Nội dung được cung cấp bởi Chris Magistrado. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Chris Magistrado hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.
Player FM - Ứng dụng Podcast Chuyển sang chế độ ngoại tuyến với ứng dụng Player FM !
Send us a text On this very funny short Bonus Show, standup comic Mack Dryden shares his story about going to the Dentist...you'll never believe what happens...Hilarious! Look for Mack Dryden's "NEW" Dry Bar Comedy Special... Please Listen, Enjoy, and Share where you can...Thanks!! Support the show Standup Comedy Podcast Network.co www.StandupComedyPodcastNetwork.com Free APP on all Apple & Android phones....check it out, podcast, jokes, blogs, and More! For short-form standup comedy sets, listen to: "Comedy Appeteasers" , available on all platforms. New YouTube site: https://www.youtube.com/@standupcomedyyourhostandmc/videos Videos of comics live on stage from back in the day. Please Write a Review: in-depth walk-through for leaving a review. Interested in Standup Comedy? Check out my books on Amazon... "20 Questions Answered about Being a Standup Comic" "Be a Standup Comic...or just look like one"…
Nội dung được cung cấp bởi Chris Magistrado. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Chris Magistrado hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
Nội dung được cung cấp bởi Chris Magistrado. Tất cả nội dung podcast bao gồm các tập, đồ họa và mô tả podcast đều được Chris Magistrado hoặc đối tác nền tảng podcast của họ tải lên và cung cấp trực tiếp. Nếu bạn cho rằng ai đó đang sử dụng tác phẩm có bản quyền của bạn mà không có sự cho phép của bạn, bạn có thể làm theo quy trình được nêu ở đây https://vi.player.fm/legal.
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
What if AI could predict and prevent cyber fraud before it happens? Meet the founder making it possible " On this episode of Hackers to Founders, we feature Zara Perumal, the CTO and co-founder of Overwatch Data. The episode explores Zara’s journey from an early fascination with computer science, influenced by her software developer father, to her evolution into a cybersecurity and AI entrepreneur. Zara recounts her first steps into coding, beginning with HTML at age 11 and later developing iOS apps, which sparked her passion for building technology. She reflects on her experiences at MIT, where she explored bioinformatics, machine learning, and eventually cybersecurity, which became a turning point in her career. Her work at Google’s Threat Analysis Group further deepened her understanding of digital threats, leading her to the realization that she wanted to create a company addressing cybersecurity challenges at scale. The episode then shifts focus to Overwatch Data, where Zara details the company's mission to harness AI to process OSINT (open-source intelligence) and provide actionable insights for businesses. She describes the challenges of collecting and analyzing data from the dark web and fraudulent networks, explaining how Overwatch leverages automation and investigative techniques to detect threats and fraud. She also discusses the business side of the startup, from finding the right market fit to the importance of customer feedback in shaping their solutions. Throughout the conversation, Zara and host Chris Magistrado delve into the complexities of cybercrime, the evolving threat landscape, and the role of AI in modern threat intelligence, offering listeners a fascinating look into the intersection of security, AI, and entrepreneurship. People Zara Perumal – CTO and Co-founder of Overwatch Data, specializing in AI-driven cybersecurity. Chris Magistrado – Host of Hackers to Founders , interviewing tech and security entrepreneurs. Arjun Bisen – CEO and Co-founder of Overwatch Data who initially had the idea for the company. Ron Rivest – Renowned cryptographer and MIT professor who influenced Zara’s interest in cybersecurity. Michael (YC Advisor) – Advisor at Y Combinator who guided Overwatch Data through its early stages. Companies & Organizations Overwatch Data – A cybersecurity startup leveraging AI to process OSINT and detect fraud. MIT CSAIL – MIT’s Computer Science and Artificial Intelligence Laboratory where Zara conducted research. Harvard Belfer Center – A research institute focused on security, where Zara contributed to digital democracy defense. Akamai – A cloud and cybersecurity company where Zara gained experience in software and data analytics. NASDAQ – A major stock exchange where Zara worked in technology roles. Apple – Technology company where Zara developed software. Y Combinator – Startup accelerator that backed Overwatch Data. Corellium – A company providing a virtualization platform for mobile security research. Technologies & Tools Objective-C – Programming language used for iOS app development before Swift. Swift – Modern programming language for Apple’s ecosystem. React Native – A framework for building cross-platform mobile applications. Flutter – Google’s UI toolkit for natively compiled mobile apps. JADX – A tool for reverse-engineering Android applications. Telegram – Messaging platform heavily used by cybercriminals for fraud and illicit activities. GPT (ChatGPT) – AI tool used for scripting and automating analysis tasks. DeepSeek – An AI tool discussed for its open-source implications. Magic Eye – A bot used for detecting duplicate images on Reddit. Corellium – A mobile security research platform used for analyzing malware. Cybersecurity & Hacking OSINT (Open-Source Intelligence) – Intelligence gathered from publicly available sources. Dark Web – A hidden part of the internet where illicit cyber activities and fraud take place. SIM Swapping – A fraud technique where hackers take over phone numbers to gain access to accounts. Credential Stuffing – A hacking technique using stolen username-password combinations. PDF Malware – Malicious software hidden in PDFs, which Zara researched in academia and at Google. Null Market (Nulled) – A recently taken-down dark web forum used for cybercrime. DNM (Dark Net Marketplaces) – Online platforms for buying and selling illicit goods. Grams – A dark web search engine that indexed darknet marketplaces. MD5 Hashing – A cryptographic technique used to verify digital signatures.…
