Podcasts about hackable how

  • 19PODCASTS
  • 20EPISODES
  • 44mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jan 2, 2023LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about hackable how

Latest podcast episodes about hackable how

Cyber Security Inside
133. What That Means with Camille: Ethical Hacker

Cyber Security Inside

Play Episode Listen Later Jan 2, 2023 21:46


In this episode of What That Means, Camille gets into ethical hacking with Ted Harrington, author of HACKABLE: How to Do Application Security Right and the Executive Partner at Independent Security Evaluators. They talk about what makes a good hacker, some surprising finds in hacking research, how ethical hacking teams can save developers time and money, and much more.   The views and opinions expressed are those of the guests and author and do not necessarily reflect the official policy or position of Intel Corporation.

Dark Rhino Security Podcast
SC S8 E7 Why would Grandma care?

Dark Rhino Security Podcast

Play Episode Listen Later Nov 18, 2022 51:40


Ted Harrington is the #1 best-selling author of Hackable: How to Do Application Security Right. He's also the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, and password managers. He's helped companies like Google, Amazon, Microsoft, Netflix, and more fix thousands of security vulnerabilities. Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes 00:00 Introduction 01:04 More than a checklist 06:19 Investing in the wrong thing 12:51 Story #1 Why would Grandma care? 13:58 Story #2 Grain of Sand 15:48 Psychology security 17:56 Different types of Hackers 22:59 Changing the mindset 32:49 Embedding 34:31 Defense in Depth 40:26 Automation 43:51 Pen Test vs Vulnerability Scan vs Vulnerability assessment 49:47 More about Ted 50:58 Win a SIGNED copy of Teds Book -------------------------------------------------- To win a FREE signed copy of Ted's book "Hackable: How to Do Application Security Right" make sure you: 1. Follow @securityconfidential and @teddy.ballgame on Instagram. 2. Comment a good question that will stump Ted under the Security Confidential infographic for Teds part 1 episode. 3. Nothing else! You're done! --------------------------------------------------- To learn more about Ted visit https://www.tedharrington.com/ To learn more about Dark Rhino Security visit https://www.darkrhinosecurity.com --------------------------------------------------- SOCIAL MEDIA: Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of our studio! Instagram: securityconfidential and OfficialDarkRhinoSecurity Facebook: @Dark-Rhino-Security-Inc Twitter: @darkrhinosec LinkedIn: @darkrhinosecurity Youtube: @Dark Rhino Security ​

That Tech Pod
It's Too Late You're Already Being Hacked With Ethical Hacker Ted Harrington

That Tech Pod

Play Episode Listen Later Aug 9, 2022 38:58


Today on That Tech Pod, Laura and Gabi talk to Ted Harrington. Ted Harrington is the author of HACKABLE: How to Do Application Security Right and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, and password managers. He's helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, Microsoft, Netflix, and more. Ted has helped hundreds of companies fix tens of thousands of security vulnerabilities, including Disney, Amazon, Google, Netflix, Adobe, Warner Brothers, Qualcomm, and more. For his stewardship of security research that Wired Magazine says “wins the prize, hands down,” Ted has been named both Executive of the Year by the American Business Awards and an SD Metro 40 Under 40 entrepreneur. He leads a team that started and organizes IoT Village, an event whose hacking contest is a three-time DEFCON Black Badge winner, representing the discovery of more than 300 zero-day vulnerabilities (and counting). Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. His team founded and organizes IoT Village, an event whose hacking contest has produced three DEF CON Black Badges.Learn more here.

