Podcasts about ethical hacker

  • 172PODCASTS
  • 241EPISODES
  • 40mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Apr 11, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about ethical hacker

Latest podcast episodes about ethical hacker

MoneyNeverSleeps
290: The Ethical Hacker Mindset with Yev Broshevan from Hacken

MoneyNeverSleeps

Play Episode Listen Later Apr 11, 2025 38:59


This week, I sat down with Yev Broshevan, co-founder and Chief Business Development Officer at Hacken, a leading blockchain security firm focused on making Web3 a safer, more trustworthy place for everyone. Even better? Yev's birthday is the same day this episode drops - happy birthday, Yev!Yev's story goes way back to her early days as a cybersecurity engineer in Ukraine, where weak institutions and a hacker's curiosity led her deep into the world of Bitcoin back in 2014. Since then, she and her Hacken co-founders have been building a mission-driven business around ethical hacking—using a mindset of creativity and values to secure everything from smart contracts to crypto exchanges.In this episode, we get into:Why the hacker mindset isn't just about code, it's a way of living—and solving problemsHow HackenProof, their bug bounty platform, now has over 45,000 ethical hackers keeping Web3 projects secureWhy smart contract audits are just one layer—operational security and key management matter just as muchHow AI is reshaping both sides of the security equation: as a powerful ally and a new threat vectorWhy Yev's now channeling her hacker brain into biohacking—optimizing health and performance like it's just another system to tuneWe also talk about Hacken's move into the US, how the security landscape has evolved since the early days of crypto, and what the industry still needs to get right to earn back trust.From Web2 to Web3 to Human 2.0, this one's got layers.Connect with Yev Broshevan and Hacken:Yev Broshevan:  X/Twitter  |  LinkedInHacken:  X/Twitter  |  LinkedIn  |  Website⁠Leave a review and subscribe onApple PodcastsSpotifyMoneyNeverSleeps (website)Email us: info@norioventures.comConnect with Pete Townsend and MoneyNeverSleeps:Pete Townsend: X/Twitter  |  LinkedIn MoneyNeverSleeps: X/Twitter  |  LinkedIn  |  Newsletter

Change Agents with Andy Stumpf
Hunting Digital Predators: The Real Dangers Hiding in Kids' Games and Devices (with ethical hacker Ryan Montgomery)

Change Agents with Andy Stumpf

Play Episode Listen Later Mar 5, 2025 71:21


 On today's episode, Andy sits down with ethical hacker Ryan Montgomery. Ryan is the founder of Montgomery Cybersecurity, a company focused on protecting individuals and organizations from online threats, and works with law enforcement agencies to track and expose online predators targeting children. Ryan also serves as a consultant for various tech companies, helping them strengthen their security systems. Through his work, he educates parents on the dangers of online exploitation and provides actionable solutions to protect children in the digital world. Ryan reveals the hidden dangers in kids' favorite games like Minecraft and Roblox, and how predators exploit these platforms, along with smart devices, to access children. More on Ryan Montgomery: IG: @0day X: @0dayCTF Change Agents is an IRONCLAD Original Sponsors:  Firecracker Farm Use code IRONCLAD to get 15% off your first order at https://firecracker.farm/ MTNTOUGH Go to ⁠https://mtntough.com⁠ and enter code CHANGEAGENTS to receive 40% OFF - a savings of about $100 off your MTNTOUGH+ annual subscription. Learn more about your ad choices. Visit megaphone.fm/adchoices

Das Ohr am Netz
Cyberattacken im Visier: Expert:innen über Aufspüren, Verfolgung und Prävention

Das Ohr am Netz

Play Episode Listen Later Feb 18, 2025 74:04


Cyberangriffe zählen zu den größten Risiken für Unternehmen in Deutschland und weltweit. Sicherheitslücken ermöglichen den Diebstahl sensibler Daten – ein Albtraum für jede Organisation. Doch wie gut sind Unternehmen darauf vorbereitet? Welche Muster erkennen Ethical Hacker und Ermittler? Und welche Maßnahmen können Unternehmen selbst ergreifen, um sich besser zu schützen? In der aktuellen Folge von „Das Ohr am Netz“ nehmen Sidonie und Sven das Thema Hacking aus verschiedenen Perspektiven unter die Lupe – mit einem besonderen Fokus auf Prävention. Linus Neumann, Sprecher des Chaos Computer Clubs (CCC), berichtet von seinen Erfahrungen als Ethical Hacker und erklärt, wie der CCC Sicherheitslücken aufdeckt. Dirk Kunze, Kriminaldirektor beim LKA NRW, gibt Einblicke in die Ermittlungsarbeit der Polizei im Bereich Cybercrime und erläutert, wie Cyberangriffe verfolgt werden. Nico Leidecker, Head of Adversarial Risk Emulation and Simulation bei NVISO, erklärt, wie Red-Teaming-Projekte Unternehmen helfen, ihre Sicherheitsstrategie zu testen und zu verbessern. Weitere Informationen: eco zu einem digitalpolitischen Neustart nach der Bundestagswahl eco zum AI Action Summit eco übernimmt FACIS-Projektleitung Kontakt zum Cybercrime Kompetenzzentrum beim LKA NRW Kriminalitätslagebilder des LKA NRW Zentrale Ansprechstellen Cybercrime der Polizeien für Wirtschaftsunternehmen ----------- Redaktion: Christin Müller, Anja Wittenburg, Melanie Ludewig Schnitt: David Grassinger Moderation: Sidonie Krug, Sven Oswald Produktion: eco – Verband der Internetwirtschaft e.V.

Human Firewall Podcast
Geschichten aus der Praxis: Herausforderungen und Learnings in der Cybersicherheit #30

Human Firewall Podcast

Play Episode Listen Later Jan 29, 2025 31:01


Cyberangriffe werden immer raffinierter, und Unternehmen stehen vor der Herausforderung, ihre Sicherheitsstrategien kontinuierlich anzupassen. Doch wie gelingt es führenden Sicherheitsexperten, immer einen Schritt voraus zu bleiben? In dieser Episode werfen wir einen Blick hinter die Kulissen der IT-Sicherheit und sprechen mit Experten, die aus erster Hand berichten, welche Herausforderungen sie tagtäglich bewältigen müssen. Ethical Hacker und ProSec-Gründer Immanuel Bär, Axel Fährmann, CISO der Emil Frey Group, und Christian Klatt, CIO von Krombacher, teilen ihre Erfahrungen aus der Praxis: Welche Entwicklungen prägen die aktuelle Bedrohungslage? Warum reicht technische Absicherung allein nicht aus? Und welche Maßnahmen sind entscheidend, um Sicherheitslücken zu schließen? Moderiert von Dr. Christian Reinhardt, bietet diese Diskussion wertvolle Einblicke in den Kampf gegen Cyberkriminalität – von realen Vorfällen bis hin zu erfolgreichen Strategien, mit denen Unternehmen sich widerstandsfähiger aufstellen.

