Episode 20 – Physical Penetration Testing with Jek Hyde

Episode 20 – Physical Penetration Testing with Jek Hyde

 
 
00:00 / 53:41
 
1X
 

I speak with the legendary Jek Hyde about physical penetration testing.

Episode 19 – Speaking to Executives with Tracy Maleeff

Episode 19 – Speaking to Executives with Tracy Maleeff

 
 
00:00 / 1:10:13
 
1X
 

Tracy Maleeff joins me to talk about strategies for communicating with senior leadership, which is a key skill for all infosec professionals

Episode 18 – Threat Hunting with Will Harmon

Episode 18 – Threat Hunting with Will Harmon

 
 
00:00 / 34:07
 
1X
 

Will Harmon from Trustwave’s Spider Labs comes to talk about Threat Hunting with me.

Episode 17 – A Look At The Treacherous Twelve From The CSA

Episode 17 – A Look At The Treacherous Twelve From The CSA

 
 
00:00 / 38:50
 
1X
 

I take a look at the Treacherous Twelve from the CSA to see what threats exist for people moving to the cloud.

Episode 16 – OSINT with Joe Gray from Advanced Persistent Security

Episode 16 – OSINT with Joe Gray from Advanced Persistent Security

 
 
00:00 / 1:00:47
 
1X
 

Joe Gray from the Advanced Persistent Security podcast and Through The Hacking Glass fame joins me to talk OSINT.

Episode 15 – Infosec Tabletop D&D with Brakeing Down Security

Episode 15 – Infosec Tabletop D&D with Brakeing Down Security

 
 
00:00 / 53:54
 
1X
 

I sit down with Bryan and Brian from Brakeing Down Security to do a fun take on a classic – Infosec Tabletop Simulations – with a D&D twist!

2017 Holiday Special – Podcast of Podcasters

2017 Holiday Special – Podcast of Podcasters

 
 
00:00 / 1:25:05
 
1X
 

The Brakeing Down Security podcast of podcasters!

Episode 14 – OWASP Top 10 2017 – A6 Through A10

Episode 14 – OWASP Top 10 2017 – A6 Through A10

 
 
00:00 / 39:44
 
1X
 

In this episode I complete my review of the OWASP Top 10 – 2017 looking at items A6 (Security Misconfiguration) through A10 (Insufficient Logging & Monitoring).

Episode 013 – OWASP Top 10 2017 – A1 Through A5

Episode 013 – OWASP Top 10 2017 – A1 Through A5

 
 
00:00 / 34:17
 
1X
 

Taking a look at the first 5 vulnerabilities in the OWASP Top 10 – 2017 list.

Episode 012 – InfoSec Certifications with Kim Crawley

Episode 012 – InfoSec Certifications with Kim Crawley

 
 
00:00 / 48:53
 
1X
 

I speak with Kim Crawley about her recent article in Cylance, Security Certifications You Should Consider Getting, and about certifications in InfoSec in general.

Episode 011 – Security Scenario Generator with Dr. Z. Cliffe Schreuders

Episode 011 – Security Scenario Generator with Dr. Z. Cliffe Schreuders

 
 
00:00 / 40:38
 
1X
 

I speak with Dr. Z. Cliffe Schreuders about a rather amazing project, the Security Scenario Generator (SecGen), which generates random vulnerable VMs!

Episode 010 – Crowdsourced Pen Testing w/ Jason Haddix of Bugcrowd

Episode 010 – Crowdsourced Pen Testing w/ Jason Haddix of Bugcrowd

 
 
00:00 / 42:17
 
1X
 

I speak with Jason Haddix of Bugcrowd about the crowdsourcing of pen tests and growing the infosec community.

Episode 009 – Detecting Intruders on AWS with Scott Piper

Episode 009 – Detecting Intruders on AWS with Scott Piper

 
 
00:00 / 42:10
 
1X
 

Scott Piper joins me this week to talk about detecting intruders on AWS.

Episode 008 – IAM Securing AWS with J Cole Morrison

Episode 008 – IAM Securing AWS with J Cole Morrison

 
 
00:00 / 32:49
 
1X
 

This week I speak with J Cole Morrison about AWS Security and how IAM policies seem to be a lost art that are causing news headlines because of security breaches.

Episode 007 – Securing Linux in Hostile Networks

Episode 007 – Securing Linux in Hostile Networks

 
 
00:00 / 40:19
 
1X
 

I speak with author Kyle Rankin about his latest book, Linux Hardening in Hostile Networks: Server Security from TLS to Tor.