Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
Careers in operational technology: What does a security risk assessor do? | Guest Donovan Tindill
|
Apr 29, 2024 |
What a CCNA boot camp is like | Cyber Work Hacks
|
Apr 25, 2024 |
How to get started in industrial control systems cybersecurity | Guest Robin Berthier
|
Apr 22, 2024 |
Working as a CIO and the challenges of endpoint security| Guest Tom Molden
|
Apr 15, 2024 |
Are you ready for the CCNA exam? Test yourself with these questions | Cyber Work Hacks
|
Apr 11, 2024 |
Working in manufacturing security: Top challenges and career advice | Guest Theresa Lanowitz
|
Apr 08, 2024 |
Modern industrial control system security issues | Guest Thomas Pace
|
Apr 01, 2024 |
Passing the CCNA exam: Tips and tricks from an instructor | Cyber Work Hacks
|
Mar 28, 2024 |
CISSP is changing! Common body of knowledge changes for 2024 | Cyber Work Hacks
|
Mar 21, 2024 |
CISSP exam tips and tricks: Top test-taking strategies | Cyber Work Hacks
|
Mar 15, 2024 |
CISSP exam tips and tricks: Avoiding common mistakes | Cyber Work Hacks
|
Mar 11, 2024 |
What help do CISOs need in 2024? | Guest Alicia Olson
|
Mar 04, 2024 |
What a CISSP boot camp is like | Cyber Work Hacks
|
Feb 29, 2024 |
Ethical hacking careers vs. cinema: What it's like to work as a hacker | Cyber Work Live
|
Feb 26, 2024 |
Renewing your Security+ certification | Cyber Work Hacks
|
Feb 22, 2024 |
A career in dental cybersecurity? Drilling down into this unique role | Guest Tom Terronez
|
Feb 19, 2024 |
Security+ Boot Camp: What to expect during your training | Cyber Work Hacks
|
Feb 15, 2024 |
Are remote workers more security-savvy than on-premises? | Guest Joseph Nwanpka
|
Feb 12, 2024 |
Security+ exam questions and answers: What to expect | Cyber Work Hacks
|
Feb 09, 2024 |
45 billion cyberattacks a day?! Media myths and working in cybersecurity | Guest Ken Westin
|
Feb 05, 2024 |
Security+ exam tips: What changed and how to pass the new exam | Cyber Work Hacks
|
Jan 29, 2024 |
The Wild West era of data collection is over | Guest Sean Falconer
|
Jan 22, 2024 |
Don't chase unicorns to fix the cybersecurity skills gap | Guest Adrianna Iadarola
|
Jan 08, 2024 |
Neurodiversity and cybersecurity leadership positions | Guest Anthony Pacilio
|
Dec 18, 2023 |
What it's like to be a CISO — and why they don't need more tech | Guest Dan Roberts
|
Dec 11, 2023 |
Empowering African Women through Cybersecurity | Guest Confidence Staveley
|
Dec 04, 2023 |
The transformative power of neurodiversity in cybersecurity practices | Guest Ian Campbell
|
Nov 27, 2023 |
National security cyber issues and Stanford’s cyber policy program | Guest AJ Grotto
|
Nov 13, 2023 |
The role of film storytelling in making education stick | Cyber Work Hacks
|
Nov 09, 2023 |
The future of passwords | Guest Tomas Smalakys
|
Nov 06, 2023 |
AI and the rise of DDoS attacks | Guest Anna Claiborne
|
Oct 30, 2023 |
How generative AI can be used by bad actors | Guest Oliver Tavakoli
|
Oct 23, 2023 |
How AI is affecting GRC and the future of cybersecurity | Guest Heather Buker
|
Oct 16, 2023 |
Finding and supporting neurodiverse cybersecurity professionals | Guest Tara D. Anderson
|
Sep 25, 2023 |
Cybersecurity investment and launching new companies | Guest Leslie Lynn Smith
|
Sep 18, 2023 |
Bringing coding skills to underserved communities | Guest Brianne Caplan
|
Sep 13, 2023 |
From software engineer to career coach for women in tech leadership | Guest Limor Bergman-Gross
|
Aug 28, 2023 |
ICS security, Blue Team Con and security work in the Air Force Reserve | Guest Lesley Carhart
|
Aug 21, 2023 |
Digital forensics careers: Facts versus fiction | Cyber Work Live
|
Aug 14, 2023 |
Uplifting women for leadership in the cybersecurity industry | Guest Katie O'Malley
|
Aug 07, 2023 |
The changing responsibilities of the CISO position | Guest Mike Scott
|
Jul 31, 2023 |
Crafting a basic disaster recovery plan | Cyber Work Hacks
|
Jun 29, 2023 |
Digital safety services and equity in cybersecurity | Guest Leigh Honeywell
|
Jun 26, 2023 |
