it, let's do it’ attitude - pushing themselves to create change in areas of purpose, performance, people and planet. Whether you’re an entrepreneur, an individual, or an organisation, this series is pac ...
 
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
 
Loading …
show series
 
This week, on our launch episode of the #bornglobal Coffee Pods series, we are joined by NASA's Dr Abigail Allwood as she lands the Perseverance Rover on Mars in real-time. Come behind-the-scenes in a personal interview with this Australian trailblazer. Dr Abigail Allwood is not only the first Australian but the first female to lead a Mars mission!…
 
Generally when you think of eCommerce attacks you probably think of theft of personal information and payment cards, when in fact there are many ways a hacker could attack your online store. Holly Grace discusses the most common threats to eCommerce businesses, and a few you may not have considered before!Key points:0'47 CIA - Confidentiality, Inte…
 
Is your online store ready for Black Friday and Christmas shopping? Have you considered how automated bots, fake reviews, plugins and a data breach could wreak havoc over the busiest shopping period of the year? This podcast is a perfect starting point for eCommerce businesses wanting to secure their business ahead of the mad rush!0'52 Preventing t…
 
This month there has been a lot going on in the world of cybersecurity. With major IT firm Sopra Steria getting hit by a cyberattack, Apple paying out over $250,000 to a team of bug hunters for finding 55 vulnerabilities in Apple systems, as well as the USA indicting 6 Russian Intelligence Officers for a range of attacks such as attacks against the…
 
Threat modelling is broader than just security, and DevSecOps is more than just secure code. Application Security Advocate, Alyssa Miller talks passionately about the importance of a collaborative approach to security, where implementing a culture of building efficiently and understand security as you go, can help with getting ahead of the game.0'2…
 
Mobile Device Management increases security, reduces risk and plays an important role in Government certified assurance models. Holly Grace discusses the role of device management for Cyber Essentials, and the challenges that come with employees using their own devices at work.Key points:1'08 What is Mobile Device Management (MDM)?3'05 Device Manag…
 
We speak to fellow co-worker and Senior Security Consultant at Secarma, Joe Thorpe, who specialises in app testing. He gives us the low down on hacking mobile apps, how they're similar to web apps, which vulnerabilities are most common and how to choose the right testing for your mobile app. Key points:0'43 What is mobile application testing?3'43 S…
 
In September's Month in Review, Holly Grace is delighted to announce that this month's hacks aren't just all about ransomware! From political motivation to notoriety, she discusses the different kind of motives a hacker may have, and the kind of attacks they might use to get what they want.Key Points: 0'55 Financially Motivated: KuCoin Hack3'07 Ins…
 
There's more to firewalls than simply installing them and leaving them to it! WatchGuard's Senior Sales Engineer Martin Lethbridge, joins Holly Grace Williams to discuss common firewall misconceptions, and how to get the most out of your firewall to ensure your organisation is safe. 0'22 Guest introduction 2'10 Firewall misconceptions - they aren't…
 
Although perimeter breaking vulnerabilities are quite rare they're certainly not unheard of - Firewalls aren't perfect systems and they can have vulnerabilities too. In this week's episode, Holly Grace looks at some previous critical vulnerabilities in firewalls and tries to highlight some key lessons learned.4'37 The firewall vulnerability 'BEIGNC…
 
Our latest 'Intro' podcast takes a look at Firewall Security. Holly discusses different types of firewalls, the importance of network segmentation and Firewall Configuration Security Reviews, and how firewalls are targeted during a pentest.1'30 How firewalls are they targeted during a Penetration Test?8'29 Network segmentation11'08 How threat actor…
 
From bribery to bug bounties! In August's Month in Review podcast, Holly Grace discusses the failed social engineering attack on a Tesla employee, and the uproar off the back of Slack's minimal payout to a researcher for a critical security bug. Key points:1'20 The failed social engineering attack against Tesla3'05 How to test your organisation aga…
 
Whilst Secarma perform Penetration Testing which is in-depth approach to security testing, organisations can get additional assurance through ongoing automated security scanningNick Blundell, AppCheck's Head of R&D, joins us on our podcast to discuss how vulnerability scanners work, their pros and cons, and how they compliment Penetration Testing t…
 
