Darin Fredde's Path From CAD Drafter To Pentester | The Hacker Factory With Phillip Wylie
Darin Fredde discusses his career journey and background. He shares how he went from a CAD...
33:32
Darin Fredde's Path From CAD Drafter To Pentester | The Hacker Factory With Phillip Wylie
Darin Fredde discusses his career journey and background. He shares how he went from a CAD...
33:32
While online games can be a healthy coping strategy, they can also pose some risks as...
22:49
This episode goes into the life and lessons learned of Dr. Patricia Mack as she discusses how we...
25:42
Here is the truth: Active Directory remains a soft target for attackers attempting to steal...
27:34
It is that jolly time of the year: The Edgescan vulnerability stats report has arrived! After six...
31:54
Simplify & Automate | A Conversation With Rich Schnitzel | Tech Done Different With Ted Harrington
In this episode we talk with automation guru Rich Schnitzel. Before any discussion of automation...
41:05
In this episode JJ and Dexter Ang explore the latest in gesture control using human machine...
38:51
Perspective and priority matters. If you use CVSS or an equivalent technical metric alone as the...
38:37
There it is again: another story about a massive company breach and loss of sensitive data....
57:40
Web App Hacking With Tib3rius | The Hacker Factory With Phillip Wylie
Tib3rius discusses his hacker journey from university, to first cybersecurity job, to web app...
34:28
The online dating waters can be hard to navigate and you may kiss some frogs. Kristin Judge,...
17:03
As humans, we tend to take things for granted. Sure, there are always advances in technology, and...
39:55
Kim Nguyen talks about her story about what made her want to get into computer science and...
27:02
We hear from the leader of a SaaS company that has successfully set up an effective responsible...
35:49
Think of a high school club, and you might think about a group of young students meeting...
35:14
Now that you know what bots are, where they originate, what good they can do, and the harm they...
37:23
The third-party ecosystems of today’s organizations have become more complex, more digital, and...
58:57
A lot can be done by CSOs/CISOs to maximize value and reduce risks when working with PR/media....
38:23
John Jackson is a Senior Application Security Engineer by day and security researcher and hacker...
29:26
In this episode JJ and Dexter Ang explore the latest in gesture control using human machine...
41:06
povo2.0に新トッピング「使い放題(7日
Episodio
Drum Machine History
Episodio
Mini PC y nuevo viejo Mac
Episodio
Startupit & ATK-castin renesanssi
Episodio