Disaster recovery plans for small businesses | Guest Eric Sugar
|
Jun 12, 2023 |
Asset detection at home | Cyber Work Hacks
|
Jun 08, 2023 |
The nuts and bolts of asset detection and asset mapping | Guest Huxley Barbee
|
Jun 05, 2023 |
The current state of crypto crime | Guest Lili Infante
|
May 22, 2023 |
Is CompTIA’s Cloud+ certification right for you? | Cyber Work Hacks
|
May 11, 2023 |
Reframing cybersecurity automation and its uses | Guest Leonid Belkind
|
May 01, 2023 |
The fundamentals of GitHub | Cyber Work Hacks
|
Apr 27, 2023 |
Changing careers to cybersecurity | Guest Dara Gibson
|
Apr 24, 2023 |
Women Impact Tech’s work in the cybersecurity industry | Guest Paula Bratcher Ratliff
|
Apr 17, 2023 |
Optimizing your digital forensics profile while job searching | Cyber Work Hacks
|
Apr 13, 2023 |
Moving from “shift left” to “born left” | Guest David Melamed
|
Apr 03, 2023 |
Set up your cybersecurity practice lab | Cyber Work Hacks
|
Mar 30, 2023 |
Overcoming burnout in cybersecurity and VMware’s XDR announcement | Guest Karen Worstell
|
Mar 27, 2023 |
Understanding developer behavior can augment DevSecOps | Guest Nir Valtman
|
Mar 20, 2023 |
Cybersecurity team cohesion in remote settings | Cyber Work Hacks
|
Mar 16, 2023 |
CompTIA Data+ certification: Is it a good fit for your career? | Guest James Stanger
|
Mar 13, 2023 |
Sorry, Terminator fans, ChatGPT is not going to become Skynet | Guest Jack Nichelson
|
Mar 06, 2023 |
Breaking down digital forensics certifications | Cyber Work Hacks
|
Mar 02, 2023 |
A deep dive into GitHub's security strategy | Guest Jacob DePriest
|
Feb 27, 2023 |
Goodbye (ISC)² CAP, hello new CGRC certification | Cyber Work Hacks
|
Feb 16, 2023 |
Asset visibility and vulnerability detection | Guest Yossi Appleboum
|
Feb 13, 2023 |
How to set up a digital forensics lab | Cyber Work Hacks
|
Feb 02, 2023 |
Inside the Pentagon's new zero-trust policy | Guest Steve Judd
|
Jan 30, 2023 |
Biggest cybercrime trends heading into 2023 | Guest Paul Giorgi
|
Jan 23, 2023 |
ISACA CISM changes: Less focus on management, more on security | Cyber Work Hacks
|
Jan 19, 2023 |
How SOCs are changing: Location, remote work and more | Guest A.N. Ananth
|
Jan 16, 2023 |
The changing roles of red teaming | Guest Matt Lorentzen
|
Jan 09, 2023 |
How to keep symmetric and asymmetric cryptography straight | Cyber Work Hacks
|
Jan 05, 2023 |
U.S. Cyber Games Season II: Behind the scenes with the head coach | Guest Ken Jenkins
|
Dec 12, 2022 |
Connecting cloud security, data privacy and cybersecurity | Guest Ameesh Divatia
|
Dec 05, 2022 |
K-12 cybersecurity: Protecting schools from cyber threats | Guest Mike Wilkinson
|
Nov 21, 2022 |
Behind the scenes of ransomware negotiation | Guest Tony Cook
|
Nov 14, 2022 |
CMMC has changed: Here's what you need to know | Guest Leighton Johnson
|
Nov 07, 2022 |
Cybersecurity public speaking techniques | Guest Lisa Tetrault
|
Oct 24, 2022 |
Digital identity and cybersecurity are inseparable | Guest Susan Morrow
|
Oct 17, 2022 |
Bad data privacy protocols can become an identity fraud disaster | Guest Stephen Cavey
|
Oct 10, 2022 |
Privacy and international business | Guest Noriswadi Ismail
|
Oct 03, 2022 |
Attack surface managers and the state of attack surfaces | Guest Dave Monnier
|
Sep 26, 2022 |
The importance of API security and PII | Guest Giora Engel
|
Sep 19, 2022 |
Corporate data breaches and security awareness training | Guest Mathieu Gorge
|
Sep 12, 2022 |
Overcoming challenges to build a cybersecurity career | Guest Dr. Chanel Suggs
|
Aug 29, 2022 |
What's it like to work in emergency response? | Guest Christopher Tarantino
|
Aug 22, 2022 |
Securing operational technology: ICS, IoT, AI and more | Guest Francis Cianfrocca
|
Aug 15, 2022 |
Cybersecurity project management: A peek behind the curtain | Cyber Work Live
|
Aug 08, 2022 |
OWASP Top 10: What cybersecurity professionals need to know | Guest John Wagnon
|
Aug 01, 2022 |
Your personal data is everywhere: What can you do about it? | Guest Mark Kapczynski
|
Jul 25, 2022 |
