Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Pen Test Podcasts

show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
Artwork
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
  continue reading
 
Artwork

1
HOU.SEC.CAST.

Michael Farnum and Sam Van Ryder

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join HOU.SEC.CON Cofounders Michael and Sam each week as they chat with conference speakers about the latest topics and trends in the cybersecurity space.
  continue reading
 
Artwork
 
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
  continue reading
 
Artwork

1
Nerding Out With Viktor

Viktor Petersson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Nerding Out With Viktor is a podcast about tech, startups, and everything in between. Hosted by Viktor, a lifelong nerd and seasoned entrepreneur, the show features real conversations with builders, hackers, and technologists. Viktor got his start in Silicon Valley with YippieMove, an early email migration tool, and later created Blotter, a top-ranked productivity app for macOS. He now runs Screenly — the first developer-friendly digital signage platform — and built its open-source sibling, ...
  continue reading
 
Artwork

4
Theorycrafting Podcast

Theorycrafting Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hi there, this podcast was made under the idea that a young adult from the Philippines can test his ability to communicate his thoughts from the pen and paper to speech through podcasts. Topics range as far as anime to culture to philosophy to science and technology and even to some extent a bit of politics. Hope you'll enjoy my random theories crafted about the why's, how's and what for's that I encounter everyday.
  continue reading
 
Artwork

1
Packet Protector

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Long before Christiane Amanpour, Frances Fitzgerald and Martha Gellhorn blazed a trail in courageous investigative journalism, a pioneering and intrepid writer and journalist whose pen name was Nellie Bly opened up a whole new field in what had previously been a strictly male domain. Ten Days in a Madhouse was published as a series of articles in the New York World during 1887. Nellie Bly was given the assignment by her editor to have herself committed to an insane asylum in New York with a ...
  continue reading
 
Transcript message from Audio. My name is Eniola Daniel and l’m here to tell you how passionate l am in drawings. It’s all started when l was in a training. Our class teacher always gives us test saying that we should draw a first Aid box. So l took my pencil and l draw a square and l just put a cross on it. Then l submitted my note. Only for me to turn back and sees someone else drawings looking so fantastic and well done. I got angry and l knew l couldn’t go back again to take my book and ...
  continue reading
 
Loading …
show series
 
Are you curious about penetration testing, aka legal hacking? In this episode of Legitimate Cybersecurity, Frank and Dustin tear down the myths of hacking, break down real-world pen testing, and share hilarious (and horrifying) war stories from the field. We cover: ✅ The skills you actually need to get into pen testing ✅ What certs like OSCP, CEH, …
  continue reading
 
🎙 In this episode of Legitimate Cybersecurity, we dive deep into the unsettling reality of AI in modern cybercrime. Senator Marco Rubio was impersonated by AI in a high-level cyber deception campaign, and that's just the beginning. Frank and Dustin unpack: 🧠 Deepfake threats to democracy 🔐 Signal messaging & nation-state exploitation 🧪 Data poisoni…
  continue reading
 
In this episode of Life of a CISO, Dr. Eric Cole sits down with cybersecurity expert and fellow podcaster Christophe Foulon to dive deep into the evolving role of the Chief Information Security Officer. From breaking into cybersecurity to leading organizations through strategic risk decisions, Christophe shares real-world insights on how to transit…
  continue reading
 
We’re chatting with another fantastic HOU.SEC.CON. author and speaker, Doug Landoll! In this episode Michael and Sam talk to Doug about his book “Security Risk Assessment Handbook”, how he transitioned from traditional IT to cybersecurity, and why others should consider a similar path before moving into a GRC role. Things Mentioned: · HSC User Grou…
  continue reading
 
In this episode of Life of a CISO, Dr. Eric Cole welcomes Michael Coates, a seasoned cybersecurity expert with over 20 years of experience. Michael shares his journey from working as a legal hacker to becoming Twitter’s first Chief Information Security Officer (CISO), and later founding his own data security company. They discuss how core cybersecu…
  continue reading
 
In this episode, Viktor Petersson sits down with Thorbjørn Rønje, founder of Bifrost Studios, to unpack the venture studio model and why he believes it’s a smarter, faster way to build startups. Thorbjørn explains how Bifrost applies a playbook-driven approach to validate product ideas quickly, reduce risk, and bring businesses to life without wast…
  continue reading
 
Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is... Read …
  continue reading
 
Greg Linares (AKA Laughing Mantis) joins us to tell us about how he became the youngest hacker to be arrested in Arizona. Follow Greg on Twitter: https://x.com/Laughing_Mantis. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. …
  continue reading
 
Sorry in advance for the wonk audio!! AI is everywhere—and it's not just writing poems or generating cat pics. In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Burr dive deep into the impact of artificial intelligence on the world of cybersecurity. From the myth of Artificial General Intelligence (AGI) to AI-powered pentesting an…
  continue reading
 