The Social-Engineer Podcast
Ep. 172 - Security Awareness Series - Creating Psychological Salt with Ted Harrington

The Social-Engineer Podcast

Play Episode Listen Later Jun 20, 2022 46:48


This month, Chris Hadnagy and Ryan MacDougall are joined by Ted Harrington. Ted is the author of HACKABLE: How to Do Application Security Right and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, and password managers. Ted has been named both Executive of the Year by the American Business Awards and an SD Metro 40 Under 40 entrepreneur. Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. [June 20, 2022]  00:00 – Intro  00:56 – Intro Links  Social-Engineer.com - http://www.social-engineer.com/  Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/  Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/  Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/  Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb  CLUTCH - http://www.pro-rock.com/  innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/  02:32 – Ted Harrington Intro  03:21 – How did you start off in this industry?  06:15 – Explain it like I'm 12 years old  07:59 – The origins of ISE   09:32 – Is there a "perfect" Password Manager?  14:11 – How to communicate at the executive level  16:54 – The right and wrong ways of investing in security  25:17 – Responsible Disclosure  29:04 – The challenges of the Medical Device field  32:39 – The problem with legislation driving security   34:20 – The manufacturers' role in safety and security   36:00 – Who is the book "Hackable" for?  38:05 – Find Ted online  Twitter: https://twitter.com/securityted  LinkedIn: https://www.linkedin.com/in/securityted  Website: https://www.tedharrington.com  38:37 – Book Recommendations  Retail Pride - Ron Thurston   Art of Resilience – Hussein Al-Baiaty   41:04 – Who is your biggest mentor?  Business Partner – Steve Bono  45:35 – Wrap Up   46:17 – Outro  www.social-engineer.com  www.innocentlivesfoundation.org 

CYBER24
Episode 161: How to do Application Security Right

CYBER24

Play Episode Listen Later May 3, 2022 26:33


In this week's episode, we discuss how businesses and users can “think like hackers” with Ted Harrington, author of Hackable: How to do Application Security Right and renowned “ethical hacker.”

Webcology on WebmasterRadio.fm
Application Security with Cybersecurity Author Ted Harrington

Webcology on WebmasterRadio.fm

Play Episode Listen Later Mar 25, 2022 58:42


Jim and Dave speak with Ted Harrington who argues that companies need to take a similar approach to secure their systems. He explains how important it is to think outside the box and be willing to push boundaries in potentially troublesome ways, whether the subject is application security or something else entirely.Ted Harrington is the author of HACKABLE: How to Do Application Security Right, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for being the first to hack the iPhone. He's overseen security research hacking medical devices, password managers, and cryptocurrency wallets. Ted has helped hundreds of companies fix tens of thousands of security vulnerabilities, including Disney, Amazon, Google, Netflix, Adobe, Warner Brothers, Qualcomm, and more. For his stewardship of security research that Wired Magazine says “wins the prize, hands down,” Ted has been named both Executive of the Year [by American Business Awards] and 40 Under 40 [by SD Metro].  He leads a team that started and organizes IoT Village, an event whose hacking contest is a three-time DEFCON Black Badge winner, and which represents the discovery of more than 300 zero-day vulnerabilities (and counting). Ted‘s work has been featured in more than 100 media outlets, including The New York Times, Financial Times, Wall Street Journal, Washington Post, and USA Today. Ted is a Boston Marathon finisher, and holds a Bachelor's degree from Georgetown University, where he started his first company while a student.Support this podcast at — https://redcircle.com/webcology/exclusive-contentAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

She Said Privacy/He Said Security
How Can Hackers Improve Your Company's Security?

She Said Privacy/He Said Security

Play Episode Listen Later Dec 9, 2021 32:52


Ted Harrington is the #1 best-selling Author of Hackable: How to do Application Security Right. He is also the Executive Partner at Independent Security Evaluators, a company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers. Ted has helped hundreds of companies — including Google, Amazon, and Netflix — fix security vulnerabilities. He also hosts the Tech Done Different podcast. In addition to this, Ted is a professional keynote speaker and the Co-founder of IoT Village, a traveling hacking event series. Previously, he was the Chief Executive Officer at NMG Technologies and the Director at Wolfpack. In this episode… Hackers are evil people trying to destroy companies and wreak havoc on the world of privacy and security. Right? Not necessarily. The word hacking and the term hacker have become grossly abused. Hackers are neither good nor bad — they are simply problem solvers. They see a system and say, “It's supposed to do one thing. Can it do this other thing instead?” As Ted Harrington explains, the differentiating factor is the hacker's motivation: are they after personal gain or trying to harm an organization? Those are attackers. On the other hand, ethical hackers find vulnerabilities in order to fix them and make the technology stronger. By identifying all the holes in your security perimeter, a team of ethical hackers can show you how to make your defense almost impenetrable. In this episode of She Said Privacy/He Said Security, Jodi and Justin Daniels sit down with Ted Harrington, Executive Partner at Independent Security Evaluators, to discuss how ethical hackers can improve your company's cybersecurity. Ted talks about why many companies' security is lagging behind technology developments, the benefits of ethical hacking, and his tips for keeping your passwords secure.

