POPULARITY
2B Bolder Podcast : Career Insights for the Next Generation of Women in Business & Tech
In episode #73 of the 2B Bolder Podcast, Micki Boland shares her passion for global cybersecurity. Micki is a fierce warrior and evangelist with Check Point Software Technologies' Office of the CTO. She has over 20 years of experience in IT, cybersecurity, and emerging technology innovation. Micki holds an ISC2 CISSP, a Master of Science in Technology Commercialization from the University of Texas at Austin, MBA with a Global Security Concentration from East Carolina University. Micki also writes cybersecurity articles for Cybertalk.org and has written for Dark Reading, Silicon Angle, and Decipher, along with frequently speaking with the broadcast media and radio shows regarding cybersecurity for and in emerging technology, the global threat landscape, tips and resources for consumers and enterprise organizations, Dark Web, Cyber Warfare, AI (ML) in cybersecurity, cloud security and DevSecOps. Tune in to hear why there has never been a better time for women to enter and excel in cyber security.Connect with Micki Boland on LinkedInLearn about Check Point TechnologiesFree Cyber Security Training Antifragile By Nassim Nicholas Taleb (book referenced in the show)The 2B Bolder Podcast provides first-hand access to some amazing women. Guests will include women from leading enterprise companies to startups, women execs, coders, account execs, engineers, doctors, and innovators.Listen to 2B Bolder for more career insights from women in tech and business.Support the show
Cyber Security Matters, hosted by Dominic Vogel and Christian Redshaw
Managing Partner of Framework Security, Tara Anderson, is today's guest on the Cyber Security Matters podcast, hosted by Dominic Vogel and Christian Redshaw. Tara is a Cybersecurity Advisor with 20 years combined in banking, private equity, and venture capital. As Managing Partner of the award-winning Cybersecurity Consultancy, Framework Security, she can be recognized for her appearances on KSL Radio, KSL News, KUTV Fresh Living, Park City Television, IBMTV World Edition, CyberTalk with Rex M. Lee, including numerous panels and podcasts discussing cybersecurity, cybercrime, and cyber warfare. Anderson is an Official Member of the Forbes Technology Council, a Member of the Tortora Brayda Institute Excellence AI & Cybersecurity Task Force, sits on the Cyber Resilience and Data Ethics Expert Council, belongs to the Women Tech Council, and many additional organizations that promote diversity, equity, and inclusion in cybersecurity, privacy, and technology. In this episode, we will cover: - Why cyber security matters to business executives - Why cyber security should be your board of director's biggest concern - Why cyber security is a factor when navigating mergers and acquisitions - What can go wrong if cyber security isn't taken seriously #cybersec #technology #business ep: 157
As the saying goes, it's the little things that kill. And in cybersecurity, that little thing can be as innocent as a singular mouse click on the wrong URL from a familiar-looking email. A recent report from Trend Micro shows that 75 percent of all cyberattacks start with phishing emails – or messages made to look like a non-threatening communication from a colleague, vendor or trusted source, but containing links meant to abstract vital personal data. Additionally, research from Cybertalk.org states that about 90 percent of data breaches are the result of phishing schemes, and the FBI is projecting a year-over-year increase of 400 percent for these types of attacks. Finally, cybersecurity software and services provider Mimecast found that 96 percent of respondents to their survey acknowledged having faced some form of phishing attack in the past year. The key is to not associate the tool too closely with the evil intentions of hackers. Email remains a highly efficient and vitally important communication tool – but one that requires greater diligence than in the past. Joining us to discuss this situation is Fleming Shi, Chief Technology Officer at Barracuda Networks, a leading provider of data security products and services.To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. And if you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach us at jeff@ien.com.To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
Another series of headlines from our friends at CyberTalk.orgWhat is purple teaming and why is it useful?One easy way to secure your Android6 simple & straightforward Cyber Monday fraud prevention tipsCanada advances cyber security via Indo-Pacific Strategy
Second in a series on business data and how organizations can protect it. Mazhar Hamayun is a Security Engineer with Check Point and a member of the Office of the CTO who covered this topic on CyberTalk.org. We discuss some of his tips in this episode.The book I mentioned in this section: Building Internet Firewalls 2nd Edition.