You’re living in a time where science fiction is quickly becoming your reality. In this high-impact episode of Life of a CISO, Dr. Eric Cole breaks down the current state of cybersecurity—from nation-state attacks and massive password breaches to the hidden threats living on your mobile device. You’ll hear Dr. Cole’s unfiltered take on a breach tha…
  continue reading
 
Dark Reading Confidential sits down with two cybersecurity leaders to find out what cuts at CISA mean for the business of cyber. Featuring: Tom Parker, CEO of Hubble Technology Jake Williams, aka "@malwarejake", VP of R&D at Hunter Strategy In today’s episode, we’ll cover… The impact of CISA's workforce reduction How the private sector can fill the…
  continue reading
 
We’re back with another keynote speaker, Robert “RSnake” Hansen! He chats with Michael and Sam about his new book, AI’s Best Friend (and how to get a free copy!), how he started hacking, and his upcoming HOU.SEC.CON. presentation around his research on the CVSS framework. Things Mentioned: · HSC User Group on June 26, 2025 – https://www.hscusergrou…
  continue reading
 
Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
  continue reading
 
In this powerful and wide-ranging episode of Legitimate Cybersecurity, Frank and Dustin are joined by Micah Heaton, Executive Director of Product & Innovation Strategy at BlueVoyant and 2025 Microsoft Security Changemaker. 🎧 We talk: Why Micah champions the quiet defenders in cybersecurity The hidden art of communicating technical truth AI vs hype:…
  continue reading
 
What happens when the man who brought down Silk Road and Silk Road 2.0 joins us to talk about the largest credential breach in history? In this episode, Austin Berglas — former Assistant Special Agent in Charge of the FBI’s Cyber Branch in New York — shares behind-the-scenes stories from taking down some of the most infamous dark web marketplaces, …
  continue reading
 
In this episode of Life of a CISO, Dr. Eric Cole welcomes a true cybersecurity trailblazer: Dan Lohrmann. With a career that spans the NSA, Lockheed Martin, the State of Michigan, and now Presidio, Dan brings a rare depth of experience in both government and the private sector. As the first Chief Security Officer for an entire U.S. state and now a …
  continue reading
 
In this episode of Nerding Out with Viktor, Viktor Petersson sits down with Carl Richell, founder and CEO of System76, to unpack how a small Linux-focused hardware company grew into a full-stack open source innovator.They explore System76's journey from shipping Ubuntu laptops to designing open firmware, building a factory, and launching their own …
  continue reading
 
Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for dev…
  continue reading
 
🎙️ Welcome back to another episode of Legitimate Cybersecurity, where Frank and Dustin dive deep into the misunderstood world of cyber maturity. From donut shop risk models to executives clicking phishing emails (yes, really), this episode brings laughs, lessons, and legal implications. Learn: What cyber maturity really means Why frameworks like NI…
  continue reading
 
In this special episode of Life of a CISO, I sit down with the brilliant Jane Frankland, MBE—an internationally recognized thought leader in cybersecurity with over 28 years of experience. Jane shares her unexpected journey into the field, starting not from a tech background but from art and design. Her curiosity and drive led her to co-found one o…
  continue reading
 
Michael and Sam are back with another HOU.SEC.CON. keynote speaker – Dmitri Alperovitch! In this episode they talk about his new book, what he’s been up to since CrowdStrike, and what will be covered in his opening keynote. Things Mentioned: HSC User Group on June 26, 2025 – https://www.hscusergroup.com TAB Cyber Foundation Scholarship Closing July…
  continue reading
 
Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
  continue reading
 
In this episode of Life of a CISO, Dr. Eric Cole reconnects with longtime friend and cybersecurity legend Dr. Anton Chuvakin, whom he has known for over 25 years. The conversation opens with reflections on their decades-long professional journey and transitions into a deep dive into Anton’s current work at Google Cloud’s Office of the CISO. Anton s…
  continue reading
 
In this episode of Nerding Out with Viktor, host Viktor Petersson welcomes back Jon Seager, VP of Engineering at Canonical, for a candid conversation about managing remote teams.They explore how Canonical structures its fully distributed engineering org, why hybrid meetings rarely work, and how to build systems that support clarity, autonomy, and a…
  continue reading
 
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero t…
  continue reading
 
Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive it blurred the line between digital crime and psychological torture. This story might make your skin crawl. Get more from Joe linktr.ee/joetidy. Get the book Ctrl + Alt + Chaos: How Teenage Hackers Hijack the Internet (https://amzn.to/3H…
  continue reading
 
In this episode of Life of a CISO, Dr. Eric Cole interviews Hendrik Parkkinen, a seasoned cybersecurity expert from Sweden with over 20 years of experience, mostly in consulting and security strategy. They discuss Henrik’s journey into cybersecurity, emphasizing how passion and curiosity play a crucial role in succeeding in the field. Henrik shares…
  continue reading
 