Keeping your inbox safe: Real-life BEC attacks and email fraud careers | Guest John Wilson
|
Jul 18, 2022 |
Cybersecurity has a marketing problem — and we're going to fix it | Guest Alyssa Miller
|
Jun 27, 2022 |
What does a secure coder do? | Cybersecurity Career Series
|
Jun 20, 2022 |
Cybersecurity jobs: How to better apply, get hired and fill open roles | Guest Diana Kelley
|
Jun 13, 2022 |
Ethical user data collection and machine learning | Guest Ché Wijesinghe
|
Jun 06, 2022 |
Working as a privacy manager | Cybersecurity Career Series
|
May 23, 2022 |
What does a cybersecurity beginner do? | Cybersecurity Career Series
|
May 16, 2022 |
What does an ICS security practitioner do? | Cybersecurity Career Series
|
May 09, 2022 |
A public discussion about privacy careers: Training, certification and experience | Cyber Work Live
|
May 02, 2022 |
What does a security engineer do? | Cybersecurity Career Series
|
Apr 25, 2022 |
What does an information risk analyst do? | Cybersecurity Career Series
|
Apr 18, 2022 |
The importance of cyber threat research | Guest Moshe Zioni
|
Apr 11, 2022 |
Security awareness and social engineering psychology | Guest Dr. Erik Huffman
|
Apr 04, 2022 |
Better cybersecurity practices for journalists | Guest Marcus Fowler
|
Mar 28, 2022 |
What makes a good cyber range? | Guest Justin Pelletier
|
Mar 21, 2022 |
Cybersecurity and all things privacy | Guest Chris Stevens
|
Mar 14, 2022 |
Working in DevOps | Guest Steve Pereira
|
Mar 07, 2022 |
Working as a digital forensics analyst | Cybersecurity Career Series
|
Mar 03, 2022 |
Three foundational cybersecurity certifications | Guest Mike Meyers
|
Feb 28, 2022 |
What does a security architect do? | Cybersecurity Career Series
|
Feb 21, 2022 |
Data backup in ransomware situations | Guest Curtis Preston, aka “Mr. Backup”
|
Feb 14, 2022 |
Long-term cybersecurity career strategies | Guest Maxime Lamothe-Brassard
|
Feb 07, 2022 |
Avoiding hardware-based cybersecurity threats | Guest Jessica Amado
|
Jan 31, 2022 |
What does a cloud security engineer do? | Cybersecurity Career Series
|
Jan 27, 2022 |
Cybersecurity project management: Your career starts here | Cyber Work Live
|
Jan 24, 2022 |
What does a SOC analyst do? | Cybersecurity Career Series
|
Jan 20, 2022 |
Top cybersecurity breaches of 2021 | Guest Keatron Evans
|
Jan 17, 2022 |
What does a security manager do? | Cybersecurity Career Series
|
Jan 13, 2022 |
Predictions for cybersecurity in 2022 | Guest Andrew Howard
|
Jan 10, 2022 |
What does a penetration tester do? | Cybersecurity Career Series
|
Jan 06, 2022 |
Security risks facing streamers on Twitch and YouTube | Guest Roderick Jones
|
Jan 03, 2022 |
High-tech hacking tools and how to defend against them | Guest Bentsi Ben-Atar
|
Dec 20, 2021 |
How to work in cloud security | Guest Menachem Shafran
|
Dec 13, 2021 |
How to get started with bug bounties and finding vulnerabilities | Guest Casey Ellis
|
Dec 06, 2021 |
How to begin your own cybersecurity consulting business | Guest Kyle McNulty
|
Nov 29, 2021 |
How to disrupt ransomware and cybercrime groups | Guest Adam Flatley
|
Nov 22, 2021 |
How to become a cyber threat researcher | Guest John Bambenek
|
Nov 15, 2021 |
How to become a great cybersecurity leader and manager | Guest Cicero Chimbanda
|
Nov 08, 2021 |
Cybersecurity collaboration, team building and working as CEO | Guest Wendy Thomas
|
Nov 01, 2021 |
How to learn web application security | Guest Ted Harrington
|
Oct 25, 2021 |
How to become a secure coder | Guest Chrys Thorsen
|
Oct 18, 2021 |
Learning Linux is key to building your cybersecurity skills | Guest Jasmine Jackson
|
Oct 11, 2021 |
Cryptography, encryption and building a secure photo app | Guest Alex Amiryan
|
Oct 04, 2021 |
Saving McDonald’s from a possible data breach | Guest Connor Greig
|
Sep 27, 2021 |
Inside the Security Yearbook: Industry trends, career advice and more! | Guest Richard Stiennon
|
Sep 20, 2021 |
Diversity, equity and inclusion in cybersecurity hiring | Cyber Work Live
|
Sep 13, 2021 |
Episode 200 extravaganza! Best of the Cyber Work Podcast (and $1,000 in prizes!)
