7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Penetration Testing Podcasts
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
Emergency Medicine Cases – Where the Experts Keep You in the Know. For show notes, quizzes, videos and more learning tools please visit emergencymedicinecases.com
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
This podcast contains security topics discussed by the Secure Ideas LLC. team.
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
Hacked Off demystifies the world of cybersecurity. Hosted by Secarma's Managing Director, Holly Grace Williams, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnerabilities, providing expert advice on how to stay safe online. This podcast is brought to you by global cybersecurity and penetration testing company, Secarma.
…
continue reading
a 360 aerial penetration entrance at the beginning of every episode (an inhuman erection)
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Hack for Fun and Profit is a weekly podcast for anyone who is interested in ethical hacking. The topics include bug bounty hunting, penetration testing, red teaming and many more. Sit back and enjoy stories, tips and tricks that will inspire you. For subscription-only episodes, enroll using this link: https://anchor.fm/thehackerish/subscribe
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
…
continue reading
Smol Der explores how AI is burning through work—leaving just enough embers to build something better. Practical chats with pros on AI unlocks, stacks, promp...
…
continue reading
The Build+Revitalize podcast is an outgrowth of SME’s passion and commitment to solving problems and building better communities. We are proud to be your go-to source for insights on challenges and emerging trends in the AEC industry. In each episode, we will be joined by our partners and friends for in-depth conversations on overcoming obstacles in the AEC industry, opportunities we offer professional engineering consultants and students, and emerging technologies that optimize how we work. ...
…
continue reading
My name is Alex Fergus, and I'm a health and technology geek providing in-depth, independent product reviews on the latest red light therapy devices. With over seven years of experience studying light therapy and having used and tested dozens of hundreds of light therapy products, you can be sure that I'll have a video to help you with your educational or product-buying needs. Test, review, compare, and study all things Red Light Therapy. Whether you're seeking out the best Red Light Body Pa ...
…
continue reading
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
…
continue reading
1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Taking the Fandoms you love and building worlds to play Dungeons and Dragons in. Homebrew Avengers, Percy Jackson & the Olympians, and Star Wars so far - what will we do next?
…
continue reading
Podcast by CyberTalk
…
continue reading
Inspirational stories of black women in tech. Support this podcast: https://podcasters.spotify.com/pod/show/frauvis/support
…
continue reading
Ages ago, elves and dwarves unknowingly migrated between Universes via a Junction. Jenneva and Egam believe they have found a Junction and plan a trip with Alexander to test the theory and investigate the origins of the elves and dwarves. Because they believe that the perennial animosity between the two races is due to misunderstandings about their histories, the mages include the prince of elves and the prince of dwarves in the group. Trouble begins at the very start of the journey as Egam ...
…
continue reading
Blue Fox Group, a technology company that specializes in supporting customers with the best infrastructure, live support, and communications technology available. Supporting your business objectives and improving your bottom line.
…
continue reading
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
…
continue reading
The one and only official podcast from OffSec, Inc. -- creators of the Kali OS, the OSCP certification, and the world's leading cybersecurity training
…
continue reading
1
HACKED: Into the minds of Cybersecurity leaders
Talking cybersecurity with nexus IT Security group
We are giving an inside look into the minds of today's cybersecurity leaders and defining trends for the upcoming threat landscape, what’s top of mind for security leaders, and advise for security leaders and practitioners.
…
continue reading
1
Penetration Testing & Threat Intelligence: Enhancing Cybersecurity | Interview with Sasa Jusic
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34In this episode, host Dejan Kosutic interviews Sasa Jusic, a board member at Infigo IS and a cybersecurity expert. They delve deep into penetration testing and cyber threat intelligence, explaining their roles in enhancing cybersecurity. Learn about the differences between offensive and defensive security measures, the importance of DORA and ISO 27…
…
continue reading
1
#10 – Penetration Testing, Fiction Writing, and LLMs With Cybersecurity Expert and Author Alex Fox
1:06:19
1:06:19
Play later
Play later
Lists
Like
Liked
1:06:19Penetration testing is changing fast—but not always in the ways the hype suggests. James Wagenheim sits down with fiction author and pentest lead Alex Fox to unpack modern pentesting, real-world escalation paths, and what LLMs mean for both attackers and defenders. We also discuss how LLMs are a poor substitute for human creativity. In this episode…
…
continue reading
1
Episode 163: The Vendor Security Trap: Are You Losing Control?
