PLAY PODCASTS
401 Access Denied

401 Access Denied

263 episodes — Page 2 of 6

Ep 76401 Access Denied Podcast Ep. 76 | Discovering and Stealing Secrets with Mackenzie Jackson

How can programmers prevent breaches and bolster security from the root of their code? Joe Carson is joined by Mackenzie Jackson, a developer advocate for GitGuardian, who are leaders in helping keep secrets and credentials out of source code. Mackenzie explains the primary ways attackers are able to exploit these secrets, and how developers can defend against their attacks. These lessons are vital for overall security in all sectors, so don’t miss out on this episode!Follow Mackenzie!~LinkedIn~TwitterFollow us on Social!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE with Cybrary!

Mar 22, 202332 min

Real-World Quantum Security with Patero | Cybrary Podcast Ep. 105

Through the first three episodes of our podcast mini-series with Patero, we’ve learned all about the opportunities and risks involved with quantum computing. In this fourth and final installment, Ron Lewis wraps up the discussion by answering the big question - what now? With a lot of uncertainty over our future with quantum, Ron takes a methodical and logical approach as to how we can best prepare ourselves for the inevitable shift that this technology will bring.Discover Patero!Learn more about the quantum threat!See the research from NIST:~NIST Announces First Four Quantum-Resistant Cryptographic AlgorithmsFollow us on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career today with Cybrary!

Mar 15, 202343 min

Ep 75401 Access Denied Podcast Ep. 75 | Security & Trust in Voting Systems with Christian Folini

As technology advances, how can governments and organizations keep up in order to maintain, secure, and legitimize elections? In this episode of the 401 Access Denied Podcast, Joe Carson speaks with security engineer Christian Folini to discuss how diversifying tech is democratizing elections. Gain insight into the rise and impact of online voting, including the recent Estonian Prime Minister election where the predominant voting method was over the internet. You won’t want to miss this pertinent conversation!Follow Christian!~LinkedIn~Twitter~YouTubeFollow us on Social!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE with Cybrary!

Mar 8, 202336 min

Empowering Women in Tech with Mari Galloway | Cybrary Podcast Ep. 104

The fields of technology and cybersecurity can be intimidating to jump into, especially for women and minorities. That didn’t stop Mari Galloway from carving out her own path full of successes. As the founder and CEO of Women’s Society of Cyberjutsu, Mari’s story is inspiring and a great example of how to overcome the odds in this domain.Follow Mari!~LinkedIn~TwitterFollow the Women's Society of Cyberjutsu!~LinkedIn~TwitterFollow us on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Mar 1, 202347 min

Ep 74401 Access Denied Podcast Ep. 74 | Decentralized Centralization with Brian Honan

How have businesses adapted to the ever-evolving field of cybersecurity over the years? Join Joe Carson as he catches up with long-time friend Brian Honan for an entertaining and informative conversation. Brian’s decades of experience in IT, cybersecurity, consulting, and executive leadership offers a unique perspective full of wisdom and anecdotes. Newcomers and cyber experts alike won’t want to miss this engaging discussion!Follow Brian!~LinkedIn~TwitterFollow us on Social!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE at Cybrary!

Feb 22, 202341 min

No More NO From Your CISO with Patero | Cybrary Podcast Ep. 103

In the third episode of our fascinating podcast miniseries on quantum computing, we are joined again by Ron Lewis, VP of Customer Success and Innovation at Patero, for an in-depth discussion on the intersection of quantum and cybersecurity! Ron applies everything we've learned about quantum thus far to recent breaches and security news. How can quantum technology bolster your defense-in-depth strategy, help mitigate cyber threats, and protect the integrity of your network? Tune in to start utilizing quantum to revolutionize your organization's security solutions!Discover Patero!Learn more about the quantum threat!See the research from NIST:~NIST Announces First Four Quantum-Resistant Cryptographic AlgorithmsFollow us on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE at Cybrary!

Feb 16, 202350 min

Ep 73401 Access Denied Podcast Ep. 73 | Cybersecurity Government Task Force with Jen Ellis

Have you ever wondered how cybersecurity policy gets created, updated, and enforced? In this episode of the 401 Access Denied Podcast, Joe Carson speaks with Jen Ellis, founder of NextJenSecurity and board member of several major cybersecurity institutions including the UK Government, to discuss the ins and outs of cyber policy. Learn how entities, including governments, corporations, and individuals, interact with and are impacted by these policies. Jen is a leader in this space, so tune in and gain a lot of insight on this important topic!Follow Jen!~LinkedIn~TwitterFollow us on Social!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE at Cybrary!

