show episodes
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
 
I
ITSPmagazine Podcasts

1
ITSPmagazine Podcasts

ITSPmagazine, Keenan Skelly, ITSPmagazine The Compromise, Alyssa Miller

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
It's time to catch the signal from the AppSec Village at DEF CON 29. ____________________________ Guest Tiffany Long On Linkedin: https://www.linkedin.com/in/tmlong783/ On Twitter: https://twitter.com/viewfromabook ____________________________ Host Vandana Verma On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/vandana…
 
Thought the tech vine episode 15 We have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think? Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐 In this episode we talk about: WiCyS Advancing Women in Cy…
 
Enterprise resiliency is something many organizations take into account as they manage their business operations to extract the most from their investment. However, the CISO view of what it is and why it matters may look different as we explore different markets and operating environments. In this episode, we take a deep dive into the impact of ent…
 
When it comes to addressing the lack of diversity in technology, the checkbox approach coupled with the measurement of rates and figures may or may not be a good place to start. Regardless, it may be that we need to understand the why before anything else. In this episode, we speak with Di Ciruolo, a top DEI Consultant who asks our listeners to con…
 
Today’s students need to contend with video learning, privacy issues, and cyberbullying. Lisa Plaggemier Executive Director at National Cyber Security Alliance explains how kids can stay safe online. Is online/remote school here to stay and what do parents need to know to help their children stay safe? Tips for staying safe even if you’re going to …
 
David's journey started by majoring in theology; his career took a turn to become a linguist for the US Navy. After leaving the US Navy, David became a red team exploitation analyst for the NSA. David is now a successful businessman and consultant in the cybersecurity space. _______________________ Guest David Evenden On Linkedin | https://www.link…
 
New federal legislation has been proposed to address data security and privacy. Is it the right move? Is it enough? Is it the next CFAA (Computer Fraud and Abuse Act)? ______________________________ Public versus private sector, enterprise versus SMB organizations, entrepreneurial versus corporate viewpoints. Where do these worlds collide and where…
 
From job postings to gatekeeping, this episode dives into better hiring practices and how to stand out. Deidre Diamond shares guidance and feedback on hiring best practices and how to get the job you want in cybersecurity. Guest Deidre Diamond On LinkedIn | https://www.linkedin.com/in/deidrediamond/ On Twitter | https://twitter.com/DeidreDiamond __…
 
The difference between a problem and a solution is action. It may sound simple, but most of the time, it isn't. It requires motivation, commitment, determination, an open mind, and the will to tackle the issue from different angles. Until you find the one that works well enough. Suppose this is true, and it is, for each problem; it is even more so …
 
To kick off the 219th edition of the Kaspersky Transatlantic Cable podcast, Ahmed, Dave and I head to Australia. You see, the app that our friends down under have in place for their Covid Passports is able to be spoofed and the researcher who found it has been ghosted by government officials he reached out to. From there, we jump into the world of …
 
Executive Director of the Cyber Project at Harvard's Belford Center, Lauren Zabierek is working on how to think about the many ways cybersecurity is synonymous with national security. As the Executive Director of the Cyber Project at Harvard's Belford Center, Lauren Zabierek is working on the front lines of how to think about the many ways cybersec…
 
Thought the tech vine episode 14 We have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think? Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐 In this week's episode of Through The TechVine Live Radio …
 
Alethe shares the story of her childhood, winning the DEF CON Social Engineering CTF and becoming a cyber security consultant. Some people are born with specific skills, and Alethe seems to have social engineering in her DNA. She shares how her childhood experience was an indicator of what she would do as a career someday. Alethe not only shares he…
 
Privacy Rights And The Right-To-Life Laws Passed In Texas | The Compromise With Alyssa Miller And Keenan Skelly ______________________________ Public versus private sector, enterprise versus SMB organizations, entrepreneurial versus corporate viewpoints. Where do these worlds collide and where can we find common ground? One thing is for certain, th…
 
With David on holiday, Ahmed and I are holding down the fort for this week’s Kaspersky Transatlantic Cable podcast. We open the show with a pair of stories about Apple. In the first, the company is holding off on the rollout of its controversial CSAM — for now. Then, we look at the aftermarket for iPhone chargers, which includes the OMG Cable, a ch…
 
