InfoSec công khai
[search 0]
Thêm

Download the App!

show episodes
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
 
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security experts, Caroline Wong and Vanessa Sauter, as they focus on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
 
A group of friends getting together and talking about things that we enjoy. We wanted to start recording conversations that we normally would have while hanging out. Interesting topics, busting chops, and some derailment here and there. Sit back, grab a drink and welcome to the circus.
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
 
The InfoSec Daily Podcast with hosted by Rick Hayes with Dave Kennedy, Boris Sverdlik, Beau Woods, Adrian Crenshaw, Karthik Rangarajan, Geordy Rostad, Them_, and Dr. B0n3z is a daily Information Security podcast where we discuss vulnerabilities, the latest information security news as well as technical discussion and debates.
 
The Infosecurity Podcast is brought to you by the organisers of Infosecurity Europe, Europe's number one dedicated information security event. The audio and video episodes will include cutting-edge views from the industry's leading experts, as well as practical tips and strategies to help you protect your business. Many of the experts featured in the series will be present at Infosecurity Europe, held on the 22nd - 24th April 2008, at Olympia, London. If you would like to meet them face-to-f ...
 
Loading …
show series
 
This week Chris Hadnagy joins us to talk about the psychology behind social engineering, choosing effective pretexts, as well as the science behind how we make decisions. My 3 main takeaways were 1) how to identify personality types and communicate effectively using DISC 2) how Oxytocin and Amygdala hijacking influence our behavior and 3) How to ge…
 
In this podcast, Heather welcomes Senior SOC Analyst Tony Robinson back for a follow-up discussion about the FireEye and SolarWinds breaches. Related resources: FireEye and SolarWinds Breaches Q&A with Senior SOC Analyst Tony Robinson by Heather Terry Security Advisory Regarding SolarWinds Supply Chain Compromise by Tony Robinson Security Advisory …
 
Dr. Eric Cole's career has been a mixed of sixth-sense chance encounters and wisdom / foresight of the future. His uncanny ability while younger to see the opportunity in cybersecurity combined with the wisdom to listen to those smarter than him is why he is where he is today. He is an accomplished cybersecurity hacker and executive advisor. His in…
 
For our latest episode of Humans of InfoSec: Emerging Voices, we’re excited to welcome Karan Dwivedi to the show. Karan is a security engineer at Google specializing in detection and response, but he dedicates his free time to coaching and mentoring others breaking into the field. His work demystifying the interview process for security engineers, …
 
This week Fabio Viggiani hangs out to talk about supply chain attacks, ransomware, mapping your software dependencies and assuming breach. My 3 main takeaways were 1) his insights into reverse engineering the SolarWinds Orion malware 2) Up-in-coming trends he sees in ransomware and 3) how he runs incident response investigations For more informatio…
 
This week Josh Sokol joins the show talk about managing risk with a focus on keeping it simple, turning a free open source project into a business and his suggestions on how to get started in InfoSec. My 3 main takeaways were 1) the three components of risk mitigation 2) the different level of maturity within risk management programs and 3) his pro…
 
This week Tyrone Wilson hangs out to talk about breaking into the security industry, passive OSINT and starting a security business. My 3 main takeaways were 1) how to use free tools to gain experience before joining a SOC 2) how he used OSINT to find his biological father and 3) how to maintain your privacy when using exercise apps. For more infor…
 
In this podcast, Heather welcomes Senior SOC Analyst Tony Robinson to talk about the FireEye and SolarWinds breaches in a Q&A. Be sure you check out some of the related resources mentioned during this episode: Security Advisory Regarding SolarWinds Supply Chain Compromise by Tony Robinson Security Advisory Regarding the Recent FireEye Breach Report…
 
This week Jenny Radcliffe joins to the show to talk about social engineering. My 3 main takeaways were 1) which influence factors are most useful in specific situations like in person social engineering vs phishing emails 2) reading micro-expressions in context and understanding their limitations and 3) how to protect yourself against social engine…
 
For our latest Humans of InfoSec podcast, we’re excited to welcome Octavia Howell on the show. Octavia, who is currently the Business Information Security Officer at Equifax, is a seasoned leader and practitioner with extensive experience in governance, networking, and security. She is also the founder of Augustus Redefined, an organization founded…
 
This week Tracy Maleeff hangs out to talk about using empathy to improve your InfoSec investigations. My 3 main takeaways were 1) how to collaborate OSINT findings before drawing a conclusion 2) how to communicate technical issues to a non-technical audience and 3) some tactical tips on using empathy to discover new information. For more informatio…
 
In this episode I got to sit down and have a lovely chat with Troy Hunt! Best known for his website haveibeenpwned.com, his courses on Pluralsight, and so much else! But we took a different road for this chat. We talked about stress management during this turbulent times. Why woud we pick this topic? Grab scotch from your native land...or the liquo…
 
This week Ed Bellis joins the show to talk about risk based vulnerability management. My 3 main takeaways were 1) which factors you should take into consideration when prioritizing vulnerability remediation 2) the effects that public exploit code has on remediation efforts 3) how organizations can improve their threat prioritization by using their …
 
Lisa Jiggetts knew from an early age that she was going to be in tech an cyber. A navy veteren who started off as a cook, she always found herself gravitating towards technology. She is also the Founder & Board of Director of Women’s Society of Cyberjutsu, a non-profit that is dedicated to increasing the opportunities and advancement for women in c…
 
Ep 8 - In this Season 1 finale episode, Asif and Christina catch up with COI listeners and discuss: Why they went dark since election week and what they have been up to. Election week chaos, exhaustion, new beginnings & other changes. The challenges of working from home for working parents. Suggestions on how to cope, including self-care. Our 2021 …
 
