PLAY PODCASTS
The ITSPmagazine Podcast

The ITSPmagazine Podcast

2,024 episodes — Page 33 of 41

Ep 1070From Hackathon To Hacked: Web3’s Security Journey | Chats On The Road | A Conversation With Nathan Hamiel | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

Web3 is a live experiment that is happening now. Around us. To us. By us. How will it affect privacy and security? Let's find out.In this conversation with Black Hat speaker, Nathan Hamiel, we explore the definition and promise of Web3 and its impact — positive and negative — on society.About the Session "From Hackathon to Hacked: Web3's Security Journey": If there's one prediction you can make with certainty, it's that security in the Web3/blockchain space will get a whole lot worse before it gets better. We have the perfect cocktail of inexperience mixed with emerging technology playing out in full public view with large sums at stake and the permanence of immutable transactions. The result is predictable. An environment free from constraints can seem like an innovation paradise, but when the stakes are so high, you have to get everything right the first time because there may not be a next time. We tend to forget that what we see from this space are experiments playing out in production, and the time between exploitation and losing millions of dollars worth of value can be measured in seconds. So, how did we get here? Is it all doom and gloom? What can be done?This talk is a grounded look at the factors contributing to the security failures we've witnessed, free from the hype and hatred associated with the space. We look at the similarities and differences between the development of this new technology and more traditional applications and how some of the attacks manifested. Better testing and tools aren't enough to solve the problem. We discuss actionable steps projects and chains can use today to address these issues and make the ecosystem safer for projects and users.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestNathan HamielSenior Director of Research at Kudelski Security [@KudelskiSec]On LinkedIn | https://www.linkedin.com/in/nathanhamiel/On Twitter | https://twitter.com/nathanhamiel____________________________This Episode’s SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesSession | From Hackathon to Hacked: Web3's Security Journey: https://www.blackhat.com/us-22/briefings/schedule/index.html#from-hackathon-to-hacked-webs-security-journey-26692Kudelski Security Research Blog: https://research.kudelskisecurity.com/____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?👉 https://itspm.ag/bhdc22spTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 6, 202233 min

Ep 1069A Conversation With Will Rush, CEO & Founder at Stack | The Founder Pack Podcast With Brendon Rod

As human beings usually get two to three recessions in our entire career. And so, what you do with them, I think can be incredibly powerful. They can be opportunities.Over the past twelve years, Will has worked with seven different billion-dollar banking and securities companies and today he shared with us his insights as a founder and how his company is navigating the current recession.Key topics:The RecessionRecession Strategy & AdviceRapid Fire Questions____________________________GuestWill RushCEO & Founder at StackOn LinkedIn | https://www.linkedin.com/in/will-rush/____________________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network____________________________Resources____________________________To see and hear more The Founder Pack Podcast content on ITSPmagazine, visit:https://www.itspmagazine.com/the-founder-pack-podcastJoin The FOUNDER Pack communityCommunity: www.thefounderpack.comNewsletter sign-up: https://brendonrod.substack.com/We’re stronger together. Keep connected with The Founder Pack podcast on Apple Podcasts, Spotify, Stitcher and Google Podcast.Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 5, 202230 min

Ep 1068A Conversation With Threat Hunter And Counter Intelligence Expert Randy Pargman | The Hacker Factory Podcast With Phillip Wylie

Randy shares his experience as an intern and how it made a big impact on his career and led to a 15 year FBI career, and later to the public sector working for Binary Defense._______________________GuestRandy PargmanVP of Threat Hunting & Counterintelligence at Binary Defense [@Binary_Defense]On Twitter | https://twitter.com/rpargmanOn LinkedIn | https://www.linkedin.com/in/randy-pargman-131b773/______________________HostPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________Resources______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 5, 202243 min

Ep 1067Why VRM Needs Customization | A Conversation With Jonathan Rau | Tech Done Different Podcast With Ted Harrington

As CISO of a cloud startup, Jonathan Rau fields tons of security questionnaires. He joins the show to explain the many struggles the vendors receiving such questionnaires face and what to do about it.You'll learn:why questionnaires need to be customizedwhy it's lazy to send the same questions to everyonewhy VRM is really about building trust, not just about answering questionsand more________________________________GuestJonathan RauCISO at Lightspin [@LightspinTech]On LinkedIn | https://www.linkedin.com/in/jonathan-r-2b2742112/________________________________HostTed HarringtonOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington________________________________This Episode’s Sponsors________________________________Resources________________________________For more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcastWatch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTQ79pdnWWvCuhWjyw9WGwiAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 5, 202225 min

Ep 1066Social Engineering Community Village At DEF CON 30 | Chats On The Road | A Conversation With Stephanie "snow" Carruthers | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

What's old is new again. With a fresh new pair of amazing co-founders, the social engineering community will come together to make some calls, have some laughs, and discuss the morals and ethics of getting someone to do something they wouldn't have otherwise done.In this Chats on the Road to Las Vegas, we have the privilege of chatting with the new Social Engineering Community Village at DEF CON, Stephanie "Snow" Carruthers. Join us to get the low-down on what's staying the same, what's new, and what's certain to be a fantastic time.About the Social Engineering Community VillageThe Social Engineering Community is formed by a group of individuals who have a passion to enable people of all ages and backgrounds interested in Social Engineering with a venue to learn, discuss, and practice this craft. We plan to use this opportunity at DEF CON to present a community space that offers those elements through panels, presentations, research opportunities, and contests in order to act as a catalyst to foster discussion, advance the craft and create a space for individuals to expand their network.Snow and JC plan to accomplish the above by bringing together passionate individuals to have a shared stake in building this community with the goal to continuously grow and iterate members of the Social Engineering Community in various roles to all have an opportunity to give back equally.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestStephanie "Snow" CarruthersCo-Founder of the new Social Engineering Community (SEC), a DEF CON village [@sec_defcon]On Twitter | https://twitter.com/_sn0ww____________________________This Episode’s SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesSocial Engineering Community Village DEF CON Schedule: https://www.se.community/village-schedule/Social Engineering Community Village website: https://www.se.community/On LinkedIn | https://www.linkedin.com/company/social-engineering-community/On YouTube | https://www.youtube.com/channel/UCFlepVHh7k5rBRTXwDrHyJAAt DEF CON: https://forum.defcon.org/node/240918____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?👉 https://itspm.ag/bhdc22spTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 4, 202226 min

Ep 1065Ransomware: To Pay Or Not To Pay, That Is The Question | A Conversation With Mark Lance | The National Blast With Keenan Skelly

Threat actors got 99 problems & PR, Crypto, and OFAC are just a few. On the flip side...same for the companies hit with ransomware.Hear what Mark thinks about bad guys, in-fighting, and ethical ransomware payments._______________________GuestMark LanceVice President, DFIR & Threat Intelligence at GuidePoint Security [@GuidePointSec]On LinkedIn | https://www.linkedin.com/in/mark-lance-9594234/On Twitter | https://twitter.com/cyberdefender43______________________HostKeenan SkellyOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/keenan-skelly______________________This Episode’s Sponsors______________________ResourcesPodcast | Ransomware Behind The Curtain — Sued And Accused | A Conversation With Tony Cook And Mark Lance | The National Blast With Keenan Skelly: https://itsprad.io/nationalblast-9______________________For more podcast stories from The National Blast Podcast with Keenan Skelly, visit: https://www.itspmagazine.com/the-national-blast-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 4, 202219 min

Ep 1064AppSec Village At DEF CON 30 | Chats On The Road | A Conversation With Chris Kubecka, Liora Herman, And Erez Yalon | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

Applications run the world. They provide an interface to the rest of the technologies and data we create, share, and make decisions with. Sometimes these interfaces come in the form of a user interface (UX), sometimes in the form of an API. In both cases, they offer a path to the systems and information we hold dear to us.In this Chats on the Road to DEF CON, we connect with the co-founders and organizers of the AppSec Village along with their keynote speaker at the village this year. This is a conversation about the real-world that you won't want to miss.About the AppSec VillageWelcome to AppSec Village, where red, blue and purple teamers, come together learn from the best of the best on how to exploit software vulnerabilities and how to secure software. Software is everywhere, and Application Security vulnerabilities are lurking around every corner making the software attack surface attractive for abuse. If you are just an AppSec n00b or launch deserialization attacks for fun and profit, you will find something to tickle your interest at the AppSec Village.Our mission is to promote diverse voices and perspectives in an inclusive environment driven for and by the appsec community to increase education and awareness of application security methods and practices.About Chris Kubecka's Keynote: Wartime AppSecTo understate things, the 2020s have been a challenging time for AppSec. First, Corona took the hardware out of the office for everyone. Now, with a war in Ukraine activating hacktivists, patriotic hackers, and nation-state level actors are wreaking havoc on our apps and websites. Cyber-attacks are targeting the code and products of allied nations, pro-Russian, and pro-sanction companies.Come on a journey with a hacker who will share the top ten geopolitical gotchas in your AppSec and real-world examples. Through her experiences in several cyber warfare incidents as well as her recent experiences in Ukraine, Romania, Moldova, and Transnistria.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestsChris KubeckaCEO at HypaSec NL [@HypaSec] and Keynote speaker at AppSec Village at DEF CON 30On LinkedIn | https://www.linkedin.com/in/chris-kubecka/On Twitter | https://twitter.com/SecEvangelismLiora HermanFounder and Queen of Details at AppSec Village [@AppSec_Village] and Head of Field and Channel Marketing, EMEA & APAC at Pentera [@penterasec]On LinkedIn | https://www.linkedin.com/in/liorarherman/On Twitter | https://twitter.com/tzionit411On Facebook | https://www.facebook.com/liorarhermanOn YouTube | https://www.youtube.com/c/AppSecVillage/Erez YalonFounder and Mayor at AppSec Village [@AppSec_Village] and VP of Security Research at Checkmarx [@Checkmarx]On LinkedIn | https://www.linkedin.com/in/erezyalon/On Twitter | https://twitter.com/ErezYalon____________________________This Episode’s SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesAppSec Village DEF CON Schedule: https://www.appsecvillage.com/events/dc-2022AppSec Village website: https://www.appsecvillage.com/On LinkedIn | https://linkedin.com/company/appsecvillageOn YouTube | https://www.youtube.com/c/AppSecVillage/At DEF CON: https://forum.defcon.org/node/240922____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?👉 https://itspm.ag/bhdc22spTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 4, 202226 min