David Bombal
#486: 2025 Ethical Hacker Roadmap with lots of free training (NOT Sponsored)

David Bombal

Play Episode Listen Later Jan 9, 2025 44:39


This video is NOT sponsored by TCM Security and I DO NOT get any affiliate commission if you use the links in the video description to buy courses etc from TCM. Also, in the interest of transparency: Heath mentions in the video and in the linked article that references to TCM Security are marked as self-promotion. I love it that Heath is providing so much free training and low cost training to the community. Heath is very well known and respected in the cybersecurity community. I love that he is making so much content available for free via his YouTube channel and on his website. Watch his content on YouTube, take the free courses and also do you own research and make your own decisions about the training and references he mentions. There are so many options out there for free training - see my other videos for options like free training from Cisco and other providers. // Article / Blog REFERENCE // How to be an Ethical Hacker in 2025: https://tcm-sec.com/how-to-be-an-ethi... // YouTube Video REFERENCE // Real World Windows Pentest Tutorial (Demos of 5 Active Directory Hacks): • Real World Windows Pentest Tutorial (... Hacking Roadmap to Success: • Hacking Roadmap to Success: AMA with ... // TCM Security SOCIAL// YouTube (The Cyber Mentor): / thecybermentor LinkedIn : / tcm-security-inc Twitter : / tcmsecurity Discord: / discord Instagram: / tcmsecurity Facebook: / tcmsecure TikTok: / tcmsecurity Academy Website: https://academy.tcm-sec.com/ TCM Certifications: https://certifications.tcm-sec.com/ Discord: / discord Website: https://tcm-sec.com/ Breach Point Website: https://breachpoint.com/ // Heath Adam's SOCIAL // LinkedIn: / heathadams // David's SOCIAL // Discord: / discord X: / davidbombal Instagram: / davidbombal LinkedIn: / davidbombal Facebook: / davidbombal.co TikTok: / davidbombal YouTube: / @davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. // MENU // 0:00 - Coming up 0:28 - Intro 01:44 - Foundational Skills 03:14 - Basic IT Skills & Courses 04:48 - TCM Security Courses 06:01 - Networking Skills & Courses 07:17 - CCNA or Network+ ? 08:20 - Linux Skills & Course 10:33 - Learning should be free 11:05 - Coding/Scripting Skills & Course 13:52 - Security Skills & Course 16:20 - Ethical Hacking Skills & Course 20:40 - Content on Youtube 21:40 - Building up your skill set as a junior hacker 23:07 - Active Directory 23:36 - Web and Mobile Application Hacking 29:23 - Wireless Hacking 30:23 - Certifications 35:04 - Privilege Escalation 36:46 - Will AI Take Our Jobs? 38:27 - What Hacking Path Should You Take? 40:03 - How to Connect with Heath 42:52 - Heath's Advice 44:32 - Outro

Cybercrimeology
The Ethical Hacker Pathway: Exploring Positive Cyber Behavior

Cybercrimeology

Play Episode Listen Later Jan 1, 2025 23:21


Key Points Discussed:Defining Ethical Hacking: Ethical hackers use their skills to identify and report vulnerabilities, often to enhance cybersecurity in various capacities, including voluntary work, bug bounty programs, or professional roles.Research Focus: Dr. Kranenbarg's studies highlight a significant overlap between positive and negative cyber behaviors, particularly among IT students, and explore how individuals transition toward ethical hacking.Ethical Hacking as a Pathway:Early positive experiences, such as reporting vulnerabilities to schools or organizations, can strongly influence individuals toward ethical hacking.Responses from organizations play a critical role—positive reinforcement encourages further ethical behavior, while negative experiences can deter individuals.Challenges in Defining Ethics:Ethical hackers themselves debate the boundaries of what constitutes ethical behavior, such as whether making vulnerabilities public is acceptable if organizations fail to act.The term "ethical hacker" is often contentious within the community.Role of Education: Schools struggle to address and guide ethical behavior among IT students effectively. Clear vulnerability disclosure policies and ethics education in IT programs are crucial.Future Research Directions: Dr. Kranenbarg plans to conduct life-history interviews with hackers to better understand their pathways and influences toward ethical behavior.About our Guest:Dr Marleen Weulen Kranenbarghttps://research.vu.nl/en/persons/marleen-weulen-kranenbarg Papers or Resources Mentioned:Weulen Kranenbarg, M. (2018). Cyber-offenders versus traditional offenders: An empirical comparison. Vrije Universiteit Amsterdam. Retrieved from https://research.vu.nl/en/publications/cyber-offenders-versus-traditional-offenders-an-empirical-comparisonWeulen Kranenbarg, M., Ruiter, S., & Nieuwbeerta, P. (2018). Cyber-offending and traditional offending over the life-course: An empirical comparison. Crime & Delinquency, 64(10), 1270–1292. https://doi.org/10.1177/0011128718763134Weulen Kranenbarg, M., Holt, T. J., & van Gelder, J.-L. (2021). Contrasting cyber-dependent and traditional offenders: A comparison on criminological explanations and potential prevention methods. In J. van Gelder, H. Elffers, D. Reynald, & D. Nagin (Eds.), Routledge International Handbook of Criminology and Criminal Justice Studies (pp. 234–249). Routledge. Retrieved from https://research.vu.nl/en/publications/contrasting-cyber-dependent-and-traditional-offenders-a-comparisoWeulen Kranenbarg, M., & Noordegraaf, J. (2023). Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers. Criminology & Public Policy, 22(3), 465–490. https://doi.org/10.1111/1745-9133.12640Additional Resources:Capture the Flag (CTF) events:Hack the Box - A popular online platform offering a variety of CTF challenges to test and improve cybersecurity skills.https://www.hackthebox.comNorthSec - A popular  in-person CTF competition designed for everyone excited about cybersecurity.https://nsec.ioBug Bounty Programs:HackerOne - A leading bug bounty platform connecting ethical hackers with organizations to find and fix vulnerabilities.https://www.hackerone.comBugcrowd - A platform that hosts bug bounty programs for a wide range of companies and industries.https://www.bugcrowd.com

The Jerich Show Podcast
Hot mess at Hot Topic, Typhoons spreading botnets, ethical hacker dumps data and more!

The Jerich Show Podcast

Play Episode Listen Later Dec 6, 2024 18:02


Hey there, tech detectives and cyber sleuths! Grab your headphones and get ready for another wild ride through the digital jungle with Erich and Javvad. This week, we're diving into a hot mess at Hot Topic (pun totally intended) that's left 57 million people saying 'Uh-oh!' Plus, we'll take you on a typhoon-fueled adventure as China's notorious Volt Typhoon crew makes a shocking comeback. It's like a cyber soap opera, but with way more zeroes and ones! So, buckle up, buttercup – it's time to unravel these tangled webs of tech drama! Stories from the show: HIBP notifies 57 million people of Hot Topic data breach https://www.bleepingcomputer.com/news/security/hibp-notifies-57-million-people-of-hot-topic-data-breach/ China's Volt Typhoon crew and its botnet surge back with a vengeance https://www.theregister.com/2024/11/13/china_volt_typhoon_back/ Amazon MOVEit Leaker Claims to Be Ethical Hacker https://www.infosecurity-magazine.com/news/amazon-moveit-leaker-claims/

@BEERISAC: CPS/ICS Security Podcast Playlist
Episode 423 - Hacking the sky and uncovering the vulnerabilities of satellites

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 29, 2024 7:47


Podcast: Cyber Security Weekly Podcast (LS 38 · TOP 2% what is this?)Episode: Episode 423 - Hacking the sky and uncovering the vulnerabilities of satellitesPub date: 2024-11-27Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWe speak with Shahmeer Amir, CEO & Co-Founder of SpeeQR and his activities in hacking satellite transmissions.Shahmeer stands as a globally recognized Entrepreneur, world renowned public speaker and Ethical Hacker, awarded Entrepreneur of the year 2024 for founding multiple startups including Speeqr and also ranking as the third most accomplished bug hunter globally. Shahmeer has been invited to speak at 130 international conferences including Blackhat, DefCON, GiSec, National Security Summit, One Conference, and International Cyber Security. His expertise has been instrumental in assisting over 400 Fortune companies, such as Facebook, Microsoft, Yahoo, and Twitter, in resolving critical security issues within their systems. Shahmeer's entrepreneurial ventures in the technology realm have led to the establishment of multiple startups, with his current role involving the leadership of Speeqr, and involvement in Veiliux and Authiun. He serves as the Cyber Security Advisor to the Ministry of Finance in the Government of Pakistan. His involvement spans various projects, including Deep Sea Tracking, Digital Transformation of Legislation, and the Digitization of Pakistani Cultural Content. As a testament to his influence in the tech industry, he holds a position on the Forbes Technology Council.Cyber Security Asia 2024 took place on 7 – 8 October 2024 at ParkRoyal Hotel, Kuala Lumpur – bringing together top experts and practitioners for in-depth talks, and exclusive networking opportunities. It is a platform for the development of partnerships and strategies and highlights the latest technologies that are ensuring the safety and security of government, industry and individual.#mysecuritytv #austaraliainspacetv #csa2024 #spacecyberThe podcast and artwork embedded on this page are from MySecurity Media, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Cyber Security Weekly Podcast
Episode 423 - Hacking the sky and uncovering the vulnerabilities of satellites