|
Aug 30, 2021 |
How to excel at penetration testing | Guest Gemma Moore
|
Aug 23, 2021 |
Becoming an ethical hacker with Offensive Security | Guest Ning Wang
|
Aug 16, 2021 |
Consumer protection careers: Fraud, identity theft and social engineering | Guest Adam Levin
|
Aug 09, 2021 |
How to become a cybersecurity threat intelligence professional | Guest Neal Dennis
|
Aug 02, 2021 |
Tips on entering blue teaming, red teaming or purple teaming | Guest Snehal Antani
|
Jul 26, 2021 |
CMMC is coming: Here's what cybersecurity professionals need to know | Guest Frank Smith
|
Jul 19, 2021 |
Red teaming: The fun, and the fundamentals | Cyber Work Live
|
Jul 12, 2021 |
How remote work is impacting federal cybersecurity careers | Guest Becky Robertson
|
Jul 06, 2021 |
Building a billion-dollar cybersecurity company | Guest Sam King
|
Jun 28, 2021 |
How to pick your cybersecurity career path | Guest Alyssa Miller
|
Jun 21, 2021 |
How hackathons can help propel your career | Guest Jonathan Tanner
|
Jun 14, 2021 |
Working as a cybersecurity researcher and industry analyst | Guest French Caldwell
|
Jun 07, 2021 |
Healthcare cybersecurity issues and legacy health systems | Guest Dirk Schrader
|
May 24, 2021 |
Project management careers in the military and private sector | Guest Ginny Morton
|
May 17, 2021 |
Data governance strategy in 2021 | Guest Rita Gurevich
|
May 10, 2021 |
Lessons cybersecurity can learn from physical security | Guest Jeff Schmidt
|
May 03, 2021 |
Supporting economic advancement among women in cybersecurity | Guest Christina Van Houten
|
Apr 26, 2021 |
Supply-chain security and servant leadership | Guest Manish Gupta
|
Apr 19, 2021 |
What does a digital forensic investigator do in the government? | Guest Ondrej Krehel
|
Apr 12, 2021 |
Your beginner cybersecurity career questions, answered! | Cyber Work Live
|
Apr 05, 2021 |
Defending the grid: From water supply hacks to nation-state attacks | Guest Emily Miller
|
Mar 29, 2021 |
How to become a cybersecurity project manager | Guest Jackie Olshack
|
Mar 22, 2021 |
How to become a security awareness manager | Guest Tiffany Franklin
|
Mar 15, 2021 |
Working at The Analyst Syndicate, AI ethics and sneaking into DARPA | Guest Diana Kelley
|
Mar 08, 2021 |
Working at Google: Security, anti-abuse and artificial intelligence | Guest Elie Bursztein
|
Mar 01, 2021 |
CompTIA Security+ SY0-601 update: Everything you need to know | Guest Patrick Lane
|
Feb 25, 2021 |
Launch your cybersecurity career by finding a mentor | Guest Mike Gentile
|
Feb 22, 2021 |
Malware analyst careers: Getting hired and building your skills | Guest Dr. Richard Ford
|
Feb 15, 2021 |
Gamification: Making cybersecurity training fun for everyone | Guest Jessica Gulick
|
Feb 08, 2021 |
Moving up in cybersecurity: From help desk to FireEye to CEO | Guest Jason Meller
|
Feb 01, 2021 |
SecOps and the keys to a successful cybersecurity startup | Guest Raju Chekuri
|
Jan 25, 2021 |
Cybersecurity careers: Risk management, privacy and healthcare security | Guest Tyler Cohen Wood
|
Jan 19, 2021 |
Kubernetes: Vulnerabilities, efficiency and cloud security | Guest Michael Foster
|
Jan 11, 2021 |
Running a digital forensics business | Guest Tyler Hatch
|
Jan 04, 2021 |
The 5 pillars of cybersecurity framework | Guest Mathieu Gorge
|
Dec 28, 2020 |
SolarWinds breach: Insights from the trenches | Guest Keatron Evans | Bonus incident response walkthroughs in description
|
Dec 21, 2020 |
Hiring a ransomware negotiator: Tactics, tips and careers | Guest Kurtis Minder
|
Dec 14, 2020 |
Vulnerability hunting and ecommerce safety | Guest Ted Harrington
|
Dec 07, 2020 |
Securing Apple devices: Managing growing cyberattacks and risk | Guest Kelli Conlin
|
Nov 30, 2020 |
