Podcasts about black hills infosec

  • 10PODCASTS
  • 11EPISODES
  • 49mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jan 23, 2026LATEST

POPULARITY

20192020202120222023202420252026


Best podcasts about black hills infosec

Latest podcast episodes about black hills infosec

Campus Comics Cast
Campus Comics Cast 227 - First Five Grimjack, The Future Is

Campus Comics Cast

Play Episode Listen Later Jan 23, 2026


As we batten down the hatches to prepare for winter storm Fern, we hopeyou enjoy episode 227 of the Campus Comics Cast as you watch the snow fall outside. Timestamps: 00:00:00 Opening Music 00:00:10 Intro 00:01:58 First Five Grimjack 00:38:15 The Future Is 01:32:50 CLZ Shake 01:36:01 Outros 01:36:43 Stinger How much has independent comics culture shaped your reading habits—and are you sleeping on character origins that defined the genre 40 years ago? This episode explores the gritty world of Grimjack—a mercenary navigating the multi-dimensional city of Cynosure—while diving deep into The Future Is, a modern cybersecurity heist series featuring a ragtag team of pentesters and hackers. Whether you're curious about '80s independent titles that influenced modern storytelling, or fascinated by the intersection of hacking culture and comics, this discussion reveals how both pulp action and cutting-edge tech narratives find their voice in sequential art. Discover why Grimjack's multi-dimensional setting and morally gray character archetype resonated with readers and why early First Comics publications remain culturally significant today. Understand how The Future Is translates modern cybersecurity concepts—penetration testing, threat actors, augmented reality, and digital vulnerabilities—into compelling narrative tension and character-driven conflict. Learn the difference between freebooters and hackers, what "doomscrolling" really means, and how the comic cleverly weaponizes tech jargon as world-building. Play now to hear two decades of comic history analyzed side-by-side with contemporary storytelling, and discover which independent titles deserve space on your pull list.

Cybercrime Magazine Podcast
Microcast: How His Mom Broke Into A Prison. Pen Testing & Security. John Strand, Black Hills InfoSec

Cybercrime Magazine Podcast

Play Episode Listen Later May 10, 2023 3:12


John Strand, owner of Black Hills InfoSec, shares how his mother broke into a South Dakota prison by pretending to be a health inspector, why pen testing helps keep us secure, why it's so dangerous, and more. This microcast is a short version of our full interview with Strand, which you can listen to at https://soundcloud.com/cybercrimemagazine/how-my-mom-broke-into-a-prison-pen-testing-keeps-us-secure-john-strand

Adventures of Alice & Bob
Ep.10 - Breaking Down the Department of the Interior // John Strand

Adventures of Alice & Bob

Play Episode Listen Later Aug 26, 2022 55:17


Today's episode is hosted by Marc. He talks to John Strand, Owner of Black Hills Information Security, about how John's first job in cybersecurity landed him in the middle of one of the largest lawsuits in United States history, how the gates that keep people from getting into cybersecurity have changed over the years, and how malicious hackers will always have a step-up on pen testing. Check out Black Hills Infosec here : https://www.blackhillsinfosec.com/

Cybercrime Magazine Podcast
How My Mom Broke Into A Prison. Pen Testing Keeps Us Secure. John Strand, Owner, Black Hills InfoSec

Cybercrime Magazine Podcast

Play Episode Listen Later Feb 23, 2021 21:09


In this episode of Cybercrime Radio, John Strand, owner of Black Hills InfoSec, shares how his mother broke into a South Dakota prison by pretending to be a health inspector, why pen testing helps keep us secure, why it's so dangerous, and more. To learn more about Black Hills, visit https://blackhillsinfosec.com/ • For more on cybersecurity, visit us at https://cybersecurityventures.com/