Some articles from our friends at CyberTalk.org about passwords, phishing, and passkeys.20 Password Management Best Practices10 Signs of Phishing for Anyone Who Champions Security5 Steps to Mitigate Credential Exposure RisksThis is How We Will Replace Passwords in the Near Future…
First of a series on business data and how organizations can protect it. Mazhar Hamayun is a Security Engineer with Check Point and a member of the Office of the CTO who covered this topic on CyberTalk.org. We begin the series by discussing what business data is, where it might reside, who might want it that shouldn't, and why.
Some recent headlines from our friends at CyberTalk.org:FOMO on the latest cyber security tech?8 mistakes CIOs make and how to avoid themAmerican Airlines learns breach caused by phishingAdware installed 13 million times + how to uninstall it
From our friends at CyberTalk.org:How to prevent sneaky zero day attacks on fleets of smartphonesCISO's Guide to Mobile SecurityHackers could crash power grids, but they're mostly after…10 mind-boggling cyber security statistics (and they might scare you)7 actionable CISO strategies for effective executive-level communication
Some recent CISO-focused headlines from our friends at CyberTalk:5 key traits of highly effective CISOs6 different types of CISOs and the environments they thrive inZero Trust Segmentation: A primer for CISOs
We're going to try something a little different with PhoneBoy reading and commenting on a few articles from CyberTalk.org. If you like this format, let us know by commenting!Links:SmokeLoader distributes Amadey malware, what you need to knowXiaomi Phone Bug, Payment Forgery Researching Xiaomi's TEE to get Chinese Money Healthcare Payer CISO Shares Real World InsightsMailChimp Breach Exposes Email Addresses and Callback Phishing 10 Key Facts About Callback Phishing Attacks
In this episode of CyberTalk, Kurt Sand, General Manager, DevSecOps at CyberArk, joins host Hillarie McClure to discuss the mission of DevSecOps, how rapid innovation demands DevSecOps, and more. CyberArk is centered on privileged access management, providing the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
In this episode of CyberTalk, Barak Feldman, SVP, PAM & Identity Security at CyberArk, joins host Hillarie McClure to discuss privileged access management (PAM), how PAM interacts with identity security, why organizations need both, and more. CyberArk is centered on privileged access management, providing the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
In this episode of CyberTalk, Omar Khawaja, CISO at Highmark Health, joins host Hillarie McClure to discuss zero trust, how Highmark created "cyber scores" for employees to improve and inspire proper cyber hygiene, how to create a cybersecurity culture, and more. CyberArk is centered on privileged access management, providing the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
Introducing the next release from a producer from Russia, Moscow - @valeraunusuv - CyberTalk. Two completely different tracks, but at the same time one era. CyberTalk - imagine a conversation between two gadgets, what exactly do they say to each other?And at the same time, piano sounds will always be relevant. Argument from the Piano - makes you move and remember the past parades of love! on Bandlink : https://band.link/mM1PH Last EP : band.link/iXWyd and band.link/YaJ8p YT chanel : www.youtube.com/rsound
Introducing the next release from a producer from Russia, Moscow - @valeraunusuv - CyberTalk. Two completely different tracks, but at the same time one era. CyberTalk - imagine a conversation between two gadgets, what exactly do they say to each other?And at the same time, piano sounds will always be relevant. Argument from the Piano - makes you move and remember the past parades of love! on Bandlink : https://band.link/mM1PH Last EP : band.link/iXWyd and band.link/YaJ8p YT chanel : www.youtube.com/rsound
In this episode of CyberTalk, Tal Kandel, Innovation Business Senior Director at CyberArk, joins host Hillarie McClure to discuss the security issues with serverless functions, app development, least privilege for the cloud, and more. CyberArk is centered on privileged access management, providing the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