Feb 8, 202357 min

The Power of Diversity in Cybersecurity with Blacks in Cyber | The Cybrary Podcast Ep. 102

In this episode of the Cybrary Podcast, we dive into the mission, vision, and future of Blacks in Cybersecurity (BIC) and how they're making waves in the industry. From the challenges they've faced to the opportunities they see, Michaela Barnett, CEO, and Arthur Pryor, Director of Operations, share their expertise and insights to help you navigate the cyber landscape. Plus, get the inside scoop on what to look out for and what advice to follow for anyone looking to break into the field by 2023. Tune in now for an electrifying episode you won't want to miss!Discover Blacks in Cybersecurity!Follow us on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE at Cybrary!

Feb 1, 202329 min

Ep 72401 Access Denied Podcast Ep. 72 | Mistaken Identities with Paul Simmonds

How can you establish a better security culture for your business and life? In this episode of the 401 Access Denied Podcast, Joe Carson sits down with “Serial CISO” (Motorola, AstraZeneca) and Security Analyst Paul Simmonds, CEO of the Global Identity Foundation, to discuss why Zero-Trust has only intensified at the height of an ever-evolving digital age. You won’t want to miss Paul’s philosophy on securing your identity and assets against any given entity, risk, or persona!Follow Paul!!~LinkedIn~TwitterCheck out the Global Identity Foundation!~https://www.globalidentityfoundation.org/Check out these blogs from the Global Identity Foundation!~Mistaken Identity Part 1~Mistaken Identity Part 2~Mistaken Identity Part 3~Mistaken Identity Part 4 ~Mistaken Identity Part 5 Follow us on Social!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE at Cybrary!

Jan 25, 202356 min

The Q's of Quantum with Ron Lewis of Patero | The Cybrary Podcast Ep. 101

In part 2 of our Quantum-focused series, the Cybrary Podcast welcomes back Ron Lewis, VP of Customer Success and Innovation at Patero. We've explored how quantum computing impacts cybersecurity professionals as both a threat to encryption and as a machine learning tool. In this episode, Ron shares his deep wealth of knowledge on the "Q's of Quantum" and the history of the field of study around Quantum Random Number Generation (QRNG).Discover Patero!Learn more about the quantum threat!See the research from NIST:~NIST Announces First Four Quantum-Resistant Cryptographic AlgorithmsFollow us on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE at Cybrary!

Jan 19, 202342 min

Ep 71401 Access Denied Podcast Ep. 71 | Hacking It Live with NahamSec

Who knew that casual livestream ethical hacking could lead to a full-time content creation career? The one-and-only Ben Sadeghipour aka NahamSec takes us down memory lane from the time he studied computer science and digital marketing in college to the moment he saw a promising future in bug bounty hunting. Get into the livestream hacker's mindset in this fun conversation about mentorship and community building in the cybersecurity space!Follow NahamSec!~Twitter ~YouTube~Twitch Consider Donating to the The Leukemia & Lymphoma Society® (LLS)Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE with Cybrary!

Jan 11, 202345 min

Ep 70401 Access Denied Podcast Ep. 70 | Cybersecurity Year in Review and 2023 Predictions with Dan Lohrmann

What were the biggest cybersecurity trends of 2022, and which types of threats do experts predict we should prepare for in 2023? Dan Lohrmann, Field CISO with Presidio, returns to the 401 Access Denied Podcast to provide a consolidated perspective on all the trends from an eventful year. From the war in Ukraine to the rise in cyber mercenary attacks, hacktivism, cloud hacks, and deepfakes, we're welcoming 2023 with a careful review of all the most memorable topics!Read Dan's article on "The Top 23 Security Predictions for 2023" ~The Top 23 Security Predictions for 2023 Part 1 Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE at Cybrary!

