Bring Your Own Security Radio is hosted by Dave The IT Guy, CISSP, CEH and MCSE who brings you both the people behind the scenes securing systems from the bad guys, and some of the vendors who bring some of the hardware and software used to help secure an environment. Each episode is one hour in len…
Talking about old vulnerabilities coming back to haunt and Incident Response planning and tabletop exercises.
New season, upcoming topics, things I've learned in the last 4 months
Talking about vulnerability management - what it should be, some things you may not have considered, and some things you certainly should consider!
What's new this week in the world of Cybersecurity and Infosec in general
What's new this week in the world of Cybersecurity and Infosec in general
Cloud Testing, Common Security issues, great tips and ideas on dealing with cloud architecture and security
Cloud Testing, Common Security issues, great tips and ideas on dealing with cloud architecture and security
John Strand from Black Hill Information Security and founder of the Wild West Hacking Fest
John Strand from Black Hill Information Security and founder of the Wild West Hacking Fest
Bring Your Own Security Radio talking about how the COVID-19 world has changed the Face of IT Security
Bring Your Own Security Radio talking about how the COVID-19 world has changed the Face of IT Security
An uncommon episode where we talk about how the global pandemic known as the CoronaVirus has changed the world of IT, and the changes that may still be coming.
An uncommon episode where we talk about how the global pandemic known as the CoronaVirus has changed the world of IT, and the changes that may still be coming.
Cincinnati IT Security Professional Matt Scheurer talks about his experiences, the Security Interest Group he runs in Cincinnati, speaking at events and reveals the February 2020 SIG Special Guest Speaker
Cincinnati IT Security Professional Matt Scheurer talks about his experiences, the Security Interest Group he runs in Cincinnati, speaking at events and reveals the February 2020 SIG Special Guest Speaker
Threat assessment and vulnerability risk for the large and smaller organizations.
Threat assessment and vulnerability risk for the large and smaller organizations.
Printers, Wireless, and other attack vectors you might not be thinking about
Printers, Wireless, and other attack vectors you might not be thinking about
Dave talks about Ring Doorbell Cameras and how law enforcement can access the video from each camera in their area.
Dave talks about Ring Doorbell Cameras and how law enforcement can access the video from each camera in their area.
Dave talking about the trend in online doctor's visits and how soon you'll be able to start having in home appointments!
Dave talking about the trend in online doctor's visits and how soon you'll be able to start having in home appointments!
Dave talking about emergency communications during rescue situations, natural disasters and other issues.
Dave talking about emergency communications during rescue situations, natural disasters and other issues.
Dave talks about GeoTagging photos on a mobile device and the potential security threats it could cause. Also, do robots have feelings?
Dave talks about GeoTagging photos on a mobile device and the potential security threats it could cause. Also, do robots have feelings?
Today we interview William and Steve from Cyber Defense Technologies, a government and private industry security contractor. We'll talk about secure design, defense in depth and much more!
Today we interview William and Steve from Cyber Defense Technologies, a government and private industry security contractor. We'll talk about secure design, defense in depth and much more!
Dave The IT Guy discussing wearable tech leaking private data.
Dave The IT Guy discussing wearable tech leaking private data.
My review of the week at hacker summer camp of 2019!
My review of the week at hacker summer camp of 2019!
BlackHat 2019 Interview with MalwareBytes Lab Director Adam Kujawa. We spoke about how MalwareBytes protects, researches and mitigates threats that we all face.
Interview during BlackHat 2019 with BugCrowd CSO David Baker. We discussed bounty hunting, emerging threats and more!
Gabrielle Hempel Interview from BlackHat 2019 - Discussing women in the Cybersecurity field
BlackHat 2019 Interview with MalwareBytes Lab Director Adam Kujawa. We spoke about how MalwareBytes protects, researches and mitigates threats that we all face.
Interview during BlackHat 2019 with BugCrowd CSO David Baker. We discussed bounty hunting, emerging threats and more!
Gabrielle Hempel Interview from BlackHat 2019 - Discussing women in the Cybersecurity field
Dave The IT Guy appearing on the Tampa Morning Show talking about medical device hacking
Dave The IT Guy appearing on the Tampa Morning Show talking about medical device hacking
Dave The IT Guy talking about smart home devices and the security problems they pose in your home. Is everything being said in your home being recorded and uploaded somewhere else? Yes, it is.
Dave The IT Guy talking about smart home devices and the security problems they pose in your home. Is everything being said in your home being recorded and uploaded somewhere else? Yes, it is.
Dave The IT Guy (me!) talks about using electronics on public WiFi and how to protect yourself.
Dave The IT Guy (me!) talks about using electronics on public WiFi and how to protect yourself.
Dave (me the host of BYOS Radio) being interviewed on Tampa, Florida WFLA's morning show. I will be an ongoing guest at 8:20AM EST every Monday. They are part of the iHeartRadio family of stations and can be heard over the air and on the iHeartRadio app.
Dave (me the host of BYOS Radio) being interviewed on Tampa, Florida WFLA's morning show. I will be an ongoing guest at 8:20AM EST every Monday. They are part of the iHeartRadio family of stations and can be heard over the air and on the iHeartRadio app.
We're talking about how hyperconverged infrastructure can make a big difference in even small and medium sized businesses.
We're talking about how hyperconverged infrastructure can make a big difference in even small and medium sized businesses.
We're going to talk about SIEM, monitoring, why do it, what to do, and some of the tools to do it with.
We're going to talk about SIEM, monitoring, why do it, what to do, and some of the tools to do it with.