Who created the CVE system? That's Adam! In this insightful episode of "Hackers to Founders," host Chris REal0day Magistrado welcomes Adam Shostack, a renowned cybersecurity expert and co-creator of the Common Vulnerabilities and Exposures (CVE) system. Adam recounts his journey from a curious and geeky childhood, engaging in activities like D&D and building with Legos, to his influential career in cybersecurity. He delves into his early experiences at Brigham and Women's Hospital, where he first encountered the importance of security and privacy in medical systems. Adam shares his entrepreneurial ventures, including his pivotal roles in startups like Net Tech and Zero Knowledge Systems, highlighting the challenges and rewards of building security-focused businesses during the nascent stages of the cybersecurity industry. His passion for threat modeling is evident as he discusses his work at Microsoft, where he developed user-friendly threat modeling tools and authored influential books to make security practices more accessible. Beyond his technical achievements, Adam emphasizes the significance of education, training, and mentorship in advancing cybersecurity. He explains his transition from product development to focusing on training and creating scalable educational programs, ensuring that essential security skills are widely disseminated. Adam also explores his collaboration with Cyber Green to establish cyber public health, aiming to apply public health methodologies to measure and mitigate cyber impacts effectively. Throughout the conversation, Adam underscores the importance of diversity in fostering innovative solutions and the need for adaptable strategies in an ever-evolving threat landscape. His dedication to making cybersecurity more inclusive and his visionary approach to integrating interdisciplinary techniques position him as a key thought leader committed to enhancing global security practices. People Adam Shostack : Renowned cybersecurity expert, co-creator of the Common Vulnerabilities and Exposures (CVE) system, author of several influential books on threat modeling and security design. Frank Abagnale : Subject of the book "Catch Me If You Can," which influenced Adam's childhood interest in security and deception techniques. Leonardo DiCaprio : Actor who portrayed Frank Abagnale in the movie adaptation of "Catch Me If You Can." Mike Howard : Worked alongside Adam on the Secure Development Lifecycle team. Steve Lipner : Collaborated with Adam on threat modeling initiatives. Rob Kinnaki : Worked with Adam on the cyber public health project, contributing to the development of new cybersecurity disciplines. Tara Wheeler : Partnered with Adam in establishing cyber public health methodologies. Heidi Trust : Recommended by Adam as a notable figure intersecting usability and security. Gene Spafford : Part of Adam's professional network, contributing to cybersecurity discourse. Steve Belvin : Known to Adam, part of his network of cybersecurity professionals. Bruce Schneier : Part of Adam's extensive network within the cybersecurity community. Marcus Ranham : Known to Adam, contributing to his professional relationships. Mudge : Met by Adam during his time at BBN, part of his influential network. Weld Pond : Met by Adam at BBN, contributing to his professional connections. Prerit Garg : Contributor to threat modeling methodologies. Lance Cottrell : Influenced Adam's work on anonymized networks at Zero Knowledge Systems. Paul Syverson : Co-inventor of onion routing. His work influenced the development of anonymized network systems like Tor and Zero Knowledge Systems. Steve Christie : Involved in the development of the CVE system. Dave Mann : Collaborated with Adam on creating the CVE system. Andre Fresh : Worked with Adam on developing the CVE system. Tony Sager : Helped secure funding for the CVE system through collaboration with MITRE. Stephen Savage : Involved in ransomware detection research, mentioned in relation to cyber public health. Organizations CVE (Common Vulnerabilities and Exposures) : A standardized system for identifying and categorizing cybersecurity vulnerabilities. Co-created by Adam Shostack to provide a common reference for vulnerabilities across different platforms and organizations. Net Tech Startup focused on developing vulnerability scanners. Adam played a pivotal role in this successful startup, contributing to the creation of security tools. Zero Knowledge Systems : Startup aimed at creating anonymized network solutions similar to Tor. Adam joined this company to work on privacy-focused technologies. MITRE: Not-for-profit organization that manages various federally funded research and development centers. Collaborated with Adam to develop and support the CVE system. Secure ID : Company that produced authentication tokens. Adam conducted security and privacy reviews of their products early in his career. BBN (Bolt Beranek and Newman Inc.) Technology company known for its work on ARPANET and early internet infrastructure. Adam worked here and met key figures like Mudge and Weld Pond. DEF CON : One of the world's largest and most notable hacker conventions. Adam attended DEF CON, sharing experiences and networking with other security professionals. 2600: Hacker community magazine and associated meetings. Part of the hacker culture Adam was involved with during his early career. ShmooCon : Annual East Coast hacker convention. Adam attended and interacted with the hacker community here. CISA (Cybersecurity and Infrastructure Security Agency) : U.S. federal agency responsible for cybersecurity and infrastructure protection. Mentioned in the context of cybersecurity research and vulnerability management. Products and Tools CVE System (Common Vulnerabilities and Exposures) : A standardized system for identifying and cataloging cybersecurity vulnerabilities. Co-created by Adam Shostack to provide a common reference across the cybersecurity industry. Hacker Shield : Vulnerability scanner developed by Adam's company. Used by organizations to identify and remediate security vulnerabilities. Stride : A mnemonic framework for threat modeling (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege). Developed by Prerit Garg and others to help structure threat analysis. Tor : An anonymity network that directs internet traffic through a free, worldwide, volunteer overlay network. Influenced the development of Zero Knowledge Systems' anonymized network products. Mixmaster : Asynchronous email router designed for anonymizing email traffic. Developed by Lance Cottrell, influencing Adam's work on privacy-focused networking. Log4j : Java-based logging utility with significant vulnerabilities exploited in cybersecurity attacks. Discussed by Adam in the context of vulnerability management and public health approaches to cybersecurity.…