In this episode of CyberTalk, Bryan Murphy, Director of Consulting Services & Leader of CyberArk's Remediation Services Team, joins host Hillarie McClure to discuss what the "work from home" environment looks like 1.5yrs after we began the COVID-19 quarantine, how it's impacting enterprises, what we need to do to stay secure, and more. CyberArk is centered on privileged access management, providing the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
In this episode of CyberTalk, Mark Camillo, CEO at CyberAcuView, joins host Hillarie McClure to explain what cybersecurity insurance is, what it covers (and what it doesn't), how recent cyber activity has impacted the market, and more. CyberArk is centered on privileged access management, providing the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
In this episode of CyberTalk, Shahar Layani, Chief Customer Officer of CyberArk, joins host Hillarie McClure to discuss the concerns customers are sharing with their cybersecurity experiences, how the customer experience can be improved, and more. CyberArk is centered on privileged access management, providing the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
In this episode of CyberTalk, Shay Nahari, VP of Red Team Services at CyberArk, joins host Hillarie McClure to discuss how multifactor authentication (MFA) is helping protect individuals, enterprises, and more. CyberArk is centered on privileged access management, providing the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
In this episode of CyberTalk, CyberArk's Senior Director - Public Sector, Matt Kenslea, joins host Hillarie McClure to discuss how the COVID-19 pandemic accelerated digital transformations for the education industry, the threat vectors that exist for educational institutions, and more. CyberArk is centered on privileged access management, providing the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
In this episode of CyberTalk, CyberArk's Senior Director of Cyber Research, Lavi Lazarovitz, joins host Hillarie McClure to discuss ransomware attacks on critical infrastructure, supply chain vulnerabilities, and more. CyberArk is centered on privileged access management, providing the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
In this episode, we will be interviewing the co-founder of GhostSec, GhostSec is a vigilante hacking group that has been active for a while and gained mainstream notoriety in 2015 when they shut down and defaced hundreds of ISIS websites and social media accounts in the wake of the Charlie Hebdo attacks that took place […] The post Cybertalk – EP10 – Interview With GhostSec appeared first on HackerSploit Blog.
In this episode of CyberTalk, CyberArk's Technical Evangelist, Andy Thompson, joins host Hillarie McClure to discuss ransomware and how it relates to identity access management, as well as what CyberArk Labs has been doing to address the growing threat of ransomware. CyberArk is centered on privileged access management, providing the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
CyberTalk is a Cybercrime Magazine podcast series brought to you by CyberArk, the global leader in identity security. In this first episode of CyberTalk, CyberArk's CEO, Udi Mokady, joins host Hillarie McClure to discuss what Identity Security means, why it matters, and how organizations need to begin implementing it. CyberArk is centered on privileged access management, providing the most comprehensive security offering for any identity – human or machine. To learn more about our sponsor CyberArk, visit https://cyberark.com