Dec 28, 202238 min

Going Phishing with ChatGPT | The Cybrary Podcast Ep. 100

Could an AI chatbot like ChatGPT help you co-author the next great cyberpunk novel? Or craft a phishing email and generate sock puppets - for ethical hacking research, of course! Join our security research team - incident responder Marc Balingit and adversary emulator Matt Mullins - as we wade into the fun (and sometimes ethically ambiguous) areas of AI tech in cybersecurity. Keep the conversation going as we explore how AI tools can impact productivity, learning, skill shortages, and more.Check out the podcast on Youtube to watch Will, Matt, and Marc demo ChatGPT.Explore ChatGPT in Cybrary's FREE challenge activity!  Read all about the potential impact of A.I. chatbots on the cybersecurity world!  Learn more about OpenAI on their website! See How OpenAI became an AWS Certified Cloud Practitioner!Follow us on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Dec 21, 20221h 9m

Ep 69401 Access Denied Podcast Ep. 69 | Cloud Hacks with Carlos Polop

Cloud services have made it easier for users to stay connected and access resources from anywhere. But how can we reduce the security risks resulting from on-premises-to-cloud infrastructure migration? Security researcher Carlos Polop returns to the 401 Access Denied Podcast to expose the most unexpected cloud security flaws commonly leveraged by adversaries. From tackling misconfigurations to enhancing security controls, we cover top risk mitigation strategies recommended by cloud penetration testers!Follow Carlos! (and join his Discord community!)~Github~Twitter Check out Carlos' latest book on cloud hack tricks~Hacktricks CloudLearn more about Carlos's priviledge escalation tool~Purple PandaFollow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE at Cybrary!

Dec 14, 202251 min

Creating a Neurodiverse Cybersecurity Workforce with Melwood | The Cybrary Podcast Ep. 99

Cybersecurity needs dynamic minds to keep up with ever-evolving threats. How can managers foster an inclusive workforce that celebrates diversity of thought? Scott Gibson, Chief Strategy Officer at Melwood, discusses how a "double empathetic" approach can help security leaders improve sourcing best practices and meet their employees where they're at. Hear more about the steps that neurodivergent people can take to build their career-ready skills and succeed in cybersecurity.Learn more about Melwood and the abilIT program! Follow us on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE at Cybrary!

Dec 7, 202247 min

Ep 68401 Access Denied Podcast Ep. 68 | Know Your Hackers' Rights with Chloé Messdaghi

Ethical hackers are motivated to make society safer, but how can they ensure that they are following the law? This episode of the 401 Access Denied Podcast explores all the gray areas of vulnerability disclosure policies, copyright laws, and end-user license agreements. Learn essential hacker safety tips from our hosts, Joe Carson and Chloé Messdaghi!Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE at Cybrary!

Nov 30, 202253 min

Unpacking Quantum Risks with Ron Lewis of Patero | Cybrary Podcast Ep. 98

The quantum computing revolution is a hot topic in the technology world, but how exactly does it impact cybersecurity professionals? To what extent does quantum computing pose a threat to encryption, and how long do we have to prepare for it? Ron Lewis, VP of Customer Success and Innovation at Patero, helps us find a pragmatic approach to post-quantum resiliency. In the first episode of our Quantum and Cyber podcast series with Patero, you'll learn all about how to differentiate Shor's algorithm from Grover's, navigate the cryptographic saga of Bob and Alice, and realistically quantify post-quantum risks.Discover Patero! Learn more about the quantum threat! See the research from NIST:~NIST Announces First Four Quantum-Resistant Cryptographic Algorithms Follow us on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE at Cybrary!

Nov 23, 202249 min

Ep 67401 Access Denied Podcast Ep. 67 | Hack the Community with Phil Wylie

The art of hacking is often synonymous with high-profile cybercrime. But how can the cybersecurity and penetration testing community help more crafty hackers go from breaking bad to breaking good? Phil Wylie, author of "The Pentester Blueprint," joins Joe Carson and Chloé Messdaghi to discuss innovative ways of fostering a safe, supportive, and rewarding culture among ethical hackers. We explore how effective mentorship, gamified bug bounty challenges, and free training opportunities can positively impact cybersecurity job recruitment and satisfaction.Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE with Cybrary!