How do you defend Fox News, hedge funds, and global networks while building groundbreaking startups? John Terrill shares his journey. In this episode of Hackers for Founders , cybersecurity executive John Terrill shares his fascinating journey from a curious 12-year-old attending 2600 meetings in Atlanta to becoming a seasoned CISO and co-founder of Drawbridge Networks. He delves into the formative experiences that shaped his career, including his early exposure to security research at Internet Security Systems and his role in founding and developing innovative security technologies. Terrill highlights his learnings about product-market fit, timing, and the challenges of building technology ahead of its time, such as with Drawbridge Networks' pioneering work in micro-segmentation. The conversation also explores Terrill’s tenure as CISO at Fox News during a transformative period, including its sale to Disney, and at Point72, where he tackled challenges like the rise of ransomware, executive protection, and the pivot to remote work during the pandemic. Throughout the episode, Terrill emphasizes the importance of aligning cybersecurity efforts with business objectives, explaining the delicate "yin and yang" balance between offensive and defensive security strategies. He also critiques current board-level approaches to cybersecurity, advocating for more nuanced discussions around practical solutions, recovery planning, and metrics to assess whether organizations are genuinely improving security posture. Companies and Organizations Phosphorus Cybersecurity Inc: A cybersecurity company specializing in xIoT security solutions. Point72: A global hedge fund focused on investment and asset management. Fox News Media : A major American media company known for its news and television broadcasting. OPĀQ Networks : A network security company acquired by Fortinet. Drawbridge Networks : A cybersecurity startup co-founded by John Terrill, focusing on network microsegmentation. NYU Tandon School of Engineering : The engineering school of New York University, where John Terrill was an adjunct professor. BlackRock : A global investment management corporation, where John led application security efforts. NASDAQ OMX : A global financial services corporation operating stock exchanges, where John worked as a consultant. IBM (Internet Security Systems) : A technology and cybersecurity company where John started as an X-Force researcher. Zettaset : A cybersecurity startup focusing on big data security, co-founded by John. Events and Concepts 2600 Meetings : Monthly hacker meetings where cybersecurity enthusiasts and professionals share knowledge. Microsegmentation : A network security strategy for isolating workloads and preventing lateral movement. Zero Trust : A cybersecurity framework emphasizing the elimination of implicit trust in networks. MITRE ATT&CK Framework: A globally accessible knowledge base of adversary tactics and techniques.…
Vivek's passion for solving nuanced, bleeding-edge problems in cybersecurity led him to found SquareX , a browser-native security product that addresses client-side web attacks. He emphasizes the importance of authenticity, community engagement, and leveraging one’s expertise to create scalable solutions. Additionally, Vivek delves into the challenges and lessons of entrepreneurship, stressing the significance of realistic goals, understanding market needs, and networking with advisors and peers to build successful ventures. On the personal front, Vivek values balancing work with family and creative pursuits, such as writing a comic book series to inspire young minds about ethical hacking. He advises entrepreneurs to focus on solving real problems, building meaningful relationships, and continuously learning from customer feedback and market trends. Events and Conferences Black Hat Defcon BruCON NullCon Books Founders at Work by Jessica Livingston Rich Dad Poor Dad by Robert Kiyosaki Superfans Technologies and Platforms Kali Linux Metasploit Qubes OS Podcasts and Media 20VC by Harry Stebbings Joe Rogan Podcast…
From crimping cables to advising the French Minister of Defense—Dave Chronister’s journey is unreal! Step into the world of cybersecurity with Dave Chronister, a trailblazer whose career spans decades of groundbreaking achievements. As the founder of Parameter Security , Dave has helped organizations across heavily regulated industries protect their technology, data, and reputation through cutting-edge strategies. He also launched ShowMeCon , a premier InfoSec conference known for its hands-on training and top-tier speakers. From building one of the largest exchange server deployments to advising global leaders, Dave has been featured on CNN and CNBC for his expertise. Join us as he shares his journey from a small-town IT tech to a global cybersecurity icon, blending technical mastery with insights on business, AI, and creating impactful conferences. You won’t want to miss this! 1. People and Speakers Dave Chronister : Cybersecurity expert, founder of Parameter Security, creator of ShowMeCon. Chris REal0day : Co-interviewer or participant in the conversation with Dave Chronister. French Minister of Defense - Mentioned as a speaker at a conference where Dave Chronister was a keynote speaker. 2. Companies and Organizations Parameter Security : Cybersecurity firm founded by Dave Chronister. ECCouncil : Organization offering certifications like CEH and facilitating cybersecurity training. EuroPol : European Union's law enforcement agency, involved in cybersecurity collaborations. FBI : U.S. federal law enforcement agency, referenced in cybersecurity operations. Fortinet : Cybersecurity company mentioned in the context of speaker quality. 3. Conferences ShowMeCon : InfoSec conference organized by Dave Chronister. Def Camp : Cybersecurity conference held in Bucharest, Romania. Positive Hack Days (PHDays) : Cybersecurity conference held in Moscow, Russia. Black Hat : Leading business-focused cybersecurity conference. DEF CON : Grassroots hacking conference focused on InfoSec enthusiasts. RSA Conference : Government-focused cybersecurity conference. 4. Certifications and Courses CISSP : Certified Information Systems Security Professional, taught by Dave Chronister. CEH : Certified Ethical Hacker certification, taught by Dave Chronister. Security Plus : Foundational cybersecurity certification taught by Dave. 5 . Pop Culture References Animal House : Mentioned as the basis for Mizzou's party reputation. 6. Books Find Your Why by Simon Sinek - A book that helps individuals and organizations discover their purpose and align their actions accordingly Traction by Gino Wickman - Focused on the Entrepreneurial Operating System (EOS) framework, helping businesses gain clarity and improve execution Rocket Fuel by Gino Wickman and Mark C. Winters - Explores the relationship between visionaries and integrators in business, emphasizing the need for complementary roles to drive success Value-Based Fees by Alan Weiss - A guide for service-based businesses on pricing based on value delivered rather than hours worked Vivid Vision by Cameron Herold - A book on creating a clear and compelling vision for businesses and teams to rally around Who Not How by Dan Sullivan - A book on delegating effectively and focusing on what you do best by surrounding yourself with the right people Living the Best Year Ever - A book with worksheets and tools for setting and achieving personal and professional goals The Home MBA - A curated list of books for learning business fundamentals…