This week John Strand joins the show to talk about pen testing in the age of Corona, bypassing multi-factor authentication, dealing with ransomware and starting a security business. My 3 main takeaways were 1) why 0-days don't matter 2) how to bypass identity services like Okta and 3) the one guiding rule for creating a security business For more i…
 
This week Tanya Janca hangs out to talk about secure coding, supply chain security and her new book 'Alice and Bob Learn Application Security'. My 3 main takeaways were 1) how to choose the right language to develop in when starting a project 2) why we should get rid of as many different JavaScript frameworks as possible within our code base and 3)…
 
IoT is Vulnerable IoT Homefootage on sale in the deep and dark web and an intimate IoT device is found to have an exploit. https://www.hackread.com/3tb-clips-hacked-home-security-cameras-leaked/ https://gizmodo.com/a-security-flaw-could-send-your-dick-to-jail-forever-1845286359 Trickbot Takedown via Private and Public Sector Both Microsoft and USCy…
 
This week Or Katz joins us to shares his research into novel phishing evasion techniques seen in the wild. My 3 main takeaways were 1) What the most popular methods to propagate phishing attacks are 2) what signals can help determine if complicated code is malicious or not and 3) How to handle potentially malicious users when we don’t have enough i…
 
Michelle Valdez, the CISO at OneMain Financial, doesn’t approach cybersecurity through the lure of the threat. Instead, she applies a methodical, problem-driven approach honed through her background in the US military, where she served as an investigator for the U.S. Air Force. Her extensive experience working in national security, intelligence, an…
 
This week Chris Rock shares his story as well as some techniques he's used as a cyber mercenary. My 3 main takeaways were 1) why 0-days are rarely needed 2) Spear-phishing as the most efficient technique for the initial compromise 3) why the easiest path to your target may be by hacking someone else, like their accountant For more information, incl…
 
Episode 7 - Security with Grace with special guest and InfoSec Leader, Charles Nwatu In this extraordinary episode, we chat with Engineering Manager, Corporate Security & Security Technology at Netflix, Charles Nwatu (@charles_nwatu) about all things DFIR, Risk, Communications and so much more. We talk about: His start in Digital Forensics and Inci…
 
Eric Strom is the Unit Chief of the Mission Critical Engagement Unit, Cyber Division. In this role, Mr. Strom oversees the FBI Cyber Division’s private sector outreach efforts to the 16 critical infrastructure sectors, forging partnerships with companies in those sectors to develop and share threat intelligence related to activities by sophisticate…
 
This week Hakluke shares some mindset tweaks and tactical advice on how to improve your bug bounty hunting. My 3 main takeaways were 1) why the abundance mindset is so important 2) what we can learn from the similarities between the music industry and bounty hunting and 3) why collaboration is so important. For more information, including the show …
 
Episode 6 - Security, Privacy, and a lot of ** with Tazin Khan Norelius. In episode 6, we're chatting with our first guest to the show, cybersecurity specialist, empath, and critical thinker Taz (@techwithtaz). With over 10 years in the security space, Taz works to bring mindfulness into Cyber Security while making noise around the lack of consumer…
 
This week Katie Moussouris hangs out to talk about both the advantages as well as challenges in running bug bounty programs. My 3 main takeaways were when companies should choose a bounty as opposed to a pen test, where a company should be at operationally before launching a program and how companies should prepare before launching their bug bounty…
 
Episode 5- The State of the Union (The Colors of InfoSec Podcast Recap) In this recap episode, Asif and Christina talk about recent news, their goals for starting this podcast, a recap of episodes and discussions, how they feel the podcast is going, and the future (yes! to more infosec topics). Resources Asif - What is a tabletop exercise? https://…
 
Gabriel Agboruche (@ICS_Gabe) is a senior ICS and OT cybersecurity consultant, helping organizations solve their most challenging industrial control security problems. And that was a mouthful, but that's what I do. Journey's unique one and almost didn't happen. Notes Gabe was a math whiz in the Detroit Public school system During college, he had so…
 
This week STÖK joins us to talk about how he approaches bug bounties. My 3 main takeaways were why you should specialize in a couple of specific bug types. Why you should constantly scan a multitude of bounty programs and why you should hack with a team. For more information, including the show notes check out https://breachsense.io/podcast…
 
Episode 4- Ethical Responsibility in Tech & The Social Dilemma Addiction to social media is a feature, not a bug. In episode 4, Asif and Christina dive into persuasive technology, growth hacking, tech ethics, and share their perspectives on 'The Social Dilemma' documentary on Netflix. Resources The Social Dilemma [on Netlfix]: https://www.thesocial…
 
For the 50th episode of Humans of InfoSec, we’re excited to feature Larkin Ryder, Slack’s head of product security and former interim chief security officer. Larkin has held engineering roles at high tech companies for more than 25 years, including more than five years as a senior security engineer at Twitter. While Larkin has a proven track record…
 
This week Joona Hoikkala joins us to talk about some of the advanced features of ffuf. My 3 main takeaways were why you should use a VPS for running scans and how to integrate an external ffuf scan into your local Burp instance. Why you should use filters instead of the default pattern matcher to remove false positives as well as what cool function…
 
Episode 3- Mentorships vs Sponsorships In this episode, Asif and Christina discuss the reality of traditional mentorship and sponsorship for techies of color, the differences between both, corporate programs feeling forced, and why folks of color don't have mentors or sponsors. Resources 1. Mentor vs Sponsor - https://www.leadersedge.com/brokerage-…
 
Loading …

Hướng dẫn sử dụng nhanh

Google login Twitter login Classic login