POPULARITY
Categories
Felix Kan discusses ethical hacking and AI and how they are reshaping cybersecurity strategies. Felix is a certified ethical hacker and the founder and CEO of Cyberbay, an AI-powered platform that connects businesses with ethical hackers to identify and fix vulnerabilities. He pioneered real-life attack simulation methods at PwC. Listen for three action items you can use today. Host, Kevin Craine Want to be a guest? DigitalTransformationPodcast.net/guest Want to be a sponsor? DigitalTransformationPodcast.net/sponsor
“When you look at cybersecurity…we've got to be constantly thinking about how we disrupt ourselves in order to actually solve the problem."Casey Ellis is a hacker, a founder, and an advisor and investor. Occupying a lot of different vantage points in cyber has given him a very unique perspective on the industry.George K and George A talk to Casey about: How Casey went from hacker to solution architect to entrepreneur, creating a marketplace that connects ethical hackers with companies who need them Why security startups focused solely on acquisition are hurting the industry (and why defenders deserve better) The reality check on AI in security - separating hype from actual value Why human creativity will always be necessary in security (automation is great, but humans build systems and humans break them)It's real and it's raw. As always.
Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com
Cybersecurity in Italy: ITASEC 2025 Recap & Future Outlook with Professor Alessandro ArmandoCybersecurity is no longer a niche topic—it's a fundamental pillar of modern society. And in Italy, ITASEC has become the go-to event for bringing together researchers, government officials, and industry leaders to tackle the biggest security challenges of our time.Although we weren't there in person this year, we're diving into everything that happened at ITASEC 2025 in this special On Location recap with Professor Alessandro Armando. As Deputy Director of the Cybersecurity National Laboratory at CINI and Chairman of the Scientific Committee of the SERICS Foundation, Alessandro has a front-row seat to the evolution of cybersecurity in Italy.This year's event, held in Bologna, showcased the growing maturity of Italy's cybersecurity landscape, featuring keynotes, technical sessions, and even hands-on experiences for the next generation of security professionals. From government regulations like DORA (Digital Operational Resilience Act) to the challenges of AI security, ITASEC 2025 covered a vast range of topics shaping the future of digital defense.One major theme? Cybersecurity as an investment, not just a cost. Italian companies are increasingly recognizing security as a competitive advantage—something that enhances trust and reputation rather than just a compliance checkbox.We also discuss the critical role of education in cybersecurity, from university initiatives to national competitions that are training the next wave of security experts. With programs like Cyber Challenge.IT, Italy is making significant strides in developing a strong cybersecurity workforce, ensuring that organizations are prepared for the evolving threat landscape.And of course, Alessandro shares a big reveal: ITASEC 2026 is heading to Sardinia! A stunning location for what promises to be another exciting edition of the conference.Join us for this insightful discussion as we reflect on where cybersecurity in Italy is today, where it's headed, and why events like ITASEC matter now more than ever.
KI hat eine neue Dimension in die IT-Sicherheitslandschaft gebracht. Cyberkriminelle nutzen KI längst für Angriffe. Verteidiger müssen mithalten – mit Plan und KI-basierten Security-Lösungen. In dieser Podcast-Folge spricht Moderatorin Henrike Tönnes mit Dr. Mohamad Sbeiti und Samet Gökbayrak über den Einsatz von KI in der Cybersicherheit. Die Gründer des Startups ENTRYZERO erklären, wie sie Unternehmen mit KI-gestützten Lösungen helfen, Bedrohungen frühzeitig zu erkennen und Risiken zu minimieren. Dabei geht es um die Automatisierung von Sicherheitsprozessen, proaktive Überwachung, Ethical Hacking und die aktuelle Bedrohungslage. Eine spannende Episode für alle, die sich für die Zukunft der IT-Security interessieren. Mehr zu ENTRYZERO: https://entryzero.ai/
Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Roy Luongo. Roy is the Chief Information Security Officer for the United States Secret Service. He leads a team in the defense and information assurance of all USSS information systems and solutions. Prior to his current role he was the Director, Joint Mission Operations Center for Cyber Command, providing oversight of mission critical Cyber Operations infrastructures. He has also served as Chief, NSA Red Team and Technical Director for Interactive Operations for the NSA. Roy is a retired Army soldier with 20 years' service within the Intelligence and Cyber career fields. [March 17, 2025] 00:00 - Intro 00:17 - Intro Links: - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 01:55 - Roy Luongo Intro 02:44 - The Path to CISO of the Secret Service 04:58 - Cybersecurity in Early Education 07:50 - The Entry Level Catch-22 12:24 - Quantifying Risk 14:27 - The Best Way Forward 16:51 - The Effects and Future of AI 20:06 - Understanding Your Needs 22:11 - Advise to Young Roy 24:56 - The Cost of Training 29:01 - Mentors - Ed Skoudis - Brigadier General Brian D. Vile - Shawn Turskey 29:55 - Lollipop Moments - TEDxToronto - Drew Dudley "Leading with Lollipops" 31:33 - Book Recommendations - Cybersecurity Canon - Rick Howard - Kingpin - Kevin Poulsen - Turn the Ship Around! - L. David Marquet 33:49 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org
Have you seen the new features of Playwright? What automation certification was just announced? Why should you know about Autonomous Ethical Hacking? Find out in this episode of the Test Guild New Shows for the week of March 8th. So, grab your favorite cup of coffee or tea, and let's do this. 0:16 ZAPTEST.AI https://testguild.me/ZAPTESTNEWS 0:55 Playwright 1.5 Released https://testguild.me/fkq97l 1:50 AI Data Quaity Webinar https://testguild.me/i7i545 3:04 Custom Playwright Reports https://testguild.me/4hyx8l 4:08 The Role of AI agents https://testguild.me/jj8003 5:26 MCP Accessibility Scanner https://testguild.me/59ikom 6:21 Robot Framework Certified https://testguild.me/cbe75y 7:20 free accessibility checker https://testguild.me/lz46mh 7:56 Dynatrace acquired Metis https://testguild.me/gh4sz8 8:43 AI Agents security testing https://testguild.me/9z5wp2
One of the goals of the show is to help you better understand all the threats facing your OT assets, your data and your people. In order to do that, we work to identify those individuals with a feel and in-depth understanding of these threats and the evolving network of threat actors.And I can't think of anyone better to break down the hacker landscape than an individual whose research has led to being followed by well-known data breachers on social media and considered persona-non-grata in countries housing many of the most notorious state-sponsored hacking groups in the world. It's my pleasure to welcome Jeremiah Fowler back to Security Breach. You might remember that we originally spoke to him regarding a huge ERP data vulnerability last summer. As a go-to podcast for our listeners, we want to help you align your brand with our expertise. By sponsoring our podcast, your brand will build trust, and your message will stand out to an audience searching for tools to assist their cybersecurity efforts. Click Here to Become a Sponsor.Promoguy Talk PillsAgency in Amsterdam dives into topics like Tech, AI, digital marketing, and more drama...Listen on: Apple Podcasts SpotifyTo catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. If you have a cybersecurity story or topic that you'd like to have us explore on Security Breach, you can reach me at jeff@ien.com. To download our latest report on industrial cybersecurity, The Industrial Sector's New Battlefield, click here.