Cyber Security Weekly Podcast

Play Episode Listen Later Nov 27, 2024 7:47


We speak with Shahmeer Amir, CEO & Co-Founder of SpeeQR and his activities in hacking satellite transmissions.Shahmeer stands as a globally recognized Entrepreneur, world renowned public speaker and Ethical Hacker, awarded Entrepreneur of the year 2024 for founding multiple startups including Speeqr and also ranking as the third most accomplished bug hunter globally. Shahmeer has been invited to speak at 130 international conferences including Blackhat, DefCON, GiSec, National Security Summit, One Conference, and International Cyber Security. His expertise has been instrumental in assisting over 400 Fortune companies, such as Facebook, Microsoft, Yahoo, and Twitter, in resolving critical security issues within their systems. Shahmeer's entrepreneurial ventures in the technology realm have led to the establishment of multiple startups, with his current role involving the leadership of Speeqr, and involvement in Veiliux and Authiun. He serves as the Cyber Security Advisor to the Ministry of Finance in the Government of Pakistan. His involvement spans various projects, including Deep Sea Tracking, Digital Transformation of Legislation, and the Digitization of Pakistani Cultural Content. As a testament to his influence in the tech industry, he holds a position on the Forbes Technology Council.Cyber Security Asia 2024 took place on 7 – 8 October 2024 at ParkRoyal Hotel, Kuala Lumpur – bringing together top experts and practitioners for in-depth talks, and exclusive networking opportunities. It is a platform for the development of partnerships and strategies and highlights the latest technologies that are ensuring the safety and security of government, industry and individual.#mysecuritytv #austaraliainspacetv #csa2024 #spacecyber

Trust Issues
EP 64 - Identity Reinvention: Insights From the World's First Augmented Ethical Hacker

Trust Issues

Play Episode Listen Later Oct 23, 2024 50:00


In this episode of the Trust Issues Podcast, host David Puner sits down with CyberArk's resident technical evangelist, white hat hacker and transhuman, Len Noe. They dive into Len's singular journey from a black hat hacker to an ethical hacker, exploring his identity reinvention and the fascinating world of subdermal microchip implants and offensive security. Len shares insights from his new book, "Human Hacked: My Life and Lessons as the World's First Augmented Ethical Hacker," which releases on October 29. They also discuss the relevance of Len's transhuman identity to his work in identity security.

Craft Brewery Finance Podcast
Breweries Beware: Cybercrime Tips from an Ethical Hacker

Craft Brewery Finance Podcast

Play Episode Listen Later Oct 18, 2024 48:26


Tom DeMayo is a partner with PKF O'Connor Davies, specializes in cybersecurity, and is a self-described 'ethical hacker'.Cybercrime is a $10 trillion problem globally, and breweries are target.In today's podcast, Tom shares how these crimes occur, how to find out if your brewery is vulnerable, and what steps you can take right now to prevent a ransomware attack. Key PointsTerms defined: Dark web, deep web, surface web, ransomwareHow hackers break in to your systems and what you can do to prevent thisBasics of compliance testing and risk assessmentTips for creating and managing those pesky login credentials The case for a cybersecurity committee ResourcesConnect with Tom and learn how to protect your beer business from cybercrimes, TDemayo@pkfod.com

Application Security PodCast
Phillip Wylie -- Pen Testing from Somebody who Knows about Pen Testing

Application Security PodCast

Play Episode Listen Later Sep 17, 2024 52:08


Join Robert and Chris Romeo as they dive into the world of pen testing with their guest Philip Wiley. In this episode, Philip shares his unique journey from professional wrestling to being a renowned pen tester. Hear some great stories from his wrestling days, in-depth discussions on application security, and good advice on starting a career in cybersecurity. Whether you're interested in pen testing techniques, learning about security origin stories, or gaining insights into career development, this episode has something for everyone!The Pentester Blueprint Starting a Career as an Ethical Hacker written by Phillip WylieThe Web Application Hacker's Handbook written by Dafydd Stuttard, Marcus PintoWhere to find Phillip:Website:  https://thehackermaker.com/Podcast: https://phillipwylieshow.com/X: https://x.com/PhillipWylieLinkedIn: https://www.linkedin.com/in/phillipwylie/FOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast➜LinkedIn: The Application Security Podcast➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast Thanks for Listening! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Tech.eu
No tech firm can say “software is never going to fail”, says ethical hacker, amid CrowdStrike fallout

Tech.eu

Play Episode Listen Later Aug 28, 2024 22:18


An interview with two experts on the CrowdStrike fallout and how businesses can limit impact of outage or cyber attack.

PBD Podcast
“Security is an Illusion” Ethical Hacker Exposes Child Predators & Tools To Protect Against Hackers | PBD Podcast | Ep. 459

PBD Podcast

Play Episode Listen Later Aug 23, 2024 124:52


Patrick Bet-David sits down with Ryan Montgomery, a renowned ethical hacker known for his expertise in cybersecurity and passion for child safety. Montgomery, who has been at the forefront of exposing online predators, shares insights into his journey as a hacker, his motivations for taking down dangerous websites, and the alarming vulnerabilities in today's digital world. ----

CyberIntel - Talking Cybersecurity and Compliance (Presented by VikingCloud)

In this episode of CyberIntel, Brian Odian discusses Len Noe – an Ethical Hacker with various technological implants. If you have any questions you want answered on CyberIntel, email us at cyberintel@vikingcloud.com and our experts will be in touch - we may even make it the subject of a future episode! CyberIntel provides a deep dive into the world of cybersecurity and compliance. Hosted by Brian Odian, VikingCloud's Director of Managed Compliance Services APAC, amongst other cybersecurity and compliance expert advisors, we explore the nuances of various compliance standards and the latest in cybersecurity news, trends and threats. New episodes every two weeks! CyberIntel is presented by VikingCloud. VikingCloud is leading the Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions - faster. VikingCloud is the one-stop partner trusted by 4+ million customers every day to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruption to their business. 

@BEERISAC: CPS/ICS Security Podcast Playlist
Tony Reshef CaaS @Electra group and others on the roll of contract Ciso & being an ethical hacker

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Jul 31, 2024 57:15


Podcast: ICS Cyber Talks PodcastEpisode: Tony Reshef CaaS @Electra group and others on the roll of contract Ciso & being an ethical hackerPub date: 2024-07-25גופים רבים שאינם יכולים להרשות לעצמם סיסו במשרה מלאה פונים לאופציה של סיסו אס הסרבייס. נחשון פינקו מארח את טוני רשף הסיסו של אלקטרה, מדיקל ארליסיין ויווויזן בין שאר הדברים שהיא עושה בשיחה על המשמעות של סיסו אס הסרביס, ההבדל בין סיסו אס הסרביס ויעוץ סייבר. איך בונים את התפקיד על מנת שיהיה אפקטיבי? החשיבות של סקרי סייבר, תוכנית עבודה ובדיקות חדירות לארגון. מהם גבולות הגזרה של הסיסו כאשר הוא אינו חלק אינטגרלי משדרת הניהול   Many organizations that cannot afford a full-time CISO use the Ciso as a Service (CaaS) option. Nachshon Pincu hosts Toni Reshef, serving as a contract Ciso for @Electra group, Medical EarlySign, and Uvision, among other things she does in a conversation about the meaning of CaaS, the difference between CaaS and cyber consulting. How do you build the CaaS position to be effective? What is the importance of cyber surveys, Cyber plans, and penetration tests (PT) for organizations? What are the limits of the CaaS when it is not an integral part of the management avenue?The podcast and artwork embedded on this page are from Nachshon Pincu, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

The Money Jar
#208: Learn about Warren Buffett; Dialysis Technician Jameson Futter

The Money Jar

Play Episode Listen Later Jul 24, 2024 22:33


In this episode, we'll learn about Warren Buffett, one of the most successful investors in history; we'll talk with Jameson Futter about his career as a dialysis technician; and we'll find out what a white hat hacker is. 