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45In this episode, we dissect the dangerous trend of organizations ceding control of their security strategy to vendors, exploring the pitfalls of vendor lock-in, overspending, and the illusion of comprehensive protection. We'll provide actionable steps to reclaim your security posture and build an independent strategy tailored to your specific needs…
…
continue reading
1
#12 - Part 1 - 2025 Smol Der Year in Review with Jim Duffy
1:08:43
1:08:43
Play later
Play later
Lists
Like
Liked
1:08:43Jim Duffy and Host James Wagenheim ring in the New Year with a two part series covering great moments in the Smol Der podcast in 2025. We AI use in eveything from developing apps, robotics, creative writing, cyber security, magic, education, and music. If you like this episode, please hit the like button or subscribe. Or if you want to support the …
…
continue reading
1
109: Breaking Into Cybersecurity: The Path Most People Get Wrong
43:46
43:46
Play later
Play later
Lists
Like
Liked
43:46Meter: Visit https://meter.com/itcareer to book a demoIf you're trying to break into cyber security and finding it challenging, this conversation is for you. Many individuals are working hard to start a cyber security career, but often lack clear direction. We'll discuss how to navigate the cybersecurity career path and offer career advice to help …
…
continue reading
After sharing a recent story about how a phishing campaign went south, I heard feedback from a lot of you. You either commiserated with my story, told me I wussed out, and/or had a difficult story of your own to share. So I thought I'd keep this momentum up and share another story of fail with you – this time about a Web app pentest that went south…
…
continue reading
1
Ep 211 Thyrotoxicosis and Thyroid Storm: Recognition and Management
1:13:18
1:13:18
Play later
Play later
Lists
Like
Liked
1:13:18In this Part 2 of our 2-part podcast series on thyroid emergencies Anton, Dr. George Willis and Dr. Alyssa Louis answer questions such as: When a patient presents with “sepsis without a source,” what bedside features should trigger you to prioritize thyrotoxicosis? How can PoCUS help you decide whether tachycardia is dangerous — or lifesaving — bef…
…
continue reading
1
Midnight Blizzard | How Russian Intelligence Breached Microsoft - w/ Alyssa Robinson, CISO @ HubSpot
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Midnight Blizzard | How Russian Intelligence Breached Microsoft With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying. No zero-day. No smash-and-g…
…
continue reading
1
#11 - AI Music, Human Taste, and the Future of SEO — with Digital Entrepreneur & Musician Will Mason
1:16:18
1:16:18
Play later
Play later
Lists
Like
Liked
1:16:18In this episode of Smol Der – the professional’s applied AI podcast, host James Wagenheim sits down with Will Mason (digital entrepreneur and musician) for a practical conversation on what generative AI is actually changing and what it still cannot replace. Will argues that iteration is the root of creativity, explains why humans still win on taste…
…
continue reading
1
7MS #707: Our New Pentest Course Has Launched!
14:03
14:03
Play later
Play later
Lists
Like
Liked
14:03Today we're thrilled to announce the launch of LPLITE:GOAD (Light Pentest Live Interactive Training Experience: Game of Active Directory). The first class is coming up Tuesday, January 27 – Thursday, January 29 (9:00 a.m. – 1:00 p.m. CST each day). More information, pricing information and more can be found at training.7minsec.com. Today I talk abo…
…
continue reading
1
108: Don't Let AI Replace You—Learn This First
1:00:54
1:00:54
Play later
Play later
Lists
Like
Liked
1:00:54Learn how Itential is bringing AI into network automation the right way — with governance, visibility, and control. https://bit.ly/itential-overview Many fear that artificial intelligence is coming for their jobs, but the reality is very different. Understanding how AI is implemented is quickly becoming a career advantage. This video explores how A…
…
continue reading
1
7MS #706: Tales of Pentest Pwnage – Part 80
29:18
29:18
Play later
Play later
Lists
Like
Liked
29:18I'm so excited to share today's tale of pentest pwnage, because it brings back to life a coercion technique I thought wouldn't work against Windows 11! Spoiler alert: check out rpc2efs, as well as the 7MinSec Club episode we did on the topic this week. Also, our January Light Pentest LITE:GOAD class is open for registration here!…
…
continue reading
1
Episode 162: Before the Breach How Attackers Profile Your Organization
