Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Patrick Wheeler and Jason Gauci, Patrick Wheeler, and Jason Gauci. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Patrick Wheeler and Jason Gauci, Patrick Wheeler, and Jason Gauci or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

130: Ethical Hacking with Ted Harrington

1:25:34
 
Share
 

Manage episode 323935592 series 8393
Content provided by Patrick Wheeler and Jason Gauci, Patrick Wheeler, and Jason Gauci. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Patrick Wheeler and Jason Gauci, Patrick Wheeler, and Jason Gauci or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

"Hacking" is a word that evokes awe from the public, laughter from developers, and pure fear from technology leaders. But what really is hacking? What does trust really mean and how do we acquire and keep trust on the Internet? It turns out that, while hacking is associated with computers, the methods behind it have been around since the dawn of time. Today we have Ted Harrington from ISE to dive deep into hacking, all the way from the medieval times to today.

00:00:15 Intro

00:01:25 Introducing Ted Harrington

00:07:10 Ethical Hackers, Non-Ethical Hackers, and Productivity

00:11:58 Starting out in Ethical Hacking/Security

00:14:40 Imposter Syndrome

00:19:34 What is Hacking?

00:30:48 Is Hacking like magic?

00:38:14 Defense in Depth

00:42:04 Earning trust and The Departed movie (Spoiler alert)

00:59:52 DEF CON® Hacking Conference

01:02:46 Tips on how not to get hacked

01:10:08 ISE.io culture and opportunities

01:24:13 Farewells

Resources mentioned in this episode:

Companies:

ISE (Independent Security Evaluators)

o Website: https://www.ise.io/

o LinkedIn: https://www.linkedin.com/company/independent-security-evaluators

o Twitter: https://twitter.com/ISEsecurity

o Facebook: https://facebook.com/ISE.infosec

People:

Ted Harrington

o Website: https://www.tedharrington.com/

o LinkedIn: https://www.linkedin.com/in/securityted/

o Twitter: https://twitter.com/SecurityTed

o Book: https://www.amazon.com/Hackable-How-Application-Security-Right/dp/154451767X

Sponsor:

MParticle

o Website: https://www.mparticle.com/

If you’ve enjoyed this episode, you can listen to more on Programming Throwdown’s website: https://www.programmingthrowdown.com/

Reach out to us via email: [email protected]

You can also follow Programming Throwdown on

Facebook | Apple Podcasts | Spotify | Player.FM

Join the discussion on our Discord

Help support Programming Throwdown through our Patreon

★ Support this podcast on Patreon ★
  continue reading

186 episodes

Artwork
iconShare
 
Manage episode 323935592 series 8393
Content provided by Patrick Wheeler and Jason Gauci, Patrick Wheeler, and Jason Gauci. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Patrick Wheeler and Jason Gauci, Patrick Wheeler, and Jason Gauci or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

"Hacking" is a word that evokes awe from the public, laughter from developers, and pure fear from technology leaders. But what really is hacking? What does trust really mean and how do we acquire and keep trust on the Internet? It turns out that, while hacking is associated with computers, the methods behind it have been around since the dawn of time. Today we have Ted Harrington from ISE to dive deep into hacking, all the way from the medieval times to today.

00:00:15 Intro

00:01:25 Introducing Ted Harrington

00:07:10 Ethical Hackers, Non-Ethical Hackers, and Productivity

00:11:58 Starting out in Ethical Hacking/Security

00:14:40 Imposter Syndrome

00:19:34 What is Hacking?

00:30:48 Is Hacking like magic?

00:38:14 Defense in Depth

00:42:04 Earning trust and The Departed movie (Spoiler alert)

00:59:52 DEF CON® Hacking Conference

01:02:46 Tips on how not to get hacked

01:10:08 ISE.io culture and opportunities

01:24:13 Farewells

Resources mentioned in this episode:

Companies:

ISE (Independent Security Evaluators)

o Website: https://www.ise.io/

o LinkedIn: https://www.linkedin.com/company/independent-security-evaluators

o Twitter: https://twitter.com/ISEsecurity

o Facebook: https://facebook.com/ISE.infosec

People:

Ted Harrington

o Website: https://www.tedharrington.com/

o LinkedIn: https://www.linkedin.com/in/securityted/

o Twitter: https://twitter.com/SecurityTed

o Book: https://www.amazon.com/Hackable-How-Application-Security-Right/dp/154451767X

Sponsor:

MParticle

o Website: https://www.mparticle.com/

If you’ve enjoyed this episode, you can listen to more on Programming Throwdown’s website: https://www.programmingthrowdown.com/

Reach out to us via email: [email protected]

You can also follow Programming Throwdown on

Facebook | Apple Podcasts | Spotify | Player.FM

Join the discussion on our Discord

Help support Programming Throwdown through our Patreon

★ Support this podcast on Patreon ★
  continue reading

186 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play