The OWASP Top 10 is a list of the 10 most common web application vulnerabilities. This podcast provides an introduction to this awareness document, and why it's so beneficial to organisations and their journey to better security.Key Points:1'00 Who are the Open Web Application Security Project?2'18 What is the OWASP Top 10?7'55 The current OWASP To…
 
This podcast provides an excellent introduction to vulnerability scanning, covering how it works and what it tests. It discusses the benefits of vulnerabilities scanning and how alongside penetration testing, can provide an organisation with a more continuous testing model.Key points:1’34 What is vulnerability scanning?2’16 What does vulnerability …
 
In July it was revealed that travel company CWT paid $4.5 million in ransom to cyber criminals. Whilst shocking, ransomware is unfortunately not new and not uncommon. Secarma’s MD, Holly Grace Williams, discusses why ransomware is such a popular option for cyber criminals and how companies can prepare for potential attacks with incident response tr…
 
After a brief break, the Hacked Off Podcast is back! If you missed our MD’s Trusted Tech Talks webinar last week, Holly Grace Williams summarises the key points of her presentation, Encryption isn’t Magic: Hackers Can Break It. She discusses why encryption is a little more complex than being on or off and the importance of configuring it correctly.…
 
Generations hang in the balance right now, as churches decide how to proceed past religious traditions into the true call of revealing the Bride of Christ. You can have a red hot relationship with God today and experience a complete change from the inside out. It's not a time to simply play church. The remnant is rising!Celebrate your freedom by go…
 
We are not only united with Jesus in his death, burial, and resurrection; We are also united with Him in ascension and being seated in heavenly places. We have access to the heavenly realm now, and creation is groaning for heaven to invade earth. Repentance brings us into the change of vision/mindset required to lay hold of the Kingdom of God that …
 
In today's episode we talk about penetration testing realism versus efficiency, and why sometimes aiming for a security test that exactly matches the options available to criminals isn't always possible and why sometimes it isn't always desirable. It's all about the context.Key points:1'05 The motiviation behind an assessment is key2'10 When realis…
 
Privacy is a right and it is important to protect that right, but operational security it hard. Mike Jones joins us again to talk all things OpSec and we cover some things to check to make sure your privacy is protected.Key Points:1'30 Why is Privacy important?4'20 Photos, GPS and Geotagging10'15 Social Media settings12'15 Removable Media14'15 Comm…
 
In today's episode we talk about incentivising your Security Team and making sure that the defensive team are getting praise for a job well done. As well as noting that the red team's job isn't over when they find a high impact vulnerability.Key Points:0'49 There's more to staff retention than bonuses1'40 The problem of the romanticisation of the r…
 
Adam Louca joins us today to talk about how to get the most out of security products, and how to cut through the marketing to find out what works for you!Key Points:0'30 What is a technologist?2'05 Why do we have to cut through vendor noise?4'21 How you can determine the truth of products9'25 Planning for the unknown12'00 How to know products are w…
 
Kevin Fielder joins us today discussing building security and building security teams. We talk risk appetite, balancing likelihood and impact, and team culture!1'20 Where to start4'00 Risk Appetite and moving quickly11'13 Balancing appetite, likelihood and impact15'15 Keeping the security team happy18'45 Team Culture25'45 Team Development and build…
 
Mike Jones is a former member of anonymous, a former confidential informant, and is here to talk about building better security. We talk about everything from Cyber Prevent programmes to help people avoid becoming cyber criminals to becoming a better penetration tester.01'12 Working with Anonymous03'25 Meeting with the Suits04'18 Working as a Confi…
 
Many security guides out there presume that you're implementing security on an existing system or an existing product; look at what has been missed and improving things incrementally - but what if you're building something completely new? If it's a new product or a new company, things can be a different.When you're struggling with security many exp…
 
What do you do when a pandemic hits and you are forced to send your entire workforce to work from home? Is your business ready for the technical and security risks that comes with that? What have you missed?COVID-19 is presenting organisations with new challenges and testing their business continuity plans. Holly Grace Williams talks about these ch…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login