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22In this episode, Brad and Spencer from SecurIT360's Offensive Security group delve into the crucial reconnaissance phase attackers undertake before launching an attack. They discuss the real-world impact of seemingly harmless data leaks, how attackers chain them together to build a profile of your organization, and common misconceptions about what …
…
continue reading
1
The importance of application security in small businesses
1:10:52
1:10:52
Play later
Play later
Lists
Like
Liked
1:10:52The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! On this episode, Accidental CISO is joined by guest host Tanya Janca, @shehackspurple. Tanya is a hacker, software developer, author, and educator. She is passionate about application …
…
continue reading
1
Episode 077 – What Security Leaders Do for Fun
15:59
15:59
Play later
Play later
Lists
Like
Liked
15:59From Spartan races to culinary arts, discover the hobbies and passions that keep CISOs balanced and inspired in this behind-the-scenes edition of Agent of Influence. Welcome to a special edition of the Agent of Influence podcast! In this episode, we step away from the usual cybersecurity deep dives to explore the personal side of security leaders, …
…
continue reading
1
Ep 210 Decompensated Hypothyroidism Recognition and Management
1:12:13
1:12:13
Play later
Play later
Lists
Like
Liked
1:12:13In the ED, we regularly care for sick patients presenting acutely with abnormal vital signs, altered mental status, and end organ dysfunction. Oftentimes, the culprit ends up being sepsis, or overdose, or organ failure. But it is important that we consider rarer endocrine presentations like decompensated hypothyroidism. In this Part 1 of this two-p…
…
continue reading
1
Simplifying ISO Standards: Insights and Best Practices | Interview with Jim Moran
58:01
58:01
Play later
Play later
Lists
Like
Liked
58:01In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO of Advisera, welcomes Jim Moran, founder of SimplifyISO, to discuss the importance and methods of simplifying ISO management systems. Jim, with over 30 years of consulting experience, shares valuable insights on how overly complex management systems can hinder employee unders…
…
continue reading
This might be obvious, but security is not all domain admin dancing and maximum pwnage. Sometimes, despite my best efforts, a security project does a faceplant. Today's episode focuses on a phishing campaign that had plenty of "bites" but got immediately shut down – for reasons I still don't understand.…
…
continue reading
1
Episode 161: The Evolution of Pentesting Going Into 2026
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50In this episode Brad and Spencer discuss the rapid technology shift that's happening in cybersecurity, hybrid pentesting models and the overall evolution of pen testing as we head into 2026. Need a pentest before the end of the year? Learn how here... Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com…
…
continue reading
1
The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin)
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin) When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all. They were after the customers of its customers. Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to st…
…
continue reading
In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth. For two full weeks, the intruders ope…
…
continue reading
1
7MS #704: DIY Pentest Dropbox Tips – Part 12
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46Hola friends! My week has very much been about trying to turnaround pentest dropboxes as quickly as possible. In that adventure, I came across two time-saving discoveries: Using a Proxmox LXC as a persistent remote access method Writing a Proxmox post-deployment script that installs Splashtop on the Windows VM, and resets the admin passwords on bot…
…
continue reading
1
Episode 160: Should You Alert Your SOC Before a Pentest?
32:24
32:24
Play later
Play later
Lists
Like
Liked
32:24In this episode, we're discussing the pros and mostly the cons of notifying your SOC/MSSP before your penetration test. Spencer and Brad delve into the details of why it matters and share their experience from hundreds of penetration tests. Get your 2025 External Pentest done before time runs out! https://www.securit360.com/external-penetration-tes…
…
continue reading
1
EM Quick Hits 69 Pediatric Urinary Retention & Acute Transverse Myelitis, Post-Dural Puncture Headache, Med Mal Cases: Clenched Fist Injury, IV Thrombolysis for Minor Stroke, EM Leadership Spotlight #4 ...
