Artwork

Content provided by Troy Vermillion. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Troy Vermillion or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Hackers Beware: These Shocking Cybersecurity Tactics are Revolutionizing the Game! | Ep. 15

44:55
 
Share
 

Manage episode 356009532 series 3402200
Content provided by Troy Vermillion. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Troy Vermillion or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In this week's episode, we will discuss some of the most shocking cyber-security tactics that are revolutionizing the game.
From hacking voting machines to taking down critical infrastructure, these tactics leave governments and businesses reeling!
If you're looking to stay ahead of the curve in the cyber-security game, then you need to be aware of these new tactics that take a proactive approach to cyber to expose threats before the bad guys do.
By watching this week's episode, you'll have a better idea of what ways you can approach your cyber defense to minimize potential gaps in your defensive measure and protect yourself and your business from hackers who are looking to exploit any vulnerability they can find. Stay safe out there!
Thanks for joining us today!
Host: Troy Vermillion - Host at WHAT THE TECH PODCAST
https://www.troyvermillion.com
https://www.linkedin.com/in/troyvermillion
Guest: Luke Secrist - CEO at BuddoBot
https://buddobot.com/
https://www.linkedin.com/in/lukesecrist/
My Equipment:
🎙️𝗦𝗵𝘂𝗿𝗲 𝗠𝗩𝟳 𝗨𝗦𝗕 𝗠𝗶𝗰𝗿𝗼𝗽𝗵𝗼𝗻𝗲: https://amzn.to/3LeJslZ
💡𝗡𝗘𝗘𝗪𝗘𝗥 𝟳𝟬𝟬𝗪 𝗘𝗾𝘂𝗶𝘃𝗮𝗹𝗲𝗻𝘁 𝗦𝗼𝗳𝘁𝗯𝗼𝘅 𝗟𝗶𝗴𝗵𝘁𝗶𝗻𝗴 𝗞𝗶𝘁: https://amzn.to/3YGL6A5
🦾 𝙄𝙓𝙏𝙀𝘾𝙃 𝘽𝙤𝙤𝙢 𝘼𝙧𝙢: https://amzn.to/3Ta28pi
🎥 𝗟𝗼𝗴𝗶𝘁𝗲𝗰𝗵 𝗕𝗥𝗜𝗢 𝗨𝗛𝗗 𝟰𝗞 𝗪𝗲𝗯𝗰𝗮𝗺: https://amzn.to/3FeEjH8
🔌𝗷𝟱𝗰𝗿𝗲𝗮𝘁𝗲 𝟳-𝗣𝗼𝗿𝘁 𝗣𝗼𝘄𝗲𝗿𝗲𝗱 𝗨𝗦𝗕 𝟯.𝟬 𝗗𝗮𝘁𝗮 𝗛𝘂𝗯: https://amzn.to/3J0Q2d6
My Platforms:
🎥 Recording: 𝗥𝗶𝘃𝗲𝗿𝘀𝗶𝗱𝗲.𝗳𝗺 - http://bit.ly/3YyOsFn
🌐 Video Creation and SEO: 𝗩𝗶𝗱𝗜𝗤 - http://bit.ly/3YMh2mQ
🎙️ Podcast Platform: 𝗕𝘂𝘇𝘇𝘀𝗽𝗿𝗼𝘂𝘁 - http://bit.ly/3ZZUMGO
----------------------------
And if you're interested in being on the show, please meander below and email me.
𝗔𝗯𝗼𝘂𝘁 𝗧𝗿𝗼𝘆 -- Hi, I help my clients expose hidden profits in their bloated employee healthcare plans, often saving them 15% or more. Think you're paying too much for healthcare? Let's talk!
Hard to believe? No worries, 𝗹𝗲𝘁 𝗺𝗲 𝘀𝗵𝗼𝘄 𝘆𝗼𝘂 what might have been missed. Ask me about your complimentary underwriter review, and connect with me below. ↓
Email: troy@troyvermillion.com
Newsletter: https://sendfox.com/lp/1k7654
* Disclaimer: The postings on this channel are my own and do not necessarily reflect the views of USI. Any companies, vendors, or individuals featured on the podcast or social media pages are independent references only that have not been vetted or endorsed by USI.
#hacking #hacker #threatemulation #cyberattack #cybersecurity #cyberstrategies #cyber #security #cybercriminals #business #databreach #databreaches #adversaryemulation #emulation #persistantadversaryemulation #ethical #penetrationtesting

  continue reading

57 episodes

Artwork
iconShare
 
Manage episode 356009532 series 3402200
Content provided by Troy Vermillion. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Troy Vermillion or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