Interested in the Darknet and untold stories of the internet?? On this episode of Hackers to Founders, Chris and Jack Rhysider explore the art of podcasting, focusing on Jack’s journey with Darknet Diaries and his evolution as a storyteller. They discuss community building, creating superfans, and the challenges of reaching out to guests, along with the complexities of expanding into new languages. Jack shares insights on integrating AI into creative processes, crafting immersive audio, and the importance of editing and collaboration. The conversation delves into hacking culture, ethical storytelling, and Jack’s transition to full-time podcasting through various revenue models. He reflects on personal growth, networking, community engagement, and aspirations for teaching and writing to inspire others. Guest : Jack Rhysider, Host of Darknet Diaries Darknet Diaries: Clothing Shop Patreon People Chris REal0day Magistrado : Hacker and Host of https://HackersToFounders.com Jack Rhysider : Jack Rhysider is the creator and host of Darknet Diaries. Pat Flynn : An entrepreneur, author, and podcaster known for Smart Passive Income. General Nakasone : General Paul M. Nakasone is the Commander of U.S. Cyber Command and Director of the National Security Agency (NSA), now on the board of OpenAI. Roman Mars : A radio producer and host of the podcast 99% Invisible. Blind Boy : A podcast host and Irish musician and author. Tim Ferriss : An author, entrepreneur, and public speaker known for "The 4-Hour Workweek." Podcasts and Media Programs Darknet Diaries : A podcast exploring true stories from the dark side of the internet. Smart Passive Income : A resource for online business and passive income strategies. This American Life : A weekly public radio program and podcast. Radiolab : A radio program and podcast weaving stories and science into sound-rich documentaries. Rabbit Hole : A New York Times podcast exploring the internet's influence on society. Books and Learning Resources Make Noise : A company specializing in modular synthesizers and other music equipment. Superfans : This term can refer to various platforms or communities. The 4-Hour Workweek : A book by Tim Ferriss on lifestyle design and productivity. Pixar in a Box : An online learning collaboration between Pixar Animation Studios and Khan Academy. Organizations and Events NSA (National Security Agency) : A U.S. government agency responsible for signals intelligence and information assurance. NPR (National Public Radio) : An American nonprofit media organization. DEF CON : One of the world's largest hacker conventions held annually in Las Vegas. CCC (Chaos Computer Club) : Europe's largest association of hackers. Toorcamp : I couldn't find a specific URL for Tor camp. CCCamp : The best hacker gathering in the world, held 1 hour north of Berlin, this features hackers from all over the world, very grassroots. Technology and Platforms ChatGPT : An AI language model developed by OpenAI. Minecraft : A sandbox video game developed by Mojang Studios. Roblox : An online platform and game creation system. IRC (Internet Relay Chat) : A protocol for real-time text communication. Anonymous : A decentralized international activist and hacktivist collective. 4chan : An anonymous English-language imageboard website. Cultural and Physical Landmarks Elden Ring : An action role-playing game developed by FromSoftware. Eiffel Tower : A wrought-iron lattice tower in Paris, France. Creators Mr. Beast : A popular YouTuber known for his elaborate challenges and philanthropy. CORPSE : Artist and Creator w/ a very unique voice.…
Want to start your own pentesting consultancy/business? Listen how ApolloGuard created their own pentesting company, offering high-value services in a competitive market. The podcast explores the journey of Daniel Amidon and Pujan Shah, co-founders of ApolloGuard, a cybersecurity company specializing in offensive security. Daniel shares his transition from being a self-taught hacker mentored in vulnerability research to becoming a cybersecurity entrepreneur. Pujan highlights his path from studying computer science and working in various industries like healthcare and venture capital to co-founding ApolloGuard. Their partnership is built on complementary skills: Daniel’s technical expertise and Pujan’s operational and strategic vision. Together, they emphasize the importance of proactive security measures and building trust with clients. The discussion also dives into how ApolloGuard operates, blending technical depth with business agility. They share insights on starting a pen-testing firm, from leveraging existing networks for early clients to addressing the gap between compliance-driven testing and meaningful security solutions. The founders stress the value of persistence, innovation, and relationships in growing a security company while staying true to their mission of providing high-quality, actionable insights to clients. Guests Pujan Shah - Co-Founder & CEO Daniel Amidon - Co-Founder & CTO Company ApolloGuard Website Hackers to Founders Website - https://HackersToFounders.com Books Mentioned Your Next Five Moves - Patrick Bet-David The Subtle Art of Not Giving a F*ck - Mark Manson The 7 Habits of Highly Effective People - Stephen Covey The Four Hour Work Week - Tim Ferriss The Obstacle Is the Way - Ryan Holiday Outliers - Malcolm Gladwell Businesses Mentioned DEFCON - Hacker & InfoSec Conference StockX - Website to buy rare shoes…
From wrestling bears to conquering cybersecurity, Philip Wylie shares his thrilling journey of resilience, self-learning, and mentorship, offering insights into the evolving cybersecurity landscape, podcasting, and building a personal brand. In this conversation, Philip Wylie shares his journey from wrestling bears and pro wrestling to becoming a prominent figure in cybersecurity, emphasizing self-learning, adaptability, mentorship, community building, and the evolving landscape of cybersecurity careers while reflecting on podcasting, public speaking, and content creation as essential tools for professional growth, networking, and giving back to the community. Books: The Pentester Blueprint - Co-authored by Phillip Wylie. Hacking Exposed - A book series popular in the late 90s and early 2000s, associated with Foundstone. People: Phillip Wylie - Cybersecurity professional and pen tester. Chris Magistrado (Chris REal0day ) - Host of the podcast. Alyssa Miller - Co-host of "Uncommon Journey" podcast with Phillip Wylie. Chloé Messdaghi - Co-host of "Uncommon Journey" podcast with Phillip Wylie. Don Weber - SANS instructor and ICS OT security professional. Jack Rhysider - Host of the "Darknet Diaries" podcast, known for cybersecurity storytelling. Stone Cold Steve Austin - WWE wrestler who used to train at the same gym as Phillip. Rick Flair - Wrestling legend associated with WCW. Sting - Wrestler who transitioned from UWF to WCW. Iceman King Parsons - Wrestler who hazed newcomers. Samson the Bear - The wrestling bear Phillip competed against. Vince McMahon - Mentioned regarding the WWF/WWE steroid scandal. Dwayne "The Rock" Johnson - Referenced in the context of Samoan wrestling heritage. American Gladiators - Referenced as a show Phillip once auditioned for. Podcasts: Uncommon Journey - Phillip Wylie's first podcast, co-hosted with Alyssa Miller and Chloe Messdaghi. Darknet Diaries - Mentioned as an inspiration for podcast storytelling (hosted by Jack Rhysider). Paul’s Security Weekly - Mentioned for its multi-host format. Events and Locations: DefCon Group 940 - Created by Phillip Wylie for community building. RSA Conference - Where Phillip met with Bugcrowd leaders. B-Sides San Francisco - Another event linked to Phillip’s early opportunities. Certifications: CEH (Certified Ethical Hacker) - Certification Phillip pursued. CISSP - Certification Phillip earned to strengthen his security credentials. Cultural References: Tiger King - Mentioned in the context of unusual animal practices and Oklahoma.…