1:32:19
1:32:19
Play later
Play later
Lists
Like
Liked
1:32:19On this month's EM Quick Hits podcast: Deborah Schonfeld on the differential diagnosis and work up of pediatric urinary retention & acute transverse myelitis, Jesse McLaren on his Tryptic Approach to Occlusion MI Diagnosis, Matthew McArthur on recognition and management of post-dural puncture headache, Joseph Yasmeh on Med Mal Cases: Clenched fist …
…
continue reading
1
Human Hacked: Life as the World’s First Augmented Ethical Hacker with Len Noe
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14In this episode of Simply Offensive, Phillip Wylie sits down with Len Noe (HaCkEr_213) — the world’s first recognized augmented ethical hacker. From microchip implants and implantable terabyte drives to a past life in outlaw motorcycle clubs, Len’s story sits at the collision point of human and machine identity. Connect with Len: https://www.linked…
…
continue reading
1
Mastering Internal Audits for ISO Standards | Interview with Carlos Cruz
1:05:55
1:05:55
Play later
Play later
Lists
Like
Liked
1:05:55In this episode of the Secure and Simple Podcast, host Dejan Kosutic, CEO at Advisera, welcomes Carlos Cruz, founder of Metanoia Consulting and a seasoned expert in ISO standards. Carlos and Dejan share best practices for performing internal audits across various ISO standards, including ISO 27001, and other cybersecurity frameworks such as NIS2 an…
…
continue reading
1
107: From Beginner to Pro: A Roadmap for Penetration Testing Careers
1:06:20
1:06:20
Play later
Play later
Lists
Like
Liked
1:06:20Meter: Visit https://meter.com/itcareer to book a demoEveryone wants to be a pen tester until they find out what the job actually looks like. This video offers a reality check on the daily grind of a professional pentester, emphasizing that the job differs significantly from Hollywood portrayals and standard certification courses.Tyler, a professio…
…
continue reading
1
7MS #703: Tales of Pentest Pwnage – Part 79
22:16
22:16
Play later
Play later
Lists
Like
Liked
22:16Happy Thanksgiving week friends! Today we're celebrating a turkey and pie overload by sharing another fun tale of pentest pwnage! It involves using pygpoabuse to hijack a GPO and turn it into our pentesting puppet! Muahahahahaah!!!! Also: This week over at 7MinSec.club we looked at how to defend against some common SQL attacks We're very close to o…
…
continue reading
1
Episode 159: How to Break Into Cybersecurity in 2026
44:55
44:55
Play later
Play later
Lists
Like
Liked
44:55In this episode, we’re sharing practical, no-fluff advice for getting into cybersecurity, whether you're switching careers, just starting out, or leveling up your IT skills. We’ll cover what actually matters to employers, what to avoid, and the fastest paths into the industry. If you’re looking for a clear roadmap into cybersecurity, this episode i…
…
continue reading
1
Humanely managing IT and security teams
1:23:24
1:23:24
Play later
Play later
Lists
Like
Liked
1:23:24The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! On this episode, Accidental CISO is joined by guest host Mike Simmons. Mike is a consultant, leadership coach, speaker, and podcaster. He combines systems thinking with a people focuse…
…
continue reading
In this episode of Simply Offensive, Phillip Wylie interviews Shubham Khichi, an offensive security professional and founder of CyberAGI. We explore Shubham's journey in cybersecurity, the challenges faced by security engineers, and the innovative solutions offered by CyberAGI. We also discuss the role of AI in penetration testing, the importance o…
…
continue reading
1
#09 - Being a Creative and Using AI with Filmmaker and Art Director Ian Pullens
1:17:40
1:17:40
Play later
Play later
Lists
Like
Liked
1:17:40Today’s guest, Art Director and Filmmaker Ian Pullens, who also happens to be my brother-in-law. It’s not nepotism that drove me to invite Ian today, it’s the fact that Ian is a hugely inspiring creative with a keen eye for quality and a sharp mind for process. Ian has produced some of the coolest and most thoughtful films and creative pieces for c…
…
continue reading
1
7MS #702: Should You Hire AI to Run Your Next Pentest?
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Hello friends, in today's episode I give an audio summary of a talk I gave this week at the MN GOVIT Symposium called "Should You Hire AI to Run Your Next Pentest?" It's not a pro-AI celebration, nor is it an anti-AI bashing. Rather, the talk focuses on my experiences using both free and paid AI services to guide me through an Active Directory pene…
…
continue reading
1
Episode 158: How to get kicked out of AWS by the FBI
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22In this episode Brad and Jordan sit down to discuss how she was caught and reported on a penetration test engagement. We deep dive into the details and why it's a net positive. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇ Spencer's Links: https://go.spen…
…
continue reading