show episodes
 
B
BarCode

1
BarCode

Chris Glanden

Unsubscribe
Unsubscribe
Monthly+
 
Cybersecurity with 1337% ABV. BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. Due to COVID-19 restrictions, most bars are limited or closed for on-prem service. Therefore, each episode will feature Tony, a virtual bartender who wi ...
 
Join hacker maker Phillip Wylie and his guests as they discuss and unveil the “secrets” of professional hacking — a mysterious, intriguing, and often misunderstood occupation, even by those in the field of cybersecurity. With the rising need for professional hackers, those entering the infosec world are drawn to it, and understandably so — it is an exciting and fascinating career. Still, it sure has nothing to do with magic. Join these conversations to discover what the role entails, the dif ...
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
The Open Web Application Security Project (OWASP) is a 501(c)(3) worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations are able to make informed decisions. OWASP is in a unique position to provide impartial, practical information about AppSec to individuals, corporations, universities, government agencies, and other organizations worldwide. Operating as a communit ...
 
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
 
Join an all-star cast — including Dan DeCloss and Shawn Scott from PlexTrac, Paul Asadoorian and Tyler Robinson from Security Weekly, and Bryson Bort from SCYTHE — for a podcast mini-series focused on getting the real work done in cybersecurity. These four episodes will consider the perspectives of red, blue, and purple teamers alike in tracking signal through the noise to identify and prioritize the right things. Additionally, we’ll show off how PlexTrac empowers all types of security pros ...
 
Interviews with Hackers around the conference CypherCon, Milwaukee Wisconsin's hacker con. Explore interviews with community hackers involved with or around CypherCon, Wisconsin’s Hacker Conference. CypherCon attracts over 1000 attendees every Spring in Milwaukee, Wisconsin.
 
This webinar series was created to share stories of how the most recent cybersecurity professionals are breaking into the industry. We hope this helps you in your quest to break into cybersecurity as well. Connect with Renee Small on LinkedIn https://www.linkedin.com/in/reneebrownsmall/ Connect with Christophe Foulon on LinkedIn https://www.linkedin.com/in/christophefoulon/ Find out more about CPF-Coaching at https://cpf-coaching.com Develop Your Cybersecurity Career Path: How to Break into ...
 
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
 
I
ITSPmagazine

4
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cyber security tips, tools, and more in the Alias Secure AF Cyber Security Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cyber security topics with coworkers and special guests. No matter where you are on the cyber security knowledge ladder, there's an episode here for you.
 
G
Getting Into Infosec

1
Getting Into Infosec

Ayman Elsawah (@coffeewithayman)

Unsubscribe
Unsubscribe
Monthly
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
Loading …
show series
 
In part one of this two-part series, Heather chats with two of Hurricane Labs' pentesters about the Log4Shell vulnerability. Also, make sure to check out some of the articles and resources mentioned during this episode: Log4Shell Everywhere Log4Shell Detection with ZAP Two Nmap NSE scripts: NSE Log4Shell Other NSE Hurricane Labs' SOC Talk: IoT and …
 
Jacob Scheetz shares his story, education experience, and advice on becoming a pentester. Jacob took the college route to get into cybersecurity, a not so common route for pentesters. A career in cybersecurity wasn't his original path, his plans were to be an EMT. Jacob desired a career in cybersecurity and became a pentester. _____________________…
 
Happy new year friends! Today I share the good, bad, ugly, and BROKEN things I've come across while migrating our Light Pentest LITE training lab from on-prem VMware ESXi to Azure. It has been a fun and frustrating process, but my hope is that some of the tips in today's episode will save you some time/headaches/money should you setup a pentesting …
 
Guest Links: https://www.linkedin.com/in/phillipwylie/ https://www.twitch.tv/thehackermaker https://www.youtube.com/c/PhillipWylie/ The Pentester Blueprint on Amazon Simply Cyber's mission is to help purpose driven professionals make and and take a cybersecurity career further, faster. 📱 Social Media LinkedIn: https://www.linkedin.com/in/geraldauge…
 
Welcome to the labs for Practical Malware Analysis & Triage. WARNING Read this carefully before proceeding. This repository contains live malware samples for use in the Practical Malware Analysis & Triage course (PMAT). These samples are either written to emulate common malware characteristics or are live, real world, "caught in the wild" samples. …
 
This week on Security Happy Hour we are discussing Social Engineering and Physical Pentesting. Tonight's guest is Cori B. Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production of the podcast and to provide our fellow warriors with meaningful connections and di…
 