The Virtual CISO Moment
S6E37 - A Conversation with Mishaal Khan

The Virtual CISO Moment

Play Episode Listen Later Jul 16, 2024 23:58


Mishaal Khan is vCISO and Cybersecurity Practice Lead at Mindsight and is the co-author of The Phantom CISO. With a deep understanding of the bits & bytes to the business processes, he uses his experience and skillset as an Ethical Hacker, OSINT enthusiast and Social Engineer to help customers secure their organization and solve real-world challenges. He's spoke at premier conferences like Black Hat, DEF CON, Wild West Hacking Fest, TEDx, and SANS.

Cyber Work
Using the CEH to create an ethical hacker career path

Cyber Work

Play Episode Listen Later Jul 11, 2024 17:48 Transcription Available


Infosec and Cyber Work Hacks are helping train the red teamers and blue teamers of tomorrow with our boot camps and study materials for the CEH exam. But how does ethical hacking proficiency translate into a satisfying career? Infosec's CEH boot camp instructor Akyl Phillips has plenty of strategies to help you get focused and stay focused on your studies, some excellent tips for keeping on top of the latest security changes and innovations, and how you're going to push past uncertainty and into the work of putting one foot in front of another in your quest to become a bona-fide, in-demand ethical hacker! Keep the enthusiasm up when you check out today's Cyber Work Hack. 0:00 - Ethical hacker career1:57 - Testing for the CEH certification2:55 - Career paths to pursue with CEH certification5:08 - Working in pentesting or ethical hacking7:55 - Unglamours side of ethical hacking 9:49 - How to keep up with new tech11:39 - Switching careers to ethical hacking12:45 - Preparing for a CEH role interview13:23 - Don't fear a cybersecurity career15:03 - Outro– Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcastAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.

ITSPmagazine | Technology. Cybersecurity. Society
Cybersecurity Leadership: AL, Burnout, and Success Strategies | A Conversation with Jack Leidecker | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 9, 2024 29:44


ITSPmagazine | Technology. Cybersecurity. Society
The Importance of Cyber Peace | A Conversation with Gabrielle Botbol | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jun 25, 2024 25:30


Guest: Gabrielle Botbol, Offensive Security Advisor, DesjardinsWebsite: https://csbygb.github.io/LinkedIn: https://www.linkedin.com/in/gabriellebotbol/Twitter/X: https://twitter.com/Gabrielle_BGBHost: Dr. Rebecca WynnOn ITSPmagazine  

PODCAFÉ DA TI
#183 - Romulo S. - Amor a primeiro CODE!

PODCAFÉ DA TI

Play Episode Listen Later May 28, 2024 67:10 Transcription Available


PODCAFÉ DA TI
Romulo S. - Trailer

PODCAFÉ DA TI

Play Episode Listen Later May 27, 2024 3:09 Transcription Available


A verdade oculta da segurança cibernética: Você está realmente protegido?

Cyber Sip
“Keeping Hackers at Bay: The Role of an Ethical Hacker”

Cyber Sip

Play Episode Listen Later May 15, 2024 28:42


Kevin and guest Ziming Zhao, assistant professor in the Department of Computer Science and Engineering at the University at Buffalo, discuss Ziming's work in systems and software security. They focus on ethical hacking and its goal of responsibly disclosing vulnerabilities to vendors. Ziming says that hacking can be fun and doing it ethically serves a purpose, though he emphasizes that ethical hacking is not a guarantee of absolute security. Companies still need to have a security in design mindset. Ethical hackers can help raise the security bar for companies and organizations. Ziming also discusses the relationship between academia and industry in the field of ethical hacking. 

Cyber Security Weekly Podcast
Episode 399 - Ask the Hackers session on the Dark Stage - interview with Ethical Hacker

Cyber Security Weekly Podcast

Play Episode Listen Later May 9, 2024


We speak with Alina Tan, Ethical Hacker and Security Architect based in Singapore.Alina is a former Top 30 Women in Cybersecurity Singapore (now the Top Women in Security ASEAN Region Awards).GISEC Global 2024 attracted more than 20,000 attendees from over 130 countries to the Dubai World Trade Center. Taking place over three days, April 23-25, the event provides a platform for more than 750 brands to showcase their innovations. #gisec #gisecglobal #mysecuritytv #womenincybersecurity #topwomeninsecurityASEAN

ITSPmagazine | Technology. Cybersecurity. Society
Is there a Frankenstein's Industry Monster lurking in the shadow at RSAC 2024? | Cybersecurity Chronicles from Broadcast Alley with Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 8, 2024 35:20


Guest: Christina Stokes, Host, On Cyber & AI Podcast, Founder of Narito CybersecurityOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokesOn LinkedIn | https://www.linkedin.com/in/xTinaStokes/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe Evolution of CybersecurityThe dialogue initiated by Sean, Christina, and Marco shed light on how cybersecurity has matured over the years. From the early days of hacking as a hobby to the current focus on ethical practices, the panelists emphasized the importance of adapting to the changing technological landscape. They discussed how regulations, policies, and laws have played a crucial role in shaping the cybersecurity industry, emphasizing the need for responsible use of technology to prevent it from becoming a monster.AI and Its ImplicationsThe conversation also touched upon the growing role of Artificial Intelligence (AI) in cybersecurity. While AI has brought about advancements in threat detection and response, there are concerns about privacy and data protection. The panelists emphasized the importance of using AI ethically and responsibly to avoid potential risks associated with its misuse.Supply Chain VulnerabilitiesA significant portion of the discussion revolved around supply chain vulnerabilities and the interconnected nature of global industries. The experts highlighted the importance of understanding and securing supply chains, particularly in the context of operational technology and manufacturing processes. They stressed the need for resilience and innovation to address evolving cybersecurity threats.The Human Element in CybersecurityThroughout the conversation, the experts reiterated the significance of human connections and collaborations in the cybersecurity domain. They emphasized the need for organizations to invest in education, training, and building strong relationships within the industry to combat cyber threats effectively. The dialogue underscored the essential role of people in securing digital ecosystems and fostering a culture of cybersecurity awareness.Looking Towards the FutureAs the discussion came to a close, Sean, Christina, and Marco expressed optimism about the future of cybersecurity. They discussed upcoming trends such as Generative AI, AI Bill of Materials, and the continued focus on governance, data security, and AI ethics. The experts highlighted the importance of ongoing conversations, collaborations, and innovation in driving the industry forward.This insightful chat at RSAC 2024 offered valuable perspectives on the current challenges and opportunities in cybersecurity. The experts' nuanced discussions about AI, supply chain vulnerabilities, and human-centric cybersecurity shed light on the complex nature of the digital threat landscape. As we navigate the evolving cybersecurity landscape, collaboration, innovation, and a shared commitment to ethical practices will be key to ensuring a secure digital future.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:

Redefining CyberSecurity
Is there a Frankenstein's Industry Monster lurking in the shadow at RSAC 2024? | Cybersecurity Chronicles from Broadcast Alley with Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli

Redefining CyberSecurity

Play Episode Listen Later May 8, 2024 35:20


Guest: Christina Stokes, Host, On Cyber & AI Podcast, Founder of Narito CybersecurityOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokesOn LinkedIn | https://www.linkedin.com/in/xTinaStokes/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe Evolution of CybersecurityThe dialogue initiated by Sean, Christina, and Marco shed light on how cybersecurity has matured over the years. From the early days of hacking as a hobby to the current focus on ethical practices, the panelists emphasized the importance of adapting to the changing technological landscape. They discussed how regulations, policies, and laws have played a crucial role in shaping the cybersecurity industry, emphasizing the need for responsible use of technology to prevent it from becoming a monster.AI and Its ImplicationsThe conversation also touched upon the growing role of Artificial Intelligence (AI) in cybersecurity. While AI has brought about advancements in threat detection and response, there are concerns about privacy and data protection. The panelists emphasized the importance of using AI ethically and responsibly to avoid potential risks associated with its misuse.Supply Chain VulnerabilitiesA significant portion of the discussion revolved around supply chain vulnerabilities and the interconnected nature of global industries. The experts highlighted the importance of understanding and securing supply chains, particularly in the context of operational technology and manufacturing processes. They stressed the need for resilience and innovation to address evolving cybersecurity threats.The Human Element in CybersecurityThroughout the conversation, the experts reiterated the significance of human connections and collaborations in the cybersecurity domain. They emphasized the need for organizations to invest in education, training, and building strong relationships within the industry to combat cyber threats effectively. The dialogue underscored the essential role of people in securing digital ecosystems and fostering a culture of cybersecurity awareness.Looking Towards the FutureAs the discussion came to a close, Sean, Christina, and Marco expressed optimism about the future of cybersecurity. They discussed upcoming trends such as Generative AI, AI Bill of Materials, and the continued focus on governance, data security, and AI ethics. The experts highlighted the importance of ongoing conversations, collaborations, and innovation in driving the industry forward.This insightful chat at RSAC 2024 offered valuable perspectives on the current challenges and opportunities in cybersecurity. The experts' nuanced discussions about AI, supply chain vulnerabilities, and human-centric cybersecurity shed light on the complex nature of the digital threat landscape. As we navigate the evolving cybersecurity landscape, collaboration, innovation, and a shared commitment to ethical practices will be key to ensuring a secure digital future.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:

The TechTual Talk
From Army Intelligence Analyst to Corporate Ethical Hacker

The TechTual Talk

Play Episode Listen Later May 1, 2024 104:16


Dive into the compelling journey of Tiffany Savage on this week's episode of The TechTual Talk as she transitions from an Army Intelligence Analyst to a revered figure in Corporate Ethical Hacking. Discover the challenges and triumphs of her path that's far from ordinary.In this enlightening interview, Henri, our seasoned host, engages Tiffany in a deep-dive conversation about her unique experiences in the military, her strategic moves within the corporate world, and her current pioneering role in cybersecurity. They explore how her military background shaped her problem-solving skills and strategic thinking, preparing her for the high-stakes world of ethical hacking in a corporate environment.Listeners gain insider insights on the importance of certifications like CISSP, Comptia Security+, and the real value they bring to cybersecurity roles. The dialogue delves into the necessary foundational knowledge and the reality of navigating job markets strengthened by authentic certifications.Tiffany shares her firsthand experiences with high-pressure roles at notable companies, including Amazon, and how these experiences helped pivot her focus towards security-focused roles that resonate more deeply with her expertise and passions.Moreover, Tiffany and Henri tackle broader societal issues, discussing the impacts of media and technology on young audiences, emphasizing the ethical considerations in cybersecurity. They highlight how critical thinking and customer-oriented strategies lead to sustained business success and stronger defense mechanisms in an era ripe with information security challenges.**What you'll learn:**- The transition nuances from military to corporate careers.- Essential cybersecurity certifications and their real-world impacts.- Strategic career planning and ethical decision-making in technology.- The societal implications of cybersecurity on younger audiencesSupport the Show.If you enjoyed the show don't forget to leave us a 5 star review, to help with the algorithm :) Email: henridavis@thetechtualtalk.com➡️ Need coaching help then go here (ask about our financing)⬇️https://techualconsulting.com/offerings➡️ Want to land your first IT Job? Then check out the IT course from Course careers use my link and code Techtual50 to get $50 off your course ⬇️https://account.coursecareers.com/ref/50932/➡️ Need help getting into Cybersecurity for a low price then check out Josh Madakor's Cybersecurity course at Leveld Careers and use my code TechTual10 to get 10%off your course. ⬇️https://www.leveldcareers.com/a/2147530874/RuqjrBGjIf you want a high paying role in the cloud then click here⬇️https://Levelupintech.com/techStop data brokers from exposing your information with Aura!Click the link below to try out Aura's FREE 14 day trial and see if your personal information has been compromised

The BlueHat Podcast
Beyond the Code: Ethics and AI with Katie Paxton-Fear

The BlueHat Podcast

Play Episode Listen Later May 1, 2024 43:42


Cyber Security Content Creator, Speaker & Ethical Hacker, Katie Paxton-Fear, joins Nic Fillingham on this week's episode of The BlueHat Podcast. Katie holds a PhD in defense and security AI plus cybersecurity and works as an academic, teaching undergraduate students cybersecurity topics. She also runs a popular YouTube channel focused on bug bounty hunting, hacking, and pen testing. Katie shares her journey into cybersecurity, reflects on her initial interest in undeciphered languages and how it parallels her approach to cybersecurity, both involving a fascination with solving mysteries and uncovering hidden meanings. In This Episode You Will Learn: Approaching AI systems with caution when translating less-documented languages Concerns surrounding the use of copyrighted training data in AI systems Recognizing and addressing AI system limitations and biases in real-world deployments. Some Questions We Ask: Can fine-tuning AI models prevent degradation and improve performance? What are the ethical implications of putting sensitive information into AI systems How does relying on niche or obscure training data impact AI models? Resources: View Katie Paxton-Fear on LinkedIn View Wendy Zenone on LinkedIn View Nic Fillingham on LinkedIn Related Microsoft Podcasts: Microsoft Threat Intelligence Podcast Afternoon Cyber Tea with Ann Johnson Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Hosted on Acast. See acast.com/privacy for more information.

Great Women In Fraud
Can Hacking be Ethical? with Mishaal Khan aka The Ethical Hacker

Great Women In Fraud

Play Episode Listen Later Apr 30, 2024 39:51


This week on Fraudish Kelly speaks with the Ethical Hacker himself,  Mishaal Khan,  who provides much needed and actionable information about all things privacy and protection. Freeze your credit, use a password manager and use multi-factor authentication straight away.  Crime as a service is a real thing.  This is a must listen episode!Links: https://www.linkedin.com/in/mish-aal/https://www.mishaalkhan.com/https://ipconfigz.com/https://www.operationprivacy.com/https://wildwesthackinfest.com/https://www.bleepingcomputer.com/news/security/anonymous-poop-gifting-site-hacked-customers-exposed/https://www.ipconfigz.com/osint/https://att.pentester.com/search

The Cybersecurity Defenders Podcast
#120 - Open Source Intelligence with Mishaal Khan, Cybersecurity Practice Lead at Mindsight

The Cybersecurity Defenders Podcast

Play Episode Listen Later Apr 30, 2024 39:18


In this episode of The Cybersecurity Defenders Podcast, we take a close look at Open Source Intelligence with Mishaal Khan, Cybersecurity Practice Lead at Mindsight.Misshal is a jack of all trades and master of some! With a profound knack for thinking like the bad guys, Misshal harnesses his extensive knowledge—from the nitty-gritty of bits and bytes to intricate business processes. As a techie, Ethical Hacker, OSINT enthusiast, and Social Engineer, he leverages his diverse skillset to help organizations fortify their defenses and tackle real-world security challenges. You can find out more about his book, The Phantom CISO, on his website, here.And you can learn more about Operation Privacy here.

MSP Business School
Preventing Cybercrime Why Every Business Ned to Prioritize Cybersecurity

MSP Business School

Play Episode Listen Later Apr 30, 2024 36:52


In this informative episode of MSP Business School, host Brian Doyle engages in conversation with cybersecurity expert Matt Quammen, President of Optimized Cyber.   Together, they unravel the intricate world of cyber protection, showcasing the significance of safeguarding businesses in today's digital age. This dialogue invites listeners to explore the realms of vulnerability scanning and penetration testing, emphasizing their roles in maintaining robust security infrastructures. Quammen emphasizes the importance of remembering 'why' businesses must prioritize cybersecurity – to prevent the crippling financial losses that cybercrimes can inflict. As a guiding principle that steers all cybersecurity endeavors, this 'why' permeates Matt's advocacy for simple yet effective security strategies. Emphasizing the three pillars of cyber risk – IT and security management, cyber insurance, and risk management – they dissect how each element buttresses a business's defense against cyber threats. Detailed discussions around the necessity of manual, professional penetration testing versus automated vulnerability scanning are elucidated, conveying the gravity of personalized security measures. Key Takeaways: Cybersecurity should be underpinned by a passion for protecting businesses from financial losses due to cyber attacks. Simplifying cybersecurity for business owners is essential; focus on practical measures like Multi-Factor Authentication (MFA) and password management. A comprehensive approach to cyber risk involves 24/7 IT and security management, cyber insurance, and risk management through regular audits and third-party tests. Penetration testing, as distinguished from vulnerability scanning, must be a manual effort to emulate the behaviors of real-world attackers. MSP businesses can expand their services and value to clients by becoming the 'governor' of cybersecurity, orchestrating the right tools, processes, and partnerships. No views Apr 27, 2024 Show Website: https://mspbusinessschool.com/ Guest Matthew Quammen, President | Optimize CyberLinkedin page:   / matthewquammen    Company: website: https://optimizecyber.com/ Hosts Brian Doyle:  https://www.linkedin.com/in/briandoylevciotoolbox/