Ep 1063The Relationship Between Roles — When Data Engineering Meets CyberSecurity | A Conversation With Saman Fatima | Redefining CyberSecurity Podcast With Sean Martin

When you combine a DevOps engineer with a data engineer that is also interested in cybersecurity and privacy, what does that relationship look like for the business? Let's find out.In today's episode, we catch up with DevOps engineer and data engineer, Saman Fatima. We dig into how her experience in a variety of engineering roles and her connections to the cybersecurity community help shape how she looks at and uses data to drive business outcomes.____________________________GuestsSaman FatimaManagement Lead and Vice-Chair of Board at BBWIC Foundation [@barriers_in]On LinkedIn | https://www.linkedin.com/in/saman-fatima-30/On Twitter | https://twitter.com/saman_3014____________________________This Episode’s SponsorsImperva: https://itspm.ag/imperva277117988Asgardeo by WSO2: https://itspm.ag/asgardeo-by-wso2-u8vc____________________________ResourcesTraining resource for Data Engineering: https://www.coursera.org/professional-certificates/ibm-data-engineerData Community: https://www.linkedin.com/company/dataworksforeveryone/Saman's Talk on "How to build a STRONG Data Driven Organization" at TECH)K)NOW DAY: https://www.youtube.com/watch?v=S2962uhQpaEBBWIC Foundation: https://www.bbwic.com/ (on LinkedIn: https://www.linkedin.com/company/bbwic-foundation/mycompany)____________________________To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 4, 202240 min

Ep 1062Blue Team Village At DEF CON 30 | Chats On The Road | A Conversation With muteki And OMENScan | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

Sometimes the best offense is a good defense. The Blue Team Village aims to bring an amazing experience to DEF CON where the community joins together to hack the defensive side of security: mindset, techniques, tools, mentoring, and more.About the Blue Team VillageBlue Team Village (our friends just call us BTV) is both a place and a community built for and by defenders. It’s a place to gather, talk, share, and learn from each other about the latest tools, technologies, and tactics that our community can use to detect attackers and prevent them from achieving their goals. Whether we are in the same physical space, or in the ether, BTV is a place for encouraging, teaching, and supporting Blue Teamers.We will have plenty of defender focused sessions held throughout the year. Don’t forget to hang out in the Discord channels to ask questions, catch up with old friends, and meet new ones.BTV promises to be a firehose of Blue Team learning, sharing, and fun for the defenders who build things, defend things, and innovate. Come celebrate the other side of the hacking mirror with us. We’ll keep a blue light on for you!Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestsCassandra Young (muteki)Director at the Blue Team Village [@BlueTeamVillage]On LinkedIn | https://www.linkedin.com/in/cassandrayOn Twitter | https://twitter.com/muteki_rtwOn YouTube | https://www.youtube.com/blueteamvillageDavid Porco (Quix0te/OMENScan)Director at the Blue Team Village [@BlueTeamVillage]On LinkedIn | https://www.linkedin.com/in/dporco/On Twitter | https://twitter.com/OMENScan____________________________This Episode’s SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesBlue Team Village DEF CON Schedule: https://dc30.blueteamvillage.org/call-for-content-2022/schedule/#Blue Team Village website: https://blueteamvillage.org/On LinkedIn | https://www.linkedin.com/company/the-blue-team-village/At DEF CON: https://forum.defcon.org/node/239819____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?👉 https://itspm.ag/bhdc22spTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 3, 202237 min

Ep 1061Branding To Create The Future You Want With TV’s Ken Underhill | 2 Cyber Chicks Podcast With Erika McDuffie And Jax Scott

Ken Underhill’s CyberLife.Tv is the ONLY Cybersecurity television show out there. This impressive television personality has been featured in Forbes, Reader's Digest, Medium, Tech Republic, Fox, NBC, Dark Reading, Voyage Houston Magazine, MSN Money, and many more places.Ken shares the history behind his television debut, the secret to successful branding, the circle of focus, and plenty of tips and tricks along the way!Ken’s background ranges from pediatric nursing to the IT side of the house.. He has a master of science in Cybersecurity and Information Assurance. He holds board seats and advisory roles for several organizations. His TV show streams on over 100 platforms and averages over $2 million viewers per month.__________________________GuestKen UnderhillCEO, Executive Producer, Television Show Host at Cyber LifeOn LinkedIn | https://www.linkedin.com/in/kenunderhill/On YouTube | https://www.youtube.com/c/CyberLifeTVHostsJax ScottOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jaclyn-jax-scottErika McDuffieOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/erika-mcduffie__________________________Sponsors__________________________ResourcesCyberLife TV Website: https://www.bingenetworks.tv/channel/cyber-life-14846__________________________For more podcast stories from 2 Cyber Chicks with Erika McDuffie and Jax Scott, visit: 👉 https://www.itspmagazine.com/2-cyber-chicks-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 3, 202226 min

Ep 1060ICS Village At DEF CON 30 | Chats On The Road | A Conversation With Bryson Bort And Tom VanNorman | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

The ICS Village is one of the first DEF CON villages we ever connected with. A lot has changed over the years, including the threats faced by critical infrastructure entities around the world. Let's find out what to expect at this year's village.About the ICS VillageHigh profile industrial control system (ICS) security issues have grabbed headlines and sparked change throughout the global supply chain. The ICS Village allows defenders of any experience level to understand the unique failure modes of these systems and how to better prepare and respond to the changing threat landscape.Interactive simulated ICS environments, such as Hack the Plan(e)t and Howdy Neighbor, provide safe yet realistic environments to preserve safe, secure, and reliable operations. The ICS Village brings a compelling experience for all experience levels and types, with IT and industrial equipment. Our interactive learning approach invites you to get hands on with the equipment to build your skills.We bring you real components such as programmable logic controllers (PLC), human-machine interfaces (HMI), remote telemetry units (RTU), and actuators to simulate a realistic environment by using commonly used components throughout different industrial sectors. You will be able to connect your machine to the different industrial components and networks and try to assess these ICS devices with common security scanners to sniff the industrial traffic, and more!Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestsBryson BortCo-Founder of the ICS Village [@ICS_Village]On LinkedIn | https://www.linkedin.com/brysonbortOn Twitter | https://mobile.twitter.com/brysonbortOn YouTube | https://youtube.com/c/ICSVillageTom VanNormanFounding member of the ICS VillageOn LinkedIn | https://www.linkedin.com/in/thomasvannorman/On Twitter | https://twitter.com/Tom_VanNorman____________________________This Episode’s SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesICS Village Website: https://www.icsvillage.com/ICS Village at DEF CON 30 Schedule: https://www.icsvillage.com/schedule-def-con-30ICS Village 360 Tour: https://www.exhibitstudiosmedia.com/tours/21396_ics_360_tour/____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?👉 https://itspm.ag/bhdc22spTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 3, 202236 min

Ep 1059Book | The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War | A Conversation With Investigative Reporter And Author, Geoff White | Audio Signals Podcast With Marco Ciappelli & Sean Martin

The Lazarus Heist – From Hollywood to High Finance: Inside North Korea’s Global Cyber War, is a book that sprang from the hit 10-part BBC podcast series of the same name, which our guest today, Geoff White, co-hosted and which immediately ranked number one in the UK Apple chart and within the top 7 in the US. Season 2 of the podcast will be out in late 2022.About The Lazarus HeistMeet the Lazarus Group, a shadowy cabal of hackers accused of working on behalf of the North Korean state. It's claimed that they form one of the most dangerous criminal enterprises on the planet, having stolen more than $1bn in an international crime spree. Their targets allegedly include central banks, Hollywood film studios and even the British National Health Service. North Korea denies the allegations, saying the accusations are American attempts to tarnish its image.In this staggering, global investigation, award-winning journalist Geoff White examines how the hackers have harnessed cutting-edge technology to launch a decade-long campaign of brazen and merciless raids on its richer, more powerful adversaries. It's not just money they're after. The Lazarus Group's tactics have been used to threaten democracies, gag North Korea's critics and destabilize global peace.From the bustling streets of Dhaka, to the glamorous studios of Hollywood, to the glittering casinos of Macau and the secretive dynastic court of Pyongyang, this shocking story uncovers the secret world of the Lazarus Group, their victims and the people who have tried - and ultimately, so far failed - to stop them._____________________________GuestGeoff WhiteAuthor, speaker, investigative journalist and podcast creator who has worked for the BBC [@BBC], Audible [@audible_com], Penguin [@penguinrandom], Sky News [@SkyNews], The Sunday Times [@thetimes] and many moreOn Twitter | https://twitter.com/geoffwhite247On LinkedIn | https://www.linkedin.com/in/geoffwhite247/On YouTube | https://www.youtube.com/user/c4newstechnology_____________________________This Episode’s SponsorsBlue Lava: https://itspm.ag/blue-lava-w2qs_____________________________ResourcesBook | The Lazarus Heist – From Hollywood to High Finance: Inside North Korea’s Global Cyber War: https://www.penguin.co.uk/books/447/447163/the-lazarus-heist/9780241554258.htmlBook | Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global: https://www.amazon.com/Crime-Dot-Com-Viruses-Rigging/dp/1789142857MITRE ATT&CK Entry for The Lazarus Group: https://attack.mitre.org/groups/G0032/Article: https://www.nccgroup.com/us/the-lazarus-group-north-korean-scourge-for-10-years/Previous Episode: https://itspmagazine.simplecast.com/episodes/the-hacker-journalist-dance-the-need-for-trust-transparency-and-storytelling-in-cybersecurity-a-conversation-with-geoff-white-and-jake-williams_____________________________For more podcast stories from Audio Signals: https://www.itspmagazine.com/audio-signalsFor more about Black Hat and DEF CON in our event coverage podcasts, visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 2, 202238 min