HOU.SEC.CON.'s first keynote speaker is returning for our 15-year anniversary! This week Michael and Sam are talking to cybersecurity legend Jeremiah Grossman about his start in cyber at just 19 years old, what we can learn from cybersecurity insurance companies, and what to expect at HOU.SEC.CON. 2025! Things Mentioned: · What Works in Cybersecuri…
  continue reading
 
Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more …
  continue reading
 
In this new episode of Life of a CISO, Dr. Eric Cole opens with one of his most powerful guiding principles: “Let data drive decisions, not emotions.” Drawing from his experiences traveling and meeting with top executives, he emphasizes the importance of making decisions based on reliable data rather than emotional impulses. He challenges listeners…
  continue reading
 
In this episode of Nerding Out with Viktor, host Viktor Petersson sits down with Vlad Trifa, founder of Zimt and co-founder of EVRYTHNG, to explore why Web3, crypto, and blockchain often fail to deliver on their promises in the real world.Drawing from Vlad's extensive background in IoT, supply chain traceability, and decentralized systems, they div…
  continue reading
 
In this conversation, Frank and Dustin explore the critical themes surrounding cybersecurity, including its impact on businesses, the vulnerabilities organizations face, the role of leadership in fostering a secure environment, the importance of frameworks and standards, and the necessity of building a culture of cybersecurity. They discuss real-wo…
  continue reading
 
Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss “secure by default” efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC and zero trust; more WLAN vendors adding AI to their products (or at least their messaging); and more. Jennifer is joined by Jonathan... Read more »…
  continue reading
 
In this episode of Life of a CISO, Dr. Eric Cole shines a spotlight on a critical blind spot that many Chief Information Security Officers overlook: legal liability. While CISOs are often highly skilled and technically knowledgeable, it’s what they don’t know—particularly about their legal exposure—that can put them at serious risk. Dr. Cole explai…
  continue reading
 
When we think of addressing cybercrime, we often view it from a position of defense: how to prepare for an attack, how to respond to an attack, and how to recover from an attack. I would posit that organizations should also consider addressing these issues from a position of offense. This podcast welcomes Garylene “Gage” Javier, Legal Counsel, Priv…
  continue reading
 
Michael and Sam are catching up with Principal Consultant and Co-Founder at Cavalry Solutions, Sean Curry! Sean talks about his transition from the military to the private sector, the importance of standards like IEC 62443 for OT security, and the best way to align IT and OT teams. Things Mentioned: · New study reveals 92% of industrial sites at ri…
  continue reading
 
After a three-year hiatus, Frank Downs and Dustin Brewer are back—older, wiser, and still talking into microphones they probably shouldn’t be trusted with. In this launch of their new podcast: Legitimate Cybersecurity, the two 20-year cyber veterans tackle one of the industry’s most persistent problems: why patching is still broken in 2025. They ex…
  continue reading
 
Stratoshark is a new tool from the Wireshark Foundation that analyzes system calls on a host. Network, security, and application teams can use Stratoshark to diagnose performance issues and investigate behavior that may indicate malware or other compromises of the host. On today’s Packet Protector we talk with Gerald Combs of the Wireshark Foundati…
  continue reading
 
In this episode of Life of a CISO, Dr. Eric Cole dives deep into the dominating force of 2025: artificial intelligence. While AI is everywhere—embedded in nearly every conversation and technology—the real concern, he explains, isn’t just about its capabilities but the risks it brings, especially in cybersecurity and data privacy. Dr. Cole breaks AI…
  continue reading
 
In this episode of Nerding Out with Viktor, host Viktor Petersson speaks with Joshua Watt of Garmin and Ross Burton of ARM to explore how the Yocto Project is evolving to meet the growing demands of software supply chain security, embedded Linux customization, and long-term product maintenance.As two long-time contributors to Yocto and OpenEmbedded…
  continue reading
 
New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
  continue reading
 
MalwareTech was an anonymous security researcher, until he accidentally stopped WannaCry, one of the largest ransomware attacks in history. That single act of heroism shattered his anonymity and pulled him into a world he never expected. https://malwaretech.com Sponsors Support for the show comes from Black Hills Information Security. Black Hills h…
  continue reading
 
In this powerful episode of Life of a CISO, Dr. Eric Cole opens by highlighting a key success principle: even the world’s top performers — whether in sports, business, or entertainment — rely on coaches to help them spot their blind spots. Drawing from his deep experience coaching CISOs, Dr. Cole shares that cybersecurity leaders are no different. …
  continue reading
 
In this episode Michael and Sam are talking to malware researcher Dr. Marcus Botacin. Dr. Botacin discusses his journey from early work in sandboxing to advanced malware detection through machine learning, his recent efforts combining LLMs with GANs to create an iterative malware generation system that enhances evasion capabilities, and the importa…
  continue reading
 
Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play