As with most things in life that require some thought, before making a decision and taking action, it's often best to figure out the "why" behind the result. In this case, start with the "Why are we hiring a CISO" question. But then what? That's where things get interesting. Undoubtedly, the answer to "Why" sets the stage for the play that's about …
 
What are the dangers of deepfakes? How is it related to cyber and cognitive psychology? Dr. Canham explains Deepfake Social Engineering: Creating a Framework for Synthetic Media Social Engineering. Deepfakes (a combination of “deep learning” and “fake”) leverages Artificial Intelligence to repurpose existing media to appear to be someone else. It’s…
 
Jon has harnessed his passion for education since early on in his career. He sees a unique opportunity to advocate for his students, regardless of what his students experience in their respective home lives. Additionally, he found a community amongst his colleagues, with a shared goal of making a difference in each of their student’s journeys. Jon …
 
Is it your job to innovate? Should you be creative? Can big changes result from small, daily moments? If you listen to Josh Linkner (which you absolutely should), the answer is a resounding YES to all. An entrepreneur, venture capitalist, and New York Times bestselling author, Josh is an innovation guru who joins Tech Done Different to help unleash…
 
Maxie Reynolds shares her story of going from an underwater robotics expert to a social engineer and authoring "The Art of Attack: Attacker Mindset for Security Professionals." Maxie's story demonstrates how, no matter how much you have invested in education and experience, it is never too much to change your career direction even when highly succe…
 
Linguistics is the scientific study of language and its structure. Sociolinguistics is the study of language in relation to social factors. How do the changes in our societies affect the way we communicate, and in what ways does technology come into play? Good questions, right? We asked many more during this episode of Redefining Society. From why …
 
If you scroll through the headlines in cybersecurity, you will often see topics that grab the readers’ attention. Correct me if I am wrong, but you’ve probably read a lot about State-sponsored APT attacks, ransomware, bug bounty programs, disclosure of 0Days, zero day usage, what color hat a hacker is. While I could go on with topics, I think that …
 
Online entities and their affiliates are using and abusing our personal information. It's time to learn how we can change the situation and do better. Guest Alan Michaels On LinkedIn: https://www.linkedin.com/in/alan-michaels-1066814/ ______________________________ Host Chloé Messdaghi On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-pod…
 
This week on the Kaspersky Transatlantic Cable podcast, Ahmed, Dave, and I start out in the Far East with a look at South Korea’s investigation of the fees Google and Apple charge vendors for in-app purchases. The article spurs some debate; we three have pretty distinct opinions about the platform-versus-developer situation. From there, we head to …
 
CyberSecurity is a really cool profession, there is room for many to join in, and the skills required are numerous and diverse. So why aren't we attracting enough people into this massively understaffed field? The answer likely sits in the industry's elitism and inability to reach the audience with the right message, early enough and with the prope…
 
From developer to leader, Emad Georgy has seen the problems of leadership in technology from every angle. He joins TDD to explain leadership principles in ways that apply to tech in particular. You'll learn: why to apply engineering principles to leadership why you need to create something bigger than yourself what it means to scale leadership why …
 
Leadership can make or break an organization's chance for success, and eventually, it will. It doesn't matter what company, organization, or community teams you lead—all you do and how you do it matters for the end result. Given the nature of the function within the cybersecurity industry, someone may think that their style needs to be more decisiv…
 
We start our weekly conversation by talking about how the flux of constant bad news is affecting our mental health and about a curious news about Annoyed Females Humming Birds Tricking Males So They Would Leave Them Alone — apparently, it is not just a human society issue! Then we moved onto: Net Zero Construction And The Need For A More Affordable…
 
Heath Adams grew up in a single-parent home but defied the odds hacking his way to a successful penetration tester, entrepreneur, content creator, and educator. Heath, aka The Cyber Mentor, not only succeeded in his career personally but has helped others living up to his The Cyber Mentor handle. He has mentored many up-and-coming cybersecurity pro…
 
Scott Kominers is the Associate Professor of Business Administration in Entrepreneurial Management at Harvard Business School. His love for math started with a research project on quadratic form representation theory. “It’s like it’s always been there; you just didn’t know how to express it.” Through his high school research project, Kominers got i…
 
CISO Jack Leidecker joins Tech Done Different to explore what it takes to build security into cloud, how security must harmonize with the business, and the power of diverse teams. You'll learn: how to think about security in a fully cloud context why starting a career in security is more about the projects you take on than the certs you collect why…
 