Nov 16, 20221h 0m

Double Trouble with Double Dragon feat. Chris Daywalt and Matt Mullins | The Cybrary Podcast Ep. 97

Some threat actor groups pursue state-sponsored espionage, and others conduct financially-motivated cyberattacks. APT41, also known as Double Dragon, happens to do both! Our adversary emulator and self-described Chief Thief, Matt Mullins, teams up with defensive security freelancer, Chris Daywalt, to discuss their latest threat actor campaign emulating APT41. Get caught up in the cat-and-mouse game between red and blue teamers in this conversation on reducing risk, enhancing alerts, and exploring realistic simulations!Start the Double Trouble with Double Dragon Threat Actor Campaign to detect TTPs leveraged by real-world threat actor group, APT41!Follow us on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE at Cybrary!

Nov 9, 202242 min

Ep 66401 Access Denied Podcast Ep. 66 | Cultivating Critical Infrastructure Resilience with George Eapen

When threat actors target enterprise security environments, they often seek to compromise the accounts with the most privileged access. How can organizations minimize security risks in a world where remote account access is growing? George Eapen, Group Chief Information Officer at Petrofac, discusses important strategies for reducing risk and increasing resilience in the face of threats like ransomware attacks. Learn more about how layered security controls, privileged access management, and employee training can foster a positive organizational security culture.Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE at Cybrary!

Nov 2, 202251 min

Kickstarting Your Cybersecurity Career with Jenn Barnabee | The Cybrary Podcast Ep. 96

Interested in switching your career to cybersecurity, but don't know where to start? Need to brush up on your cyber basics? In this episode of the Cybrary Podcast, we are joined by our very own course managers Sara Faradji and Jenn Barnabee. Jenn goes into detail on the making of her new Entry-Level Cybersecurity Training (ELCT) course that is intended for absolute beginners with no prior knowledge of the industry! Get the inside scoop on how you can gain the foundational knowledge to take the next step towards your cybersecurity career or goals.Check out Jenn's Entry-Level Cybersecurity Training course at Cybrary!Follow us on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE at Cybrary!

Oct 26, 202257 min

Ep 65401 Access Denied Podcast Ep. 65 | Bringing the Fun Back to Cybersecurity with Ian Murphy

Learn more about Cybrary! Feeling fatigued from all the fear and uncertainty surrounding cybersecurity news? Take a breather in this engaging podcast conversation with Ian Murphy, founder of CyberOff and affectionately known as "The Monty Python of Cyber"! Join in the fun as Ian breaks down the complexities of cybersecurity to focus on the value of human impact, bravery, and connectedness in this dynamic field.Check out CyberOff! Connect with Ian!~LinkedIn Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE at Cybrary!

Oct 19, 202253 min

Breaking Barriers in Cyber with Black Girls Hack Founder Tennisha Martin | The Cybrary Podcast Ep. 95

Have you ever thought about pursuing a cybersecurity career, but you don't imagine yourself as a "tech person"? Tennisha Martin, founder and Executive Director of Black Girls Hack, discusses strategies for both front and backdoor entrances into the dynamic world of cybersecurity. Learn how to take advantage of networking, resume review, and hands-on training opportunities so that you can see yourself in cyber!Join Black Girls Hack! ~Black Girls Hack Website Follow us on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE at Cybrary!

Oct 12, 202248 min

Ep 64401 Access Denied Podcast Ep. 64 | The Future State of Cybersecurity with Rik Ferguson

With the state of cybersecurity in constant flux, how can security teams better prepare both their organizations and society for the challenges ahead? Rik Ferguson, VP of Security Intelligence at Fourscout Technologies, shares best practices for tackling issues of trust, authenticity, communication, and problem-solving in the security world.Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE at Cybrary!

Oct 5, 202245 min

How to Build a Cybersecurity Career with Dave Kennedy | The Cybrary Podcast Ep. 94

A skill shortage is pervading the cybersecurity industry. But what is the root cause of the problem, and how can employers fill more job roles? Dave Kennedy, CEO and founder of TrustedSec, and Chloé Messdaghi, Chief Impact Officer at Cybrary, discuss hiring and training best practices in the security world. Learn how you can break into the cybersecurity field from any educational or technical background!Follow Dave Kennedy!~LinkedIn Follow us on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career today at Cybrary!