Ep 1058AI-Written Code | New CIO Strategies To Address The Global Developer Shortage | A Conversation With Mathew Lodge | Redefining Technology Podcast With Sean Martin & Marco Ciappelli

One of the key challenges organizations face is the lack of technical talent to help the business keep up to speed from a digital perspective. One possible way to help with the digital transformation process is to leverage AI to help write some of the code.Inspired by a LinkedIn post and an article covering this topic, we connect with Mathew Lodge to explore the possibilities — and the boundaries — of AI-written code.______________________________GuestMathew LodgeCEO at Diffblue [@diffbluehq]On LinkedIn | https://linkedin.com/in/mathewOn Twitter | https://twitter.com/mathewlodgeOn YouTube | https://www.youtube.com/channel/UCr5NPniP9toBlaVluUo52tg/______________________________ResourcesHow CIOs can deal with the developer shortage: https://www.linkedin.com/posts/activity-6947174944417959936-3oUH/Software testing is tedious: AI can help: https://hbr.org/2021/02/software-testing-is-tedious-ai-can-helpNew CIO strategies to address the global developer shortage: https://thenewstack.io/new-cio-strategies-to-address-the-global-developer-shortage/Software Ate The World and Soon It Will Write Itself: https://webreprints.djreprints.com/5176990571960.html______________________________This Episode’s SponsorsBlueLava ✨ https://itspm.ag/blue-lava-w2qsDevo ✨ https://itspm.ag/itspdvwebAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/advertise-on-itspmagazine-podcast______________________________To see and hear more Redefining Technology stories on ITSPmagazine, visit:🎙✨ https://www.itspmagazine.com/redefining-technology Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Aug 1, 202239 min

Ep 1057Can We Really Take Back Our Data With Web 3? Let’s Start With Understanding What It Is And How Can Change Online Businesses And Our Internet Experience | A Conversation With Connor Borrego | Redefining Society Podcast With Marco Ciappelli

1, 2, 3 … NFT… and WEB .3 For those of you that are still figuring out WEB .2, it may be time to skip ahead and envision an internet where users can regain the ownership of their data — and identity too? Can we really? Let’s start with the basics: what is web .3?In the podcast, Sean joins Marco, and they ask A TON of questions to Connor Borrego, a web3 nerd who wants to help users reclaim ownership of their digital identity.He got us thinking that maybe a better internet is in reach and wondering about what that could look and feel like.About ConnorHe believes... that in spite of religious, cultural, political, professional, et al. divides that we have in theses systems of life, we are just different reflections of the same core truth. The Connor Borrego that clings to tradition and likes stability is his web2 side, while his passionate drive to constantly learn and grow is a reflection of his web3 side.Resistance to change is natural, but change is an absolute. forgetting this keeps us locked in hell.____________________________GuestConnor BorregoOn LinkedIn | https://www.linkedin.com/in/connorborrego/On Twitter | https://mobile.twitter.com/3lpr0fOn TikTok | https://www.tiktok.com/@3lpr0f____________________________Resources ____________________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcwebBlackCloak 👉 https://itspm.ag/itspbcweb____________________________To see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/advertise-on-itspmagazine-podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 30, 202248 min

Ep 1056Trying To Be Everything To Everyone: Let’s Talk About Burnout | A Conversation With Stacy Thayer | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

The industry recognizes there is a problem with staff being overworked and reaching a point of burnout. What is the definition of burnout, and how can we spot the signs? Perhaps we need to look at this from a different angle to begin to make some progress in this area.In this conversation with Black Hat speaker, Dr Stacy Thayer, we explore the history, definition, and progress we are making as we attempt to deal with burnout and the overarching challenges of employee experience.About the session, "Trying to Be Everything to Everyone: Let’s Talk About Burnout"Research shows computer security professionals describe the computer security industry as a high-risk yet high-reward profession with negative effects on the workforce. There is an estimated 805,000 computer security professionals working in the US, but meeting the business demand for computer security professionals would require 62% industry growth. This leaves those in the field understaffed and highly stressed, ultimately leading to burnout. Stress and burnout can lead to mental fatigue, which can negatively impact motivation and engagement. It can also cause diminishing focus and performance levels, and have a negative impact on operational security, satisfaction, and performance, both in the office and at home. This talk will discuss the existing research on burnout in the computer security industry and will discuss what really causes burnout, why it happens, and what you can do to mitigate it, including setting healthy boundaries, avoiding guilt, realistic ways to manage anxiety, and honest self-talk so you can identify what is needed to refill your energy and passion.I will discuss how to recognize burnout in hidden places and explore the root causes of it.I will address what to do about it – going beyond simply meditation, exercise, and healthy eating. If it was that easy, we would all be doing that. This talk is unique in that it will utilize a knowledge of practical psychology to keep it real and use behavioral change models as a guide for reducing burnout. How do you find motivation, appreciation, and time for yourself when it feels like the world around you is demanding you give more? You will leave this talk with a better understanding of how burnout happens, your personal relationship to burnout, and an idea of what to do to help reduce, relieve, and manage it.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestStacy ThayerPh.D, Clinical and Organizational/Business Psychology, Norfolk State University [@Norfolkstate]On LinkedIn | https://www.linkedin.com/in/stacythayer/On Twitter | https://twitter.com/DrStacyThayer____________________________This Episode’s SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesSession | Trying to Be Everything to Everyone: Let’s Talk About Burnout: https://www.blackhat.com/us-22/briefings/schedule/#trying-to-be-everything-to-everyone-lets-talk-about-burnout-28230____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?👉 https://itspm.ag/bhdc22spTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 29, 202243 min

Ep 1055From Software Developer To Penetration Tester | A Conversation With Rob Ragan | The Hacker Factory Podcast With Phillip Wylie

Rob's interest in hacking started with 2600 Magazine and 2600 Groups. This fueled his curiosity and passion for technology and security.Rob started his career as a software developer but more he learned about security and pentesting, he was drawn to that passion and became a consulting providing pentesting services for clients._______________________GuestRob RaganPrincipal Security Researcher at Bishop Fox [@bishopfox]On Twitter | https://twitter.com/sweepthatlegOn LinkedIn | https://www.linkedin.com/in/robragan/______________________HostPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________Resources______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 29, 202244 min

Ep 1054A Fully Trained Jedi You Are Not | A Conversation With Adam Shostack | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

While many in the InfoSec industry try to be all things to all people, sometimes that just isn't a winning strategy? What is? Let's have a chat with Adam Shostack to find out.About the session, "A Fully Trained Jedi, You Are Not"As software organizations try to bring security earlier in the development processes, what can or should regular software or operations engineers know about security? Taking as given that we want them to build secure systems, that demands a shared understanding of the security issues that might come up, and agreement on what that body of knowledge might entail. Without this knowledge, they'll keep building insecure systems. With them, we can have fewer recurring problems that are trivially attackable.Training everyone at a firm is expensive. Even if the training content is free, people's time is not. If you have 1,000 people, one hour per person is half a person year (before any overhead). So there is enormous pressure to keep it quick, ensure it meets compliance standards like PCI, and … the actual knowledge we should be conveying is almost an afterthought. We need to design knowledge scaffolding and tiered approaches to learning, and this talk offers a structure and tools to get there.We don't need every developer to be a fully trained Jedi, and we don't have time to train everyone to that level or even as much as we train security champs. So what could we ask everyone to know, and how do we determine what meets that bar?Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestAdam ShostackPresident at Shostack & AssociatesOn LinkedIn | https://www.linkedin.com/in/shostack/On Twitter | https://twitter.com/adamshostack____________________________This Episode’s SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesSession | A Fully Trained Jedi, You Are Not: https://www.blackhat.com/us-22/briefings/schedule/#a-fully-trained-jedi-you-are-not-26650____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?👉 https://itspm.ag/bhdc22spTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 28, 202240 min

Ep 1053A Conversation With Jessica Robinson @jessrobin96 | Securing Bridges Podcast With Alyssa Miller | Episode 18

Today's guest is Jessica Robinson. She and Alyssa talked about Consciously Secure Living and her origin story in launching PurePoint International.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestJessica RobinsonFounder at PurePoint InternationalOn LinkedIn | https://www.linkedin.com/in/jessica-a-robinson-she-her-22740311/On Twitter | https://twitter.com/jessrobin96________________________________HostAlyssa MillerOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alyssa-miller________________________________This Episode’s Sponsors________________________________Resources________________________________Watch the live stream webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllQyN9-nfFOIp711q65pTsSQFor more podcast stories from Securing Bridges Podcast With Alyssa Miller: https://www.itspmagazine.com/securing-bridges-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/advertise-on-itspmagazine-podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 28, 202240 min

Ep 1052Open Threat Hunting Framework: Enabling Orgs To Build, Operationalize, And Scale Threat | A Conversation With John Dwyer | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