TestTalks | Automation Awesomeness | Helping YOU Succeed with Test Automation

If you don't fix your security vulnerabilities, attackers will exploit them. As testers, we have a responsibility to help to secure our applications. In this episode, Ted Harrington, author of Hackable: How to Do Application Security Right, shares how to defend against attackers by learning to think like them. Discover how to eradicate security vulnerabilities, establish a threat model, and build security into your development process. Listen up!

DiscoPosse Podcast
Ep 193 Ted Harrington on Being Hackable, Preventing the Personal Hack, and Good Security Practices

DiscoPosse Podcast

Play Episode Listen Later Sep 27, 2021 81:28


Ted Harrington is a best-selling auther of a book called HACKABLE: How to Do Application Security Right, and an Executive Partner at Independent Security Evaluators (ISE). ISE is a company of ethical hackers most commonly known for our work hacking cars, medical devices, web applications, and password managers and they've helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, and Netflix. We discuss the challenges of security in every day tech, enterprise and personal infosec practices we can all embrace easily, and why it's so easy to slip on security but equally easy to prevent hacking. Follow Ted at https://tedharrington.com and check out ISE at https://ise.io  This episode is brought to you by Veeam Software and the 4-Step Guide to Delivering Extraordinary Software Demos that Win Deals and Diabolical Coffee plus the great folks over at Fiverr!  Want to ensure real privacy online? Check out ExpressVPN and keep your online life protected. 

The Successful Bookkeeper Podcast
EP258: Ted Harrington - Two Security Strategies Every Bookkeeping Business Should Know

The Successful Bookkeeper Podcast

Play Episode Listen Later Aug 17, 2021 38:33


Protecting your business. When so many businesses rely on the internet and apps, like QuickBooks, security is an indispensable asset. Ted Harrington, author of Hackable: How to Do Application Security Right, is an ethical hacker who finds and fixes security vulnerabilities in companies.  This week's episode focuses on what small businesses can do right now to protect themselves against security threats and breaches. During this interview, you'll learn... Why you should be paying more attention to business security  Security strategies for small businesses How your attitude about security can help or hurt your business Connect with Ted on LinkedIn here.  To learn more about his book HACKABLE: How to Do Application Software Right, click here.    Time Stamps 2:06 - Ted's career journey as an ethical hacker 8:16 - A metaphor for understanding the growing need for security in businesses 13:29 - Baseline security practices for small businesses 19:21 - Why your team should not be sharing the same credentials 23:48 - How mindset plays a key role in business security  32:53 - Ted's book, Hackable: How to do Application Security Right

The Technically Human Podcast
The Rise of the Ethical Hacker: The Wild, Wild West of Cybersecurity with Ted Harrington

The Technically Human Podcast

Play Episode Listen Later Aug 6, 2021 63:00


In this episode, I sit down with Ted Harrington, the author of Hackable: How to Do Application Security Right, and the Executive Partner at Independent Security Evaluators (ISE), one of the most prominent global companies working in the growing industry of ethical hacking. We talk about cybersecurity, the growth of the "ethical hacker" profession, and how the next generation of humanists and technologists can keep the internet safe. For his stewardship of security research that Wired Magazine says “wins the prize, hands down,” Ted has been named both Executive of the Year [by American Business Awards] and 40 Under 40 [by SD Metro]. He leads a team that started and organizes IoT Village, an event whose hacking contest is a three-time DEFCON Black Badge winner, and which represents the discovery of more than 300 zero-day vulnerabilities (and counting). Ted's work has been featured in more than 100 media outlets, including The New York Times, Financial Times, Wall Street Journal, Washington Post, and USA Today.