In this week's episode, we will discuss some of the most shocking cyber-security tactics that are revolutionizing the game.
From hacking voting machines to taking down critical infrastructure, these tactics leave governments and businesses reeling!
If you're looking to stay ahead of the curve in the cyber-security game, then you need to be aware of these new tactics that take a proactive approach to cyber to expose threats before the bad guys do.
By watching this week's episode, you'll have a better idea of what ways you can approach your cyber defense to minimize potential gaps in your defensive measure and protect yourself and your business from hackers who are looking to exploit any vulnerability they can find. Stay safe out there!
Thanks for joining us today!
Host: Troy Vermillion - Host at WHAT THE TECH PODCAST
https://www.troyvermillion.com
https://www.linkedin.com/in/troyvermillion
Guest: Luke Secrist - CEO at BuddoBot
https://buddobot.com/
https://www.linkedin.com/in/lukesecrist/
My Equipment:
🎙️𝗦𝗵𝘂𝗿𝗲 𝗠𝗩𝟳 𝗨𝗦𝗕 𝗠𝗶𝗰𝗿𝗼𝗽𝗵𝗼𝗻𝗲: https://amzn.to/3LeJslZ
💡𝗡𝗘𝗘𝗪𝗘𝗥 𝟳𝟬𝟬𝗪 𝗘𝗾𝘂𝗶𝘃𝗮𝗹𝗲𝗻𝘁 𝗦𝗼𝗳𝘁𝗯𝗼𝘅 𝗟𝗶𝗴𝗵𝘁𝗶𝗻𝗴 𝗞𝗶𝘁: https://amzn.to/3YGL6A5
🦾 𝙄𝙓𝙏𝙀𝘾𝙃 𝘽𝙤𝙤𝙢 𝘼𝙧𝙢: https://amzn.to/3Ta28pi
🎥 𝗟𝗼𝗴𝗶𝘁𝗲𝗰𝗵 𝗕𝗥𝗜𝗢 𝗨𝗛𝗗 𝟰𝗞 𝗪𝗲𝗯𝗰𝗮𝗺: https://amzn.to/3FeEjH8
🔌𝗷𝟱𝗰𝗿𝗲𝗮𝘁𝗲 𝟳-𝗣𝗼𝗿𝘁 𝗣𝗼𝘄𝗲𝗿𝗲𝗱 𝗨𝗦𝗕 𝟯.𝟬 𝗗𝗮𝘁𝗮 𝗛𝘂𝗯: https://amzn.to/3J0Q2d6
My Platforms:
🎥 Recording: 𝗥𝗶𝘃𝗲𝗿𝘀𝗶𝗱𝗲.𝗳𝗺 - http://bit.ly/3YyOsFn
🌐 Video Creation and SEO: 𝗩𝗶𝗱𝗜𝗤 - http://bit.ly/3YMh2mQ
🎙️ Podcast Platform: 𝗕𝘂𝘇𝘇𝘀𝗽𝗿𝗼𝘂𝘁 - http://bit.ly/3ZZUMGO
----------------------------
And if you're interested in being on the show, please meander below and email me.
𝗔𝗯𝗼𝘂𝘁 𝗧𝗿𝗼𝘆 -- Hi, I help my clients expose hidden profits in their bloated employee healthcare plans, often saving them 15% or more. Think you're paying too much for healthcare? Let's talk!
Hard to believe? No worries, 𝗹𝗲𝘁 𝗺𝗲 𝘀𝗵𝗼𝘄 𝘆𝗼𝘂 what might have been missed. Ask me about your complimentary underwriter review, and connect with me below. ↓
Email: troy@troyvermillion.com
Newsletter: https://sendfox.com/lp/1k7654
* Disclaimer: The postings on this channel are my own and do not necessarily reflect the views of USI. Any companies, vendors, or individuals featured on the podcast or social media pages are independent references only that have not been vetted or endorsed by USI.
#hacking #hacker #threatemulation #cyberattack #cybersecurity #cyberstrategies #cyber #security #cybercriminals #business #databreach #databreaches #adversaryemulation #emulation #persistantadversaryemulation #ethical #penetrationtesting

  continue reading

57 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide