30 Minutes with a Hacker Podcast Archive
Episode: Is This Thing On? Verifying Defensive Tools Are Working
You’ve just deployed the new state of the art security tool. It appears to be working, but are you confident that it is performing as advertised? Newly deployed tools may slow hackers down, but they know the odds are in their favor that you missed something. They also know that they have a better chance at long-term success if they can beat your defensive tools. In this episode, our speakers address why it’s important to validate your security tools and how to do it.
Guest Appearance: Lewis Needham, ATEC Group
🔈 Click here to listen.
Episode: The Business of Malware: The rise of Malware-as-a-Service (MaaS) continues.
The special knowledge of how to hack and breach is something that only a small select group of people know. You may not have the ability or knowledge to hack or cause any damage with cyber attacks. But as a result of the growth of MaaS, skilled hackers have created marketplaces where they happily sell their malware services to you to help customers attack their desired targets. Tune in for a discussion on the business of malware, its staggering growth and how we must evolve our cyber skills to stay ahead of these nefarious cybercriminals.
🔈 Click here to listen.
Episode: The Importance of Cyber Exercises
Discover the importance of cyber exercises for your business and how these trainings can help enhance or grow a company’s security infrastructure. These cyber exercises, offered at the Tech Data Cyber Range can be sold by our partners and provide tremendous value to end-user customers.
Episode: Supply Chain Hacking and How it Impacts MSPs and MSSPs
One of the common ways into an organization as a hacker is not to attack the company directly at all. Hacking a company in the supply chain, who hasn’t secured their own infrastructure, is often a much easier way in when the end-target seems to have put stronger security measures in place. Listen in as we dive into the topic deeper with our team of ethical hackers and learn how to mitigate against this type of a breach.
Episode: AI, Machine Learning, Deep Learning
Join us as we chat with Brett Scott and Josh Harp, two notable ethical hackers, about Deep Learning and how it relates to or is different from Artificial Intelligence and Machine Learning, technologies that are becoming increasingly more prevalent in both the offensive and defensive sides of cybersecurity.
Episode: GDPR, PIPEDA, CCPA
Join us as we chat with Brett Scott and Josh Harp about privacy regulations currently in place, ones that are in the works and the impact on businesses today.
Episode: End-point Attack Vector
Join us as we chat with Brett Scott and Josh Harp about how hackers are getting in through our endpoint devices and how we can guard against it.
Episode: Phishing Schemes
Now more than ever the most common method hackers use to break in to a network is through phishing schemes. Join us as we discuss cyberattacks and how hackers are implementing sophisticated phishing schemes to access your system.
Episode: IoT Devices and Other Ways Hackers Are Getting In
One of the ways hackers break into networks is through IoT Devices. Join us as we pick the brains of Brett Scott and Josh Harp, two notable ethical hackers who will share their insights into how hackers are leveraging these devices and other entrance points and how they are able to pivot within your network once they get in.