Threat hunting is all the rage. But what the heck is it? "Ask 10 InfoSec professionals to define threat hunting, and you'll get 11 different answers," writes John Dwyer in his Black Hat session abstract. Will we get to hear the 12th definition in this episode?About the session, "The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting""Ask 10 infosec professionals to define threat hunting and you'll get 11 different answers." Threat hunting is one of those interesting components of cybersecurity where everyone knows they should be doing it but not everyone can fully articulate what threat hunting is.In our roles as threat hunters, we're lucky enough to be witness to, and evaluate, the hunt programs of Fortune 100 companies, state and national governments, and partners and MSPs. This experience has shown us that one person's definition of threat hunting does not necessarily equal another's.If you do an Internet search for "how to build a threat hunting program" there are plenty of results and some include great insights into what makes a threat hunting program effective. However, while resources do exist, they're often tied to a specific vendor or a particular product and the best way to hunt using it. There's useful information, but you're left trying to find a way to make the proposed processes and techniques work for your environment and not the one driven by the vendor."If you don't like the road you're walking, start paving another one." It's with that in mind that we're releasing a threat hunting framework that can help organizations start a threat hunting program as well as improve threat hunting operations for existing programs that's free and not tied to any particular technology.This framework will enable organizations to take control of building a threat hunting program by providing a clear path to operationalizing threat hunting as well as a well-defined threat hunting process to ensure threat hunters are set up for success.We've responded to far too many incidents that could have been prevented with solid threat hunting operations and we hope this project can help prevent future incidents.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestJohn DwyerHead of Research at IBM X-Force [@IBM | @XForceIR | @IBMSecurity]On LinkedIn | https://www.linkedin.com/in/john-dwyer-xforce/On Twitter | https://twitter.com/TactiKoolSec____________________________This Episode’s SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesSession | The Open Threat Hunting Framework: Enabling Organizations to Build, Operationalize, and Scale Threat Hunting: https://www.blackhat.com/us-22/briefings/schedule/#the-open-threat-hunting-framework-enabling-organizations-to-build-operationalize-and-scale-threat-hunting-26702____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?👉 https://itspm.ag/bhdc22spTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 28, 202237 min

Ep 1051Mind Traveling and Mindfulness. The Universal Language And Power Of Music | A Conversation With Murray Hidary | Audio Signals Podcast With Marco Ciappelli & Sean Martin

"Music encompasses our primal yet aspirational desires. It satisfies our most profound needs while raising us to our highest sense of self." - Murray Hidary, MindTravel CreatorMindTravel is an immersive musical experience that takes place in iconic theaters and beautiful outdoor spaces such as Central Park and Santa Monica Beach. Created by composer and entrepreneur Murray Hidary, MindTravel features gorgeous and provocative avant-garde real-time piano compositions, spontaneously improvised, infused with wisdom traditions, theoretical physics and the power of communal elevation.WHAT PEOPLE ARE SAYING"MindTravel is an experience like no other. Imagine a concert pianist improvising beautiful, peaceful music with imagery in the background that matches the beauty of the music — combined, it is almost meditative or trance-like." - Jason Wachob, Founder of mindbodygreen"MindTravel is an amazing introduction to meditation as it takes the Traveler on a specific journey. It is also perfect for the experienced meditator as a way to enhance and deepen one’s own practice. In short, MindTravel is for anyone!” - Sara Ivanhoe, MA Yoga PhilosophyThe mission of the MindTravel Foundation is to move people to purpose through music. Founded by composer and musician Murray Hidary, the foundation creates healing, transformative music experiences for underserved and at-risk populations including seniors, youth, homeless, police, and veterans.The MindTravel Foundation: MissionThe mission of the MindTravel Foundation is to move people to purpose through music. Founded by composer and musician Murray Hidary, the foundation creates healing and transformative music experiences for underserved and at-risk populations including seniors, youth, homeless, police, and veterans. In 2020, the MindTravel Foundation will focus on experiences specially supporting people dealing with grief and trauma._____________________________GuestMurray HidaryComposer, Pianist, Abstract Photographer, & Creator of Mind Travel MusicOn Twitter | https://www.twitter.com/murrayhidaryOn Facebook | https://www.facebook.com/hidaryOn YouTube | https://www.youtube.com/channel/UCwVLtkJu9rvyUDBBUXW5z3g_____________________________This Episode’s SponsorsBlue Lava: https://itspm.ag/blue-lava-w2qs_____________________________Resourceshttps://www.mindtravel.com/foundation_____________________________For more podcast stories from Audio Signals: https://www.itspmagazine.com/audio-signalsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 28, 202245 min

Ep 1050Going Interstellar: The Alcubierre Warp Drive | Guest: Dr Harold "Sonny" White | Stories From Space Podcast With Matthew S Williams

For generations, people have dreamed of a future where faster-than-light (FTL) travel is possible. Unfortunately, conventional physics tells us that it can't be done.For years, Dr. Harold "Sonny" White worked at NASA Eagleworks to develop the Alcubierre Warp Drive, a concept that relies on "exotic" physics to allow for FTL travel.Through the Limitless Space Institute, Dr. White and his colleagues continue to work on the warp drive and other advanced propulsion methods to achieve the dream of "Going Faster!"_______________________GuestsDr. Harold "Sonny" WhiteDirector of Advanced Research and Development, Limitless Space Institute [@explorelsi]On LinkedIn | https://www.linkedin.com/in/harold-white-6049518/On Facebook | https://www.facebook.com/limitlessspaceinstitute_______________________HostMatthew S WilliamsOn ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams______________________This Episode’s Sponsors______________________ResourcesLimitless Space Institute: https://www.limitlessspace.org/Fraser Cain - Advanced Propulsion Systems with Dr. Sonny White: https://www.youtube.com/watch?v=MDURVz31N1k______________________For more podcast Stories from Space with Matthew S Williams, visit: https://itspmagazine.com/stories-from-space-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/advertise-on-itspmagazine-podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 27, 202227 min

Ep 1049Meet The Raíces Cyber Org | A Conversation Featuring Eric Belardo And Yvonne Rivera | The Changemaking Podcast With Chloé Messdaghi

Encouraging and supporting the Hispanic and Latino Cyber and Technology Community to Achieve Greater Representation.Learn about The Raíces Cyber Org's upcoming events, career resources, community support, and education resources.______________________________GuestsEric BelardoFounder of Raíces Cyber Org [@RaicesCyberOrg]On Twitter | https://twitter.com/ebelardo73On LinkedIn | https://www.linkedin.com/in/ebelardo/Yvonne RiveraDeputy Executive Director at Raíces Cyber Org [@RaicesCyberOrg]On Twitter | https://twitter.com/CyberMyteOn LinkedIn | https://linkedin.com/in/yvonne-rivera-cissp-issep-cism-25862378______________________________HostChloé MessdaghiOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/chloe-messdaghi______________________________This Episode’s Sponsors ______________________________ResourcesRaíces Cyber Org: https://www.raicescyber.org/On LinkedIn | https://www.linkedin.com/company/raicescyberorg______________________________For more podcast stories from The Changemaking Podcast With Chloé Messdaghi: https://www.itspmagazine.com/the-changemaking-podcast______________________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/advertise-on-itspmagazine-podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 27, 202225 min

Ep 1048Empowered Women, Empower Women | A Conversation With Jessly And Christine | Part 1 Of 2 | Living And Breathing Technology Podcast With Amina Aggarwal

From Nice Job to Dream Job. From Nanny to Becoming a Security Analyst. It takes courage, dedication, and motivation to change careers. This episode is sure going to inspire you and motivate you to never give up on your dreams.In this episode I speak to Jessly Altamirano about her journey, passion, and interests. She talks about her hometown in Nicaragua and how her upbringing influenced her career choices.She was determined to change the biases of people who still think that lifting heavy computers is still a male's job and challenges them by equally shouldering the responsibilities. She talks about the challenges that she faced from:Moving to a new placeUncertainty of getting a jobComing out of the comfort zoneWorking and studying at the same timeShe was introduced to cybersecurity while working as a full-time nanny by an amazing woman. Stay tuned, as she will be joining us in the part one of this two-part episode.____________________________GuestsJessly AltamiranoSecurity Analyst at AppFolio [@AppFolio]On LinkedIn | https://www.linkedin.com/in/jessly-a/Christine WillseySecurity Program Manager at IBM [@IBM | @IBMSecurity]On LinkedIn | https://www.linkedin.com/in/christinewillseyHostAmina AggarwalOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/amina-aggarwal____________________________This Episode’s SponsorsIf you’d like to sponsor this or any other podcast episode on the ITSPmagazine Podcast Network, you can learn more here: https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network____________________________Resources____________________________For more Living And Breathing Technology Podcast stories visit: https://www.itspmagazine.com/living-and-breathing-technology-podcastAre you interested in sponsoring an ITSPmagazine Channel?https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 27, 202221 min

Ep 1047Remove Friction | A Conversation With Josh Twist | Tech Done Different Podcast With Ted Harrington

What happens when you remove friction? Better yet, what happens when you focus on small, incremental gains that compound on each other rather than aiming for big massive wins?On this episode, we are joined by ex-Facebook & ex-Microsoft tech leader Josh Twist to dig into these topics and more.You'll learn:why small wins are better than big winswhy it's mission critical to make things easywhy UX doesn't win deals (but it does earn advocacy)why feature growth can kill (rather than help) a product________________________________GuestJosh TwistCo-Founder & CEO at Zuplo [@zuplo]On LinkedIn | https://linkedin.com/in/joshtwistOn Twitter | https://twitter.com/joshtwist________________________________HostTed HarringtonOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington________________________________This Episode’s SponsorsCrowdSec 👉 https://itspm.ag/crowdsec-b1vp________________________________Resources________________________________For more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcastWatch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTQ79pdnWWvCuhWjyw9WGwiAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 25, 202226 min

Ep 1046A Keynote Conversation With Chris Krebs: Black Hat At 25: Where Do We Go From Here? | Black Hat 2022 And DEF CON 30 Las Vegas Event Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

