Ranked #1
033| Cyber Security Education from Student and Teacher Perspectives
033| Cyber Security Education from Student and Teacher Perspectives
Cyber security has never been a hotter field to get into, but how do you gain the skills needed for landing a job? There... Read more
8 Jan 2020
•
39mins
Ranked #2
020| Defining Cyber Warfare, with Mikko Hypponen
020| Defining Cyber Warfare, with Mikko Hypponen
Cyber war is a term we often hear tossed about, but is it just science fiction, or is it really happening? How worried s... Read more
11 Feb 2019
•
46mins
Similar Podcasts
Ranked #3
029| Ask a Hacker: Red Teamer Answers Listener Questions
029| Ask a Hacker: Red Teamer Answers Listener Questions
In this episode, veteran hacker and red teamer Tom Van de Wiele answers questions from our listeners. Tom covers the eth... Read more
25 Sep 2019
•
33mins
Ranked #4
021| The Cloud: Security Benefits, Risks & Why You Should Use It
021| The Cloud: Security Benefits, Risks & Why You Should Use It
The cloud has changed the way we do business and the way we develop and deploy software and infrastructure. What are the... Read more
14 Mar 2019
•
30mins
Ranked #5
007| Popping Hotel Locks: The Hard Truth About Hacking
007| Popping Hotel Locks: The Hard Truth About Hacking
When people look for logos or symbols that emanate security, they often choose a lock. Sure, we know locks can be picked... Read more
9 May 2018
•
18mins
Ranked #6
005| Demystifying Hardware Security, with Andrea Barisani
005| Demystifying Hardware Security, with Andrea Barisani
With the disclosure of Meltdown and Spectre early this year, hardware security has come into focus. What are the special... Read more
29 Mar 2018
•
39mins
Ranked #7
006| Spring Cleaning for Opsec
006| Spring Cleaning for Opsec
Operational security is about turning the tables, looking at things from an attacker's point of view, and identifying ho... Read more
26 Apr 2018
•
24mins
Ranked #8
025| The Psychology of Phishing
025| The Psychology of Phishing
Phishing is one of today's biggest cyber security issues, a go-to tactic for threat actors. It's simple and effective, a... Read more
12 Jun 2019
•
36mins
Ranked #9
031| Filtered & Fragmented: Is True Internet Freedom a Thing of the Past?
031| Filtered & Fragmented: Is True Internet Freedom a Thing of the Past?
The internet seems to be changing from being a relatively unrestricted space into something more regulated. More countri... Read more
12 Nov 2019
•
31mins
Ranked #10
004| Security, Privacy and the IoT, with Steve Lord
004| Security, Privacy and the IoT, with Steve Lord
The Internet of Things promises futuristic smart homes, energy savings and efficiencies, and improvements to health and ... Read more
8 Mar 2018
•
33mins
Ranked #11
019| The Best Defense is Good Offensive Security
019| The Best Defense is Good Offensive Security
They say that the best defense is a good offense, as football fans or anyone that’s played a game of Risk might agree. B... Read more
23 Jan 2019
•
26mins
Ranked #12
013| Passwords: A Hacker's Take on Cracking & Protecting Your Creds
013| Passwords: A Hacker's Take on Cracking & Protecting Your Creds
Passwords. You plug them into your accounts and the services you use at work, you try little tricks to make them more un... Read more
14 Sep 2018
•
44mins
Ranked #13
012| Adventures in Red Teaming
012| Adventures in Red Teaming
How can companies know if their security investments are actually working? Getting attacked is the ultimate test, but hi... Read more
23 Aug 2018
•
32mins
Ranked #14
030| Talking Infosec to Non-Infosec Folks
030| Talking Infosec to Non-Infosec Folks
Cyber security is relevant for everyone. Not everyone realizes it though, and not everyone understands what those in the... Read more
22 Oct 2019
•
32mins
Ranked #15
011| The Rise of AI and Deliberate Deception
011| The Rise of AI and Deliberate Deception
Disinformation. Fake news. Social media manipulation. Lately another dark side of the internet has come into focus - its... Read more
2 Aug 2018
•
31mins
Ranked #16
028| When the Well is Poisoned: The Devastation of Supply Chain Attacks
028| When the Well is Poisoned: The Devastation of Supply Chain Attacks
Supply chain attacks are on the increase, with attackers abusing the trust we place in vendors and software. Why are the... Read more
29 Aug 2019
•
33mins
Ranked #17
009| Top OpSec Tips for Vacation Travel
009| Top OpSec Tips for Vacation Travel
The summer holiday season is upon us, and people are looking forward to trading their daily workplace grind for a new ad... Read more
21 Jun 2018
•
14mins
Ranked #18
010| Ransomware Out, Cryptojacking In? Latest Cybercrime Trends
010| Ransomware Out, Cryptojacking In? Latest Cybercrime Trends
Over the past few years, ransomware stole headlines as the biggest malware threat to worry about. Consumers and business... Read more
9 Jul 2018
•
22mins
Ranked #19
032| How California's New Privacy Law Strikes Where the Pain Is
032| How California's New Privacy Law Strikes Where the Pain Is
Following in the footsteps of GDPR, the US is seeing more progressive data privacy laws coming down, with the new Califo... Read more
4 Dec 2019
•
36mins
Ranked #20
018| Online Dating and Trading Data for Love (It's Complicated)
018| Online Dating and Trading Data for Love (It's Complicated)
If you're looking for love nowadays, you'll likely turn to an online dating app. But what do these apps mean for your se... Read more
26 Dec 2018
•
39mins