Sep 28, 202258 min

Ep 63401 Access Denied Podcast Ep. 63 | Building a Safer Cyberspace with Philipp Amann

With ransomware, supply-chain attacks, and other organized cybercrime incidents on the rise, what can we do to better protect society? Philipp Amann, Head of Strategy at the European Cybercrime Centre (EC3), invites us to his world of cyber law enforcement and analysis. Learn more about the evolution of cyberattacks and cybercriminal investigations. Hear how you can join government agencies in the fight against new and pervasive threats.Follow Philipp!~LinkedIn ~Twitter Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE with Cybrary!

Sep 21, 202248 min

Responsible Vulnerability Disclosure with Casey Ellis | The Cybrary Podcast Ep. 93

When it comes to vulnerability disclosure, there can be a lot of unknowns. What is the first step in safely reporting? How can global bug bounty hunters better understand the specialized legalese in disclosure policies? Casey Ellis, founder and CTO of Bugcrowd and Co-founder of Disclose.io, addresses the importance of standardizing vulnerability disclosure policy language. Join in the de-villainization of ethical hackers with Casey and the Cybrary team at Black Hat!Follow Cybrary on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Sep 14, 202220 min

Ep 62401 Access Denied Podcast Ep. 62 | Warfare and Welfare in Ukraine with Chris Kubecka

At the onset of the 2022 war in Ukraine, how did the wiper malware attacks deployed by Russia impact civilians? To what extent does cyberwarfare coincide with information warfare in the context of the Russo-Ukrainian War? In part 2 of our conversation with Chris Kubecka, CEO of HypaSec, we discuss the importance of open-source intelligence and community support amidst global conflict.Connect with Chris Kubecka!~TwitterFollow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE with Cybrary!

Sep 7, 202233 min

Finding the Humanities in Information Security with Tracy Z. Maleeff | The Cybrary Podcast Ep. 92

How did Tracy Z. Maleeff (aka InfoSecSherpa) pivot from a library science job into a cybersecurity research career? What first steps can other liberal arts majors take on their potential path toward the information security field? Find your niche in the security world with Tracy's tips on leveraging diverse skill sets to help solve complex security problems.Follow Cybrary on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Aug 31, 202239 min

Upskilling Your Security Team with Lance James | The Cybrary Podcast Ep. 91

With the Great Resignation looming, what can security leaders do to empower their teams? How does effective training help shatter glass ceilings? Lance James, CEO of Unit 221B, shares his methodology for boosting team confidence and capability.Follow Cybrary on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Aug 26, 202227 min

Ep 61401 Access Denied Podcast Ep. 61 | Escaping Ukraine with Chris Kubecka

A distressing escape from a nation at the outbreak of war. A race to the border filled with sharp turns, sleepless nights, and evasion from mercenary groups. This is the true story of cyberwarfare expert Chris Kubecka's exodus from Ukraine in early 2022. Follow Chris down the winding Ukrainian backroads in part 1 of her perilous story.Connect with Chris Kubecka!~Twitter Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE with Cybrary!

Aug 24, 202224 min

Debuting the Cybrary SOC Analyst Assessment with Ned Hinman | The Cybrary Podcast Ep. 90

Cybrary has been hard at work building a custom lab experience designed to prepare your security teams to succeed. Get the inside scoop on Cybrary's SOC Analyst Assessment from Senior Product Manager Ned Hinman. Learn how you evaluate your team's skill development with a high-fidelity, immersive assessment.Follow Cybrary on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Aug 17, 202232 min

Ep 60401 Access Denied Podcast Ep. 60 | Ethically Exploiting Vulnerabilities with John Hammond

With thousands of new vulnerabilities discovered each year, how can security teams prioritize which ones to mitigate? John Hammond, acclaimed content creator and Senior Security Researcher at Huntress, explains key factors determining a vulnerability's potential impact. Join John behind the scenes at the RSA conference as he discusses threat actor mindsets, community engagement, and the ethics of hacking.Connect with John!~LinkedIn Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTubeJump-start your cybersecurity career for FREE with Cybrary!

