Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Justin Shelley and Phoenix IT Advisors. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Justin Shelley and Phoenix IT Advisors or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

66. Turn Hackers Into Your Security Team - with Grant McCracken

42:42
 
Share
 

Manage episode 503967585 series 3338921
Content provided by Justin Shelley and Phoenix IT Advisors. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Justin Shelley and Phoenix IT Advisors or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Hosts: Justin Shelley - https://www.phoenixitadvisors.com/
| Mario Zaki - https://www.mazteck.com/
| Bryan Lachapelle - https://www.b4networks.ca/

Guest: Grant McCracken - https://darkhorse.sh

What if the best way to secure your business was to invite hackers to attack it? In this eye-opening episode, ethical hacker Grant McCracken reveals how bug bounty programs are revolutionizing cybersecurity for businesses of all sizes. Grant explains how his company Dark Horse Security makes these powerful security tools accessible and affordable for small businesses - starting at absolutely free for the first 25 vulnerability reports.

Discover why traditional penetration testing only scratches the surface, how a major bank found six-figure worth of vulnerabilities overnight when they expanded their scope, and why the bad guys are already looking for your vulnerabilities whether you're testing for them or not. Grant breaks down complex concepts like attack surfaces, vulnerability disclosure programs, and the NIST Cybersecurity Framework in business owner-friendly terms.

Key takeaways include identifying if your business needs a bug bounty program, understanding what constitutes an attack surface, and learning how to leverage the crowd-sourced approach to cybersecurity. This episode is essential listening for any business owner serious about proactive security.

  continue reading

66 episodes

Artwork
iconShare
 
Manage episode 503967585 series 3338921
Content provided by Justin Shelley and Phoenix IT Advisors. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Justin Shelley and Phoenix IT Advisors or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Hosts: Justin Shelley - https://www.phoenixitadvisors.com/
| Mario Zaki - https://www.mazteck.com/
| Bryan Lachapelle - https://www.b4networks.ca/

Guest: Grant McCracken - https://darkhorse.sh

What if the best way to secure your business was to invite hackers to attack it? In this eye-opening episode, ethical hacker Grant McCracken reveals how bug bounty programs are revolutionizing cybersecurity for businesses of all sizes. Grant explains how his company Dark Horse Security makes these powerful security tools accessible and affordable for small businesses - starting at absolutely free for the first 25 vulnerability reports.

Discover why traditional penetration testing only scratches the surface, how a major bank found six-figure worth of vulnerabilities overnight when they expanded their scope, and why the bad guys are already looking for your vulnerabilities whether you're testing for them or not. Grant breaks down complex concepts like attack surfaces, vulnerability disclosure programs, and the NIST Cybersecurity Framework in business owner-friendly terms.

Key takeaways include identifying if your business needs a bug bounty program, understanding what constitutes an attack surface, and learning how to leverage the crowd-sourced approach to cybersecurity. This episode is essential listening for any business owner serious about proactive security.

  continue reading

66 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play