Corporate Strategy
118. Interview with an Ethical Hacker

Corporate Strategy

Play Episode Listen Later Apr 29, 2024 37:36 Transcription Available


Ever wondered if your digital fortress can withstand a full-scale cyber siege? Buckle up as Squidboi, our corporate fam discord's virtuoso of virtual vulnerabilities, takes us on a rollercoaster ride through the landscape of offensive security. This episode promises to arm you with the know-how of ethical hacking that's essential for keeping corporate networks safe. We kick things off with a casual chat about the upcoming summer and the peculiar world of 'ghost jobs', setting the stage for a deep-dive into Squidboi's daily grind as a cybersecurity consultant.As the conversation progresses, we peel back the layers of penetration testing and cybersecurity consulting, exposing the skills that transcend coding prowess and the persistence needed when scouring systems for elusive security gaps. Squidboi regales us with tales from the trenches—where creativity is king, and late-night excursions into digital defenses are just another Monday. Plus, we get the scoop on how cybersecurity professionals stay nimble in a landscape peppered with ever-evolving threats and custom integrations.Don't miss the electrifying discussion on bug bounties and the tools of the trade, including the nifty Flipper Zero, which could give Q from James Bond a run for his money. Squidboi casts a light on the paradoxical pressures of offensive security consulting, where boasting an impenetrable defense is practically an invitation for trouble. By the time we wrap up, you'll have a hearty dose of insights and inspiration, whether you're a seasoned pro or just curious about what it takes to join the ranks of ethical hackers safeguarding our digital domain.Everything Corporate Strategy: All the links!Elevator Music by Julian Avila Promoted by MrSnoozeDon't forget ⭐⭐⭐⭐⭐ it helps!

Side Hustle School
#2658 - TBT: Ethical Hacker Earns Big “Bug Bounties”

Side Hustle School

Play Episode Listen Later Apr 11, 2024 7:08


In this week's “Throwback Thursday / Where are they now?” segment, we hear from an ethical hacker who carved out a niche in cybersecurity by safeguarding small businesses. Today, we're updating you on his pivot to earning through bug bounties. Side Hustle School features a new episode EVERY DAY, featuring detailed case studies of people who earn extra money without quitting their job. This year, the show includes free guided lessons and listener Q&A several days each week. Show notes: SideHustleSchool.com Email: team@sidehustleschool.com Be on the show: SideHustleSchool.com/questions Connect on Instagram: @193countries Visit Chris's main site: ChrisGuillebeau.com Read A Year of Mental Health: yearofmentalhealth.substack.com If you're enjoying the show, please pass it along! It's free and has been published every single day since January 1, 2017. We're also very grateful for your five-star ratings—it shows that people are listening and looking forward to new episodes.

The Full Nerd
Episode 293: Ethical Hacker Talks Windows Security, AI Concerns, Future Trends & More

The Full Nerd

Play Episode Listen Later Mar 5, 2024 138:58


Join The Full Nerd gang as they talk about the latest PC hardware topics. In this episode the gang is joined by CEH and CISSP Mike Danseglio to talk about all things security, including Windows 11, AI, BitLocker, and so much more. And as always we answer your questions live! Join the PC related discussions and ask us questions on Discord: https://discord.gg/SGPRSy7 Follow the crew on Twitter: @GordonUng @BradChacos @MorphingBall @AdamPMurray Follow PCWorld for all things PC! ------------------------------­---- SUBSCRIBE: http://www.youtube.com/subscription_center?add_user=PCWorldVideos TWITTER: https://www.twitter.com/pcworld

MSP Business School
EP 186 The Real Difference between Vulnerability Scans and Pen Tests

MSP Business School

Play Episode Listen Later Feb 27, 2024 31:25


Show Website: https://mspbusinessschool.com/ Guest: Name: Frank Raimondi Linkedin page: https://www.linkedin.com/in/frankraimondi/ Company: IGI Cybersecurity & Nodeware Website(s): https://igicybersecurity.com/ and https://nodeware.com/ About the Guest(s): Frank Raimondi is a seasoned channel and partner strategy specialist currently associated with IGI Global, working specifically with their Nodeware product. With a wealth of experience spanning over two decades, Frank has a track record of fostering partnerships and alliances in the tech industry. He has previously held notable positions at Apple Computer and Intel, where he focused on maximizing value from hardware components and driving vendor relationships. His entry into the cybersecurity and software realm marks a significant transition from his earlier focus on hardware. Episode Summary: In the latest installment of MSP Business School, we are joined by cybersecurity expert Frank Raimondi from Nodeware, a part of IGI Global. This episode dives into the intricate differences between penetration testing and vulnerability scanning and their integration into the assessment processes for security validation. We unravel the essentials defining each concept and explore their roles in fortifying MSPs against increasing cyber threats. Frank Raimondi elaborates on the vital mechanics behind vulnerability assessments and management, illustrating how these defenses act as a company's internal security checkpoints. In contrast, he clarifies the crucial role of penetration testing performed by an external third party to ethically evaluate the security from an outsider's perspective. The conversation further navigates the relationship between these tests, cybersecurity insurance, and regulatory compliance, underlining the importance of ongoing scrutiny in an ever-evolving threat landscape. Key Takeaways: Vulnerability Assessments vs. Management: A snapshot of current system vulnerabilities against a continuous, proactive approach to mitigating them. The Necessity for External Penetration Testing: MSPs must ensure that an independent third party carries out penetration tests for unbiased security validation. Preparation for Compliance and Insurance: Active vulnerability management programs are becoming essential prerequisites for regulatory compliance and favorable cybersecurity insurance premiums. Strategic Scheduling of Cybersecurity Tests: Implementing vulnerability management can prepare a system for penetration testing and vice versa. Importance of Cyber Hygiene: Frank highlights four pillars of cyber hygiene: security awareness training, MFA, email security, and vulnerability management. Hosts Brian Doyle: https://www.linkedin.com/in/briandoylemetathinq/ Robb Rogers: https://www.linkedin.com/in/robb-rogers-07415251/ Tim McNeil: https://www.linkedin.com/in/timmcneil3/ Sponsors vCIOToolbox: https://vciotoolbox.com OSR Manage: https://osrmanage.com  

5 Minute Career Hack™️
Inside the Mind & Career of a Military-Trained Ethical Hacker

5 Minute Career Hack™️

Play Episode Listen Later Feb 5, 2024 24:05


#best0f2023 This week's episode turns to the infinite growth industry of Cybersecurity as Jamila speaks with the expert military-trained guru Jihana Barrett. The stark reality is that "everyone will be compromised," emphasizing the critical need to stay informed to protect yourself effectively. Jihana shares essential strategies to fortify your defenses, including the imperative to avoid complacency with passwords and the use of "weak passwords." Throughout this episode, you are encouraged to adopt a "security lens" in your thinking, understanding how this perspective can safeguard you from the ever-evolving landscape of cyber threats. Jihana Barrett's unique journey is unveiled as she divulges the reasons behind her departure from the cybersecurity field a year ago and her triumphant return. Her story resonates with those seeking to align passion with innate talents, underscoring a powerful revelation: When your expertise is a divine gift, even when it doesn't energize you, you can become an expert if you find your path. Let's Hack! Connect with Jihana Barrett: https://www.cybrsuite.com/ Rate & Review the podcast and send us a screenshot of your review on Instagram https://bit.ly/5mchinstagram and we will send you a premium course for FREE. --- Support this podcast: https://podcasters.spotify.com/pod/show/5minutecareerhack/support