In this episode, Phillip Wylie talks about his journey from pro wrestling to pentesting and what motivated him to start teaching, mentoring and giving back to the infosec community. It's an inspirational story for veterans in the field and newbies alike. Phillip not only talks about his work helping others get started in ethical hacking, but the va…
 
#CISOThursdays​: Breaking Into Cybersecurity with Anshu Gupta 01/20/22 It’s #CISOThursdays​​ @ 1pm eastern! Join us as we discuss recent news and hot topics in security. James Azar, CISO Talk podcast host & the crew are ready, as always, for a lively discussion. https://www.linkedin.com/in/anshuguptapmp/ About Breaking Into Cybersecurity: This seri…
 
Every moment of every day, we are using technologies that require we exchange personally identifiable information just to be able to use them. Have we lost the power of control for our personal data? Can we get it back? We discuss this highly complex societal and technological problem with author Dr. Carissa Véliz, using her book, Privacy is Power:…
 
Nicolas Chaillan, former Air Force Chief Software Officer, resigned from the DoD over frustrations with what he called a lack of innovation, collaboration and agility. He gets into those issues and talks about how the U.S. can invest more in technology to compete with China in artificial intelligence and cybersecurity. --------- Why you should list…
 
Adam Baldwin (@adam_baldwin) Amélie Koran (@webjedi) https://logging.apache.org/log4j/2.x/license.html https://www.theregister.com/2021/12/14/log4j_vulnerability_open_source_funding/ https://www.zdnet.com/article/security-firm-blumira-discovers-major-new-log4j-attack-vector/ F/OSS developer deliberately bricks his software in retaliation for big co…
 
Join us on this time travel adventure into the future with our friend Matthew Rosenquist. We share some laughs and a deep understanding of what will come in the cybersecurity arena in 2022. We discuss it all, from technology to politics and society to businesses. “Cybersecurity will continue to rapidly gain in both relevance and importance in 2022 …
 
Open source developer corrupts widely-used libraries, affecting tons of projects https://www.theverge.com/2022/1/9/22874949/developer-corrupts-open-source-libraries-projects-affected NPM libraries in question: https://github.com/Marak/colors.js https://github.com/marak/Faker.js/ Marek's post about no more free work: http://web.archive.org/web/20210…
 
After a few requests and considering the growth of the recently launchedITSPmagazine‘s YouTube Channel, we are now officially back on streaming the live recording of Through The TechVine with the camera on. We still like to consider this a Radio Program but with an added multimedia flavor. Apart from that, everything else is the usual Tech and Scie…
 
Breaking into Cybersecurity with Zinet Kemal (Legal Intern to Cloud Security Engineer) 1.14.22 Linkedin: https://www.linkedin.com/in/zinet-kemal/ About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry. Our specia…
 
Episode 30 - what a milestone! As always, this episode has an extra special guest, Josh Amishav-Zlatin. Josh Amishav is a founder, hacker, and podcast host. He started his career in cybersecurity nearly 20 years ago and today, he is an influencer and is focused on giving back to the community. Join us for an interesting conversation around CTI, eme…
 
Jacob Scheetz shares his story, education experience, and advice on becoming a pentester. Jacob took the college route to get into cybersecurity, a not so common route for pentesters. A career in cybersecurity wasn't his original path, his plans were to be an EMT. Jacob desired a career in cybersecurity and became a pentester. _____________________…
 
Are all your decisions, actions, and efforts what defines you, or can you reinvent yourself? If you have always been a stay-at-home parent, an accountant, or even an Offensive Security professional, does that mean thats all you can be? are you pigeon-holed? Guest Links: https://thehauntedhacker.com/ https://twitter.com/H4unt3dH/ https://www.youtube…
 
#CISOThursdays​: Breaking Into Cybersecurity + Alan Alford 01/12/22 It’s #CISOThursdays​​ @ 1pm eastern! Join us as we discuss recent news and hot topics in security. James Azar, CISO Talk podcast host & the crew are ready, as always, for a lively discussion. Today's guest is Alan Alford! About Breaking Into Cybersecurity: This series was created b…
 
This week on Security Happy Hour we are celebrating Cyber Warrior's Birthday and also talking about Pivoting in Your Career & the Cybersecurity Student Experience. Today's special guest is Marie Twitter: https://www.twitter.com/ScorpVayne Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes d…
 