Recorded during ThreatLocker Zero Trust World 2025 in Orlando, this episode of the On Location series features an engaging conversation with Alex Benton, Special Projects at ThreatLocker. Benton shares insights from his Metasploit lab, a beginner-friendly session that demonstrates the power of tools like Metasploit and Nmap in cybersecurity. The lab's objective is clear: to illustrate how easily unpatched systems can be exploited and reinforce the critical need for consistent patch management.Understanding the Metasploit LabBenton explains how participants in the lab learned to execute a hack manually before leveraging Metasploit's streamlined capabilities. The manual process involves identifying vulnerable machines, gathering IP addresses, examining open ports, and assessing software vulnerabilities. With Metasploit, these steps become as simple as selecting an exploit and running it, underscoring the tool's efficiency.A key demonstration in the lab involved Eternal Blue, the exploit associated with the WannaCry virus in 2017. Benton emphasizes how Metasploit simplifies this complex attack, highlighting the importance of maintaining patched systems to prevent similar vulnerabilities.The Real-World Implications of Unpatched SystemsThe discussion dives into the risks posed by cybercriminals who use tools like Metasploit to automate attacks. Benton points out that malicious actors often analyze patch notes to identify potential vulnerabilities and create scripts to exploit unpatched systems quickly. The conversation touches on the dark web's role in providing detailed information about exposed systems, making it even easier for attackers to target vulnerable machines.Lessons from WannaCryThe episode revisits the WannaCry incident, where a vulnerability in Windows systems led to a global cybersecurity crisis. Benton recounts how outdated systems and the absence of a strong security culture created an environment ripe for exploitation. He also shares the story of cybersecurity researchers, including Marcus Hutchins, who played pivotal roles in mitigating the virus's impact by identifying and activating its kill switch.Tune in to Learn MoreThis episode offers valuable insights into cybersecurity practices, the dangers of unpatched environments, and the tools that both ethical hackers and cybercriminals use. Listen in to gain a deeper understanding of how to secure your systems and why proactive security measures are more crucial than ever.Guest: Alex Benton, Special Projects at ThreatLocker | On LinkedIn: https://www.linkedin.com/in/alex-benton-b805065/Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Key Points Discussed:Defining Ethical Hacking: Ethical hackers use their skills to identify and report vulnerabilities, often to enhance cybersecurity in various capacities, including voluntary work, bug bounty programs, or professional roles.Research Focus: Dr. Kranenbarg's studies highlight a significant overlap between positive and negative cyber behaviors, particularly among IT students, and explore how individuals transition toward ethical hacking.Ethical Hacking as a Pathway:Early positive experiences, such as reporting vulnerabilities to schools or organizations, can strongly influence individuals toward ethical hacking.Responses from organizations play a critical role—positive reinforcement encourages further ethical behavior, while negative experiences can deter individuals.Challenges in Defining Ethics:Ethical hackers themselves debate the boundaries of what constitutes ethical behavior, such as whether making vulnerabilities public is acceptable if organizations fail to act.The term "ethical hacker" is often contentious within the community.Role of Education: Schools struggle to address and guide ethical behavior among IT students effectively. Clear vulnerability disclosure policies and ethics education in IT programs are crucial.Future Research Directions: Dr. Kranenbarg plans to conduct life-history interviews with hackers to better understand their pathways and influences toward ethical behavior.About our Guest:Dr Marleen Weulen Kranenbarghttps://research.vu.nl/en/persons/marleen-weulen-kranenbarg Papers or Resources Mentioned:Weulen Kranenbarg, M. (2018). Cyber-offenders versus traditional offenders: An empirical comparison. Vrije Universiteit Amsterdam. Retrieved from https://research.vu.nl/en/publications/cyber-offenders-versus-traditional-offenders-an-empirical-comparisonWeulen Kranenbarg, M., Ruiter, S., & Nieuwbeerta, P. (2018). Cyber-offending and traditional offending over the life-course: An empirical comparison. Crime & Delinquency, 64(10), 1270–1292. https://doi.org/10.1177/0011128718763134Weulen Kranenbarg, M., Holt, T. J., & van Gelder, J.-L. (2021). Contrasting cyber-dependent and traditional offenders: A comparison on criminological explanations and potential prevention methods. In J. van Gelder, H. Elffers, D. Reynald, & D. Nagin (Eds.), Routledge International Handbook of Criminology and Criminal Justice Studies (pp. 234–249). Routledge. Retrieved from https://research.vu.nl/en/publications/contrasting-cyber-dependent-and-traditional-offenders-a-comparisoWeulen Kranenbarg, M., & Noordegraaf, J. (2023). Why do young people start and continue with ethical hacking? A qualitative study on individual and social aspects in the lives of ethical hackers. Criminology & Public Policy, 22(3), 465–490. https://doi.org/10.1111/1745-9133.12640Additional Resources:Capture the Flag (CTF) events:Hack the Box - A popular online platform offering a variety of CTF challenges to test and improve cybersecurity skills.https://www.hackthebox.comNorthSec - A popular in-person CTF competition designed for everyone excited about cybersecurity.https://nsec.ioBug Bounty Programs:HackerOne - A leading bug bounty platform connecting ethical hackers with organizations to find and fix vulnerabilities.https://www.hackerone.comBugcrowd - A platform that hosts bug bounty programs for a wide range of companies and industries.https://www.bugcrowd.com
Hugo van den Toorn is the Chief Information Security Officer (CISO) at HEMA, one of the Netherlands' most iconic retail brands. With a background in offensive security and ethical hacking, Hugo is passionate about fostering a positive image of cybersecurity and inspiring the next generation of ethical hackers. He also serves as an advisor to The Hacking Games, a platform aimed at creating interactive and gamified learning experiences to shape future cybersecurity professionals. In this episode, SoSafe CEO Dr. Niklas Hellemann talks with Hugo about the unique challenges of cybersecurity in the retail sector, from social engineering to gamified security training. They discuss how Hugo integrates playful, personalized learning approaches at HEMA to engage employees across diverse roles and improve security culture. The conversation also explores the evolving landscape of ethical hacking, including its critical role in reshaping public perception and preparing organizations for emerging threats like AI-driven social engineering. Tune in to discover how Hugo's innovative strategies are transforming security awareness and inspiring the next generation of cybersecurity leaders.