Seriously, Dad? Podcast
Seriously, Dad? S2. Ep. 2: "The Dark Web" w/ Cybersecurity Consultant Sarah Hume

Seriously, Dad? Podcast

Play Episode Listen Later Feb 4, 2024 58:58


Today the Dads chat with Cybersecurity Consultant Sarah Hume about her work as an Ethical Hacker! We discuss what things should we all be thinking about when on a device. And don't miss Albert as he tries to create his own internet and look for a portal to the Dark Web! Check it out! Tell a Friend!FOLLOW GUEST: Sarah HumeFOLLOW THE PODCAST:IG: https://www.instagram.com/seriouslydadpod/TW: https://twitter.com/SeriouslyDadPodWebsite: https://droptent.com/podcasts/seriously-dadFOLLOW YOUR HOSTS:Al Davis:https://www.instagram.com/albertdavis_4th/https://www.facebook.com/albert.davis.940641Jay Yoder:https://sites.google.com/view/jay-yoder-comedyhttps://www.instagram.com/jayyodercomedy/https://www.facebook.com/jonathanayoderComedian Neil Wood - Producer:Neil on YT: @IamNeilWoodhttps://www.instagram.com/iamneilwood/https://iamneilwood.com/A DropTent Media Network Podcast - https://droptent.com/

eXecutive Security
How to Get Started as a Pen Tester With Phillip Wylie

eXecutive Security

Play Episode Listen Later Jan 25, 2024 16:53


Want to start a career as a pen tester? Phillip Wylie literally wrote the book on the topic. Gene and Phillip, co-author of The Pentester Blueprint: Starting a Career as an Ethical Hacker and host of the Phillip Wylie Show, have a wide-ranging and advice-filled conversation on:His career journey and his podcastStarting a pen testing careerCollegiate Cyber Defense CompetitionsHow to leverage B-SidesMorePhillip Wylie on LinkedIn: https://www.linkedin.com/in/phillipwylie/The Pentester Blueprint: https://www.amazon.com/Pentester-BluePrint-Your-Guide-Being/dp/1119684307

Clear Money Talk
Just The Answer: What is Cybersecurity and Why is it Important?

Clear Money Talk

Play Episode Listen Later Jan 22, 2024 4:42


Visit with Tim & Tyler as they discuss their recent insights obtained from an Ethical Hacker. Learn to better protect your identity and your privacy.

Clear Money Talk
What is Cybersecurity and Why is it Important?

Clear Money Talk

Play Episode Listen Later Jan 22, 2024 32:16


Visit with Tim & Tyler as they discuss their recent insights obtained from an Ethical Hacker. Learn to better protect your identity and your privacy.

Trust Issues
EP 42 - Year in Review 2023: Unleashing AI, Securing Identities

Trust Issues

Play Episode Listen Later Dec 27, 2023 35:22


In this year-end Trust Issues podcast episode, host David Puner takes listeners on a retrospective jaunt through some of the show's 2023 highlights. The episode features insightful snippets from various cybersecurity experts and thought leaders, each discussing crucial aspects of the ever-evolving cyber landscape. From discussions on the dynamic nature of threat actors and the need for agile security approaches to insights on identity security challenges in the cloud and the intricacies of safeguarding data, the episode encapsulates a wealth of knowledge shared by industry professionals. With diverse perspectives on generative AI, risk management, cloud security, DevSecOps – and even a personal bear wrestling story – Trust Issues' 2023 cannon delivers an engaging compilation for both cybersecurity enthusiasts and industry practitioners. As the podcast looks back on the year's diverse lineup of guests, it serves as a valuable resource for anyone seeking to stay informed about the latest cybersecurity trends, strategies and challenges. The episode emphasizes the importance of adapting to the rapidly changing threat landscape, adopting innovative security practices and fostering collaboration to address the multifaceted nature of cyber risks in the modern digital era. Clips featured in this episode from the following guests:Eran Shimony, Principal Security Researcher, CyberArk LabsAndy Thompson, Offensive Security Research Evangelist, CyberArk LabsEric O'Neill, Former FBI Counterintelligence Operative & Current National Security Strategist Shay Nahari, VP of Red Team Services, CyberArkDiana Kelley, CISO, Protect AI Len Noe, Technical Evangelist, White Hat Hacker & Biohacker, CyberArkTheresa Payton, Former White House CIO, Founder & CEO of Fortalice SolutionsLarry Lidz, VP & CISO, Cisco CX CloudMatt Cohen, CEO, CyberArkCharles Chu, GM of Cloud Security, CyberArkBrad Jones, CISO & VP of Information Security, Seagate TechnologyDusty Anderson, Managing Director, Global Digital Identity, ProtivitiPhilip Wylie, Offensive Security Professional, Evangelist & Ethical Hacker

Cybercrime Magazine Podcast
Cybercrime Magazine Update: Who Is Jackson Henry? Teenage Ethical Hacker Working With Mastercard.

Cybercrime Magazine Podcast

Play Episode Listen Later Dec 11, 2023 3:53


Mastercard reports that 18-year-old Jackson Henry is one of an increasingly sought-after band of ethical hackers who try to break into systems to uncover potential weaknesses. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com

2 Cents Podcast
Unlocking Cybersecurity w/ Shawon Mir, Ethical hacker, Freelancer

2 Cents Podcast

Play Episode Listen Later Oct 6, 2023 72:18


Guest: Shawon Mir, Ethical hacker, Freelancer In this episode of the 2 Cents Podcast, we have an eye-opening discussion with Shawon Mir, an Ethical Hacker and Freelancer, about the untapped opportunities and future of ethical hacking in Bangladesh. If you're curious about making a mark in the cybersecurity world, you won't want to miss this one! Topics Covered: Who is Shawon Mir?: A brief introduction to our guest, his journey into ethical hacking, and what it means to be an ethical hacker in Bangladesh. The Ethical Hacking Landscape in BD: Shawon shares his insights on the current state of ethical hacking and cybersecurity in Bangladesh. Challenges and Hurdles: What are the roadblocks you might face if you choose this career path in BD? Shawon breaks it down for us. Breaking In: Tips and strategies for newcomers to get started in the ethical hacking field. Job Market and Freelancing: A look at both traditional job opportunities and freelancing options available in Bangladesh for ethical hackers. Legal Framework: How does Bangladesh law view ethical hacking? What are the legal responsibilities? Future Prospects: Shawon discusses the future of ethical hacking in Bangladesh, including emerging trends and technologies. Q&A Session: We open the floor to listener questions about ethical hacking, cybersecurity, and job opportunities in the field.

Logically Speaking
Trained to Protect: Creating a Culture of Security with Tiffany Ricks

Logically Speaking

Play Episode Listen Later Oct 2, 2023 53:13


Happy cybersecurity awareness month! In this week's episode of Logically Speaking, we welcome special guest, Tiffany Ricks, Founder and CEO of HacWare, to share her experiences in IT and Cybersecurity and the major challenges facing businesses today. As a former Ethical Hacker, Tiffany saw first hand how hard it was for companies to protect their company from phishing attacks and other threats. But, having the right support within an organization can make being compromised a bit harder for attackers. Steve and Tiffany dive in to: Preventing disgruntled employees from turning into insider threatsDiscovering how to cultivate a culture of security in an organizationTop current and emerging threats facing businesses todayLearn more about the importance of training your employees and the positive impacts it will have for you.

Trust Issues
EP 36 - The Evolution of an Ethical Hacker

Trust Issues

Play Episode Listen Later Sep 21, 2023 36:12


Our guest today is Phillip Wylie, an offensive security professional and evangelist, author and podcast host who recently added director of services and training at Scythe to his extensive CV. Wylie talks with host David Puner about the critical need for ethical hacking in cybersecurity, identity security revelations from years of penetration testing, and his fascinating career arc, which began in professional wrestling.  Considering a cybersecurity career? You won't want to miss this episode – Wylie's passion for cybersecurity education and mentorship is contagious. Plus, you'll discover many unexpected parallels between pro wrestling and red teaming – and how they can help strengthen your organization's digital defenses.