Aug 10, 202228 min

Ep 59401 Access Denied Podcast Ep. 59 | Unlocking Identity Management with Pamela Dingle

What is your ideal password management experience? Pamela Dingle, Director of Identity Standards at Microsoft, chats with us during the 2022 RSA conference about forward-thinking identity management strategies from the perspectives of consumers, businesses, and government entities. Hear Pamela's take on how authentication, standardization, and decentralization efforts are changing the way that we think about digital identity.Connect with Pamela!~Linkedin Follow us on Social!!~Twitter~Instagram~Facebook~LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Jul 27, 202237 min

Strengthening AWS Cloud Security with Tenacity | The Cybrary Podcast Ep. 89

With companies migrating to cloud environments amidst a continued influx of remote and hybrid workspaces, it's essential to keep your data secure. Nick Lumsden, co-founder and CTO of Tenacity Cloud, helps organizations to improve their foundational AWS cloud security. In a world where you can quickly make software changes, how can you maintain asset visibility and ensure compliance? Listen to Nick's insights on cost-effective cloud security management best practices.Connect with Nick!~LinkedInCheck out Tenacity Cloud~Company Website Follow Cybrary on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Jul 20, 202240 min

Detecting the Follina Vulnerability and Initial Access Brokers | The Cybrary Podcast Ep. 88

When the next zero-day vulnerability hits, how can your security team prepare to detect and respond to the latest threats? In what ways can your organization reduce risk in a dynamic threat landscape? Our Cybrary Threat Intelligence Group (CTIG) is here to jumpstart the conversation on grounding your security training and decision-making on actionable research. Hear our CTIG experts, Ryan English and Matt Mullins, discuss the latest intel on the Follina vulnerability (CVE-2022-30190), the ZuoRAT report from Black Lotus Labs, and evolving tactics from initial access brokers like Prophet Spider.  Take Matt’s training course on the Follina vulnerability: ~https://www.cybrary.it/course/cve-series-follina-cve-2022-30190/ Enroll in our Spinning a Web Shell for Initial Access course to detect behaviors of real-world initial access brokers: ~https://www.cybrary.it/catalog/spinning-a-web-shell-for-initial-access/ Check out the report on ZuoRat from the Cybray Threat Intelligence Group (CTIG): ~https://www.cybrary.it/blog/ctig-coverage-of-black-lotus-labs-zuorat-report/Follow Cybrary on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Jul 16, 20221h 1m

Ep 58401 Access Denied Podcast Ep. 58 | Creating a Human-Centered Cyber Strategy with Robert Burns

As our threat landscape evolves and remote work opportunities continue to grow in popularity, it's important that security leaders enhance their future-proofing strategies. How can organizations cultivate human-centered approaches to prioritizing risks and developing proactive incident response plans? Robert Burns, Chief Security Officer of the Thales Cloud Protection and Licensing division, sits down with the 401 Access Denied team to discuss these strategies and other key takeaways from the June 2022 BSIDES and RSA conferences.Connect with Bob!~LinkedIn ~Twitter Follow us on Social!!~Twitter~Instagram~Facebook~LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Jul 13, 202219 min

Reflections on the Infosecurity Europe Conference 2022 | The Cybrary Podcast Ep. 87

Security conference season is back in full swing, and Cybrary is here to bring you all the highlights! Our Senior Product Manager, Ned Hinman, shares key takeaways from the Infosecurity Europe Conference in June of 2022. Hear what security leaders organizations like ISC2 are saying about strategies for bridging skills gaps, attracting new talent, and approaching cybersecurity as a psychological challenge.  Read the Psychology of Intelligence Analysis Follow Cybrary on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Jul 6, 202238 min

Ep 57401 Access Denied Podcast Ep. 57 | Tackling Trauma in Cybersecurity with Chloé Messdaghi

Living in the Information Age means that we have a wide world of knowledge and networks at our fingertips, but where do we find that balance between enlightenment and exhaustion? If you're weary from doomscrolling and tired of putting bandaids on burnout, you'll want to hear what Chloé Messdaghi has to say about maintaining sanity in the security industry. Join Chloé as she kicks off her latest gig as the co-host of the 401 Access Denied podcast, where she will share insights on prioritizing mental health support and positive leadership in cybersecurity.Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Delinea LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Jun 29, 202233 min