Join our Discord! https://discord.gg/NWN3ehgmwP In this episode of the Hackers to Founder podcast, host Chris REal0day interviews Maxie Reynolds, a pioneer in sustainable technology and cybersecurity. Maxie shares her unique journey from working offshore as a ROV pilot to founding Subsea Cloud, a company focused on underwater data centers. She discusses overcoming family expectations, her experiences in the offshore industry, and her transition into cybersecurity. The conversation also touches on cultural differences experienced while living in Alabama and Australia, her philosophy on life choices, and her brief foray into the entertainment industry as a stuntwoman and actress. In this conversation, Maxie shares his experiences ranging from cultural misunderstandings to the challenges faced during red team engagements in cybersecurity. He discusses his transition from working at PWC to starting his own firm, emphasizing the importance of networking and building a client base. Maxie also highlights the significance of continuous learning through reading and debates the effectiveness of carbon capture and other environmental solutions. Finally, he introduces his company, Subsea Cloud, which focuses on innovative data center efficiency. In this conversation, Maxie discusses the intricacies of subsea operations, emphasizing the cost efficiency and energy dynamics involved. He shares insights on the challenges faced by startups, particularly in navigating the enabler's dilemma and the impact of antitrust regulations. The discussion also covers client acquisition strategies, the exploration of GPU trials, and the landscape of crypto mining. Maxie highlights the importance of networking and building authentic connections, while also touching on the art of social engineering and perceptions in networking. In this engaging conversation, Chris and Maxie delve into the intricacies of red teaming, the importance of social engineering, and the profound impact of literature on personal and professional development. They discuss their dream team for red team engagements, share insights on various influential books, and reflect on the writing process and its challenges. The dialogue highlights the significance of knowledge sharing and the role of imagination in problem-solving, culminating in a thoughtful exploration of happiness and lifestyle choices. Takeaways Maxie Reynolds is a trailblazer in sustainable technology and cybersecurity. She overcame family expectations to pursue a career offshore. Maxie's journey includes working as a ROV pilot and in underwater robotics. She transitioned into cybersecurity and founded her own company. Cultural experiences in Alabama and Australia shaped her perspective. Maxie emphasizes the importance of taking opportunities in life. She believes parenting is a challenging and thankless task. Maxie's philosophy is to live an interesting life without regrets. She has a unique background in stunt work and acting. Maxie's experiences highlight the intersection of technology and personal growth. Cultural identity can lead to misunderstandings in professional settings. Red team engagements can present unexpected challenges. Transitioning to entrepreneurship often involves risk and uncertainty. Networking is crucial for building a client base. Continuous learning through reading is essential for personal growth. Carbon capture technology faces significant challenges and skepticism. Data centers can be made more efficient through innovative cooling solutions. Being likeable, driven, and smart are key traits for success. Understanding the technical aspects of environmental issues is vital. Networking can lead to unexpected opportunities. Water has a high specific heat, affecting ocean warming. Subsea operations can be significantly cheaper than traditional methods. Startups often face challenges due to the enabler's dilemma. Antitrust movements can benefit startups by reducing acquisitions. Determination and synthesis of information are key to startup success. Client trials are a common strategy for acquiring larger companies. The crypto mining market presents unique opportunities and challenges. Targeting large companies is a primary focus for growth. Funding strategies are crucial for operational success. Networking authentically can lead to valuable connections. Max shares his ideal red team members, emphasizing their unique skills. Social engineering is a crucial aspect of red team engagements. Books like 'The Artist's Direction' and 'Atomic Habits' are influential. Maxie prefers actionable, research-based books over self-help. The conversation touches on the importance of understanding human behavior. Maxie discusses the impact of books like 'Outlaw Ocean' on awareness of global issues. Freakonomics provides interesting insights into societal behaviors. The writing process requires discipline and sacrifice, especially during tight deadlines. Maxie believes in the importance of imagination in problem-solving. Lifestyle choices significantly impact long-term health and happiness. Guest Maxie Reynolds - https://www.linkedin.com/in/maxiereynolds/ Subsea Cloud - https://www.subseacloud.com/ Hackers Mentioned All of the hackers of the Scottish Consulate - https://scottishconsulate.org/ Deviant - https://www.youtube.com/@DeviantOllam Drew Porter - https://x.com/imredshift grifter - https://x.com/grifter801 snow - https://x.com/_sn0ww catmurd0ck - https://x.com/catmurd0ck Companies Mentioned Red Team Alliance - https://redteamalliance.com/ Red Team Radio - https://www.redteamradio.net/ Books Mentioned How the World Really Works: The Science Behind How We Got Here and Where We're Going Book by Vaclav Smil - https://amzn.to/3VpesEj Art of Seduction by Robert Greene - https://amzn.to/3ZBRzzQ Atomic Habits by James Clear - https://amzn.to/3VnlJof Outlaw Ocean by Deckle Edge - https://amzn.to/3CW00x4 Freakonomics by Steven Levitt - https://amzn.to/4fYInvp Stuff Matters by Mark Miodownik - https://amzn.to/4gnhcu1 New Confessions of an Economic Hitman by John Perkins - https://amzn.to/3VpFzz8 Blueprint: How DNA Makes Us Who We Are by Robert Plomin - https://amzn.to/49jTz3b Visit our website: https://HackersToFounders.com…