Application Security PodCast
Maril Vernon -- You Get What You Inspect, Not What You Expect

Application Security PodCast

Play Episode Listen Later Aug 29, 2023 40:43 Transcription Available


Maril Vernon is passionate about Purple teaming and joins Robert and Chris to discuss the intricacies of purple teaming in cybersecurity. She underscores the significance of fostering a collaborative environment between developers and the security team. Drawing from her experiences, Maril shares the challenge of development overlooking her remediation recommendations. She chose to engage directly with the developers, understanding their perspective and subsequently learning to frame her remediations in developer-centric language. This approach made her recommendations actionable and bridged the communication gap between the two teams.Maril also looks into the future of purple teaming, envisioning a landscape dominated by automation and AI tools. While these tools will enhance the efficiency of certain tasks, she firmly believes that the human element, especially the creativity and intuition of red teamers, will remain irreplaceable. She envisions a future where dedicated purple teams might be replaced by a more holistic approach, or white teams, emphasizing collaboration across all departments.Maril's powerful message on the essence of security: "You get what you inspect, not what you expect." She emphasizes the importance of proactive inspection and testing rather than relying on assumptions. And she re-states the centrality of cooperation between teams. Maril's insights serve as a reminder of the dynamic nature of cybersecurity and the need for continuous adaptation and collaboration.Helpful Links:Follow Maril: @shewhohacksPurple Team Exercise Framework: https://github.com/scythe-io/purple-team-exercise-frameworkScythe: https://scythe.io/MITRE ATT&CK Framework: https://attack.mitre.org/MITRE ATT&CK Navigator: https://github.com/mitre-attack/attack-navigatorAttackIQ: https://www.attackiq.com/SafeBreach: https://www.safebreach.com/ PlexTrac - https://plextrac.com/Atomic Red Team: https://atomicredteam.io/Book Recommendations: Security+ All-in-One Exam Prep: https://www.mheducation.com/highered/product/comptia-security-all-one-exam-guide-sixth-edition-exam-sy0-601-conklin-white/9781260464009.htmlThe Pentester BluePrint - https://www.wiley.com/en-us/The+Pentester+BluePrint:+Starting+a+Career+as+an+Ethical+Hacker-p-9781119684305The First 90 Days - https://hbr.org/books/watkinsFOLLOW OUR SOCIAL MEDIA: ➜Twitter: @AppSecPodcast➜LinkedIn: The Application Security Podcast➜YouTube: https://www.youtube.com/@ApplicationSecurityPodcast Thanks for Listening! ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cloud Security Podcast
The Azure Cloud Security Pentesting Skills You NEED!

Cloud Security Podcast

Play Episode Listen Later Aug 28, 2023 29:14


Karl Fosaaen, the author of Penetration Testing "Azure for Ethical Hacker" and the VP of Research at NetSPI, came as a guest to share why the penetration Test of a Web Application hosted on Azure Cloud in 2023 is quite different to just a simple/traditional web app pentesting and the skills you need to pentest Azure environments. Cloud Penetration testing is misunderstood to be just config review in Microsoft Azure Cloud just like in AWS and Google Cloud. In this video, we have Karl Fosaaen was kind enough to answer the following questions and methods. Episode YouTube: ⁠ ⁠⁠⁠Video Link⁠⁠⁠⁠⁠⁠ Host Twitter: Ashish Rajan (⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@hashishrajan⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠) Guest Socials: Karl's Linkedin (⁠⁠⁠⁠Karl Fosaaen) Podcast Twitter - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@CloudSecPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ If you want to watch videos of this LIVE STREAMED episode and past episodes - Check out our other Cloud Security Social Channels: - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security Newsletter ⁠⁠⁠⁠⁠⁠ - ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Cloud Security BootCamp⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Spotify TimeStamp for Interview Question (00:00) Introduction (02:32) A bit about Karl Fosaaen (03:26) How is pentesting in Azure different from AWS? (04:35) Cloud pentesting is not just config review (05:42) Cloud pentesting vs Network pentesting (06:25) Cloud Pentest - Next evolution of Network Pentest? (07:14) Boundaries of cloud pentesting (09:07) Do you need prior approval for Azure Pentest? (09:32) Working with Microsoft Security Research Centre (10:35) Process of pentesting in Azure (11:57) Low hanging fruits to start off with! (13:37) How to persist and escalate? (14:58) Managed Identities in Azure (16:23) Impact of peripheral services to Azure (18:33) Scale of deployments in Azure (21:02) Getting access to permissions for Azure Entra (22:36) Scaling your pentest tools (23:34) TTPs or Matrix you can use (25:30) Getting into Azure Pentesting (26:56) Transitioning from network to azure pentesting (28:37) Connect with Karl Resources: The NetSPI Blog to learn more about offensive cloud security Mitre - Cloud Attack Matrix ATRM Karl's Book - Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment of Microsoft Azure environments See you at the next episode!

The Jordan Harbinger Show
852: Ryan Montgomery | The Hacker Who Hunts Child Predators Part Two

The Jordan Harbinger Show

Play Episode Listen Later Jun 28, 2023 70:37 Transcription Available


Ryan Montgomery (@0dayCTF) is a professional cyber security specialist, the founder of Pentester (JORDAN15), and an ethical hacker known for exposing online predators. [This is part two of a two-part episode. Be sure to catch up with part one here!] What We Discuss with Ryan Montgomery: How vulnerable are your "smart" appliances to savvy hackers? What did Ryan discover when he hacked a pedophile website? How did the authorities respond when Ryan tipped them off about what he found on this website and who was involved? How Ryan and his MMA friend directly confront predators who think they're meeting minors in the real world. What should you do (and not do) when you encounter would-be predators online? And much more... Full show notes and resources can be found here: jordanharbinger.com/852 This Episode Is Brought To You By Our Fine Sponsors: jordanharbinger.com/deals Sign up for Six-Minute Networking — our free networking and relationship development mini course — at jordanharbinger.com/course! Like this show? Please leave us a review here — even one sentence helps! Consider including your Twitter handle so we can thank you personally!

Shawn Ryan Show
#56 Ryan Montgomery - #1 Ethical Hacker Who Hunts Child Predators Catches One Live On Podcast

Shawn Ryan Show

Play Episode Listen Later May 8, 2023 161:42


1 in 5 children in the United States will be sexually exploited online. Every 9 minutes, Child Protective Services finds evidence of child sexual abuse. 93% of victims know the perpetrator. These are horrifying and sobering statistics that drove the Shawn Ryan Show to expose this topic–this is where Ryan Montgomery comes in. Ryan is the #1 "ethical hacker" in the world and it's a title he's earned by infiltrating websites that host child exploitation and exposing the predators that run rampant there. Ryan takes us into the underbelly of this dark-web hidden world and lights it up in real time. During the filming of this show, Ryan ran a mini-sting operation from his laptop in a chatroom, posing as a teen–it took less than 60 seconds for a predator to take the bait. This episode is a cold, hard look at the pervasive problem that is child exploitation. Although it's difficult to stomach, we do believe that this episode will educate parents and save thousands of children. Ryan has dedicated his life to saving human life via his treatment center for those with addiction and by forcing this vile topic into the light. We are honored to share his message. Shawn Ryan Show Sponsors: https://hvmn.com - USE CODE "SHAWN" https://moinkbox.com/srs https://LearShawn.com | Call 800-741-0551 Information contained within Lear Capital's website is for general educational purposes and is not investment, tax, or legal advice. Past performance may not be indicative of future results. Consult with your tax attorney or financial professional before making an investment decision. https://mudwtr.com/shawn - USE CODE "SHAWNMUD" https://blackbuffalo.com - USE CODE "SRS" Ryan Montgomery Links: https://pentester.com https://www.instagram.com/0day https://www.youtube.com/@561predcatchers Please leave us a review on Apple & Spotify Podcasts. Vigilance Elite/Shawn Ryan Links: Website | Patreon | TikTok | Instagram Learn more about your ad choices. Visit podcastchoices.com/adchoices