Preventing Data Exfiltration and Extortion Attacks | Cybrary Podcast Ep 86

As cybersecurity teams become more advanced, adversaries get craftier. That's why Cybrary's blue teamer Owen Dubiel and red teamer Matt Mullins joined forces to develop purple team training campaigns based on real-world threats. Their latest campaign explores how threat actors like FIN10 extort organizations by threatening to expose their stolen data publicly. Hear all about how Owen and Matt created training exercises to help you improve your situational awareness and detection strategies.Think you have what it takes to enhance your detections to pinpoint each step in FIN10's attack kill chain? Enroll now in our Exfiltration and Extortion campaign, where you'll gain expert insights on real-world threat actor behavior and detect the malicious activity yourself in a virtual lab.Enroll now in our new Exfiltration and Extortion Campaign!Follow Cybrary on Social!!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Jun 24, 202244 min

Ep 56401 Access Denied Podcast Ep. 56 | Highlights from Verizon's 2022 Data Breach Investigations Report

Verizon's 2022 Data Breach Investigations Report (DBIR) is out, and Delinea is here to break down the highlights! Delinea CISO Stan Black and Cybersecurity Evangelist, Tony Goulding, discuss which findings are most surprising, actionable, and trending upward in this year's report. Get the experts' advice on how we all can develop smart, data-driven security solutions based on evolving threat actor behavior and incident analysis.Read all about it in Verizon's 2022 Data Breach Investigations Report!  Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Delinea LinkedInJump-start your cybersecurity career for FREE with Cybrary!

Jun 15, 202251 min

Prioritizing Diversity in Cybersecurity with Chloé Messdaghi | The Cybrary Podcast Ep. 85

Acclaimed cybersecurity power player Chloé Messdaghi is making big moves in her new role as Cybrary's Head of Impact. In this episode of the Cybrary podcast, she discusses commonsense approaches to minimizing bias and cultivating inclusivity in the security industry. How can organizations mitigate not only dynamic cyber risks, but also the revolving door of employee turnover? What can effective leaders do to prioritize the value of security teams and invest in their continued growth? Listen to Chloé's advice on developing a human-centered perspective in security management and workplace culture.Follow Cybrary on Social!~Twitter~Instagram~FaceBook~YouTube~LinkedInJump-start your cybersecurity career with Cybrary!

Jun 8, 202243 min

Ep 55401 Access Denied Podcast Ep. 55 | Investing in People and Reducing Skills Gaps with Kevin Hanes

Jump-start your cybersecurity career for FREE with Cybrary!Where can organizations find specialized candidates for millions of unfilled security jobs? How can the right approach to training help increase employee retention and close the notorious cybersecurity skills gap? Kevin Hanes, CEO of Cybrary, shares why investing in people is a vital part of reducing risk. Learn how you can effectively prioritize diversity in the hiring process and support the growth of people who value the continuous educational journey that is cybersecurity.Follow us on Social!~Twitter~Instagram~Facebook~YouTube~LinkedIn

Jun 1, 202246 min

The Power of Purple Teaming with Owen Dubiel and Matt Mullins | The Cybrary Podcast Ep. 84

Jump-start your cybersecurity career for FREE with Cybrary!How can purple teaming benefit your organization? When red teamers like Matt Mullins collaborate with blue teamers like Owen Dubiel, you know you'll get a thorough and cost-effective assessment of your security environment. Listen to Matt and Owen share their strategies for successful purple teaming design and implementation. Plus, hear about their new Cybrary course campaign where you'll learn real-world adversary techniques before enhancing detections.Check Owen and Matt's Threat Actor Campaign series, where you'll learn the tactics and techniques used by real-world adversaries!~Threat Actor CampaignsFollow Cybrary on Social!!~Twitter~Instagram~YouTube~LinkedIn

May 26, 202250 min

Ep 54401 Access Denied Podcast Ep. 54 | Creativity, Community, and Bug Bounties with STÖK

Jump-start your cybersecurity career for FREE with Cybrary!How does the hacker of all trades, Fredrik Alexandersson (aka STÖK), take the time to learn new things, design sustainable fashion, and connect with a growing social media community? Hear how you can satisfy your curiosity with the ultimate work-life balance. Follow STÖK down the bug bounty career path that influenced his cybersecurity career journey and inspired his creative pursuits.Follow STÖK on all platforms! ~Website ~YouTube~Twitter  Follow us on Social!~Twitter~Instagram~Facebook~YouTube~LinkedIn

May 18, 202257 min

How to Checkmate Ransomware Threat Actors with Red/Blue Team Training | The Cybrary Podcast Ep. 83