This week, Rachael Lyon and Vince Spina continue their riveting conversation with Gemma Moore, a renowned expert in pen testing and red teaming and cofounder of Cyberus, a leading cyber consultancy. In this second part of their discussion, Gemma delves deep into the evolving landscape of cybersecurity, touching on the complexities introduced by cloud services, the intricacies of red teaming, and the critical interplay with blue teams. She even shares a few fascinating anecdotes from her career, including some high-stakes physical infiltration assignments that sound straight out of a spy movie! Don't miss out as we explore the cutting edge of cybersecurity and the ongoing battle to keep our digital world safe. Tune in, subscribe, and let's get to the point! For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e311
Welcome back to another episode of Forcepoint! In this week's episode, hosts Rachael Lyon and Vince Spina dive deep into the intriguing and often underestimated world of cybersecurity with special guest Gemma Moore, co-founder of Cybers, a renowned cybersecurity consultancy. We'll kick things off with Vince's alarming personal story about a scam call that mimicked his wallet company, shedding light on the growing concerns of voice capture and security. Gemma brings her wealth of expertise to the table, sharing stories from the front lines of ethical hacking. We explore the ins-and-outs of penetration testing, distinguishing between compliance-based and scenario-based tests, and uncover the real vulnerabilities that hide in outdated systems and shared passwords. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e310
Send us a textIn this engaging conversation, Robert Vescio shares his unique journey from horticulture to cybersecurity, emphasizing the importance of economics in understanding cyber risk. The discussion highlights the value of learning from mistakes, the need for transparency in cyber risk management, and the cultural challenges within the cybersecurity field. Vescio advocates for a compassionate approach to cybersecurity, encouraging professionals to embrace failure as a learning opportunity. He also introduces X Analytics, a platform designed to simplify cyber risk management and provide organizations with a clear understanding of their cyber risk condition.Chapters00:00 Navigating the Conference Landscape02:53 From Horticulture to Cybersecurity: A Unique Journey06:09 The Importance of Economics in Cybersecurity09:00 Learning Through Mistakes: A Personal Journey12:05 The Culture of Mistakes in Cybersecurity14:54 The Need for Transparency in Cyber Risk18:06 The Role of Boldness in Career Growth21:14 Embracing Failure: Lessons from NASA24:00 Understanding Cyber Risk Management26:58 The Impact of Cyber Incidents on Businesses30:01 The Importance of Compassion in Cybersecurity33:13 X Analytics: Simplifying Cyber Risk Management#podcast #techsecurity #informationsecurity #cybersecurity #aiSupport the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
Go to my sponsor https://snhu.edu/itdad and see what the current average annual salary for a Cybersecurity is and learn how you can get startedFirst Interview: https://youtu.be/Kbjj9alXUa4In this episode, we dive deep into the world of cybersecurity, exploring the key skills, certifications, and strategies you need to succeed in one of the fastest-growing fields in tech. Whether you're starting out or looking to advance your career, you'll gain valuable insights and actionable tips to help you break into the industry and stay ahead in this ever-evolving space.We'll cover everything from essential cybersecurity skills to choosing the right certifications and navigating the job market. If you're ready to level up your tech career, don't miss this episode! Be sure to like, subscribe, and share with anyone who might find this helpful.✅ Subscribe to our weekly newsletter for insider tips and practical advice on launching your tech career, straight from industry experts! https://thebeardeditdad.ck.page/55f710292b===========================Subscribe and Listen to The I.T. Career Podcast HERE:
पूरा Podcast यहाँ देखें: https://youtu.be/TTpW910isBA BeerBiceps SkillHouse का Course Join करने के लिए यहाँ CLICK करें : https://bbsh.in/trshindi-launch-cpyt Use my referral code OFF40 to get a 40% Discount on a standard membership subscription. BeerBiceps SkillHouse को Social Media पर Follow करे :- YouTube : https://www.youtube.com/channel/UC2-Y36TqZ5MH6N1cWpmsBRQ Instagram : https://www.instagram.com/beerbiceps_skillhouse Website : https://bbsh.in/trshindi-launch-cpyt For any other queries EMAIL: support@beerbicepsskillhouse.com In case of any payment-related issues, kindly write to support@tagmango.com Level Supermind - Mind Performance App को Download करिए यहाँ से
पूरा Podcast यहाँ देखें: https://youtu.be/TTpW910isBA BeerBiceps SkillHouse का Course Join करने के लिए यहाँ CLICK करें : https://bbsh.in/trshindi-launch-cpyt Use my referral code OFF40 to get a 40% Discount on a standard membership subscription. BeerBiceps SkillHouse को Social Media पर Follow करे :- YouTube : https://www.youtube.com/channel/UC2-Y36TqZ5MH6N1cWpmsBRQ Instagram : https://www.instagram.com/beerbiceps_skillhouse Website : https://bbsh.in/trshindi-launch-cpyt For any other queries EMAIL: support@beerbicepsskillhouse.com In case of any payment-related issues, kindly write to support@tagmango.com Level Supermind - Mind Performance App को Download करिए यहाँ से
In today's episode, we'll hear from Craig Jeffery on pentests. What are they, who performs them, and why are they vital for cyber security? Listen in to learn more.
CyberIntel - Talking Cybersecurity and Compliance (Presented by VikingCloud)
In this episode of CyberIntel, Brian Odian discusses Len Noe – an Ethical Hacker with various technological implants. If you have any questions you want answered on CyberIntel, email us at cyberintel@vikingcloud.com and our experts will be in touch - we may even make it the subject of a future episode! CyberIntel provides a deep dive into the world of cybersecurity and compliance. Hosted by Brian Odian, VikingCloud's Director of Managed Compliance Services APAC, amongst other cybersecurity and compliance expert advisors, we explore the nuances of various compliance standards and the latest in cybersecurity news, trends and threats. New episodes every two weeks! CyberIntel is presented by VikingCloud. VikingCloud is leading the Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions - faster. VikingCloud is the one-stop partner trusted by 4+ million customers every day to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruption to their business.
A big shoutout to TCM Security for sponsoring this video. Register now to receive a 50% discount on your first month at the TCM Security Academy, potentially making your most significant step toward a career in ethical hacking. Go here: https://davidbombal.wiki/3vQsqWm // FREE Training // Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1): • Ethical Hacking in 15 Hours - 2023 Ed... Ethical Hacking in 12 Hours - Full Course - Learn to Hack: • Ethical Hacking in 12 Hours - Full Co... Open-Source Intelligence (OSINT) in 5 Hours - Full Course - Learn OSINT: • Open-Source Intelligence (OSINT) in 5... // TCM Security SOCIAL// LinkedIn : / tcm-security-inc Twitter : / tcmsecurity YouTube (The Cyber Mentor): / thecybermentor Discord: / discord Instagram: / tcmsecurity Facebook: / tcmsecure TikTok: / tcmsecurity Academy Website: https://academy.tcm-sec.com/ TCM Certifications: https://certifications.tcm-sec.com/ Discord: / discord Website: https://tcm-sec.com/ Breach Point Website: https://breachpoint.com/ // Heath Adam's SOCIAL // LinkedIn: / heathadams // YouTube Video REFERENCE // Real World Windows Pentest Tutorial (Demos of 5 Active Directory Hacks): • Real World Windows Pentest Tutorial (... My Entrepreneurial Journey – Episode 1: • My Entrepreneurial Journey - Episode ... // Books REFERENCE // They ask you Answer by Marcus Sheridan: US: https://amzn.to/4eVDFyv UK: https://amzn.to/45NKRIO 12 Months to $1 Million by Ryan Daniel Moran: US: https://amzn.to/3VLFwwY UK: https://amzn.to/4cEMOtb // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming up 00:32 - Introduction 01:08 - Certifications in TCM 06:06 - Exploring TCM Offerings 08:04 - Advanced Courses in TCM 09:29 - Red Team vs. Blue Team 10:14 - Video Learning vs. Reading 10:51 - Cloud Penetration Testing 12:06 - Hacking Certifications Roadmap 15:55 - Preparation Before PNPT 16:46 - Career Prospects with PNPT 17:31 - Degree vs. Certificate Requirements 19:37 - Job Opportunities without Certificates 21:21 - CCNA vs. Network+ 22:30 - Red Team Certificates for Blue Teaming 23:07 - Essential Skills for Penetration Testers 24:20 - Job Search Advice 27:09 - Relevance of Previous Job Skills 28:04 - Programming Skills Requirement 30:04 - AI in Cybersecurity 32:11 - Starting a Career in Cybersecurity 33:05 - Heath Adams' Journey 37:17 - Changing Your Life 38:25 - Achieving Work-Life Balance 41:01 - Job Opportunities in Cybersecurity 44:20 - Getting Started in Cybersecurity 45:24 - Entrepreneurial Journey 50:39 - Advice from Heath Adams 53:07 - Starting a Penetration Testing Company 54:36 - Importance of Social Media 55:25 - Courses on Starting a Cyber Business 56:24 - More Advice from Heath Adams 59:23 - Pricing Your Services 01:01:18 - Continuous Learning 01:03:07 - Realities of Cybersecurity 01:05:24 - Remote vs. In-Person Work 01:08:13 - Studying, Burnout, and Motivation 01:10:58 - Competing with Yourself 01:12:51 - Recommended Tools 01:15:38 - Debunking Cyber Myths 01:18:38 - How to Get in Touch 01:20:38 - Outro Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cybersecurity #hack #hacker