During his keynote at Black Hat 2022, former CISA Director, Chris Krebs, will reflect on 25 years of the information security community, discussing today’s risks and trends and what they mean for tomorrow’s network defenders. We get a sneak peek into some of these items during this Chats on the Road to Las Vegas.Chris Krebs is a Founding Partner of Krebs Stamos Group, founded in 2020 alongside Alex Stamos. He was the first director of U.S. Cybersecurity and Infrastructure Security Agency (CISA), leading the nation’s civilian cyber defense and business resilience and risk management efforts. He will give his talk “Black at 25: Where Do We Go from Here?” on Wednesday, Aug. 10 at 9 a.m.About the keynote, "Black Hat at 25: Where Do We Go from Here?"For twenty-five years, the InfoSec community and industry have been gathering here in the desert. For twenty-five years, we have chipped away at underlying insecurities in the technologies we use every day with new vulnerability research and adversary insights. For twenty-five years we’ve seen vendors and software firms roll out new products and protections. With the last twenty-five years as prologue and as we look forward to the next twenty-five years, we have to ask ourselves: are we on the right track?We certainly aren’t set up for success, given society’s insatiable and almost pathological need to connect everything. We’re constantly serving up more attack surface to the bad guys and always cleaning up after business decisions that we know will drive bad security outcomes. All the while factors out of our hands – namely global market realities and shifting geopolitical dynamics – wreck nearly overnight carefully orchestrated business plans and national strategies. The last few years of geopolitical chaos and autocratic retrenchment might look like the good ol’ days by the end of the 2020s.This talk will work through today’s risk trends and what they mean for tomorrow’s network defenders, suggesting along the way the needed shifts in both mindset and action to successfully deliver better outcomes while recognizing that we’re going to be forever operating in a contested information environment. To rip off a Mitch Hedberg joke (RIP), maybe over the next twenty-five years we can build a safer, more resilient technological future where systems and infrastructure behave more like escalators: when they break, they turn into stairs.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestChris KrebsFounding Partner, Krebs Stamos Group [@KrebsStamos]On LinkedIn | https://www.linkedin.com/in/christopherckrebs/On Twitter | https://twitter.com/C_C_Krebs____________________________This Episode’s SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________ResourcesKeynote | Black Hat at 25: Where Do We Go from Here?https://www.blackhat.com/us-22/briefings/schedule/index.html#keynote-chris-krebs-28699____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?👉 https://itspm.ag/bhdc22spTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 25, 202242 min

Ep 1045From Tank Driver To Active Directory Security Expert | A Conversation With Darryl Baker | The Hacker Factory Podcast With Phillip Wylie

Darryl started his journey in the US Army as a tank driver, pistol instructor, and pathfinder, and then discovered information systems which would be a pivotal moment in his role.Darryl's extensive IT experience and Active Directory expertise would lead him to a role in cybersecurity as an Active Directory Security expert. In this episode Darryl shares how the technology needs to be understood before you can truly understand how to secure it or test its security._______________________GuestDarryl BakerSecurity Consultant at Trimarc [@TrimarcSecurity]On Twitter | https://twitter.com/DFIRdeferredOn LinkedIn | https://www.linkedin.com/in/dbaker-cissp-ceh/______________________HostPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________Resources______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 22, 202247 min

Ep 1044A Conversation With Chuck Brooks @ChuckDBrooks | Securing Bridges Podcast With Alyssa Miller | Episode 17

The state of enterprise and ICS cybersecurity across the public, private, and academia sectors; how to successfully share more information with each other, and so much more ... all on this week's episode with Chuck Brooks.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestChuck BrooksAdjunct Professor at Georgetown University’s Graduate Applied Intelligence Program [@GeorgetownSCS]On LinkedIn | https://www.linkedin.com/in/chuckbrooks/On Twitter | https://twitter.com/ChuckDBrooks________________________________HostAlyssa MillerOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alyssa-miller________________________________This Episode’s Sponsors________________________________Resources________________________________Watch the live stream webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllQyN9-nfFOIp711q65pTsSQFor more podcast stories from Securing Bridges Podcast With Alyssa Miller: https://www.itspmagazine.com/securing-bridges-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 21, 202237 min

Ep 1045Report | Quantifying The Business Need For Digital Executive Protection | A BlackCloak Brand Story With Chris Pierson

It's usually the sum of the parts that paint the best picture and tell the best story. So what does the net sum game of the most recent report from BlackCloak tell us about the so-called gap between the work and personal lives of the executive?Sometimes, it's necessary to connect the dots to answer the questions we have. Sometimes we need to connect the dots to create the questions we need to be asking. In this episode, our guest, Dr. Chris Pierson, takes us through the results of their most recent report, Quantifying The Business Need For Digital Executive Protection, helping to make the connection between how threats and vulnerabilities originating in the personal digital lives of the corporate executive, Board Member, and high-profile employee add new risks to your organization that can lead to lost revenue, decreased productivity, disruption of business continuity and more.About the reportThe attack surface has expanded. The soft-underbelly of enterprise security is now the personal digital lives—the digital privacy, personal devices and home networks— of your executives, board members, and high-profile employees with access to finances, confidential information, and proprietary data.As protected as your company’s leaders are when inside the organization’s four walls, as soon as they head home or switch to working on their personal devices, home networks, or personal email accounts, the security team loses control, and both the individual and the company become exponentially more vulnerable.This report quantifies the personal digital privacy and cybersecurity risks to your executives and other high-value employees in their personal lives. It examines the specific threats posed to them as individuals and to the organization, while also highlighting potential business impacts of concern.Get ready for some number sharing. Prepare yourself for some storytelling. Brace yourself for the findings you may or may not have expected.Note: This story contains promotional content. Learn more.GuestChris PiersonOn Linkedin 👉 https://www.linkedin.com/in/drchristopherpierson/On Twitter 👉 https://twitter.com/drchrispiersonResourcesLearn more about BlackCloak and their offering: https://itspm.ag/itspbcwebDownload a copy of the BlackCloak Quantifying The Business Need For Digital Executive Protection Report here: https://itspm.ag/blackccyq6Are you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 21, 202230 min

Ep 1043Why The World Needs A Global CSIRT: Introducing CSIRT.global | A Conversation With Eward Driehuis And Lennaert Oudshoorn | Redefining CyberSecurity Podcast With Sean Martin

Vulnerabilities are discovered every day. Once found, they make their way into any number of databases that can be used to help organizations take action to put a patch in place... if one is available. But what about the case where the weakness is actively exposed or being exploited? This is where CSIRT.global comes in.Born from the work being done at the Dutch International for Vulnerability Disclosure (DIVD), a team of volunteers have decided to take things to the next level, helping organizations take action when action matters most ... when a vulnerability exists, when that vulnerability is being exploited in the wild, and when an organization is prone to (or is under) attack. That's when the email is sent from CSITR.global to the affected organization, letting them know what the team uncovered."We don't send marketing emails. We don't send emails promoting conferences. When a company gets an email from us, it really means something.” ~EwardThere's a lot going on in this process, from scanning the entire global Internet for every system exposed, identifying vulnerabilities on those systems, and mapping the proof of concept to those two results to determine whether or not an organization is vulnerable or is showing signs of having been compromised. The next piece of the puzzle is figuring out who or what is behind the IP address that was scanned and flagged. This isn't always easy given how IP addresses are assigned and looked up. The next piece of the puzzle is even harder, in that CSIRT.global needs to find a way to contact the affected entity that lives behind the IP address ... which department or person should receive the info and what is their email address? Good luck finding that in a pinch. And, to top it all off, the receiving party needs to trust that the email they received from CSIRT.gloal is both legitimate and must be taken seriously. The process is rooted in information and built on trust - which is one of the main reasons they sought and receive support from the Dutch government.It's this full circle scenario that delivers the real value provided by this group. It can scale to a global nature, but requires the help of the global community. Listen in to hear more about how this works, how to get involved, and how this non-profit organization is redefining cybersecurity.____________________________GuestsEward DriehuisFounder at 3Eyes Security and Chairman at CSIRT.globalOn LinkedIn | https://www.linkedin.com/in/ewarddriehuis/On Twitter | https://twitter.com/e3huisLennaert OudshoornCSIRT Coordinator And Webmaster at Dutch Institute for Vulnerability Disclosure (DIVD) [@DIVDnl]On Twitter | https://twitter.com/lennaert89On LinkedIn | https://www.linkedin.com/in/lennaertoudshoorn/____________________________This Episode’s SponsorsAsgardeo by WSO2: https://itspm.ag/asgardeo-by-wso2-u8vcHITRUST: https://itspm.ag/itsphitweb____________________________ResourcesCSIRT.global: https://csirt.global/ & https://www.divd.nl/DIVD: https://www.divd.nl/ and on LinkedIn: https://www.linkedin.com/company/divd-nl/May Contain Hackers (MCH2022) Hacker Conference: https://mch2022.org/#/____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 21, 202242 min

Ep 1042From Medical Genetics To Infrastructure And Cloud Security With Keynote Speaker And Thought Leader, Dr. Wendy | 2 Cyber Chicks Podcast With Erika McDuffie And Jax Scott

Dr. Wendy joins Jax and Erika to discuss her transition into the Cybersecurity industry, while sharing hot tips and tricks for our listeners. After earning her Ph.D. in medical genetics from Oxford University, she leveraged her analytics expertise and established a background in infrastructure and cloud security.Dr. Wendy’s impressive experience ranges from aerospace, healthcare, financial services, consulting, telecommunications, transport logistics, and national infrastructure. In this chat, she provides valuable feedback on entering the industry, establishing credibility through thought leadership, and getting more speaking engagements under your belt.__________________________GuestDr. Wendy NgPrincipal Cloud Security Architect at OneWeb [@OpenWebHQ]On LinkedIn | https://uk.linkedin.com/in/wendyng1HostsJax ScottOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jaclyn-jax-scottErika McDuffieOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/erika-mcduffie__________________________Sponsors__________________________ResourcesArticles and Blogs: https://www.linkedin.com/in/wendyng1/detail/recent-activity/posts/__________________________For more podcast stories from 2 Cyber Chicks with Erika McDuffie and Jax Scott, visit: 👉 https://www.itspmagazine.com/2-cyber-chicks-podcastFor more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2022-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?👉 https://itspm.ag/rsac22spAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 20, 202220 min