In this episode of Hackers to Founders, Chris Magistrado interviews Marcus Sailler, a seasoned expert in cybersecurity with over 25 years of experience. They discuss Marcus's journey from the military to leading red teams, the importance of understanding business impact in cybersecurity, and the nuances of interviewing in the field. Marcus shares insights on building effective red teams, the significance of program development, and how aspiring professionals can transition from pen testing to red teaming. The conversation emphasizes the need for intellectual curiosity, practical experience, and the ability to communicate effectively within organizations. In this conversation, Chris and Marcus delve into the dynamics between red and blue teams, discussing the transition of professionals between these roles and the importance of understanding various vulnerabilities. They explore the relevance of legacy vulnerabilities in modern cybersecurity, the challenges faced in building effective red team programs, and the ethical considerations surrounding the use of zero-day vulnerabilities. Additionally, they highlight the significance of industry breaches in validating security programs and the value of certifications and training for aspiring red teamers. In this conversation, Chris and Marcus delve into various aspects of cybersecurity, focusing on the importance of critical thinking in exams, the transition from on-premises to cloud environments, and the necessity of understanding cloud infrastructure for red teaming. They also explore social engineering techniques, particularly vishing, and discuss the #WeHackHealth movement, which combines fitness and cybersecurity. Additionally, they touch on the discovery of CVEs and the challenges of vulnerability management in software. In this conversation, Chris REal0day and Marcus Sailler discuss various aspects of the cybersecurity industry, including investment opportunities, content creation strategies, the importance of networking, and career transitions. They explore the challenges of building relationships in a corporate environment, the significance of soft skills, and the complexities of navigating global cybersecurity issues. The discussion also touches on the differences between vulnerability research and red teaming, highlighting the unique challenges and rewards of each career path. In this conversation, Marcus Sailler and Chris REal0day delve into various aspects of cybersecurity, leadership dynamics, cultural insights, and personal growth. They discuss the challenges of reporting vulnerabilities without rewards, the complexities of different leadership styles, and the importance of understanding interpersonal relationships through concepts like love languages. The conversation also touches on the significance of cultural adaptation in language learning, the tools essential for cybersecurity professionals, and the value of continuous training and development in red teaming. Additionally, they share insightful book recommendations that emphasize resilience and self-awareness in both personal and professional contexts. Takeaways Red teamers must understand the business impact of their findings. Interviews should be interactive and allow for discussion. Early career experiences can be valuable in cybersecurity. Joining the military can provide a strong foundation for IT careers. Building a red team requires maturity in the organization's security posture. Learning from experts and networking is crucial for career development. Program development is essential for legitimizing red team efforts. Demonstrating curiosity and initiative can help in career transitions. Creating internal communities can foster talent and interest in cybersecurity. Understanding operating systems is key for effective red teaming. Red teamers often transition from blue team roles due to frustration with unaddressed issues. Understanding foundational vulnerabilities is still valuable, even if less prevalent. The usefulness of vulnerabilities depends on the organization's maturity and vulnerability management program. Building a red team requires investment in talent development and retention. Using industry breaches can effectively validate the need for security programs. Ethical considerations arise when using zero-day vulnerabilities in demonstrations. Training and certifications are crucial for effective red teaming. Practical experience is essential for understanding red team operations. The urgency of red teaming requires quick execution in complex environments. A strong understanding of both offensive and defensive strategies is necessary for red team success. The exam structure emphasizes critical thinking and situational awareness. Understanding cloud infrastructure is crucial for aspiring red teamers. Vishing is an effective social engineering technique that uses phone calls. The #WeHackHealth movement promotes fitness within the cybersecurity community. Vulnerability management requires collaboration and team effort. Process Hacker is a valuable tool for discovering vulnerabilities. Mitigating vulnerabilities can involve clever solutions that obscure predictable patterns. The complexity of multi-cloud environments presents unique challenges for security professionals. Social engineering tactics are evolving with advancements in technology. Investing in cybersecurity contributes to industry growth. Networking is essential for career advancement. Building relationships should be genuine, not transactional. Career transitions can lead to exciting new opportunities. Soft skills are crucial for effective networking. Global challenges require tailored approaches in cybersecurity. Red teaming offers a different perspective than vulnerability research. Trial and error is part of building effective teams. Bounties in cybersecurity can complicate vulnerability disclosure. Leadership styles can significantly impact team dynamics. Understanding love languages can enhance workplace relationships. Cultural adaptation is crucial when learning new languages. Bloodhound is a powerful tool for Active Directory reconnaissance. Continuous training is essential for red team effectiveness. Books on personal growth can provide valuable perspectives. Ego can hinder personal and professional development. Resilience is key to overcoming challenges in cybersecurity. Guest - Marcus Sailler Linkedin - https://www.linkedin.com/in/marcus-s-8bbb5340/ Trainings Mentioned SpectorOps.io - https://specterops.io/training/ Books Mentioned Red Team Development and Operations: A practical guide by Joe Vest and James Tubberville - https://amzn.to/4145X5a The Art of Attack - Attacker Mindset for Security Professionals by Maxie Reynolds - https://amzn.to/3Ops6n5 The 5 Love Languages: The Secret to Love That Lasts - https://amzn.to/4fJR1O3 The Obstacle Is the Way: The Timeless Art of Turning Trials into Triumph by Ryan Holiday - https://amzn.to/3Vc8juW Visit our website: https://HackersToFounders.com…