The Cybertraps Podcast
HACKABLE: How to Do Application Security Right with Ted Harrington Cybertraps 65

The Cybertraps Podcast

Play Episode Listen Later Aug 6, 2021 42:15


Ted Harrington is the #1 best selling author of HACKABLE: How to Do Application Security Right, and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for hacking cars, medical devices, web applications, and password managers. He's helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, and Netflix. Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes. His team founded and organizes IoT Village, an event whose hacking contest is a three-time DEF CON Black Badge winner. He hosts the Tech Done Different podcast. To get help with security consulting and security assessments, or to book Ted to keynote your next event, visit https://www.tedharrington.com. Using a modifier with a password How to think like an attacker A hacker is a problem solver - the intent is what matters. My job is to think the bad thoughts and ask the hard questions How to hack a bar waiting line. Determine what the rules of the game are The people who really succeed are the people who see the way the world could be. It's really about independent thinking. Constraints provide opportunity for us to do better. How to teach people to be better Give kids opportunities to explore their creativity. Most humans are inherently wired to do good and make good choices. Be Better - the two words that define security Start from the foundation that all people are good. Automation of hacking techniques and if it's too easy to be bad, people will do that. The democratization of an elite skill Zeroday vulnerabilities marketplace Security research community. The Blockchain bandit. What do we do about zerodays? We have to accept that they exist, and then we have to go find them.

8th Layer Insights
Embrace an Attacker Mindset to Improve Security

8th Layer Insights

Play Episode Listen Later Aug 3, 2021 63:59


Have you ever taken time to view the world through the eyes of an attacker? Doing so is an interesting and useful exercise. Understanding the mind of an attacker is fundamental to securing your organization or aspects of your personal life. After all, if you aren't doing the job of viewing things from an attacker's perspective, that means that only the attackers are. The idea is to understand the mindset, motivations, and capabilities of a possible threat actor so that you aren't simply oblivious to your vulnerabilities.  This episode is a deep dive into attacker mindsets, we'll hear from four experts who really know what it is to view the world through the eyes of an attacker. Featuring Chris Kirsch (DEF CON Social Engineering CTF Black Badge winner and co-founder of Rumble, Inc.), David Kennedy (Founder of Binary Defense and TrustedSec), Maxie Reynolds (Author of The Art of Attack: Attacker Mindset for Security Professionals, and Technical Team Leader, Social-Engineer, LLC), and Ted Harrington (Author of Hackable: How to Do Application Security Right, and Executive Partner at Independent Security Evaluators). Guests: Maxie Reynolds (https://www.linkedin.com/in/maxiereynolds/) David Kennedy (https://www.linkedin.com/in/davidkennedy4/) Chris Kirsch (https://www.linkedin.com/in/ckirsch/) Ted Harrington (https://www.linkedin.com/in/securityted/) Books and References: Bruce Schneier blog about the Security Mindset: https://www.schneier.com/blog/archives/2008/03/the_security_mi_1.html Origin of "Devil's Advocate": https://allthatsinteresting.com/devils-advocate-origin Lockheed Martin Cyber Kill-Chain: https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html What is Threat Modeling: https://securityintelligence.com/posts/what-is-threat-modeling-and-how-does-it-impact-application-security/ 12 Methods of threat Modeling: https://insights.sei.cmu.edu/blog/threat-modeling-12-available-methods/ The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds Hackable: How to Do Application Security Right by Ted Harrington The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick Threat Modeling: Designing for Security by Adam Shostack Threat Modeling: A Practical Guide for Development Teams by Izar Tarandach and Matthew J. Coles Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors by Perry Carpenter Music and Sound Effects by Blue Dot Sessions & Storyblocks. Artwork by Chris Machowski.