Today, we have a bit of a different show for you all. After the recent issues with MS and the Crowdstrike update, we decided to shed light on hacking in logistics and how to protect yourself. Then, we dive into the D.I.S.C way to get through to prospects.Welcome to The Logistics Life - Your Path to Million-Dollar SuccessThe Logistics Life is designed to fuel your journey to extraordinary success. I'm Dan Deigan, your host, and I'm thrilled to have you join us.We understand that success doesn't happen overnight and is not achieved through guesswork. We're committed to providing you with the tools, knowledge, and resources to rise above and crush your sales.Each episode is packed with knowledge, inspiration, and real-life success stories. We delve into sales strategy, logistics industry insights, personal development, productivity, and the concept of "stickibility."Our mission is to empower 10,000 sales reps to achieve an astonishing milestone - over $1,000,000 in annual Gross Profit. Yes, you read that right - a seven-figure success story, and we're here to guide you every step of the way.https://imasaleshacker.com/www.logisticssalesmastery.com offers a treasure chest of courses crafted explicitly by industry veteran Dan Deigan. These courses are your roadmap to mastering the art of logistics sales, boosting productivity, and achieving your financial goals. With Dan's guidance, you'll learn the strategies and techniques that have transformed ordinary sales reps into top earners.Check Out Dan's Blog Here: https://imasaleshacker.com/Our second valuable resource is... Dan Deigan's Resource Hub: www.logisticssalesmastery.comThis hub is a goldmine of free tools, frameworks, and resources that we discuss on the show. It's THE PLACE for everything you need to supercharge your sales game. Whether it's templates, guides, or expert insights, the Resource Hub is your go-to destination for actionable information.Last but certainly not least, we introduce you to the Bridger Sales System - the ultimate CRM for the logistics professional. This isn't just any CRM; it's a game-changer tailor-made for our industry. And here's the exciting part - you can get a FREE trial at www.bridgersystem.com/30dayspecial.Imagine having a tool that provides data-driven insights, automates time-consuming tasks, and empowers you to nurture and close leads efficiently. The Bridger Sales System is your key to unlocking the next level of sales success.Our mission is clear, and our resources are at your fingertips. Whether you're looking to hit that million-dollar mark or want to excel in the logistics sales field, SalesChatter is here to support you.Thank you for joining us on The Logistics Life. Remember, your journey to success begins here, and we're with you every step of the way.
IT.ie, the Irish-owned Managed IT Services company, has announced that it expects to generate an additional €1M in revenue through an automated testing service that imitates the movements of hackers to uncover and exploit cybersecurity weak spots within organisations. The company's new penetration testing as-a-service (PTaaS), also known as pen testing or 'ethical hacking', is an automated cyber security solution designed to fully replicate a hacker's attack on an organisation, as it attempts to exploit and gain access to its network. This forewarns the organisation to the potential dangers before cybercriminals have an opportunity to exploit them, potentially preventing an attack. Pen testing has emerged as a key solution for businesses with the growth and increased sophistication of cyberattacks in the modern business landscape. As threats develop at a previously unforeseen rate, regular, automated testing - which takes into account human oversight - is essential. The new service provides an in-depth scan of the organisation's network to identify vulnerabilities. It then exploits any vulnerabilities found by replicating the actions of a hacker via a diverse and sustained attack. PTaaS is preferable to traditional pen testing, which typically only occurs once per year. It represents a significant upgrade on the previous method, which was less precise, more expensive, and more prone to human error. Monthly assessments, however, allow organisations to constantly evaluate and reinforce their systems, enabling them to protect themselves from emerging threats. Significantly, regular pen testing also enables a reduction in business' insurance premiums, representing long-term cost savings. As insurance premiums for businesses continue to rise, PTaaS can reduce the likelihood of needing to pay out a ransomware attack - along with the associated costs of a major cybersecurity incident - making them less of a risk to insurance companies. The new service is being introduced at a time of significant growth for IT.ie. Earlier this year, the company announced plans to double its headcount to 50 people by the end of 2025 and increase annual revenue to €8M. Wayne Morgan, CTO at IT.ie, said: "To stay ahead of hackers, we must think like them and view our defences as their points of attack. Manual penetration testing led the way for many years, highlighting vulnerabilities in our networks and systems. Identifying these issues internally gave us time and direction to apply remediation steps before falling victim to malicious intent. "Although this is effective at the time it is carried out, it fails to account for the dynamic nature of cyber threats. Hackers don't just knock on your door once; they are constantly there, looking for ways in. Automated monthly pen testing is the next generation approach and is a much more effective means of testing your network to highlight any potential weaknesses, helping you to keep hackers at bay. "This new innovative service offers cost-effective, monthly assessments, reducing costs and helping achieve regulatory compliance. At IT.ie, we are determined that we remain at the cutting edge of cybersecurity and provide our customers with the most up-to-date services available as we continue to grow, and this new solution adds to our armoury." See more stories here.
In the latest episode of the Redefining CyberSecurity Podcast, host Sean Martin engages with Rogier Fischer, co-founder and CEO of Hadrian, to delve into the evolving landscape of cybersecurity. The discussion navigates through the intricacies of modern cybersecurity challenges and how Hadrian is providing innovative solutions to tackle these issues. Sean Martin sets the stage by emphasizing the importance of operationalizing cybersecurity strategies to manage risk and protect revenue. Rogier Fischer shares his journey from an ethical hacker working with Dutch banks and tech companies to co-founding Hadrian, a company that leverages advanced AI to automate penetration testing.Fischer highlights the limitations of traditional cybersecurity tools, noting they are often too passive and fail to provide adequate visibility. Hadrian, on the other hand, offers a proactive approach by simulating hacker behavior to identify vulnerabilities and exposures. The platform provides a more comprehensive view by combining various aspects of offensive security, enabling organizations to prioritize their most critical vulnerabilities.One of the key points Fischer discusses is Hadrian's event-driven architecture, which allows the system to detect changes in real-time and reassess vulnerabilities accordingly. This ensures continuous monitoring and timely responses to new threats, adapting to the ever-changing IT environments. Another significant aspect covered is Hadrian's use of AI and machine learning to enhance the context and flexibility of security testing. Fischer explains that AI is selectively applied to maximize efficiency and