Ep 1041Application And API Security: Sometimes We See The Risk — Sometimes It's Hidden Inside An API | A Live Stream Panel With Kristy Westphal And Giora Engel | Redefining CyberSecurity Podcast With Sean Martin

In this conversation, we explore the overall process for creating a culture where applications are secured from the beginning on through to monitoring and response:Which teams are involvedHow do secure products get defined from the beginning (PRDs, architecture, design, planning, etc.)How do they communicate/collaborate (tools/techniques)Tips and tricks to streamline processes, reduce human workload (aka automation)How to define and demonstrate success____________________________GuestsKristy WestphalVP Security Operations at HealthEquity and Adjunct Professor at Arizona State University [@ASU]On LinkedIn | https://www.linkedin.com/in/kmwestphalGiora EngelCEO & Co-Founder at Neosec [@neosec_com]On LinkedIn | https://www.linkedin.com/in/giorae/____________________________This Episode’s SponsorsHITRUST: https://itspm.ag/itsphitwebImperva: https://itspm.ag/imperva277117988Asgardeo by WSO2: https://itspm.ag/asgardeo-by-wso2-u8vc____________________________ResourcesOWASP API Security Project: https://owasp.org/www-project-api-security/OWASP Top 10: https://owasp.org/www-project-top-ten/White Paper | Scorched Earth: Hacking Banks And Cryptocurrency Exchanges Through Their APIs: https://knightgroup.app.box.com/s/mlmoa5vtw1ktqo8vcwcqtbex70mtvpo0API Security Fundamentals 2022: https://www.neosec.com/api-security____________________________Catch the on-demand live stream video and podcast here: https://www.itspmagazine.com/live-panels/application-and-api-security-sometimes-we-see-the-risk-sometimes-its-hidden-inside-an-api-redefining-cybersecurity-with-sean-martinTo see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 19, 202242 min

Ep 1040Our Traditional Conversation With Black Hat GM, Steve Wylie, To Kick Off Our Las Vegas Hacker Summer Camp 2022 Coverage | Las Vegas Black Hat 2022 And DEF CON 30 Coverage | Redefining CyberSecurity Podcast With Sean Martin And Marco Ciappelli

Tradition arrives again as we hit the road to Las Vegas to cover the biggest and most important hacker conference in the world: Black Hat. Celebrating its 25th (silver) anniversary, there is a lot to celebrate and absorb from this year's hybrid conference in Las Vegas and online. Join us as we connect with Black Hat General Manager, Steve Wylie, to get the latest on what everyone can expect this year.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 at https://www.itspm.ag/bhdc22____________________________GuestSteve WylieVice President, Cybersecurity Market at Informa Tech [@InformaTechHQ] and General Manager at Black Hat [@BlackHatEvents]On LinkedIn | https://www.linkedin.com/in/swylie650/On Twitter | https://twitter.com/swylie650____________________________This Episode’s SponsorsCrowdSec | https://itspm.ag/crowdsec-b1vpEdgescan | https://itspm.ag/itspegwebPentera | https://itspm.ag/pentera-tyuw____________________________Resources____________________________For more Black Hat and DEF CON Event Coverage podcast and video episodes visit: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?👉 https://itspm.ag/bhdc22spTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 18, 202241 min

Ep 1039From Enrolling In College To Gambling, Traveling, And Shopping, Evasive Bad Bots Are A Major Source Of Online Fraud | The Bad Bot Report 2022 | Part 2 | An Imperva Brand Story With Ryan Windham

As we continue this 2nd part of the conversation, we immediately kick things off with Gremlins and quickly move into real-world scenarios where bad bots wreak havoc by enabling high-speed abuse, misuse, and attacks on websites, mobile apps, and APIs. Businesses cannot overlook the impact of malicious bot activity as it is contributing to more account compromise, higher infrastructure and support costs, customer churn, skewed marketing analytics, and degraded online services.The implications of account takeover (ATO) are also extensive, where successful attacks can lock customers out of their account, while fraudsters gain access to sensitive information that can be stolen and abused. For businesses, ATO contributes to revenue loss, risk of non-compliance with data privacy regulations, and tarnished reputations.How can organizations — actually, the people in them that keep the business running — distinguish between real, authentic traffic versus something that's being driven by a bot? That's exactly what we talk about.We hope you enjoy this Part 2 of 2 conversations as we explore and uncover the consequences of bad bots for our business and society.About the 2022 Imperva Bad Bot ReportLeveraging data from its global network, Imperva Threat Research investigates the rising volume of automated attacks occurring daily, evading detection while wreaking havoc and committing online fraud. The 9th annual Imperva Bad Bot Report is based on data collected from the Imperva global network throughout 2021. The data is composed of hundreds of billions of blocked bad bot requests, anonymized over thousands of domains. The goal of this report is to provide meaningful information and guidance about the nature and impact of these automated threats.Bot attacks are often the first indicator of fraudulent activity online, whether it’s validating stolen user credentials and credit card information to later be sold on the dark web, or scraping proprietary data to gain a competitive advantage. Often bots are used to surveil applications and APIs in an attempt to discover vulnerabilities or weak security. Online fraud from automated bot attacks is not only a threat to the business, but it is first and foremost a risk to customers. Bad bot attacks might cause customers to be unable to access their accounts or have sensitive information stolen from them due to successful account takeover fraud.Bad bots mask themselves and attempt to interact with applications in the same way a legitimate user would, making them harder to detect and block. They enable high-speed abuse, misuse, and attacks on your websites, mobile apps, and APIs. They allow bot operators, attackers, unsavory competitors, and fraudsters to perform a wide array of malicious activities.Such activities include web scraping, competitive data mining, personal and financial data harvesting, brute-force login, digital ad fraud, denial of service, denial of inventory, spam, transaction fraud, and more.Note: This story contains promotional content. Learn more.GuestRyan WindhamVP of Application Security at Imperva [@Imperva]On Linkedin | https://www.linkedin.com/in/rwindham/ResourcesLearn more about Imperva and their offering: https://itspm.ag/imperva277117988Imperva Bad Bot Report 2022: https://itspm.ag/impervwurdWant the Bad Bot 101 Story? Check out the Imperva 2021 Bad Bot Report Podcast Series here: https://www.itspmagazine.com/their-stories/the-good-the-bad-and-the-ugly-the-bad-bot-report-2021-an-imperva-storyBe sure to listen to Part 2 of this conversation here: https://itspmagazine.com/their-stories/how-bots-fake-human-behavior-to-conduct-online-fraud-the-bad-bot-report-2022-part-1-an-imperva-story-with-ryan-windhamAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 18, 202227 min

Ep 1038Indigenous Astronomy | Stories From Space Podcast With Matthew S Williams

For as long as humans have walked the Earth, they have stared up at the night sky and drawn hope, inspiration, and a common sense of identity from it.Today, there are many efforts to revitalize and recognize Indigenous astronomical traditions worldwide. In this new era of space exploration, we must live up to those sacred words, "for all humanity."_______________________HostMatthew S WilliamsOn ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams______________________This Episode’s Sponsors______________________ResourcesNative Skywatchers: https://www.nativeskywatchers.com/Rothney Astrophysical Observatory - Indigenous Skies: https://science.ucalgary.ca/rothney-observatory/community/Indigenous%20Skies______________________For more podcast Stories from Space with Matthew S Williams, visit: https://itspmagazine.com/stories-from-space-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 16, 202228 min

Ep 1037What Is And What Is Not A Virtual Human? More Than An Influencer And A Fashion Statement? | A Conversation With Digital Creative Writer, Specializing In Content For Virtual Influencers, Astrid Hiort | Redefining Society Podcast With Marco Ciappelli

Influencers help brands to sell products by creating content on social media — the concept is certainly not new. How about virtual ones? It depends on what we assume "virtual" means because, in the advertising field, it is not new either. The technology makes this different, but humans are still in the machine. The point is that testimonials have been around since the beginning of advertising, as such virtual ones. You can think of celebrities, authorities in the field, fictional characters, and cartoon characters. As technology has evolved, so have the techniques to create and make them more believable, likable, engaging, relatable, and even more real.Nowadays, there is a tendency in our society — well, marketing is responsible for a lot of that hype — to use the words Artificial Intelligence, Augmented, and Virtual Reality, even when it is not precisely that. Nevertheless, our society is moving faster on the technology highway, and some blurriness is justified. Sometimes.So these virtual influencers, also called virtual humans — what are they, and, most of all, what are not? What do they do, and what they could do?Maybe they are not exactly sentient, but there are human that makes them seems so.Confused? We were too. So we invited on the show Astrid Hiort, a digital creative and journalist, specializing in content for virtual influencers and digital fashion.Join us, or maybe our digital twins?____________________________GuestAstrid HiortContributing Writer at VirtualHumans.org [@virtual_humans] https://www.virtualhumans.org/writer/astrid-hiortOn LinkedIn | https://www.linkedin.com/in/astrid-hiort/On Medium | https://medium.com/@astrid.hiort____________________________Resources ____________________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcwebBlackCloak 👉 https://itspm.ag/itspbcweb____________________________To see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-societyAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 15, 202247 min

Ep 1036A Conversation With Quentin Rhoads-Herrera | The Hacker Factory Podcast With Phillip Wylie

Quentin Rhoads-Herrera doesn't have a typical hacker origin like some others. He discovered technology after departing from the military.Although Quentin did not come from a background of hacking as a high schooler or earlier, but he learned technology, security, and hacking at a very advanced level. He is now an accomplished offensive security professional with zero days to his list of accomplishments. He also built and leads a team of highly skilled ethical hackers._______________________GuestQuentin Rhoads-HerreraDirector of Professional Services at CyberOne Security [@C1Security]On Twitter | https://twitter.com/paragonsecOn LinkedIn | https://www.linkedin.com/in/quentin-rhoads-herrera-b90320b6/______________________HostPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________Resources______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 15, 202236 min

