POPULARITY
As we batten down the hatches to prepare for winter storm Fern, we hopeyou enjoy episode 227 of the Campus Comics Cast as you watch the snow fall outside. Timestamps: 00:00:00 Opening Music 00:00:10 Intro 00:01:58 First Five Grimjack 00:38:15 The Future Is 01:32:50 CLZ Shake 01:36:01 Outros 01:36:43 Stinger How much has independent comics culture shaped your reading habits—and are you sleeping on character origins that defined the genre 40 years ago? This episode explores the gritty world of Grimjack—a mercenary navigating the multi-dimensional city of Cynosure—while diving deep into The Future Is, a modern cybersecurity heist series featuring a ragtag team of pentesters and hackers. Whether you're curious about '80s independent titles that influenced modern storytelling, or fascinated by the intersection of hacking culture and comics, this discussion reveals how both pulp action and cutting-edge tech narratives find their voice in sequential art. Discover why Grimjack's multi-dimensional setting and morally gray character archetype resonated with readers and why early First Comics publications remain culturally significant today. Understand how The Future Is translates modern cybersecurity concepts—penetration testing, threat actors, augmented reality, and digital vulnerabilities—into compelling narrative tension and character-driven conflict. Learn the difference between freebooters and hackers, what "doomscrolling" really means, and how the comic cleverly weaponizes tech jargon as world-building. Play now to hear two decades of comic history analyzed side-by-side with contemporary storytelling, and discover which independent titles deserve space on your pull list.
John Strand, owner of Black Hills InfoSec, shares how his mother broke into a South Dakota prison by pretending to be a health inspector, why pen testing helps keep us secure, why it's so dangerous, and more. This microcast is a short version of our full interview with Strand, which you can listen to at https://soundcloud.com/cybercrimemagazine/how-my-mom-broke-into-a-prison-pen-testing-keeps-us-secure-john-strand
Today's episode is hosted by Marc. He talks to John Strand, Owner of Black Hills Information Security, about how John's first job in cybersecurity landed him in the middle of one of the largest lawsuits in United States history, how the gates that keep people from getting into cybersecurity have changed over the years, and how malicious hackers will always have a step-up on pen testing. Check out Black Hills Infosec here : https://www.blackhillsinfosec.com/
In this episode of Cybercrime Radio, John Strand, owner of Black Hills InfoSec, shares how his mother broke into a South Dakota prison by pretending to be a health inspector, why pen testing helps keep us secure, why it's so dangerous, and more. To learn more about Black Hills, visit https://blackhillsinfosec.com/ • For more on cybersecurity, visit us at https://cybersecurityventures.com/
Welcome to another fun tale of internal pentest pwnage! Today's tale includes these helpful informational tidbits: My understanding is that in order for mitm6 relay attacks to work against DCs, those DCs have to have LDAPS config'd properly. Use nmap -sV -p646 name.of.domain.controller to verify this (thanks this site for the tip!) PowerView is awesome when used with Find-InterestingDomainShareFile to find interesting files with the word password or sensitive or other helpful strings. eavesarp helped me identify some weird hosts on weird subnets sending regular bursts of traffic to "interesting" hosts! Check out this video from Black Hills Infosec to learn more. I've also got some personal updates for you, including: House updates Fighting with the man/woman upstairs My worst Webinar nightmare came true A socially distanced wedding singing experience
Insecure - Cyber Security Podcast With Keith Wilson and John Morton
Erich Mueller returns to the show as the boys discuss continued learning for your first five years, Keith's terrorist wall, and how Morton learned Python. All this and a bag of chips this week on the Insecure Cybersecurity Podcast... bet.References:Black Hills Security - https://blackhillsinfosec.com/John Strand's webinar - https://blackhillsinfosec.com/webcast-5-year-plan-infosec/Black Hills Youtube - https://www.youtube.com/channel/UCJ2U9Dq9NckqHMbcUupgF0AClosing Music:"Robots are Technology" - Blaming TimGet The Latest Episode On: Apple: https://apple.co/2MvqaM6Stitcher: http://bit.ly/insecurestitcherGoogle Play: http://bit.ly/insecuregpSpotify: http://bit.ly/insecurepodYouTube: http://bit.ly/InsecureTubeWeb: http://www.totallyinsecure.comOpinions of the hosts and its guests are their own. This podcast in no way represents the views of the host's or guest's respective companies or their affiliates.
We figured out two step verification. Well, sort of. At least we know the difference between two factor authentication and two step verification. Sometimes all it takes is a quick review of the options.CORRECTIONIn this episode I said Paul Asadoorian works for Black Hills Infosec. Apparently he doesn’t. He’s got his own thing going on.LINKS1. Two-factor authentication (2FA) versus two-step verification (2SV)2. two-step verification - Another artical on the difference between 2SV and 2FA
Carrie Roberts joined Black Hills InfoSec after working for HP's Global Cyber Security group, where she worked as a network penetration tester. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode501#Tech_Segment:_Slipping_Executables_Past_Firewalls_with_Carrie_Roberts.2C_Black_Hills_InfoSec_-_7:00-7:30PM Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
David Conrad of ICANN joins us, Carrie Roberts of Black Hills InfoSec breaks all the firewalls, and we discuss the security news for the week. Stay tuned!
Carrie Roberts joined Black Hills InfoSec after working for HP's Global Cyber Security group, where she worked as a network penetration tester. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode501#Tech_Segment:_Slipping_Executables_Past_Firewalls_with_Carrie_Roberts.2C_Black_Hills_InfoSec_-_7:00-7:30PM Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
David Conrad of ICANN joins us, Carrie Roberts of Black Hills InfoSec breaks all the firewalls, and we discuss the security news for the week. Stay tuned!