minimize false positives, thus allowing for smarter, more effective security assessments.Fischer also shares insights on how Hadrian assists in automated risk remediation. The platform not only identifies vulnerabilities but also provides clear guidance and tools to address them. This is particularly beneficial for smaller security teams that may lack the resources to handle vast amounts of raw data generated by traditional vulnerability scanners. Additionally, Hadrian's ability to integrate with existing security controls and workflows is highlighted. Fischer notes the company's focus on user experience and the need for features that facilitate easy interaction with different stakeholders, such as IT teams and security engineers, for efficient risk management and remediation.In conclusion, Rogier Fischer articulates that the true strength of Hadrian lies in its ability to offer a hacker's perspective through advanced AI-driven tools, ensuring that organizations not only identify but also effectively mitigate risks. By doing so, Hadrian empowers businesses to stay ahead in the ever-evolving cybersecurity landscape.Top Questions AddressedWhat drove the creation of Hadrian, and what gaps in the cybersecurity market does it fill?How does Hadrian's event-driven architecture ensure continuous risk assessment and adaptation to changing environments?How does Hadrian leverage AI and machine learning to improve the effectiveness of penetration testing and risk remediation?Learn more about Hadrian: https://itspm.ag/hadrian-5eiNote: This story contains promotional content. Learn more.Guest: Rogier Fischer, Co-Founder and CEO, Hadrian [@hadriansecurity]On LinkedIn | https://www.linkedin.com/in/rogierfischer/ResourcesView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
André Baptista is an ethical hacker, co-founder and CTO at Ethiack, and information security university professor at FCUP. He is also featured on our list of Cybersecurity Pundits. In this episode, Baptista joins host Charlie Osborne to discuss ethical hacking and the prospect of teaching it in schools and colleges. • For more on cybersecurity, visit us at https://cybersecurityventures.com
In the latest episode of the Redefining CyberSecurity Podcast, host Sean Martin engages with Rogier Fischer, co-founder and CEO of Hadrian, to delve into the evolving landscape of cybersecurity. The discussion navigates through the intricacies of modern cybersecurity challenges and how Hadrian is providing innovative solutions to tackle these issues. Sean Martin sets the stage by emphasizing the importance of operationalizing cybersecurity strategies to manage risk and protect revenue. Rogier Fischer shares his journey from an ethical hacker working with Dutch banks and tech companies to co-founding Hadrian, a company that leverages advanced AI to automate penetration testing.Fischer highlights the limitations of traditional cybersecurity tools, noting they are often too passive and fail to provide adequate visibility. Hadrian, on the other hand, offers a proactive approach by simulating hacker behavior to identify vulnerabilities and exposures. The platform provides a more comprehensive view by combining various aspects of offensive security, enabling organizations to prioritize their most critical vulnerabilities.One of the key points Fischer discusses is Hadrian's event-driven architecture, which allows the system to detect changes in real-time and reassess vulnerabilities accordingly. This ensures continuous monitoring and timely responses to new threats, adapting to the ever-changing IT environments. Another significant aspect covered is Hadrian's use of AI and machine learning to enhance the context and flexibility of security testing. Fischer explains that AI is selectively applied to maximize efficiency and minimize false positives, thus allowing for smarter, more effective security assessments.Fischer also shares insights on how Hadrian assists in automated risk remediation. The platform not only identifies vulnerabilities but also provides clear guidance and tools to address them. This is particularly beneficial for smaller security teams that may lack the resources to handle vast amounts of raw data generated by traditional vulnerability scanners. Additionally, Hadrian's ability to integrate with existing security controls and workflows is highlighted. Fischer notes the company's focus on user experience and the need for features that facilitate easy interaction with different stakeholders, such as IT teams and security engineers, for efficient risk management and remediation.In conclusion, Rogier Fischer articulates that the true strength of Hadrian lies in its ability to offer a hacker's perspective through advanced AI-driven tools, ensuring that organizations not only identify but also effectively mitigate risks. By doing so, Hadrian empowers businesses to stay ahead in the ever-evolving cybersecurity landscape.Top Questions AddressedWhat drove the creation of Hadrian, and what gaps in the cybersecurity market does it fill?How does Hadrian's event-driven architecture ensure continuous risk assessment and adaptation to changing environments?How does Hadrian leverage AI and machine learning to improve the effectiveness of penetration testing and risk remediation?Learn more about Hadrian: https://itspm.ag/hadrian-5eiNote: This story contains promotional content. Learn more.Guest: Rogier Fischer, Co-Founder and CEO, Hadrian [@hadriansecurity]On LinkedIn | https://www.linkedin.com/in/rogierfischer/ResourcesView all of our RSA Conference Coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Welcome to another riveting episode of Business Growth Talks! In today's show, we delve into the inspiring journey of Christian Espinoza, a thought leader in cybersecurity and founder of Blue Goat Cyber. Host Mark Hayward uncovers the pivotal moments that shaped Christian's career, his philosophy on business and personal growth, and how he has merged technical expertise with emotional intelligence to foster leadership and innovation.Christian Espinoza details his challenging upbringing, moving from the chaos of Riverside, California, to a small town in Arkansas. His story is one of resilience, culminating in a successful career in cybersecurity and entrepreneurship. They discuss Christian's transformative mindset shift in 2014, which led him to establish his first cybersecurity firm, and his specific focus on medical device cybersecurity with Blue Goat Cyber. They also tackle crucial business strategies, including innovative marketing and hiring approaches, and how prioritizing emotional intelligence can define company success. The episode is packed with practical advice for entrepreneurs, shedding light on how to grow both personally and professionally while navigating a complex and ever-evolving industry.Key Takeaways:Personal Development and Business Growth: Christian emphasizes that growing a business is deeply intertwined with personal development and overcoming one's ego.Effective Hiring Practices: Shift from valuing only technical skills to also assessing emotional intelligence and alignment with core values.Importance of Niche Specialization: The strategic advantage of focusing on a specialized market, such as medical device cybersecurity.Security Challenges in Healthcare: Understanding the complexities of securing medical devices and healthcare environments.Resilience and Mindset: The necessity of having resilience and a positive mindset to overcome personal and professional challenges.This Is PropagandaChallenging marketers' delusions about the cultural impact of our work. A WEBBY winner!Listen on: Apple Podcasts SpotifySupport the Show.Do you want to be a guest on multiple podcasts as a service go to:www.podcastintroduction.comFind more details about the podcast and my coaching business on:www.businessgrowthtalks.comDo you want to be a podcaster? Sign up onwww.abmpodcastcourse.co.ukFind me onLinkedIn - https://www.linkedin.com/in/mark-hayw...Facebook - https://www.facebook.com/markjhayward
Send us a Text Message.In a world where cyber threats are constantly evolving, ethical hackers play a crucial role in safeguarding information and systems. The world of hacking is often shrouded in mystery and misconception. While some hackers exploit vulnerabilities for malicious purposes, many ethical hackers use their skills for good, identifying security flaws and making the digital world a safer place. Connect With Kapeel GuptaWhat You May Learn0:00 Introduction1:19 Mission Statement1:36 Who is an Ethical Hacker3:08 Scope in India and Abroad4:01 Nature of Work4:54 Skills and Educational Qualifications6:05 Salary in India and Abroad7:15 Conclusion7:57 Call to ActionSupport the Show.