Ep 1035Shushing Your Lizard Brain With Elizabeth Lotardo | 2 Cyber Chicks Podcast With Erika McDuffie And Jax Scott

One of our favorite guests is back with new nuggets of knowledge! How should we look on video conference calls? Leadership positions with sales numbers - how can we ramp up sales experience, without the traditional sales training? Her latest project: Monday motivation series, her new audio series through LinkedIn 10 EST LIVE, Unfiltered! The need for informal leadership and how to best prepare for performance reviews!Elizabeth’s work focuses on igniting emotional engagement and rallying teams around the Noble Purpose of customers. Elizabeth has spoken at LinkedIn Talent Connect, facilitated a "Millennial Talent Intervention" program for a school system, and designed virtual learning bursts for global sales teams. Some of her work has been featured on NPR and in The Wall Street Journal.__________________________GuestElizabeth LotardoVP of Client Services, McLeod&More [@lisaearlemcleod]On LinkedIn | https://www.linkedin.com/in/elizabethlotardoHostsJax ScottOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jaclyn-jax-scottErika McDuffieOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/erika-mcduffie__________________________Sponsors__________________________ResourcesLearn more about Selling with Noble Purpose: https://www.mcleodandmore.com/selling-with-noble-purpose/__________________________For more podcast stories from 2 Cyber Chicks with Erika McDuffie and Jax Scott, visit: 👉 https://www.itspmagazine.com/2-cyber-chicks-podcastFor more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2022-rsac-san-francisco-usa-cybersecurity-event-coverageAre you interested in telling your story in connection with RSA Conference by sponsoring our coverage?👉 https://itspm.ag/rsac22spAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 13, 202225 min

Ep 1034Protect Us Kids Foundation | A Conversation With With Founder Veda Woods | The Changemaking Podcast With Chloé Messdaghi

Learn how to help their global mission to advocate cybersex trafficking awareness of children from underserved and rural communities.______________________________GuestVeda WoodsFounder of Protect Us Kids Foundation [@protectuskids]On Twitter | https://twitter.com/vedatwoodsOn LinkedIn | https://linkedin.com/in/vedawoods______________________________HostChloé MessdaghiOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/chloe-messdaghi______________________________This Episode’s Sponsors ______________________________ResourcesProtect Us Kids Foundation Website: https://www.protect-us-kids.org/______________________________For more podcast stories from The Changemaking Podcast With Chloé Messdaghi: https://www.itspmagazine.com/the-changemaking-podcast______________________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 13, 202232 min

Ep 1033Both In Video Games And Movies There’s A Complicated, And Yet So Creative, Relationship Between Storytelling & Technology | A Conversation With Rafael Brown And Carey D'Souza (Part 2) | Audio Signals Podcast With Marco Ciappelli & Sean Martin

It was a dark and stormy night … Ok, what happened? But, wait — How stormy? Lightning? Thunders? How dark? Where?You could leave that to the listener/reader's imagination when you tell a story, but when you need to visualize it, how you render it will lead the audience into the story. In this episode, we welcome back Rafael and Carey to continue our videogame and storytelling conversation we started last month [ https://audiosignals.simplecast.com/episodes/games-blockchain-cloud-storytelling-and-metaverse-a-conversation-with-rafael-brown-and-carey-dsouza-audio-signals-podcast-with-marco-ciappelli-sean-martin ]We started with some old-school Arcade Games talks and how the evolution of technology has changed how we can build scripts and stories for games and movies. Of course, there are many parallels and divergences in the gaming and movie industry, but there is a big lesson on how knowing the technology you have at hand can help or damage the story you choose to tell. We also discuss the differences between large and indie projects and the best environment to promote creativity outside the box: budgets, time pressure, team size, available technology, a good story, and what else can add to the perfect mix that can promote innovation and genius?Is the book always better than the movie? Or the game? Or what is it that makes great? Maybe it is the correct adaptation to the medium used, and sometimes maybe is even better to tell a partially different story — BladeRunner case, anyone?!We can say that Marshall McLuhan was right: "The medium is the message" [https://en.wikipedia.org/wiki/The_medium_is_the_message]BTW, did you watch Chip 'n Dale: Rescue Rangers? [ https://www.imdb.com/title/tt3513500/ ]Well, according to Rafael, it should be on your list!Enjoy this conversation, catch up on the first one, and stay tuned for more! Prior Episode:https://audiosignals.simplecast.com/episodes/games-blockchain-cloud-storytelling-and-metaverse-a-conversation-with-rafael-brown-and-carey-dsouza-audio-signals-podcast-with-marco-ciappelli-sean-martin _____________________________GuestsRafael BrownCEO/Founder at Symbol ZeroOn LinkedIn | https://www.linkedin.com/in/rafaelbrown/Carey D'SouzaCEO and Co-Founder at IAMPASS [@iampassHQ]On LinkedIn | https://www.linkedin.com/in/careydsouza/On Twitter | https://twitter.com/carey_dsouza_____________________________This Episode’s SponsorsBlue Lava: https://itspm.ag/blue-lava-w2qsNintex: https://itspm.ag/itspntweb_____________________________ResourcesListen to the previous episode: https://itsprad.io/audiosignals-34_____________________________For more podcast stories from Audio Signals: https://www.itspmagazine.com/audio-signalsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 10, 20221h 2m

Ep 1032A Conversation With Content Creator And Cybersecurity Professional Harley Kimball | The Hacker Factory Podcast With Phillip Wylie

Harley shares his path into cybersecurity as well as his education choices including a mix of college and certification based education. Harley shared his thoughts and experience on using content creation to start and advance cybersecurity careers._______________________GuestHarley KimballTechnical Community Manager, Pentest Assessments at HackerOne [@Hacker0x01]On Twitter | https://twitter.com/infiniteloginsOn LinkedIn | https://www.linkedin.com/in/harley-kimball/On YouTube | https://www.youtube.com/c/infinitelogins______________________HostPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________Resources______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 8, 202234 min

Ep 1031Threat Intelligence | A Conversation With Mounir Hahad | Tech Done Different Podcast With Ted Harrington

Mounir Hahad knows a thing or two about threat intelligence, and he joins Tech Done Different to share those insights.You'll learn:what threat intelligence, and why it matterswhy it's important to share informationhow to think about outsourcing, insourcing, or some combinationand more________________________________GuestMounir HahadHead of Threat Labs at Juniper NetworksOn LinkedIn | https://linkedin.com/in/mounirhahadOn Twitter | https://twitter.com/Mounirhahad________________________________HostTed HarringtonOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington________________________________This Episode’s SponsorsCrowdSec 👉 https://itspm.ag/crowdsec-b1vp________________________________Resources________________________________For more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcastWatch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTQ79pdnWWvCuhWjyw9WGwiAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 7, 202226 min

Ep 1030"Where is Everybody?" The Enduring Problem of Fermi's Paradox | Stories From Space Podcast With Matthew S Williams

In 1950, physicist Enrico Fermi posed the question that launched a thousand explanations. "Where is Everybody?" Where are the extraterrestrial civilizations that are supposed to be out there?Addressing that question requires immense research, further studies, and (above all) that we confront how little we know about life and intelligence in the Universe._______________________HostMatthew S WilliamsOn ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams______________________This Episode’s Sponsors______________________ResourcesBeyond Fermi's Paradox at Universe Today (a series)https://www.universetoday.com/?s=Beyond+Fermi%27s+Paradox______________________For more podcast Stories from Space with Matthew S Williams, visit: https://itspmagazine.com/stories-from-space______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 2, 202222 min

Ep 1029A Conversation with Non Profit Founder and Cybersecurity Community Volunteer Kim Kennedy | The Hacker Factory Podcast With Phillip Wylie

Kim shares her passion for helping others through her volunteer efforts in numerous cybersecurity organizations helping the under-represented.Kim not only volunteers in multiple cybersecurity organizations, she also founded her own non profit. Not only does she focus on helping people gain skills in cybersecurity, she wants to educate people at all ages, from children to the retired. Her efforts are also focused on providing security education to help all people defend themselves from threat actors._______________________GuestKim KennedyFounder & CEO of EMPIRE of WEOn Twitter | https://twitter.com/broncobailey303On LinkedIn | https://www.linkedin.com/in/kim-possible/______________________HostPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________Resources______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 1, 202239 min

Ep 1028A Conversation With Liz Wharton @lawyerliz | Securing Bridges Podcast With Alyssa Miller | Episode 15

Have a listen as Alyssa and Liz entertain each other and their audience.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestElizabeth WhartonAdvisory Board at Rural Technology Fund [@ruraltechfund] and VO Operations at SCYTHEOn LinkedIn | https://www.linkedin.com/in/elizabeth-wharton/On Twitter | https://twitter.com/LawyerLiz________________________________HostAlyssa MillerOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alyssa-miller________________________________This Episode’s Sponsors________________________________Resources________________________________Watch the live stream webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllQyN9-nfFOIp711q65pTsSQFor more podcast stories from Securing Bridges Podcast With Alyssa Miller: https://www.itspmagazine.com/securing-bridges-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jul 1, 202243 min

Ep 1027From Technology To Buzzwords To Marketing; From Conversations To Friendships To Mergers And Acquisitions | Key Learnings From RSA Conference 2022 | Redefining CyberSecurity With Eward Driehuis