The Mark Struczewski Podcast
3 Cybersecurity Questions You Need to Answer - Ted Harrington

The Mark Struczewski Podcast

Play Episode Listen Later Jul 13, 2021 32:05


Ted Harrington is the #1 best-selling author of Hackable: How to Do Application Security, and he's the Executive Partner of security consultancy ISE (Independent Security Evaluators). His website WHO IS MARK STRUCZEWSKI? Mark “Ski” Struczewski (Mister Productivity) works with executives to help them gain control of their time by taming distractions so they can experience less overwhelm, feel a sense of freedom, and enjoy their lives. In addition to being a productivity coach, Mark is a speaker, host of The Mark Struczewski Podcast, and author. His strategies have guided CEOs/Executive Directors, business owners, business corporate specialists, and entrepreneurs to get back control of their time. You can find out more about how to connect with Mark and his mission to create confident leaders at MisterProductivity.com. Become a Mark Struczewski Insider and get productivity tips and exclusive content that I only share with email subscribers. Follow Mark on TikTok, Facebook, and Instagram. K

tiktok cybersecurity executive partner ted harrington hackable how ceos executive directors
The Mark Struczewski Podcast
3 Cybersecurity Questions You Need to Answer - Ted Harrington

The Mark Struczewski Podcast

Play Episode Listen Later Jul 13, 2021 32:06


Ted Harrington is the #1 best-selling author of Hackable: How to Do Application Security, and he's the Executive Partner of security consultancy ISE (Independent Security Evaluators).   Become a Mark Struczewski Insider and get productivity tips and exclusive content that I only share with email subscribers.   Follow Mark on TikTok, Facebook, and Instagram.   WHO IS MARK STRUCZEWSKI? Mark ‘Ski' Struczewski (“Mister Productivity”) works with executives to help them gain control of their time by taming distractions so they can experience less overwhelm, feel a sense of freedom, and enjoy their lives.   In addition to being a productivity coach, Mark is a speaker, host of The Mark Struczewski Podcast, and author. His strategies have guided CEOs/Executive Directors, business owners, business corporate specialists, and entrepreneurs to get back control of their time. You can find out more about how to connect with Mark and his mission to create confident leaders at misterproductivity.com.

tiktok cybersecurity executive partner ted harrington hackable how ceos executive directors
Productized
Ted Harrington- How to do application security right?

Productized

Play Episode Listen Later Jul 2, 2021 43:34


Host Carolina Messias talks with Ted Harrington, the author of HACKABLE: How to Do Application Security Right and the Executive Partner at Independent Security Evaluators (ISE), the company of ethical hackers famous for being the first to hack the iPhone. He has overseen security research hacking for medical devices, password managers, and cryptocurrency wallets. NOTES: [1:31] From Psychology to hacking [3:45] Ted's book “Hackable: How to Do Application Security Right.” What PMs need to know about it. [7:50] First steps to secure my product [14:00] At what stage do people usually worry about this issue? [15:53] We're becoming increasingly more digital dependent, with our files saved in our drives, pictures in the cloud, digital calendars, remote work, social media, and so on. How secure are we with what we save or send online? [17:50] Exploit Chain & Information leakage [20:00] More challenging hacking - The iPhone [25:11] The cybersecurity of iPhone vs other brands [28:40] Starting in the 1980s, with cases of cyber espionage during the cold war and to last year, in 2020, with a Massive Distributed Denial of Service attack against AWS, we've been vulnerable to cyber-attacks and aware of the need for protection. Over time what do you think has changed and kept the same? [38:25] Ethical hackers vs non-ethical hackers The Productized Podcast is produced by Productized - a series of interviews with product innovators, successful makers, and entrepreneurs. We hope those who listen to the ideas on this show are inspired to productize. For show notes and additional resources related to the Productized Podcast visit https://medium.com/@Productized.