Ransomware attacks impacted 66% of organizations in 2021. As threat actor groups like FIN7 take advantage of expanded networks, security weaknesses, and human trust, it's more important than ever to keep up with their level of prowess. Cybrary's "enterprise defender," Owen Dubiel, and "chief thief," Matt Mullins, discuss how their cybersecurity work experiences informed their Ransomware for Financial Gain course series modeled after FIN7's techniques. Follow each part of their attack scenario that lets you emulate adversaries before enhancing your detections to reduce your risk of being the next ransomware victim. Why choose between the red and blue teams when you can do both? Check Owen and Matt's Threat Actor Campaign series, where you'll learn the tactics and techniques used by real-world adversaries! ~Threat Actor Campaigns Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

May 13, 202252 min

Ep 53401 Access Denied Podcast Ep. 53 | Password Security Secrets with Dustin Heywood (aka EvilMog)

Just in time for World Password Day, this podcast episode is all about password cracking and the solutions to securing your secrets. Four-time DEF CON Black Badge winner and Chief Architect of IBM X-Force, Dustin Heywood, shares essential tips for easy password management. And if you're into ethical hacking, listen to Dustin's advice on which tools, hardware baselines, technique variations, and intellectual abilities will give you the advantage you need to start cracking.Follow Dustin on Social! ~Twitter~LinkedIn Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Delinea LinkedIn

May 4, 202250 min

Counting Down the OWASP Top 10 List with Clint Kehr | The Cybrary Podcast Ep. 82

Ready to get hands-on with Cybrary's ten bite-sized OWASP Top 10 courses? Legendary instructor and penetration tester, Clint Kehr, shares what you can expect in his scenario-based training courses that prepare you to exploit real-world web application vulnerabilities. Hear what's new in the 2021 OWASP Top Ten List, including category revisions, position ranking adjustments, and a whole lot of freshly-mapped CWEs. Plus, learn how Clint and the CyDefe team worked to bring you custom lab exercises that challenge you to think like a pen tester. Enroll in all of Clint's phenomenal OWASP Top 10: 2021 courses! ~A01:2021 - Broken Access Control ~A02:2021 - Cryptographic Failures ~A03:2021 - Injection ~A04:2021 - Insecure Design ~A05:2021 - Security Misconfiguration ~A06:2021 - Vulnerable and Outdated Components ~A07:2021 - Identification and Authentication Failures ~A08:2021 - Software and Data Integrity Failures ~A09:2021 - Security Logging and Monitoring Failures ~A10:2021 - Server-Side Request Forgery (SSRF) Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Apr 27, 202247 min

Ep 52401 Access Denied Podcast Ep. 52 | Hacking the Penetration Test with FC (aka Freaky Clown)

In a world where cybersecurity is no longer just an IT issue, it is more important than ever to assess the human, technical, and physical security aspects of any organization. Bringing responsible awareness to this triad, FC (aka Freaky Clown) and his team at Cygenta are reimagining the role of penetration testing in fostering sustainable cyber resilience. Hear the tricks that FC has learned on the job while (ethically!) robbing banks to identify physical security weaknesses, enhancing the comprehensive value of pen tests, and developing cybersecurity training exercises for people of all ages.Learn more about FC's company! ~Cygenta Follow us on Social!!~Cybrary Twitter~Delinea Twitter~Instagram~Facebook~YouTube~Cybrary LinkedIn~Delinea LinkedIn

Apr 20, 202247 min

The Okta Breach and Cyber Risk Management with Cybrary CEO Kevin Hanes | The Cybrary Podcast Ep. 81

The Okta security breach has gained considerable attention since the company's public disclosure of the attack on March 22nd, 2022. As debates continue on the timeliness and effectiveness of the organization's response, we at Cybrary want to elevate the discourse on how to foster smart, sustainable, and empathetic approaches to cybersecurity risk management. On this episode of the Cybrary Podcast, listen to the thoughtful advice of Cybrary's CEO, Kevin Hanes, and Senior Director of Content, Will Carlson, as they discuss how all organizational stakeholders can align on incident response strategies. Follow Cybrary on Social!! ~Twitter ~Instagram ~FaceBook ~YouTube ~LinkedIn

Apr 1, 202256 min