David Brown is the CEO of CounterCraft, deception-powered cybersecurity solutions that go beyond detection and response. In this talk, David tells me about the challenges and opportunities within the cybersecurity landscape. Although he's optimistic about humanity's capacity to overcome adversity, David also expresses concerns about the potential for global conflict and the increasing sophistication of cyber threats. Whether we realize it or not, David Brown's work is at the heart of one of the most important and underdiscussed issues of our time. ➡️ https://www.countercraftsec.com ➡️ Follow me on Instagram: @therosspalmer ➡️ Watch this Episode on YouTube: @therosspalmer
Guest: Christina Stokes, Host, On Cyber & AI Podcast, Founder of Narito CybersecurityOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokesOn LinkedIn | https://www.linkedin.com/in/xTinaStokes/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe Evolution of CybersecurityThe dialogue initiated by Sean, Christina, and Marco shed light on how cybersecurity has matured over the years. From the early days of hacking as a hobby to the current focus on ethical practices, the panelists emphasized the importance of adapting to the changing technological landscape. They discussed how regulations, policies, and laws have played a crucial role in shaping the cybersecurity industry, emphasizing the need for responsible use of technology to prevent it from becoming a monster.AI and Its ImplicationsThe conversation also touched upon the growing role of Artificial Intelligence (AI) in cybersecurity. While AI has brought about advancements in threat detection and response, there are concerns about privacy and data protection. The panelists emphasized the importance of using AI ethically and responsibly to avoid potential risks associated with its misuse.Supply Chain VulnerabilitiesA significant portion of the discussion revolved around supply chain vulnerabilities and the interconnected nature of global industries. The experts highlighted the importance of understanding and securing supply chains, particularly in the context of operational technology and manufacturing processes. They stressed the need for resilience and innovation to address evolving cybersecurity threats.The Human Element in CybersecurityThroughout the conversation, the experts reiterated the significance of human connections and collaborations in the cybersecurity domain. They emphasized the need for organizations to invest in education, training, and building strong relationships within the industry to combat cyber threats effectively. The dialogue underscored the essential role of people in securing digital ecosystems and fostering a culture of cybersecurity awareness.Looking Towards the FutureAs the discussion came to a close, Sean, Christina, and Marco expressed optimism about the future of cybersecurity. They discussed upcoming trends such as Generative AI, AI Bill of Materials, and the continued focus on governance, data security, and AI ethics. The experts highlighted the importance of ongoing conversations, collaborations, and innovation in driving the industry forward.This insightful chat at RSAC 2024 offered valuable perspectives on the current challenges and opportunities in cybersecurity. The experts' nuanced discussions about AI, supply chain vulnerabilities, and human-centric cybersecurity shed light on the complex nature of the digital threat landscape. As we navigate the evolving cybersecurity landscape, collaboration, innovation, and a shared commitment to ethical practices will be key to ensuring a secure digital future.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:
Guest: Christina Stokes, Host, On Cyber & AI Podcast, Founder of Narito CybersecurityOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokesOn LinkedIn | https://www.linkedin.com/in/xTinaStokes/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe Evolution of CybersecurityThe dialogue initiated by Sean, Christina, and Marco shed light on how cybersecurity has matured over the years. From the early days of hacking as a hobby to the current focus on ethical practices, the panelists emphasized the importance of adapting to the changing technological landscape. They discussed how regulations, policies, and laws have played a crucial role in shaping the cybersecurity industry, emphasizing the need for responsible use of technology to prevent it from becoming a monster.AI and Its ImplicationsThe conversation also touched upon the growing role of Artificial Intelligence (AI) in cybersecurity. While AI has brought about advancements in threat detection and response, there are concerns about privacy and data protection. The panelists emphasized the importance of using AI ethically and responsibly to avoid potential risks associated with its misuse.Supply Chain VulnerabilitiesA significant portion of the discussion revolved around supply chain vulnerabilities and the interconnected nature of global industries. The experts highlighted the importance of understanding and securing supply chains, particularly in the context of operational technology and manufacturing processes. They stressed the need for resilience and innovation to address evolving cybersecurity threats.The Human Element in CybersecurityThroughout the conversation, the experts reiterated the significance of human connections and collaborations in the cybersecurity domain. They emphasized the need for organizations to invest in education, training, and building strong relationships within the industry to combat cyber threats effectively. The dialogue underscored the essential role of people in securing digital ecosystems and fostering a culture of cybersecurity awareness.Looking Towards the FutureAs the discussion came to a close, Sean, Christina, and Marco expressed optimism about the future of cybersecurity. They discussed upcoming trends such as Generative AI, AI Bill of Materials, and the continued focus on governance, data security, and AI ethics. The experts highlighted the importance of ongoing conversations, collaborations, and innovation in driving the industry forward.This insightful chat at RSAC 2024 offered valuable perspectives on the current challenges and opportunities in cybersecurity. The experts' nuanced discussions about AI, supply chain vulnerabilities, and human-centric cybersecurity shed light on the complex nature of the digital threat landscape. As we navigate the evolving cybersecurity landscape, collaboration, innovation, and a shared commitment to ethical practices will be key to ensuring a secure digital future.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________Follow our RSA Conference USA 2024 coverage: https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageOn YouTube:
BeerBiceps SkillHouse का Course Join करने के लिए यहाँ CLICK करें : https://bbsh.in/ra-yt-pod101 Use my referral code OFF40 to get a 40% Discount on a standard membership subscription. BeerBiceps SkillHouse को Social Media पर Follow करे :- YouTube : https://www.youtube.com/channel/UC2-Y36TqZ5MH6N1cWpmsBRQ Instagram : https://www.instagram.com/beerbiceps_skillhouse Website : https://linktr.ee/BeerBiceps_SKillHouse For any other queries EMAIL: support@beerbicepsskillhouse.com In case of any payment-related issues, kindly write to support@tagmango.com Level Supermind - Mind Performance App को Download करिए यहाँ से
Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Join Chris as he discusses topics and news pertaining to the world of Social Engineering. [April 22, 2024] 00:00 - Intro 00:16 - Dr. Abbie Maroño Intro 00:40 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:24 - 2024 State of Vishing Report 04:00 - The Data Set 04:55 - Compromise Rates 08:06 - Voicemail Compromise 09:14 - Play Silly Games... 10:11 - Breaking Expectations 14:29 - Battle of the Sexes 15:52 - Most Effective Principle 18:56 - Lesser Principles 20:19 - Midday Slump 22:14 - The Report Overview 23:10 - Research Partners 23:46 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online - Chris Hadnagy - Twitter: @humanhacker - LinkedIn: linkedin.com/in/christopherhadnagy - Dr. Abbie Maroño - Twitter: @DrAbbieofficial - LinkedIn: linkedin.com/in/dr-abbie-maroño-phd - Instagram: @DoctorAbbieofficial
Episode 65: In this episode of Critical Thinking - Bug Bounty Podcast we sit down with Sam Curry to discuss the ethical considerations and effectiveness of hacking, the importance of good intent, and the enjoyment Sam derives from pushing the boundaries to find bugs. He shares stories of his experiences, including hacking Tesla, online casinos,Starbucks, his own is ISP router, and even getting detained at the airport.Follow us on twitter at: @ctbbpodcastWe're new to this podcasting thing, so feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!------ Links ------Follow your hosts Rhynorater & Teknogeek on twitter:https://twitter.com/0xteknogeekhttps://twitter.com/rhynorater------ Ways to Support CTBBPodcast ------Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.Today's Guest:https://samcurry.net/Resources:Don't Force Yourself to Become a Bug Bounty HunterhackcomputeStarbucks BugrecollapseTimestamps:(00:00:00) Introduction(00:02:25) Hacking Journey and the limits of Ethical Hacking(00:28:28) Selecting companies to hack(00:33:22) Fostering passion vs. Forcing performance(00:54:06) Collaboration and Hackcompute(01:00:40) The Efficacy of Bug Bounty(01:09:20) Secondary Context Bugs(01:25:01) Mindmaps, note-taking, and Intuition.(01:46:56) Back-end traversals and Unicode(01:56:16) Hacking ISP(02:06:58) Next.js and Crypto(02:22:24) Dev vs. Prod JWT
The Elixir Wizards Podcast is back with Season 12 Office Hours, where we talk with the internal SmartLogic team about the stages of the software development lifecycle. For the season premiere, "Testing 1, 2, 3," Joel Meador and Charles Suggs join us to discuss the nuances of software testing. In this episode, we discuss everything from testing philosophies to test driven development (TDD), integration, and end-user testing. Our guests share real-world experiences that highlight the benefits of thorough testing, challenges like test maintenance, and problem-solving for complex production environments. Key topics discussed in this episode: How to find a balance that's cost-effective and practical while testing Balancing test coverage and development speed The importance of clear test plans and goals So many tests: Unit testing, integration testing, acceptance testing, penetration testing, automated vs. manual testing Agile vs. Waterfall methodologies Writing readable and maintainable tests Testing edge cases and unexpected scenarios Testing as a form of documentation and communication Advice for developers looking to improve testing practices Continuous integration and deployment Links mentioned: https://smartlogic.io/ Watch this episode on YouTube! youtu.be/unx5AIvSdc Bob Martin “Clean Code” videos - “Uncle Bob”: http://cleancoder.com/ JUnit 5 Testing for Java and the JVM https://junit.org/junit5/ ExUnit Testing for Elixir https://hexdocs.pm/exunit/ExUnit.html Code-Level Testing of Smalltalk Applications https://www.cs.ubc.ca/~murphy/stworkshop/28-7.html Agile Manifesto https://agilemanifesto.org/ Old Man Yells at Cloud https://i.kym-cdn.com/entries/icons/original/000/019/304/old.jpg TDD: Test Driven Development https://www.agilealliance.org/glossary/tdd/ Perl Programming Language https://www.perl.org/ Protractor Test Framework for Angular and AngularJS protractortest.org/#/ Waterfall Project Management https://business.adobe.com/blog/basics/waterfall CodeSync Leveling up at Bleacher Report A cautionary tale - PETER HASTIE https://www.youtube.com/watch?v=P4SzZCwB8B4 Mix ecto.dump https://hexdocs.pm/ectosql/Mix.Tasks.Ecto.Dump.html Apache JMeter Load Testing in Java https://jmeter.apache.org/ Pentest Tools Collection - Penetration Testing https://github.com/arch3rPro/PentestTools The Road to 2 Million Websocket Connections in Phoenix https://www.phoenixframework.org/blog/the-road-to-2-million-websocket-connections Donate to Miami Indians of Indiana https://www.miamiindians.org/take-action Joel Meador on Tumblr https://joelmeador.tumblr.com/ Special Guests: Charles Suggs and Joel Meador.