Chris REal0day interviews Lauro Perez, a seasoned software engineer and cybersecurity enthusiast, exploring his journey from a young computer enthusiast to a professional in the field. Lauro shares pivotal career moments, including a life-changing scholarship, navigating job offers, overcoming imposter syndrome, and the importance of mentorship. The conversation highlights AI’s role in learning, the evolution of cybersecurity, and challenges like ransomware-as-a-service and bug bounty programs. Lauro emphasizes soft skills, networking, and balancing work with personal growth while reflecting on ethical considerations in tech. They also discuss content creation in cybersecurity, hands-on learning, unscripted podcasting, and future aspirations. Touching on AI, true crime, and gaming, the dialogue offers insights into the evolving tech landscape and personal growth. Key Takeaways Lauro's passion for computers began at age 10, with perseverance shaping his career. A scholarship was pivotal, and networking led to multiple job offers. Soft skills, confidence, and concrete achievements are crucial in interviews. Mentorship and self-study greatly impact career growth. AI tools aid in learning, cybersecurity, and content creation. Balancing work, family, and personal projects is essential. Imposter syndrome is common but manageable with self-belief. Challenges in cybersecurity include AI's role, unfair bug bounty rewards, and ransomware-as-a-service. Sharing knowledge empowers others and reinforces personal learning. Trends like AI and diverse representation are reshaping cybersecurity. Hands-on learning is critical, as computer science education often lacks depth. Authentic, unscripted content fosters engaging discussions. Collaboration and personal experiences inspire innovation in tech, health, and gaming. Lauro Perez LinkedIn - https://www.linkedin.com/in/lauroperezjr/ Exploit Brokers Website - https://exploitbrokers.com/ YouTube - https://www.youtube.com/ @exploitbrokers Spotify - https://open.spotify.com/show/3YRafqb2OGxfXgoIPfRbe2?si=40e21cd5ac0b45c0 Rumble - https://rumble.com/user/ExploitBrokers Visit our website: https://HackersToFounders.com…
In this episode, Chris interviews Sid, a prominent figure in the cybersecurity field, discussing his journey from a small town in India to becoming a successful entrepreneur in the UK. Sid shares insights about his early education, the importance of peers in his career, and the transition from corporate life to founding his own company, NotSoSecure. He emphasizes the significance of training in scaling his business and reflects on the acquisition of his company, highlighting the challenges and rewards of entrepreneurship. In this segment of the conversation, Sid and Chris delve into the intricacies of service businesses in the VC landscape, the evolution of SecOps Group, and the innovative exam models they have developed in the cybersecurity education sector. They discuss the challenges and strategies of building a brand through exam offerings, the importance of understanding the consulting landscape, and how to navigate competition effectively. Sid emphasizes the significance of creating value through affordable and accessible exams, which has led to substantial growth in their business. In this conversation, Chris and Sid explore the intricacies of entrepreneurship, investment, and mentorship. Sid shares his experiences with certifications, the importance of understanding business dynamics, and the value of enjoying the entrepreneurial journey. They discuss the significance of identifying strengths and weaknesses in startups, the role of community in product development, and the future vision for growth in Sid's ventures. The conversation emphasizes the importance of networking, collaboration, and the mindset required for successful entrepreneurship. Takeaways Sid's journey showcases the importance of curiosity and resilience. Early exposure to hacking sparked Sid's interest in cybersecurity. The role of peers is crucial in personal and professional growth. Transitioning from corporate to entrepreneurship requires courage and preparation. Training became a key revenue stream for Sid's business. Clear messaging is essential for standing out in a competitive market. Sid emphasizes the importance of creating trainers rather than just being a trainer. The acquisition of Not So Secure was a strategic decision for growth. Entrepreneurship is about building something and knowing when to let go. Success in business often requires recognizing one's strengths and weaknesses. VCs typically prefer product-based businesses over service-based ones. Service businesses can sell for 5x to 7x EBITDA depending on various factors. The principles of hacking can be applied to various aspects of life and business. SecOps Group aims to provide affordable and accessible cybersecurity exams. The exam business has seen rapid growth, with over 50,000 participants in a year. Building a brand through innovative exam offerings can lead to increased leads and business opportunities. A bottom-up approach in sales can complement traditional top-down strategies. The exam model is lean and allows for quick updates and changes. Creating value through good quality and reasonably priced exams is key to popularity. The exam portfolio has expanded significantly in a short time, indicating market demand. Certifications can be controversial; choose wisely. Investing is more about mentorship than just money. Understanding a business's needs is crucial for investment. Failures are part of the entrepreneurial journey. Enjoying the process leads to eventual success. Identifying strengths and weaknesses is key for startups. Community engagement is vital for product success. Market fit is essential before launching a product. Networking can lead to valuable collaborations. Continuous learning and adaptation are necessary for growth. Guest: Sumit Siddharth - https://www.linkedin.com/in/sumsid/ SecOps Group - https://secops.group/ Visit our website: https://HackersToFounders.com…
In this episode of the Hackers to Founders podcast, host Chris REal0day interviews Greg Martin, a prominent figure in the cybersecurity field. Greg shares his journey from a young hacker in a small Texas town to becoming the CEO of Go Security. He discusses his early fascination with computers, the rise of Linux, and his first job at a local ISP. As he transitioned into the world of data centers and cloud computing, Greg also recounts his experiences working with law enforcement agencies like the FBI and Secret Service on cybercrime initiatives. The conversation highlights the evolution of cybersecurity and Greg's entrepreneurial ventures. In this conversation, Greg Martin shares his journey from feeling like an imposter in the cybersecurity field to being recruited by the NSA. He discusses the challenges he faced during the recruitment process, his experiences at ArcSight, and the importance of mentorship in cybersecurity. Greg also reflects on his transition from employee to entrepreneur, emphasizing the significance of training the next generation of cybersecurity professionals. In this conversation, Greg Martin shares his journey from developing a cybersecurity tool to founding multiple startups, including Ghost AI. He discusses the challenges of entrepreneurship, the importance of securing investment, and the evolving role of AI in business. The conversation highlights the significance of mentorship, the realities of startup life, and the innovative solutions being developed in the application security space. Takeaways Greg Martin's journey in cybersecurity began at a young age. He was inspired by movies depicting hacking culture. Linux played a crucial