Privileged access management and work-from-home tips | Guest Terence Jackson
|
Nov 23, 2020 |
Ask us anything: Security awareness, behavior and culture (part 2) | Infosec Inspire 2020
|
Nov 21, 2020 |
Collaboration and cultural relevance: Taking security awareness global | Infosec Inspire 2020
|
Nov 20, 2020 |
Influencing security mindsets and culture | Infosec Inspire 2020
|
Nov 19, 2020 |
Ask us anything: Security awareness, behavior and culture (part 1) | Infosec Inspire 2020
|
Nov 18, 2020 |
Why we need to rethink the human factor | Infosec Inspire 2020
|
Nov 17, 2020 |
Storytelling in cybersecurity: The impact of a great story | Infosec Inspire 2020
|
Nov 16, 2020 |
Ask us anything: Developing security talent and teams (part 2) | Infosec Inspire 2020
|
Nov 14, 2020 |
Building stronger teams: Career path development strategies | Infosec Inspire 2020
|
Nov 13, 2020 |
Upskilling to deepen employee engagement and retention | Infosec Inspire 2020
|
Nov 12, 2020 |
Ask us anything: Developing security talent and teams (part 1) | Infosec Inspire 2020
|
Nov 11, 2020 |
Close your skills gap: Putting the NICE Workforce Framework for Cybersecurity to work | Infosec Inspire 2020
|
Nov 10, 2020 |
Flip the funnel: Fixing the cybersecurity talent pipeline challenge | Infosec Inspire 2020
|
Nov 09, 2020 |
BAHAMUT: Uncovering a massive hack-for-hire cyberespionage group | Guest Eric Milam
|
Nov 02, 2020 |
Getting started and moving up in IT and security | Guest George McPherson
|
Oct 26, 2020 |
Protecting sensitive information: Growing data, regulations and risks | Guest Mahmoud Abdelkader
|
Oct 19, 2020 |
Security awareness: How to influence others and change behavior | Guest Bruce Hallas
|
Oct 12, 2020 |
Red teamers arrested conducting a penetration test | Guests Gary DeMercurio and Justin Wynn
|
Oct 05, 2020 |
Starting a cybersecurity business and building a diverse workforce | Guest Christine Izuakor
|
Sep 28, 2020 |
Cloud security best practices and career tips | Guest Oliver Tavakoli
|
Sep 21, 2020 |
Job hunting tips for cybersecurity professionals | Guest Eric Jeffery
|
Sep 14, 2020 |
Get started in computer forensics: Entry-level tips, skills and career paths | Guest Amber Schroader
|
Sep 07, 2020 |
Getting into security architecture: Careers, skills and ransomware | Guest Pranshu Bajpai
|
Aug 31, 2020 |
Data privacy careers: GDPR, CCPA and the right to be forgotten | Guest Gabe Gumbs
|
Aug 24, 2020 |
Computer forensics careers: Taking down a $1.2 billion Ponzi scheme | Guest Sam Rubin
|
Aug 17, 2020 |
Threat modeling: Breaking the design with pen, paper and creativity | Guest Geoffrey Hill
|
Aug 10, 2020 |
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based training | Guests Leo Van Duyn and Bill Newhouse
|
Aug 06, 2020 |
API security, vulnerability research and LGBTQ+ representation | Guest Alissa Knight
|
Aug 03, 2020 |
From network engineer to pentester: Tips for moving into cybersecurity | Guest Brad Pierce
|
Jul 27, 2020 |
Inside a purple team: Pentesting, vulnerabilities and other key skills | Guest Luke Willadsen
|
Jul 20, 2020 |
How to become a malware analyst | Guest Danny Jenkins
|
Jul 13, 2020 |
Preparing the next generation of cybersecurity professionals | Guest Victor “Vic” Malloy
|
Jul 06, 2020 |
Cyber threat intelligence: Learn to become a cybersecurity tactician | Guest Charles DeBeck
|
Jun 29, 2020 |
Offensive or defensive security: Which career is for you? | Guest Fabien Dombard
|
Jun 22, 2020 |
CompTIA CySA+ certification changes: Everything you need to know | Guest Patrick Lane
|
Jun 18, 2020 |
How COVID-19 is changing phishing, social engineering and security | Guest Aaron Cockerill
|
Jun 15, 2020 |
Cybersecurity careers: How to stand out, get hired and make more money | Guest Karl Sharman