In today's show, I have a conversation with Lawrence Gentellio, the CEO and Founder of Optery, a personal data removal service. Lawrence shares his own experiences with identity theft and what motivated him to start Optery. We also discuss the future of privacy in the United States, Utah's new privacy law, the Utah Consumer Privacy Act (UCPA), and the bare minimum you should be doing to protect and secure your private data.Follow on Twitter (X): @privacypodSupport the show: https://www.patreon.com/TheLockdownThis episode was recorded on March 6, 2024Follow Ray on Twitter @privacypodIn this week's episode:Lawrence's experience with identity theft highlights the importance of a credit freezeThe need for disinformationA reminder on hunting appsThe future of data privacy and the need for services like OpteryData privacy in the UK and the existence of search sites like 192.comUpdate on next weeks showShow Links:Optery website: https://www.optery.com/PC Magazine Editors Choice Award for Optery: https://www.pcmag.com/reviews/opteryPC Magazine's list of the best personal data removal services: https://www.pcmag.com/picks/the-best-personal-data-removal-servicesUtah Consumer Privacy Act (UCPA): https://attorneygeneral.utah.gov/utah-consumer-protection-act-a-new-law-to-protect-online-privacy/"If privacy is outlawed, only outlaws will have privacy."- Philip R. Zimmermann, creator of PGP encryption
Don't believe the movies and TV shows — ethical hacking is not done by frantically typing on the keyboard in a race against the clock.What's a career in ethical hacking and penetration testing really like? Join our panel of experts who have worked in the field for decades to find out!In this one-hour live event, we'll cover:0:00 - Ethical hacking fact vs fiction7:45 - First, getting into cybersecurity 12:00 - Does ethical hacking fiction affect people? 19:20 - Cybersecurity students in higher ed26:17 - Qualifying for penetration testing jobs31:21 - A real-life cybersecurity attack42:30 - Does Hollywood inspire cybersecurity workers?44:30 - U.S. Cybergames47:40 - Infosec Skills and real-life learning 50:35 - Cybersecurity career jump53:30 - Criminal justice and cybersecurity 56:25 - From IT support to cybersecurity 59:00 - Outro– Get your FREE cybersecurity training resources: https://www.infosecinstitute.com/free– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcastAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
René Carmille is considered one of the first hackers. Today, we'd call him a hacktivist, or someone who sabotages a computer for ethical reasons. Carmille sabotaged the Nazi census of France during World War II. He saved many thousands of Jewish people by hacking Hollerith machines during the war. Support us on Patreon! Show Transcript Shop Modem Mischief Merch! Created, Produced & Hosted by Keith Korneluk Written & Researched by Jim Rowley Edited, Mixed & Mastered by Greg Bernhard Theme Song You Are Digital by Computerbandit
Let's hack cybersecurity in 2024 with Melanie Rieback, Co-founder & CEO of Radically Open Security, the world's first not-for-profit cybersecurity consultancy with a focus on PenTesting
This week, I introduce Defensive OSINT, address privacy concerns while on the road, and examine the intricacies of alias usage and AI-based face morphing for photo alteration. Sharing insights from my recent travels, I highlight the need for vigilance and innovative strategies for maintaining privacy on the go. The episode explores the pros and cons of using alias names for hotel bookings, including the challenges of identity verification during check-in, while I discuss smart, alternative solutions for these scenarios. Join me as we navigate the complexities of preserving privacy in an era rife with survlleiance and data breaches, providing practical tips and advice for privacy-conscious travelers and digital citizens.Become a Patreon member to support the show: https://patreon.com/TheLockdown/Follow TheLockdown on Twitter @privacypodIn This Week's Show:Privacy on the road with hotels, VRBO rentals, and UberWhy we do this, and the reasons behind our privacy lifestyleA look at Defensive OSINT strategiesFace morphing our real photos for privacyLocation tracking on your phoneMySudo and pre-paid burner numbersA surprise guest?Show Links:Black Portable Hotel Door Lock: https://www.amazon.com/Portable-Security-Additional-Traveling-Apartment/dp/B0CFVS6NRNPython Script for ThisPersonDoesNotExist: https://github.com/locksec/tpdne_pyFacemorph.me: https://facemorph.meUpscayl: https://www.upscayl.orgFile Optimizer: https://nikkhokkho.sourceforge.io/static.php?page=FileOptimizerIntro voice-over: IRLRosie - Creative Commons Attribution license (reuse allowed)Music: The Lockdown “Give me six lines written by the most honest man, and I will find something in them to hang him.” - Cardinal Richelieu
Summary Eric Escobar (Twitter; LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss compromising networks and information security. He has a coveted DEFCON Black Badge. What You'll Learn Intelligence -What keeps Eric up at night -Thinking like an ethical hacker (aka a “penetration tester) -Protecting your information (i.e., “Hardening the attack surface”) -Plain English explanations of key cyber concepts like “Kill Chains” and “Zero Days” Reflections -Having a cool job -The information revolution and life in the modern world And much, much more… Episode Notes Eric Escobar commits several thousand felonies on any given day, if he didn't have permission to do what he was doing. A Principal Security Consultant with SecureWorks, Eric has compromised pretty much everything out there: from healthcare and banking to technology and critical infrastructure, through to amusement parks and next generation military aircraft. “From my perspective, it's the coolest job in the entire world.” His team consecutively won first place in the Wireless CTF category at DEF CON 23, 24, and 25, snagging a Black Badge along the way. He has a BS and MS in Civil Engineering. And… The links between computing, hacking and the 60's counterculture are FASCINATING. Learn more by dipping your toes here and here, or dive deeper with What the Dormouse Said (2005) by John Markoff and From Counterculture to Cyberculture (2006) by Fred Turner. Quote of the Week "Watching any critical infrastructure get compromised is really the thing that keeps me up at night because lives are in the balance…and we do a lot of testing for critical infrastructure, and I've seen computers and machines that have been online and not been taken offline, longer than I've been alive…So really interesting to see those types of things because they interact with really big, expensive hardware…there's a catch 22 that happens where you can't really take the machine offline to do maintenance on it because it's critical infrastructure. So then how do you test it to make sure that a hacker can't take it offline, or maintenance can't be done on it? " – Eric Escobar. Resources *Andrew's Recommendation* -Word Notes From beginner thru advanced, you'll find some helpful definitions of things like “Web 3.0,” “NFT's” and “Digital Transformation” on this Cyberwire audio glossary. *SpyCasts* -Inside Microsoft's Threat Intelligence Center (MSTIC) – with John Lambert and Cristin Goodwin (2021) -The Cyber Zeitgeist – with Dave