role in his early career. His first job was at a local ISP where he learned networking. Greg transitioned to data centers during the rise of cloud computing. He worked closely with law enforcement on cybercrime cases. The Secret Service's Nitro program focused on cybercrime. Private sector collaboration is essential in combating cyber threats. Greg's entrepreneurial spirit led him to found multiple companies. His experiences shaped his understanding of cybersecurity's complexities. Cybersecurity professionals often experience imposter syndrome. Recruitment by the NSA can feel surreal and movie-like. Young talent in cybersecurity can be intimidating. The interview process at the NSA is rigorous and unique. Honesty in background checks can impact career opportunities. Transitioning to a startup can open new doors. Building software for cybersecurity requires creativity and passion. Mentorship is crucial for the growth of young professionals. Entrepreneurship in cybersecurity can stem from open-source projects. The journey from employee to founder is filled with challenges. Starting a company can stem from recognizing a valuable opportunity. Navigating early challenges is crucial for startup success. Securing investment is often about finding the right partners. The entrepreneurial journey is filled with ups and downs. AI is transforming the landscape of business and security. Investing in startups carries significant risks and rewards. Mentorship can be a game-changer for first-time founders. Automation can significantly enhance productivity in tech roles. Understanding market needs is essential for successful entrepreneurship. Building a product that evolves with technology is key to long-term success. Greg Martin - https://www.linkedin.com/in/gregcmartin/ Ghost Security - https://ghostsecurity.com/ Ghost Security Reaper - https://github.com/ghostsecurity/reaper Visit our website: https://HackersToFounders.com…
In this episode, Chris interviews Hannah Latonick, a cybersecurity expert with over 18 years of experience. They discuss Hannah's journey into cybersecurity, her experiences with Capture the Flag competitions, her role at Dark Wolf Solutions, and her insights on government contracts and networking. Hannah shares valuable advice for aspiring cybersecurity entrepreneurs and highlights innovative projects her team is working on, including a focus on drone technology and vulnerability research. In this conversation, Hahna Latonick discusses her journey in cybersecurity, the importance of data security in hostile environments, and the future of Dark Wolf Solutions. She shares insights on scaling success in defense contracting, building strong customer relationships, and the role of mentorship in her career. Hahna reflects on her entrepreneurial spirit from a young age, explores various side hustles, and discusses her experiences with seed funding and startups. She emphasizes the importance of investing in oneself and continuous learning, particularly in the field of cybersecurity training. The conversation concludes with Hahna sharing her upcoming conferences and networking opportunities. Takeaways Hannah Latonickhas over 18 years of experience in cybersecurity. Her journey began with a family computer and curiosity about technology. Capture the Flag competitions played a significant role in her career. Dark Wolf Solutions focuses on finding zero-day vulnerabilities. Networking is crucial for small businesses in government contracting. Small business set-asides on SAM.gov provide opportunities for new companies. Engaging with small business offices can facilitate government contracts. Conferences and trade shows are valuable for networking and learning. Cybersecurity is vital for national security and everyday life. Innovative projects include automated tools for vulnerability discovery. Data security is crucial, especially in hostile environments. Dark Wolf Solutions aims to compete with top defense contractors. Customer intimacy is key to successful contracting. Mentorship has played a significant role in my career growth. Entrepreneurial spirit can start from a young age. Investing in yourself opens up more opportunities. Continuous learning is essential in the tech industry. Teaching cybersecurity helps reinforce my own knowledge. Networking at conferences is vital for career advancement. Exploring side hustles can lead to new business opportunities. Hahna Latonick LinkedIn - https://www.linkedin.com/in/hahnakane/ X (Twitter ) - https://twitter.com/hahnakane BSides Tampa Presentation - https://youtu.be/xi5EFPmw18g?si=w10fpRjv4hswWMc_ Dark Wolf Solutions Website - https://darkwolfsolutions.com/ Android Security Research Playbook - https://asrp.darkwolf.io/ Drone Security Research Playbook - https://dronewolf.darkwolf.io/ IoT Exploitation Blog Post - https://blog.darkwolfsolutions.com/dws-blog-09-26-2024-ep-15 Spoofing Mint Browser Blog Post - https://blog.darkwolfsolutions.com/dws-blog-07-30-2024-ep-8 Topics Mastering Your Money - Stop Yearning Start Earning - https://amzn.to/48nuOTf Unlock Your Millionaire Mindset Today Course - https://www.udemy.com/course/unlock-your-millionaire-mindset-today/ The Personal MBA - https://amzn.to/3Ys9gQE Visit our website: https://HackersToFounders.com…
In this episode, Chris Real0day interviews Alan Braithwaite , Co-Founder and CTO of RunReveal . They discuss Alan's journey from hacker to entrepreneur, his literary influences, the philosophical foundations of his work in cybersecurity, and the importance of curiosity and learning in the hacker mindset. Alan shares insights from his early experiences with gaming, his education, and his career at Cloudflare and Segment, highlighting the lessons learned along the way. The conversation culminates in a discussion about building RunReveal and understanding customer needs in the cybersecurity landscape. In this conversation, Alan discusses the importance of customer feedback in product development, emphasizing the value of engaging with paying customers. He shares insights on building a user-friendly product, the significance of data management and security, and the introduction of streaming detections. Alan also outlines his vision for a flexible security pipeline and strategies for customer acquisition. The discussion touches on the challenges of on-prem solutions, the journey of founding a startup, and the role of community in innovation. Alan highlights the balance between focusing on the big picture and being present in the moment, concluding with recommendations for books and resources that have influenced his journey. Visit our website: https://HackersToFounders.com…
Chào mừng bạn đến với Player FM!
Player FM đang quét trang web để tìm các podcast chất lượng cao cho bạn thưởng thức ngay bây giờ. Đây là ứng dụng podcast tốt nhất và hoạt động trên Android, iPhone và web. Đăng ký để đồng bộ các theo dõi trên tất cả thiết bị.
Tham gia ứng dụng podcast tốt nhất thế giới để quản lý các chương trình yêu thích của bạn trực tuyến và nghe ngoại tuyến trên ứng dụng Android và iOS. Nó miễn phí và dễ sử dụng!