Software Lifecycle Stories
Outthinking a hacker with Ted Harrington

Software Lifecycle Stories

Play Episode Listen Later Jun 24, 2021 39:15


In this conversation, Ted Harrington, Executive Partner at Independent Security Evaluators (ISE) shares his career journey and perspectives with Sivaguru on various topics related to IT security and ethical hacking. He talks aboutHis company of ethical hackers helping other companies secure their IT systemsWanting to be an entrepreneur and starting a consumer facing businessMoving to a company, as the CEO / founder wanted to mentor someone and felt that would be a good experienceWith that experience, feeling the need to serve businesses rather than consumers directlyHow he met his current business partner and how the plan for the company evolved literally overnightHis four core principles: do hard things, do things that matter, do things in the service of others and to get better every single dayApplying these principles in the security business and getting a clientMindset needed for outhinking a hackerThinking like a hacker and why it may not be possible to think one step ahead of the attackerDeveloping the skill of thinking ‘evil', to raise the security levels of our solutionsWhose job it is to think security in a teamHow security is a leadership issueHow security thinking can be used to ensure the adherence to company values such as customer experience, quality etc.Using security as a business differentiator and gain competitive advantageHis thoughts on security aspects of the ‘supply chain'Zero trust and defense in depth modelsHow not to become obsessed and become a pessimist, thinking only of all bad things that can happenHow he likes to look at systems in everything and how they could be improved by breaking themHow he approached writing his book that is related to technology, when technology is changing very fastHow to make security layers least obtrusiveWhat it takes to become a security professionalTed Harrington is the #1 best selling author of HACKABLE: How to Do Application Security Right. He's helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, and Netflix.Ted has been featured in more than 100 media outlets, including The Wall Street Journal, Financial Times, and Forbes.His team founded and organizes IoT Village, an event whose hacking contest is a three-time DEF CON Black Badge winner. He hosts the Tech Done Different podcast.Reach him at: ted [at] tedharrington [dot] com or https://tedharrington.com

Coffee & Coding: the App Developer's Handbook
33 - How Secure is Your App, Hacking Medical Devices, the Blockchain Bandit & more! w/ Ted Harrington

Coffee & Coding: the App Developer's Handbook

Play Episode Listen Later May 26, 2021 52:41


Today's guest is Ted Harrington, Cyber Security Expert & Author of the #1 bestseller "Hackable: How to do Application Security Right"In this episode we discuss: • His origins in Cyber Security • How his team hacked medical devices • How secure is your smartphone • How to think like a hacker • The book writing process • the Blockchain Bandit • and much much more!

Risk Management Show
Interview with Ted Harrington, author of HACKABLE

Risk Management Show

Play Episode Listen Later Apr 14, 2021 38:07


Hello and welcome to the new episode of the Risk Management Show brought to you by Global Risk Community. This is your host Boris Agranovich and our guest today is Ted Harrington. Ted is the author of "HACKABLE: How to Do Application Security Right", and the Executive Partner at Independent Security Evaluators (ISE).  In this interview we discussed the following questions: the main idea behind the book HACKABLE; What ethical hackers do and how they can help mitigate risks and help organisations do application security right; How organizations or software engineers should go about finding issues so we can build more secure solution; and more...

Cyber Work
Vulnerability hunting and ecommerce safety

Cyber Work

Play Episode Listen Later Dec 7, 2020 44:28


Let's talk about the practice of finding vulnerabilities! For Ted Harrington, Executive Partner of ISE, it's much more than a job, it's a life mission. Ted joins the Cyber Work Podcast to discuss being part of the first team to hack the iPhone, as well as thinking like a hacker to avoid being hacked yourself. He also gives advice for people who would rather sell their wares online this holiday season than spend all day thinking about security. The world has been moving in the direction of holiday shopping online for quite some time now, but with things being what they are in 2020, that trend is likely to grow exponentially upward as stores become either closed to the public or only open to a few people at a time for safety. Either way, that means a lot of online transactions, and a lot of juicy targets for cybercriminals.– Get Ted's book, "Hackable: How to do application security right": https://hackablebook.com – Enter code “cyberwork” to get 30 days of free training with Infosec Skills: https://www.infosecinstitute.com/skills/– View transcripts and additional episodes: https://www.infosecinstitute.com/podcastTed Harrington, Executive Partner at ISE is finding new ways to protect digital assets. He's helped companies like Disney, Amazon, Google, Netflix and Adobe fix tens of thousands of security vulnerabilities. His team at ISE is composed of ethical hackers known for being the first to hack the iPhone, where he applies his think-like-a-hacker mentality to constantly adapt to fresh security and software development challenges.About InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.