|
Jun 08, 2020 |
2020 election security: Vulnerabilities, lockdowns and disinformation | Guest John Dickson
|
Jun 01, 2020 |
Hunting criminals and stolen identities across the internet | Guest Amyn Gilani
|
May 25, 2020 |
What’s new in ethical hacking: Latest careers, skills and certifications | Guest Keatron Evans
|
May 21, 2020 |
From AI to deepfakes: How machine learning is affecting cybersecurity | Guest Emmanuel Tsukerman
|
May 18, 2020 |
Red team hacking in the age of COVID-19 | Guest John Cartrett
|
May 11, 2020 |
What does a military forensics and incident response expert do? | Guest Daniel Young
|
May 04, 2020 |
Cybersecurity and compliance: What's here, what's next? | Guests Scott Madsen and Jeff Dennis
|
Apr 30, 2020 |
How is the open exchange of information affecting cybersecurity? | Guest Cody Cornell
|
Apr 27, 2020 |
Teaching internet safety to children, teens and the elderly | Guest Patrick Craven
|
Apr 20, 2020 |
Military cybersecurity jobs, offensive security and CTFs | Guest Ken Jenkins
|
Apr 13, 2020 |
Fuzzing, security testing and tips for a career in AppSec | Guest Dr. Jared DeMott
|
Apr 06, 2020 |
How to become a cyber risk specialist | Guest Ryan Wallace
|
Mar 30, 2020 |
Identifying worms, bots, fraud and other malicious traffic | Guest Fang Yu
|
Mar 23, 2020 |
How universities are evolving to teach cybersecurity | Guest Chad Hardaway
|
Mar 16, 2020 |
How to become a penetration tester | Guest Dr. Wesley McGrew
|
Mar 09, 2020 |
How to get a cybersecurity startup off the ground | Guest Kevin O'Brien
|
Mar 02, 2020 |
Cryptography careers and IoT vulnerabilities | Guest Ted Shorter
|
Feb 24, 2020 |
How to keep your cybersecurity knowledge fresh | Guest Robert McMillen
|
Feb 17, 2020 |
Teach yourself cybersecurity with skills-based education | Guest John Wagnon
|
Feb 10, 2020 |
Digital forensics and incident response: Is it the career for you? | Guest Cindy Murphy
|
Feb 06, 2020 |
Election security issues for 2020 | Guest Adam Darrah
|
Feb 03, 2020 |
FREE cybersecurity training for everyone — 100th episode celebration!
|
Jan 28, 2020 |
The rise of insider cybersecurity threats | Guest Irena Mroz
|
Jan 27, 2020 |
How Women’s Society of Cyberjutsu is diversifying security | Guest Mari Galloway
|
Jan 20, 2020 |
Email attack trend predictions for 2020 | Guest Evan Reiser
|
Jan 13, 2020 |
PCI Security Standards Council talks security awareness and training | Guests Elizabeth Terry and Lisa Plaggemier
|
Jan 09, 2020 |
Top 5 soft skills and the Federal Cybersecurity Reskilling Academy | Guest Chris Triolo
|
Jan 06, 2020 |
Take your career to the next level with CompTIA and Infosec Skills | Guest Patrick Lane
|
Dec 19, 2019 |
Stay safe when shopping online | Guest Sam Bouso
|
Dec 16, 2019 |
Cognitive biases in security decision-making | Guest Kelly Shortridge
|
Dec 09, 2019 |
Cybersecurity needs in megacorporations | Guest Gene Yoo
|
Dec 02, 2019 |
Hacking since age six | Guest Nir Gaist
|
Nov 25, 2019 |
2020 election cybersecurity strategies | Guest Bob Stevens
|
Nov 18, 2019 |
The ROI of security awareness training | Guest Michael Osterman and Lisa Plaggemmier
|
Nov 14, 2019 |
Hyperspecialization in cybersecurity | Guest John Wheeler
|
Nov 11, 2019 |
Insider tips from a cybersecurity CEO | Guest Scott Madsen
|
Nov 04, 2019 |
How being hacked inspired a comic book series | Guest Gary Berman
|
Oct 28, 2019 |
Privacy is shaping the future of cybersecurity careers: Are you ready? | Guest Byron Johnson
|
Oct 24, 2019 |
Networking, engineering and education | Guest Tia Hopkins
|
Oct 21, 2019 |
Engineering, cybersecurity and changing careers | Guest Dave Farrow
|
Oct 14, 2019 |
Combating phishing, malware and hackers | Guest Atif Mushtaq
|
Oct 07, 2019 |