CISOs tend to talk to other technical personnel and don’t get involved in business conversations on a regular basis. To succeed in their role, however, CISOs need to get out from behind their keyboards and start discussions with executives so they can begin to translate what they do in security into what the business wants to hear. But finding thos…
 
Unless you’re “borrowing” network access from your neighbor, you’ve probably got a WiFi setup in your home. Expert JJ Minella explains what you need to know to build your best home WiFi ever. JJ walks us through current WiFi options and helps you create the most secure and reliable system for your home without breaking the bank. Conversation highli…
 
During their research into AD Certificate Services, Lee Christensen and Will Schroeder discovered some severe vulnerabilities that could be exploited and go unnoticed. Lee Christensen and Will Schroeder, experts in AD security research, share what they discovered in some research on AD Certificate Services. They discuss their research that they spo…
 
This week on the Kaspersky Transatlantic Cable podcast, Ahmed, Dave, and I discuss a number of topics that really run the gamut — from spy ships to the robot apocalypse, Bitcoin, and more. Kicking things off is a story from Tom Spring on Threatpost about how Microsoft Power App configurations have led to the leak of more than 38 million sensitive r…
 
Lately, we talk quite a bit about Virtual Reality, Augmented Reality, and Extended Reality. Plenty of Sci-fi books, video games, and movies have helped us think and fantasize about them, but is this still a vision for the future, or is it a reality that is actually here now? Well, it is here and is pretty good already. Not perfect, not quite The Me…
 
We start our weekly conversation by talking about the way we are consuming art today. Virtual reality, immersive digital experiences, and other modern mediums allow us to present and consume art from the past in new innovative ways, but we wonder: would the artist agree? And what would an artist from the past do with today's technology? 👉 https://v…
 
Dave Kennedy shares his story of going from an ethical hacker to the CEO of two successful cybersecurity companies. Most people that know of Dave knows of his involvement with Mr. Robot, but he was also in a rap video. He also started and ran a highly successful conference and started the health movement RedTeamFit. _______________________ Guest Da…
 
So what's it like to be a CISO? We came across a thread on Twitter posted by now Deputy (and then acting) CISO of a billion-dollar crypto company that in the role for three months during the spring bull run. Aside from the burnout, what else can we glean from J.M. Porup's experience? ____________________________ Guest J.M. Porup On Twitter 👉https:/…
 
This week on the Kaspersky Transatlantic Cable podcast, Ahmed, Dave, and I discuss John Oliver’s recent monologue on ransomware and why it’s a good PSA to share with friends and family. We then take a look at the world of malicious social media influencers — in this case from the United Kingdom, where an investigative reporter identified an “influe…
 
Today's conversation comes to us through our partnership with The Mentor Project, where Neil coaches/mentors entrepreneurs all over the world. Having been a founder more than a dozen times, our guest, Neil Kane, also teaches entrepreneurship at the undergraduate and MBA levels for a major university. As a result of all his experience, Neil has beco…
 
With the 300% increase of breaches last year, it's time for congress to create a board that investigates breaches. Scott discusses the need for us to take actions into having a community body that will move the United States into a more secure nation. We cannot wait, we must take action to protect our critical infrastructure. Guest Scott Shackelfor…
 
Join us for an exciting conversation with “Mr. Awesome”, Neal Bridges, an “influencer” in the cybersecurity space. Neal Bridges started hacking at an early age, served in the United States Air Force and made his way into Cyber Command with the United States Air Force. He has led red teams, built pen testing teams from the ground up, developed cyber…
 
As Director of Information Security & IT, Naomi Buckwalter sees firsthand the challenges (and opportunities) around building capable teams. She walks us through security as both a leadership problem, and a talent problem. You'll learn: why we're losing the battle against cybercrime what happens when the security community doesn't play well together…
 
Black Hat: Perspectives on ransomware, cyber hygiene, and and the Industry Avengers. _______________________ Guests Tony Cook On Twitter 👉 https://twitter.com/captcook32 On Linkedin 👉 https://www.linkedin.com/in/tony-cook-26bb5a7/ Mark Lance On Linkedin 👉 https://www.linkedin.com/in/mark-lance-9594234/ ______________________ Host Keenan Skelly On I…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login