7 Minute Security
7MS #428: Tales of Internal Network Pentest Pwnage - Part 20

7 Minute Security

Play Episode Listen Later Aug 19, 2020 53:42


Welcome to another fun tale of internal pentest pwnage! Today's tale includes these helpful informational tidbits: My understanding is that in order for mitm6 relay attacks to work against DCs, those DCs have to have LDAPS config'd properly. Use nmap -sV -p646 name.of.domain.controller to verify this (thanks this site for the tip!) PowerView is awesome when used with Find-InterestingDomainShareFile to find interesting files with the word password or sensitive or other helpful strings. eavesarp helped me identify some weird hosts on weird subnets sending regular bursts of traffic to "interesting" hosts! Check out this video from Black Hills Infosec to learn more. I've also got some personal updates for you, including: House updates Fighting with the man/woman upstairs My worst Webinar nightmare came true A socially distanced wedding singing experience

Insecure - Cyber Security Podcast With Keith Wilson and John Morton

Erich Mueller returns to the show as the boys discuss continued learning for your first five years, Keith's terrorist wall, and how Morton learned Python. All this and a bag of chips this week on the Insecure Cybersecurity Podcast... bet.References:Black Hills Security - https://blackhillsinfosec.com/John Strand's webinar - https://blackhillsinfosec.com/webcast-5-year-plan-infosec/Black Hills Youtube - https://www.youtube.com/channel/UCJ2U9Dq9NckqHMbcUupgF0AClosing Music:"Robots are Technology" - Blaming TimGet The Latest Episode On: Apple: https://apple.co/2MvqaM6Stitcher: http://bit.ly/insecurestitcherGoogle Play: http://bit.ly/insecuregpSpotify: http://bit.ly/insecurepodYouTube: http://bit.ly/InsecureTubeWeb: http://www.totallyinsecure.comOpinions of the hosts and its guests are their own. This podcast in no way represents the views of the host's or guest's respective companies or their affiliates.

SECTION 9 Cyber Security
105 - We Figured Out Two Step Verification vs Two Factor Authentication

SECTION 9 Cyber Security

Play Episode Listen Later Apr 8, 2019 23:16


We figured out two step verification. Well, sort of. At least we know the difference between two factor authentication and two step verification. Sometimes all it takes is a quick review of the options.CORRECTIONIn this episode I said Paul Asadoorian works for Black Hills Infosec. Apparently he doesn’t. He’s got his own thing going on.LINKS1. Two-factor authentication (2FA) versus two-step verification (2SV)2. two-step verification - Another artical on the difference between 2SV and 2FA

Paul's Security Weekly TV
Slipping Executables Past Firewall, Carrie Roberts - Paul's Security Weekly #501

Paul's Security Weekly TV

Play Episode Listen Later Feb 20, 2017 8:29


Carrie Roberts joined Black Hills InfoSec after working for HP's Global Cyber Security group, where she worked as a network penetration tester. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode501#Tech_Segment:_Slipping_Executables_Past_Firewalls_with_Carrie_Roberts.2C_Black_Hills_InfoSec_-_7:00-7:30PM Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly

Paul's Security Weekly
Paul’s Security Weekly #501 - The Christian Slater Hacking Edition

Paul's Security Weekly

Play Episode Listen Later Feb 18, 2017 132:47


David Conrad of ICANN joins us, Carrie Roberts of Black Hills InfoSec breaks all the firewalls, and we discuss the security news for the week. Stay tuned!

Paul's Security Weekly (Video-Only)
Slipping Executables Past Firewall, Carrie Roberts - Paul's Security Weekly #501

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Feb 18, 2017 8:29


Carrie Roberts joined Black Hills InfoSec after working for HP's Global Cyber Security group, where she worked as a network penetration tester. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode501#Tech_Segment:_Slipping_Executables_Past_Firewalls_with_Carrie_Roberts.2C_Black_Hills_InfoSec_-_7:00-7:30PM Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly

Paul's Security Weekly (Podcast-Only)
Paul's Security Weekly #501 - The Christian Slater Hacking Edition

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Feb 17, 2017 132:47


David Conrad of ICANN joins us, Carrie Roberts of Black Hills InfoSec breaks all the firewalls, and we discuss the security news for the week. Stay tuned!