30 days of free training! | Breaking into cybersecurity with CompTIA | Guest James Stanger
|
Oct 03, 2019 |
The future of cybersecurity training: Subscription-based learning | Guest Jason Dion
|
Sep 30, 2019 |
Digital forensics, data analysis and data recovery | Guest Allan Buxton
|
Sep 23, 2019 |
Alissa Knight talks API security, formjacking and hacking | Guest Alissa Knight
|
Sep 16, 2019 |
From hacker to lawyer: An expert in cybersecurity law | Guest Bradley Gross
|
Sep 09, 2019 |
Ask an expert: How to start and advance your cybersecurity career | Guest Keatron Evans
|
Sep 05, 2019 |
The human element of cybersecurity careers | Guest Cheryl Kerrigan
|
Sep 02, 2019 |
How to become a cybersecurity analyst | Guest Jonathan Butler
|
Aug 26, 2019 |
Phish testing: What to do about so-called “repeat offenders” | Guest Tory Dombrowski
|
Aug 22, 2019 |
What’s it like being a cybersecurity risk analyst? | Guest John Bree
|
Aug 19, 2019 |
The importance of cybersecurity education | Guest Dave Hatter
|
Aug 12, 2019 |
PenTest+ Everything you need to know about CompTIA’s new certification | Guest Patrick Lane
|
Aug 08, 2019 |
Leveraging board governance for cybersecurity | Guest Michael Figueroa
|
Aug 05, 2019 |
The dangers of role-based access control (RBAC) | Guest Balaji Parimi
|
Jul 29, 2019 |
Getting started in digital forensics | Guest Keatron Evans
|
Jul 25, 2019 |
What does a vulnerability verification specialist do? | Guest Lauren McCaslin
|
Jul 22, 2019 |
Hacking cars, getting arrested and a career in cybersecurity | Guest Alissa Knight
|
Jul 15, 2019 |
Closing the cyber skills gap: Advice from a CEO, CTO and educator | Guests Kathleen Hyde, Scott Madsen and Henry Harrison
|
Jul 11, 2019 |
Preventing and repairing security breaches | Guest John Torres
|
Jul 08, 2019 |
Impostor syndrome, burnout and the challenges of a career in security | Guest Susan Morrow
|
Jul 01, 2019 |
DoH! Will the new protocol change how infosec professionals work? | Guest Andrew Wertkin
|
Jun 24, 2019 |
Latest malware trends are bad news for business | Guest Adam Kujawa
|
Jun 17, 2019 |
How data science and machine learning are affecting cybersecurity | Guest Anu Yamunan
|
Jun 10, 2019 |
How to become an APT hunter with Carbon Black | Guest David Balcar
|
Jun 03, 2019 |
Fraud trends from the latest ThreatMetrix cybercrime report | Guest Rebekah Moody
|
May 27, 2019 |
Protecting customer data at contact centers | Guest Ben Rafferty
|
May 20, 2019 |
Cybersecurity reporting and closing the skills gap with Dark Reading | Guest Kelly Sheridan
|
May 09, 2019 |
Benefits and challenges of securing your cloud data | Guest Andrew Howard
|
May 03, 2019 |
Focusing on users is the only way to improve cybersecurity | Guest Ben Johnson
|
Apr 26, 2019 |
Risk management and understanding what matters most | Guest Liz Mann
|
Apr 19, 2019 |
How to become a Certified Ethical Hacker (CEH) | Guest Keatron Evans
|
Apr 15, 2019 |
What does a director of fraud and identity do? | Guest Kimberly Sutherland
|
Apr 11, 2019 |
What’s it like to be a help desk manager? | Guest Gloria Milton
|
Apr 04, 2019 |
Saving lives with ICS and critical infrastructure security | Guest Emily Miller
|
Mar 28, 2019 |
Creating a more diverse cybersecurity workforce | Guest Ruth Gomel-Kafri
|
Mar 22, 2019 |
Take control of your infosec career with CyberSeek | Guest Tim Herbert
|
Mar 15, 2019 |
VPNs and the ongoing battle for privacy | Guest Pete Zaborszky
|
Mar 08, 2019 |
Where are All the Government Infosec Professionals? | Guest Gregory Garrett
|
Mar 02, 2019 |
The Business Impact of Cyber Risk | Guests David Kruse, Jeff McCollum and Justin Webb
|
Feb 26, 2019 |
The Current State of Artificial Intelligence in Cybersecurity | Guest Eric Stevens
|
Feb 22, 2019 |
