I speak with Haydn Johnson about the myth of the purple teamer, that is, an individual who does both red and blue team activities as part of their day job.
I speak with the legendary Jek Hyde about physical penetration testing.
Will Harmon from Trustwave’s Spider Labs comes to talk about Threat Hunting with me.
I sit down with Bryan and Brian from Brakeing Down Security to do a fun take on a classic – Infosec Tabletop Simulations – with a D&D twist!
I speak with Kim Crawley about her recent article in Cylance, Security Certifications You Should Consider Getting, and about certifications in InfoSec in general.
I speak with Dr. Z. Cliffe Schreuders about a rather amazing project, the Security Scenario Generator (SecGen), which generates random vulnerable VMs!
I speak with Jason Haddix of Bugcrowd about the crowdsourcing of pen tests and growing the infosec community.
Scott Piper joins me this week to talk about detecting intruders on AWS.
This week I speak with J Cole Morrison about AWS Security and how IAM policies seem to be a lost art that are causing news headlines because of security breaches.
I speak with author Kyle Rankin about his latest book, Linux Hardening in Hostile Networks: Server Security from TLS to Tor.
I speak with Matt Domko about Bropy, a tool he built on top of Bro that offers infosec professionals an anomaly detection engine for network analysis.
I speak with Jonathon Poling about DFIR and what it entails.
I speak with security consultant Mark Kikta about red teams, their activities and all sorts of interesting aspects on how red teams help organizations build a stronger defence.
In the conclusion of my 2 part interview with Archie Agarwal from ThreatModeler, we look at threat modeling outside of early design and architecture.
Part 1 of a 2 part discussion about threat modeling with Archie Agarwal, CEO of ThreatModeler.