Today's episode is all about Brute Ratel, a command and control center that is super cool, quick to setup, and much easier to use (IMHO) than Cobalt Strike. I also talk specifically about some of my favorite command line features, how slick and simple lateral movement is, and the "killer feature" that makes me giggle like the bad guy from Sonic the…
 
Adam Baldwin (@adam_baldwin) Amélie Koran (@webjedi) Log4j vulnerability https://logging.apache.org/log4j/2.x/license.html https://www.theregister.com/2021/12/14/log4j_vulnerability_open_source_funding/ https://www.zdnet.com/article/security-firm-blumira-discovers-major-new-log4j-attack-vector/ F/OSS developer deliberately bricks his software in re…
 
Regina Bluman is an infosec professional who previously worked in IT Marketing for almost a decade, before leaving the dark side and moving across! She is an experienced panelist, guest author, podcast guest, and was recently nominated as ‘Technical Employee of the Year’, ‘Role Model of the Year’, ‘Rising Star’, and ‘Woman of the Year’ in the CRN W…
 
Happy New Year! In this first episode of 2022, Diana, Sean, and Marco start with a light movies and TV chats, ephemeral art and vintage tech | The present and future of video projectors | Discussion around a list of lousy technology from 2021 | The cost of clean energy and how we need to reevaluate the way we design and build our societal environme…
 
This week on Security Happy Hour it's New Year's Eve and we are discussing how you can protect your future going into next year. Today's special guest is Wasabi Twitter: https://www.twitter.com/spiceywasabi Become a supporter and let out your inner Cyber Warrior with upcoming engagements and merch! Any support goes directly back into the production…
 
Incident response practitioner and cybersecurity community contributor Matt Scheurer shares his experience and advice on getting started in cybersecurity. Matt Scheurer is an experienced and highly skilled cyber security professional specializes in digital forensics and incident response (DFIR). Matt is a frequent conference speaker and cybersecuri…
 
Incident response practitioner and cybersecurity community contributor Matt Scheurer shares his experience and advice on getting started in cybersecurity. Matt Scheurer is an experienced and highly skilled cyber security professional specializes in digital forensics and incident response (DFIR). Matt is a frequent conference speaker and cybersecuri…
 
Breaking into Cybersecurity w Greg Hanniman (Ordinance Disposal to Cyber) 01/07/2022 https://www.linkedin.com/in/greg-hanniman/ https://www.withyouwithme.com About Breaking Into Cybersecurity: This series was created by Renee Small & Christophe Foulon to share stories of how the most recent cybersecurity professionals are breaking into the industry…
 
What is the price for cybersecurity education and are you gated out of accessing it? What if you could get world class training for the price that YOU decide? John Strand, Blackhills Information Security, and AntiSyphon are bringing you Pay What You Can training, specifically Active Defense and Cyber Deception. https://dev.antisyphontraining.com/ac…
 
Even with the best cybersecurity tools and skills, a third-party cybersecurity incident can seriously disrupt your operations. Payroll service provider Kronos was ransomwared just recently. How does a business operate if it can’t pay its employees? (hint its not with a 0-day) What is REAL business continuity and how do YOU identify and advise on co…
 
Want to get started with a backup program to protect your sensitive information? Security expert and trainer Mike McBride explains how to keep your most important personal and business data safe. Conversation highlights: Why every home and business needs a backup strategy How to determine what you should backup Are cloud backup services (iCloud, On…
 
Sometimes practitioners feel "stuck" with their information security program. Is it possible to break free? To innovate security operations? The answer may be found in the form of advanced analytics. Let's find out. ____________________________ Guests Kaley Coleman On LinkedIn | https://www.linkedin.com/in/kaley-coleman-85a31840/ Chuck Brooks On Li…
 
#CISOThursdays​: Breaking Into Cybersecurity + Guillaume Ross 01/06/21 It’s #CISOThursdays​​ @ 1pm eastern! Join us as we discuss recent news and hot topics in security. James Azar, CISO Talk podcast host & the crew are ready, as always, for a lively discussion. Today's guest is Guillaume Ross! Check out James Azar's presentation at Keynote at Futu…
 
OSINT investigations aren't always glamorous. In this episode we talk to Rae Baker about some overlooked (although incredibly practical) applications of OSINT as well has her journey in to the field. Rae on Twitter: @wondersmith_rae Rae's Blog: https://wondersmithrae.medium.com Organizations Rae donates time to: https://safeescape.org/ https://www.…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login