https://youtu.be/HF_QS0U7XAE Barry Edwards and Merle Garrison discuss... Career/Self-Improvement Side gigs: The pros and cons of rental property. The good way out-weighs the bad. Cognitive differences between generations. Current Events / Politics The political smoke screen. Voting restrictions and corporations jumping onboard in spite of hurting their bottom line. Jordan Peterson explains in 2 minutes why it's risky to not take risks in life: https://bit.ly/3gfY3OT Court packing: House and Senate Democrats Plan Bill to Add Four Justices to Supreme Court: https://bit.ly/3soXsg7 Dan Bongino vs Geraldo Rivera On the Lighter Side... Don't miss this! Raccoon puts the moves on a cat. https://bit.ly/3tpGiAr Consumer Review: Tozo cordless phone charger Podcast updates: Catch Merle on IBMTV.TV with Rex Lee for their CyberTalk. BONUS: After show wrap up: https://youtu.be/yy_yxLqkLhY Write in and share your questions or insight at: mail@OverFiftyStartingOver.com Website: OverFiftyStartingOver.com Subscribe to your preferred channels below! Apple podcasts: https://apple.co/2v2wLWY Google podcasts: https://bit.ly/2xaVhWs Spotify: https://spoti.fi/3cztoaR YouTube channel: https://bit.ly/34xuSyM #PodcastShow #politics #entrepreneurship #BarryEdwards #MerleGarrison #LosAngeles #Cleveland #OverFiftyStartingOver #Over50StartingOver #SalesAndMarketing #PoliticallyIncorrect #branding #SelfEmployment #PassionForWork #EdwardsCommunications #racism #IdentityPolitics #inspiration #racism #sexism #censorship #specialInterests #lobbyists #JordanPeterson #DanBongino #GeraldoRivera
Barry Edwards and Merle Garrison discuss... April Fools pranks - Barry kicks off the show with a bad one. Happy Good Friday! Career / Self-improvement Theme: Good Friday. Michael Strahan's simple April Fools prank somehow showed us what an enlightened person he is. Forgiveness for those that wronged us, and forgiving ourselves. Current Events / Politics Border crisis - Even CNN is turning on the Biden Administration's lack of solutions and transparency. Maybe we should discuss annexing Mexico. The Vaccination Passport debate. On the Lighter Side... Update on our upcoming guest podcasts. Check out Barry and Merle Wednesday joining Rex Lee on CyberTalk. IBMTV.TV
https://youtu.be/LNRGO_X4L6Y Barry Edwards and Merle Garrison discuss... Arizona as possible new home for Merle - Pros and cons Career / Self-improvement Will Generation X be the first generation never to get to retire? -- article by Barry Edwards, http://bit.ly/2Nb6bUw We tackle reader Maria's retirement obstacles How healthy are health drinks? How Barry's smart phone bill went from $100 to $30 per month. And how to get a NEW iPhone 11 for $225: http://apple.co/38z7BQp Current Events / Politics 5 Oklahoma City officers charged with first-degree manslaughter in fatal shooting of teen who dropped gun - USA Today http://bit.ly/2OKQKmA Cleveland Hyperloop would propel passengers at 700 mph through vacuum-sealed tubes http://bit.ly/38vqJOW Cleveland to Chicago in ½ hour. Phase 2 - Cle to Pitt in 10 min. Russia and China just agreed to build a research station on the moon together. Space.com http://bit.ly/3rBE2oG On the Lighter Side... Stay tuned for Special Guest Geza Kassai – Movie Art director/set designer- Judas and the Black Massiah (HBO Max), Wrong Term Part 7 (Horror movie series), I See You, Dangerous IMBD page - http://imdb.to/3vfIJqn Catch Merle co-hosting Rex Lee's CyberTalk episodes - hopefully link comes soon. BONUS: After show wrap up: https://bit.ly/3eyY2oo Write in and share your questions or insight at: mail@OverFiftyStartingOver.com Website: OverFiftyStartingOver.com Subscribe to your preferred channels below! Apple podcasts: https://apple.co/2v2wLWY Google podcasts: https://bit.ly/2xaVhWs Spotify: https://spoti.fi/3cztoaR YouTube channel: https://bit.ly/34xuSyM #PodcastShow #politics #entrepreneurship #BarryEdwards #MerleGarrison #LosAngeles #Cleveland #OverFiftyStartingOver #Over50StartingOver #SalesAndMarketing #PoliticallyIncorrect #branding #SelfEmployment #PassionForWork #EdwardsCommunications #racism #IdentityPolitics #inspiration #racism #sexism #censorship #HyattHotels #CancelCulture
Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. Google form (Post your questions here): https://forms.gle/hK5o7ucQy7iNuz8p7 YouTube Channel: […] The post Cybertalk – EP9 – AI In Cyber Security, Bug Bounties & Reverse Engineering appeared first on HackerSploit Blog.
For the first episode of 2021, the boys discuss their favorite things of the past year and then Brian and Vargas let Brendon off his leash to review Cyberpunk 2077 on the PlayStation 5! Enjoy!