Bittner (2021) -Securing Cyberspace – with Charlie Mitchell (2016) *Beginner Resources* -What is Hacking? The Economic Times (n.d.) [web] -Ethical Hacking in 8 Minutes, Simplilearn (2020) [8 min video] -Cybersecurity in 7 minutes, Simplilearn (2020) [7 min video] Books -The Cyberweapons Arms Race, N. Perloth (Bloomsbury, 2021) -Cult of the Dead Cow, J. Menn (PublicAffairs, 2020) -Breaking & Entering, J. Smith (Mariner Books, 2019) -The Art of Invisibility, K. Mitnick (L, B & C, 2017) -Ghost in the Wires, K. Mitnick (Back Bay Books, 2012) -Kingpin, K. Poulson (Crown, 2012) -The Cuckoo's Egg, C. Stoll (Doubleday, 1989) -Neuromancer, W. Gibson (Ace, 1984) Articles -2022 State of the Threat: A Year in Review, Secureworks (2022) -The Anthropology of Hackers, The Atlantic (2010) -Timeline Since 2006: Significant Cyber Incidents, CSIS (n.d.) Documentary -DEFCON, The Documentary Network (2013) Resources -Government Hacking Bibliography, S. Quinlan, New America Foundation (2016) *Wildcard Resource* -“The Aurora Shard” Come to the International Spy Museum to see an ugly chunk of metal. Why? Well, it speaks to a revolution in the relationship between the material world and the non-material world. Broken down? 30 lines of code blew up a 27-ton generator. Zeros and ones can cause violent explosions!
Jayson Street — Chief Adversarial Officer at Secure Yeti, a DEF CON Groups Global Ambassador, and a world-class awkward hugger Jayson Street, the dynamic Chief Adversarial Officer at Secure Yeti, has worn many masks throughout his life and career. He was once named a “World-Class Hacker” on the National Geographic series "Breakthrough Cyber-Terror," but he prefers the simpler title of Hacker, Helper, and Human. In this episode, Jayson joins Carlton Fields P.A.'s Jack Clabby and KnowBe4's VP of Remote Publishing Teams Kayley Melton to talk about his journey of self-discovery that led him from being an award-winning janitor at McDonald's to one of the world's most infamous ethical hackers. From his early childhood, Jayson has embraced hacking as a way of life, embodying the spirit of relentless exploration, innovation, and resilience. Like our favorite co-host Kayley, Jayson uncovered a new layer of his identity in his adulthood when he discovered that he is neurodivergent. He dives deep into how this new understanding altered his perception of himself, allowed him to embrace the various “masks” he wears throughout life, and discovered that his unique mind is actually his superpower. He also shares extraordinary stories of how he gained entry into some of the hardest-to-access cyber targets in the world. To start off the show, Jack and Kayley talk about the celebrity that's topping the Hacker Celebrity Hot List as the celeb whose name is used most by cybercriminals when creating online scams. Hint: he's just Ken… You can follow Jayson on LinkedIn here: https://www.linkedin.com/in/jstreet/ You can follow Jayson on Twitter here: @jaysonstreet You can learn more about Jayson here: https://jaysonestreet.com You can learn more about Secure Yeti here: https://www.secureyeti.com/
Follow me to see #HeadsTalk Podcast Audiograms every Monday on LinkedIn
Kristin Demoranville — CEO and Founder of AnzenSage, defender of the food sector, and friend to primates What is the role of cybersecurity in food safety? Kristin Demoranville, CEO and Founder of AnzenSage, is committed to shielding the food sector from potential cybersecurity threats and ensuring the resilience of the entire food supply chain. Her dedication is not just a professional pursuit; it's a mission to prevent any compromise to public health. In this episode, Carlton Fields Cybersecurity Attorney Jack Clabby and No Password Required producer Rex Wilson speak with Kristin about everything from the deployment of autonomous tractors to the secure refrigeration of airport food, and Kristin sheds light on the other facets of daily life that are linked to the food supply chain. Kristen also shares how her love for wildlife led to her working with primates at the Louisville Zoo before making the transition into cybersecurity, and the value that podcasting has brought to her life. Kristen's podcast, the Bites & Bytes Podcast, is her platform for discussing cybersecurity and food safety, and is recommended listening for fans of No Password Required. Bites & Bytes has fast become a medium for Kristin to share insights, connect with audiences, and explore the intersections of her diverse interests. Jack and Rex also delve into the intricacies of the Environmental Protection Agency's recent decision not to include cybersecurity in water system audits, and the questions this may raise about the security of water utility infrastructure. You can follow Kristin on LinkedIn here: https://www.linkedin.com/in/demoranvillekristin/ You can follow Kristin on Twitter here: @demokris You can learn more about AnzenSage here: https://www.anzensage.com/
This week, the Elixir Wizards are joined by Yohana Tesfazgi and Wes Bos to compare notes on the experience of learning Elixir vs. JavaScript as your first programming language. Yohana recently completed an Elixir apprenticeship, and Wes Bos is a renowned JavaScript educator with popular courses for beginner software developers. They discuss a variety of media and resources and how people with different learning styles benefit from video courses, articles, or more hands-on projects. They also discuss the current atmosphere for those looking to transition into an engineering career and how to stick out among the crowd when new to the scene. Topics Discussed in this Episode Pros and cons of learning Elixir as your first programming language Materials and resources for beginners to JavaScript and Elixir Projects and methods for learning Elixir with no prior knowledge Recommendations for sharpening and showcasing skills How to become a standout candidate for potential employers Soft skills like communication translate well from other careers to programming work Learning subsequent languages becomes more intuitive once you learn your first How to decide which library to use for a project How to build an online presence and why it's important Open-source contributions are a way to learn from the community Ship early and often, just deploying a default Phoenix app teaches deployment skills Attend local meetups and conferences for mentoring and potential job opportunities Links Mentioned https://syntax.fm/ https://fly.io/ https://elixirschool.com/en Syntax.fm: Supper Club × How To Get Your First Dev Job With Stuart Bloxham (https://syntax.fm/show/667/supper-club-how-to-get-your-first-dev-job-with-stuart-bloxham) Quinnwilton.com (https://quinnwilton.com/) https://github.com/pallets/flask https://wesbos.com/courses https://beginnerjavascript.com/ Free course: https://javascript30.com/ https://pragmaticstudio.com/ https://elixircasts.io/ https://grox.io/ LiveView Mastery YouTube Channel (https://www.youtube.com/channel/UC7T19hPLqQ-Od3Rb3T2OX1g) Contact Yohana: yytesfazgi@gmail.com
Strap yourselves in, because today we're joined by one of the world's most notorious and ethical hackers: Jamie Woodruff. From impersonating a Domino's pizza delivery driver to malware infected e-cigarettes, Jamie takes us on a wild ride of social engineering attacks and the great lengths hackers will go to exploit targets.