Closing the Cyber Skills Gap | Guest Kathleen Hyde
|
Feb 15, 2019 |
CIS Top 20 Security Controls with Tony Sager | Guest Tony Sager
|
Feb 12, 2019 |
Growing the Number of Women in Cybersecurity | Guest Olivia Rose
|
Feb 08, 2019 |
California Consumer Privacy Act: Are You Prepared for 2020? | Guests Jay Rodne and Aaron Weller
|
Feb 05, 2019 |
Getting Started in Red Teaming and Offensive Security | Guest Curtis Brazzell
|
Feb 01, 2019 |
How to Become a Chief Information Security Officer | Guest Joshua Knight
|
Jan 25, 2019 |
Community Cyber-Attacks, Simulations and Cooperation | Guest Michael Figueroa
|
Jan 19, 2019 |
How to Launch a Career in Application Security | Guest Dan Cornell
|
Jan 11, 2019 |
Red Team Operations: Attack and Think Like a Criminal | Guest Jeremy Martin
|
Jan 08, 2019 |
Career Advice from McAfee’s Lead Scientist | Guest Christiaan Beek
|
Jan 04, 2019 |
Cyber Threat Hunting: Identify and Hunt Down Intruders | Guest Jeremy Martin
|
Jan 02, 2019 |
What’s It Like to be a High-End Red Team Member? | Guest David "Moose" Wolpoff
|
Dec 28, 2018 |
DNS Exploits, Concerns and Easy Fixes | Guest Andrew Wertkin
|
Dec 21, 2018 |
Malware Removal and Security Tips with Malwarebytes | Guest Michael Sherwood
|
Dec 14, 2018 |
10 Proven Security Awareness Tips From Osterman Research | Guest Michael Osterman
|
Dec 10, 2018 |
Drilling Holes in ATMs, Card Skimming and Other Fraud | Guest Stan Engelbrecht
|
Dec 07, 2018 |
Are Third-Party Vendors Your Biggest Cybersecurity Risk? | Guest Fred Kneip
|
Nov 30, 2018 |
Transform Your Organization with a Security Champion | Guest Jeff Williams
|
Nov 21, 2018 |
Securing the Internet-of-Things (IoT) | Guest Dr. Jared DeMott
|
Nov 16, 2018 |
Developing Security Champions within DevOps | Guest Ty Sbano
|
Nov 09, 2018 |
How is Cybercrime Impacting the Financial Sector? | Guest Todd Weller
|
Nov 03, 2018 |
New Phishing Trends, Old Tactics and Security Awareness | Guest Pedram Amini
|
Oct 26, 2018 |
Get Started in Cybersecurity: Beginner Tips, Certifications and Career Paths | Guest Keatron Evans
|
Oct 23, 2018 |
Armed Services, Social Engineering and Sensationalist Reporting | Guest Michel Huffaker
|
Oct 19, 2018 |
Breaking into IT: From First Job to Advanced Certs with CompTIA | Teresa Sears and Christine Tuttleman
|
Oct 16, 2018 |
Midterm Elections, Hacking and Information Warfare | Guest John Dickson
|
Oct 12, 2018 |
Defending Against and Recovering from Ransomware | Guest Bill Siegel
|
Oct 05, 2018 |
Turn the Tables on Your Attackers with Deception Technology | Guest Carolyn Crandall
|
Sep 28, 2018 |
CISSP Exam Changes: Tips to Pass the New CAT Format (and Free E-book) | Guest Ken Magee
|
Sep 25, 2018 |
Privacy and Anonymity in the Modern World | Guest Lance Cottrell
|
Sep 23, 2018 |
Healthcare’s Many Cybersecurity Challenges | Guest Lisa Hedges
|
Sep 16, 2018 |
Cybersecurity Startups and Minority Representation | Guest Ron Gula
|
Sep 08, 2018 |
How to Become a Network Admin | Guest Elias Papatestas
|
Sep 01, 2018 |
Post GDPR Best Practices | Guest Susan Morrow
|
Aug 27, 2018 |
CRISC Roadmap: The Highest-Paying Certification | Guest Leighton Johnson
|
Aug 24, 2018 |
How to Become a Computer Forensics Investigator | Guest Amber Schroader
|
Aug 20, 2018 |
Privacy Certifications Boosted by New Regulations | Guest Aaron Stevens
|
Aug 17, 2018 |
The Problem with Passwords | Guest Susan Morrow
|
Aug 13, 2018 |
PMP Certification: Boost Your Career and Earn More Money | Guest Chris Danek
|
Aug 10, 2018 |
How to Become an Incident Responder | Guest Keatron Evans
|
Aug 06, 2018 |
The $9 Billion BEC Threat You Can’t Ignore | Guests Roger Sels and Jack Koziol
|
Aug 03, 2018 |
How to Become a Security Architect | Guest Leighton Johnson
|
Jul 26, 2018 |