We have t-shirts! And other merch you can stamp the design onto! https://www.teepublic.com/stores/dad-and-sons-podcast?ref_id=14157Subscribe via RSS feed at: https://rss.art19.com/dad-and-sonsJoin our Discord & support the show at: patreon.com/dadandsonsYouTube versions:https://www.youtube.com/channel/UC58jKMTseTHniEJBQLPdTdg00:01:25 Cybertalk 207700:37:32 https://www.metacritic.com/game/pc/cyberpunk-207700:38:13 https://www.forbes.com/sites/paultassi/2020/12/08/three-things-to-understand-about-current-cyberpunk-2077-reviews/?sh=117e1a02389000:40:09 https://www.gamespot.com/reviews/cyberpunk-2077-review/1900-6417622/00:43:03 https://www.polygon.com/2020/12/10/22167349/cyberpunk-2077-penis-glitch-breasts00:51:38 The Game Awards00:59:38 https://www.youtube.com/watch?v=bJo25Dtglbo01:02:27 https://www.youtube.com/watch?time_continue=27&v=rok9-g8E0PE&feature=emb_title01:09:26 https://www.youtube.com/watch?v=tlizZsbG-4o&start=332201:13:08 Listener QuestionsDon't forget to send questions to: dadandsonspodcast@gmail.comLogo art by Strekks: twitter.com/StrekksBackground art by Henry Ng: https://www.henryng-art.com/Music by Ryan Lafford https://www.youtube.com/ryanlaffordSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
A lot of it is super broken, but some of it's kinda good. A bit of it is even great. It's Cyberpunk 2077, one of the more confusing and difficult to describe games this year. It's disappointing to many, amazing to a few, and we talk about a lot of it here. No spoilers! Also: Fire Emblem: Shadow Dragon and the Blade of Light. --- Send in a voice message: https://anchor.fm/pressxtopodcast/message
Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. Google form (Post your questions here): https://forms.gle/hK5o7ucQy7iNuz8p7 YouTube Channel: […] The post Cybertalk – EP8 – Better Bug Bounty Hunting & Reverse Engineering appeared first on HackerSploit Blog.
The recording industry, Metallica, and ultimately federal court put the brakes on Napster’s music file sharing. But before exiting the stage, Napster changed the way we listen to music—and how much we’re willing to pay for it. [Editor’s note - Sept. 1, 2020: This episode has been updated to reflect that “CyberTalk” was a group effort overseen by Jeff Gold. An earlier version characterized it as his solo effort.] Our sponsors this week:Bombas: bombas.com/spectacularPolicy Genius: policygenius.comNetSuite: netsuite.com/spectacularSign up to receive our brand new newsletter, featuring weekly recommendations from Lauren and the rest of the team at spectacularfailures.org/newsletter.Read the transcript of the trailer at spectacularfailures.org.You can follow Spectacular Failures on Twitter at @failureshow and like us at Facebook.com/failureshow. We're @failure_show on Instagram. Follow Lauren Ober on Twitter and Instagram at @oberandout.
Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. Google form (Post your questions here): https://forms.gle/hK5o7ucQy7iNuz8p7 YouTube Channel: […] The post Cybertalk – EP7 – OPSEC & Personal Security Guide appeared first on HackerSploit Blog.
Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. Google form (Post your questions here): https://forms.gle/hK5o7ucQy7iNuz8p7 YouTube Channel: […] The post Cybertalk – EP6 – Don't Dual Boot appeared first on HackerSploit Blog.
Barry Edwards and Merle Garrison interviewing Rex M. Lee- Cybersecurity and Privacy Advisor/Tech Journalist Rex is a cybersecurity and privacy advisor and a freelance tech journalist. Rex is the founder of My Smart Privacy and CyberTalk. He is also a sr. tech and telecom analyst for BlackOpts Partners in Washington, DC and a former advisor to the Department of Homeland Security ("DHS"), National Security Agency ("NSA"). Rex has written numerous articles on tech, telecom, privacy and cybersecurity for many publications that include The Epoch Times, MissionCritical Communications Magazine, The Wireless Messaging News and The Vision Times. Write in and share your questions or insight at: mail@OverFiftyStartingOver.com • https://OverFiftyStartingOver.com
Hey, Rohit here. So, you know I've not uploaded a episode in months. So, to apoligize, here's a new Sub-Section. CYBERTALK. Everything about tech in one podcast. Sorry for the long duration anyway, but sometimes you gotta take the risk. So, this is your boy Rohit with another podcast. Peace.
Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. Google form (Post your questions here): https://forms.gle/hK5o7ucQy7iNuz8p7 YouTube Channel: […] The post Cybertalk – EP5 – Is The CEH Worth It? appeared first on HackerSploit Blog.
Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. Google form (Post your questions here): https://forms.gle/hK5o7ucQy7iNuz8p7 YouTube Channel: […] The post Cybertalk – EP4 – IDA Pro, Malware Analysis & Python Libraries appeared first on HackerSploit Blog.
Welcome to the fourth episode of Cybertalk! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. In this episode, we discuss IDA Pro, assembly language for malware analysis and useful python libraries for penetration testing and cybersecurity. Books: The IDA Pro Book: https://www.amazon.com/IDA-Pro-Book-Unofficial-Disassembler/dp/1593272898 The Art of Assembly Language: https://www.amazon.com/Art-Assembly-Language-2nd/dp/1593272073 Malware Samples: https://crackmes.one/ https://dasmalwerk.eu/ Listen To CyberTalk: iTunes:https://podcasts.apple.com/ke/podcast/cybertalk/id1490558117 Spotify: https://open.spotify.com/show/6j0RhRiofxkt39AskIpwP7 Google form (Post your questions here): https://forms.gle/hK5o7ucQy7iNuz8p7
Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. Google form (Post your questions here): https://forms.gle/hK5o7ucQy7iNuz8p7 YouTube Channel: […] The post Cybertalk – EP1 – Secure Coding, HackTheBox & Web App Penetration Testing appeared first on HackerSploit Blog.
Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. Google form (Post your questions here): https://forms.gle/hK5o7ucQy7iNuz8p7 YouTube Channel: […] The post Cybertalk – EP2 – CEH vs CISSP, Cybersecurity Degrees & CTFs vs Penetration Tests appeared first on HackerSploit Blog.
Welcome to the Cybertalk podcast! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. Google form (Post your questions here): https://forms.gle/hK5o7ucQy7iNuz8p7 YouTube Channel: […] The post Cybertalk – EP3 – Cybersecurity Certifications & Learning Resources appeared first on HackerSploit Blog.
Welcome to the third episode of CyberTalk! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. In this episode, we discuss various cybersecurity certifications, their pros and cons, and some great cybersecurity learning resources for students. Books: RTFM: https://www.amazon.com/Rtfm-Red-Team-Field-Manual/dp/1494295504 Hacking: The Art Of Exploitation: https://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441/ref=sr_1_1?crid=QKGY144IOZAI&keywords=art+of+exploitation&qid=1575492400&s=books&sprefix=art+of+expl%2Cstripbooks-intl-ship%2C352&sr=1-1 Hacker Playbook: https://www.amazon.com/Hacker-Playbook-Practical-Penetration-Testing/dp/1980901759/ref=pd_sbs_14_t_1/142-2877011-6826601?_encoding=UTF8&pd_rd_i=1980901759&pd_rd_r=cf8581e2-3f95-4260-9f5e-5feacb9835e2&pd_rd_w=BN3FF&pd_rd_wg=luuR6&pf_rd_p=5cfcfe89-300f-47d2-b1ad-a4e27203a02a&pf_rd_r=GF0Q1C16BQ02ZD4333PY&psc=1&refRID=GF0Q1C16BQ02ZD4333PY Links: https://cybrary.it https://pentesterlab.com https://pentesteracademy.com
Welcome to the first episode of Cybertalk! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. In this episode we cover secure coding and it's importance for developers, how to get started with HackThebox and some of the best tools for web application penetration testing. Google form (Post your questions here): https://forms.gle/hK5o7ucQy7iNuz8p7 Cristi Vlad's channel: https://www.youtube.com/user/cristivlad25
Welcome to the second episode of Cybertalk! My co-host is Cristi Vlad and together where we will be covering all your questions related to Infosec and Cyber-security. If you want your question answered/featured in the next episode, you can post them in the Google form linked below. In this episode, we discuss the differences between CEH and CISSP, the relevance of cyber-security degrees and the fundamental differences between CTFs and traditional penetration testing. Google form (Post your questions here): https://forms.gle/hK5o7ucQy7iNuz8p7
Dr. Zero Trust Chase Cunningham joins the podcast this week to discuss how after 30 years organizations are finally approaching cybersecurity strategy the right way.
Rants, Raves, Ridicule, and Ridiculousness.