We pack a lot into this conversation, looking at what to learn, how to learn, and who to learn from, getting a fantastic overview of the conference from many angles and positions.*Threat intelligence**Development processes**Cyber security M&A market**Sales**Marketing messaging**Cyber law**Standards*Tune in to this conversation as we wrap up our coverage of RSA Conference 2022. Be sure to listen to all of the conversation we had before, during, and after the event.Be sure to catch all of our conversations from Black Hat and DEF CON 2022 as well.____________________________GuestEward DriehuisFounder at 3Eyes Security and Chairman at CSIRT.globalOn LinkedIn | https://www.linkedin.com/in/ewarddriehuis/On Twitter | https://twitter.com/e3huis____________________________This Episode’s SponsorsHITRUST: 👉 https://itspm.ag/itsphitwebCrowdSec: 👉 https://itspm.ag/crowdsec-b1vpBlue Lava: 👉 https://itspm.ag/blue-lava-w2qsBlackCloak 👉 https://itspm.ag/itspbcwebAppViewX 👉 https://itspm.ag/appviewx-cbyeCheckmarx 👉 https://itspm.ag/checkmarx-i9o5____________________________ResourcesLinkedIn post summing up the discussion points: https://www.linkedin.com/posts/ewarddriehuis_this-is-going-to-be-a-long-post-on-my-lessons-activity-6941702693895725056-H1YALearn more about RSA Conference 2022: https://itspm.ag/rsac-b8ef76____________________________For more RSAC Conference Coverage podcast and video episodes visit: https://www.itspmagazine.com/rsa-conference-usa-2022-rsac-san-francisco-usa-cybersecurity-event-coverageBe sure to catch all of the conversations for the Black Hat and DEF CON conferences in Las Vegas: https://www.itspmagazine.com/black-hat-2022-and-def-con-hacker-summer-camp-las-vegas-usa-cybersecurity-event-and-conference-coverageTo see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorshipsAre you interested in telling your story in connection with Black Hat and DEF CON by sponsoring our coverage?👉 https://itspm.ag/bhdc22sp Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jun 30, 202248 min

Ep 1026Early Stage Medical Devices | A Conversation With Chris Barron | Tech Done Different Podcast With Ted Harrington

In this episode, we are joined by long-time medical device veteran Chris Barron, to help walk us through the many challenges that early-stage medical device startups face, and how to overcome them.You'll learn:why fundraising is a long processwhat you need to make clear to investors in order to get them to invest in your startupwhat role your mission has in deciding where to allocate resourceswhy to apply your passion________________________________GuestChris BarronVP of Engineering at Respiratory Motion, Inc.On LinkedIn | https://linkedin.com/in/chris-barron________________________________HostTed HarringtonOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington________________________________This Episode’s SponsorsCrowdSec 👉 https://itspm.ag/crowdsec-b1vp________________________________Resources________________________________For more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcastWatch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTQ79pdnWWvCuhWjyw9WGwiAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jun 30, 202224 min

Ep 1025The Real-World Value Of Telling Stories And The Role Of Visual Art In Ethical Hacking Videos | A Conversation With YouTuber SecAura | Redefining CyberSecurity Podcast With Sean Martin

SecAura is an amateur YouTuber whose post I came across caught my attention. SecAura creates free educational videos for ethical hacking and does so while going the extra mile to hand-craft many of the animations used in the videos. All of this is done outside of the 9-5 job SecAura has as a penetration tester. Realizing that the technical subjects needed diagrams and that these elements were a core part of the videos being created, SecAura decided to hand-craft the animations for each of the subjects being prepared, teaching himself all that was required to do so while constantly trying to improve with each video released.SecAura aims to have every video released be at the top of its game in terms of teaching someone who knows very little about a subject and getting them to a great foundational and applicable position just from watching his videos. He also hopes to extend the community and help to create the next generation of cybersecurity professionals by providing them with real, practical skills, backed by the theory!About SecAura [from Twitter]By day I work as a pentester, and in the evening, I compete in CTFs/cyber things. I have always loved teaching, and wanted to give back to the cyber community the best I can, so I made my YouTube Channel.It was a treat speaking with SecAura, learning about the creativity, passion, and production that goes into the making each of these videos, and how they can be used by those looking to enter the field of information security, preparing for a job interview, looking to grow their skills as they aspire to take on new roles or perhaps even get promoted at their job.So many uses cases — lots of great content — all from a super cool human.____________________________GuestSecAuraEthical Hacking Content CreatorOn Twitter | https://twitter.com/secaura_On LinkedIn | https://www.linkedin.com/in/sec-aura-57736422a/On YouTube | https://www.youtube.com/channel/UCx89Lz24SEPZpExl6OfQ0Gg____________________________This Episode’s SponsorsImperva: https://itspm.ag/imperva277117988Asgardeo by WSO2: https://itspm.ag/asgardeo-by-wso2-u8vc____________________________ResourcesMore information about SecAura: https://twitter.com/secaura_/status/1518241710412808192The new SQLi video discussed during the conversation: UNLEASH THE POWER OF SQL INJECTION | A beginners guide: https://www.youtube.com/watch?v=_Y4MpvB6o7sVIDEO: Web Fundamentals for Cyber Security | HTTP for Hackers | 0x01 (Animated): https://www.youtube.com/watch?v=ro-5AjgoPc4____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jun 30, 202239 min

Ep 1024Blockchain, Bitcoin, Filecoin, Other Coins: The 101 Of Cryptocurrency Explained | A Conversation With Robert Dowling | Audio Signals Podcast With Marco Ciappelli And Sean Martin

Cryptocurrency can be used for almost any purchase these days. However, a lot goes on underneath and behind the scenes. In this episode, we learn the basics, the history, and the future of Bitcoin, Ethereum, Filecoin, NFTs, smart contracts, and so much more.We talk about this with Robert Dowling, which is not only extremely knowledgeable on the matter but has an elegant and easy-to-understand way to present on the topic.Many thanks to The Mentor Project for connecting us with yet another expert and mentor.Enjoy the conversation! About RobertEngineer, entrepreneur, and student, formerly the co-Founder of rePurpose and Alphagora, currently finishing studies at Penn and serving as a Graduate Student Fellow at the Singh Center for Nanotechnology. Knowledgable about Bitcoin.Associate Engineer at Filecoin Foundation; Graduate Student Fellow at the Singh Center for Nanotechnology; Student at The Wharton School About The Mentor ProjectThe Mentor Project is a registered 501(c)(3) non-profit. Our mentors are experts in science, technology, engineering, the arts, mathematics, business, and law. From developing a patent on how to use credit cards on the Internet to insights on space exploration and astronomy, to titans of industry and world-class technologists, TMP mentors share their skills and knowledge to inspire and guide their mentees._____________________________GuestRobert DowlingAssociate Engineer at the Filecoin Foundation [@FilFoundation]On LinkedIn | https://www.linkedin.com/in/robertpatrickdowling/_____________________________This Episode’s SponsorsBlue Lava: https://itspm.ag/blue-lava-w2qsNintex: https://itspm.ag/itspntweb_____________________________ResourcesCo:Rise Software Engineering Course | Web3 Applications & Filecoin/IPFS: https://corise.com/course/web3-filecoinFilecoin Foundation: https://fil.org/_____________________________For more podcast stories from Audio Signals: https://www.itspmagazine.com/audio-signalsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jun 29, 20221h 2m

Ep 1023Finding And Sharing Cybersecurity | A Conversation With Zinet Kemal | The Changemaking Podcast With Chloé Messdaghi

Dive into the ways to improve online safety with kids and why diversity matters...and her books!______________________________GuestZinet KemalMom of 4, Author, & Associate Cloud Security Engineer at Best Buy [@BestBuy]On Twitter | https://twitter.com/zinet_kemalOn LinkedIn | https://linkedin.com/in/zinet-kemal______________________________HostChloé MessdaghiOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/chloe-messdaghi______________________________This Episode’s Sponsors ______________________________ResourcesZinet Kemal's Website: http://www.zinetkemal.com/______________________________For more podcast stories from The Changemaking Podcast With Chloé Messdaghi: https://www.itspmagazine.com/the-changemaking-podcast______________________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jun 29, 202232 min

Ep 1022Sounds Of The Ocean | Environmental Activist, Mindful Musician And Immersive Media Producer Dedicated To Raising Awareness In Support Of Ocean Conservation | A Conversation With Joshua Sam Miller | Audio Signals Podcast With Marco Ciappelli

What an inspiring conversation! In this episode of Sound Signals, we put together music, ocean life, environment conservation, and multimedia experiences that, thanks to new technologies, could be soon available in the comfort of your home. So, get your headset, make-believe scuba gear on, and dive into the ocean with us.With our guest Joshua Miller, we discover his journey to connect his passions into one big project. From his love for music and nature to envisioning and turning into reality a multimedia project that involves science, creativity, and substantial involvement in supporting Ocean Conservancy Group all over the globe.Where this journey started, morphed, and evolved is all here in this episode for you to listen, learn, get involved, and even get a sound glimpse of what Joshua‘s music feels like when he follows the sounds of ocean life with his instruments.Let’s dive in, respectfully, of course.THE PURPOSESounds of the Ocean is an invitation to journey within yourself while traveling through the underwater world. We exist to connect human beings with the natural environment, through sound, visual art, dance, and spoken word poetry.​ We host live events and produce immersive content to support your mental, emotional, physical, and spiritual wellbeing.WHY OCEANS? WHY SOUND?Oceans contain between 50% - 80% of all life on Earth. Our goal is to raise awareness and understanding around the critical issues facing the health of our oceans while supporting people to live healthy lives. Our promise is to hold space for you to slow down and practice mindfulness, with the intention to inspire meaningful action to protect the sea._____________________________GuestJoshua Sam MillerFounder, Creative Director & Composer - Sounds of the Ocean [@soundsofthocean]On LinkedIn | https://www.linkedin.com/in/joshuasammiller/On Twitter | https://twitter.com/JoshuaSamMillerOn YouTube | https://www.youtube.com/channel/UCy3GoDoYdDGpH-6Z3ruubSAOn Facebook | https://www.facebook.com/joshuasammillerWebsite | https://www.joshuasammiller.com/_____________________________This Episode’s SponsorsBlue Lava: https://itspm.ag/blue-lava-w2qsNintex: https://itspm.ag/itspntweb_____________________________ResourcesMore about Sounds of the Ocean: https://www.soundsoftheocean.com/_____________________________For more podcast stories from Audio Signals: https://www.itspmagazine.com/audio-signalsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Jun 27, 202238 min