Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
Introduction
00:00 • 3min
Kevin Mc's Ghost in the Wire
02:57 • 2min
How to Maximize Cyber Risk Reduction
05:11 • 3min
The Meme of the Week: Dan Reardon
08:40 • 1min
The Rise of Complex DDoS Attacks in Q2
09:45 • 6min
China's Data Traps
15:44 • 4min
Microsoft Expands Cloud Log Access
19:42 • 2min
Microsoft's Advanced Logging Data Is Free
22:05 • 3min
Neil Bridges on Cyber Insecurity
24:45 • 2min
The Importance of Capitalism
27:07 • 4min
How to Be a First Timer on YouTube
31:32 • 4min
How to Make a Custom Meme Every Thursday
35:06 • 3min
How to Keep Carl From Downloading Stupid Stuff
38:14 • 5min
Cold Fusion Zero Days
43:38 • 4min
The Speed of Global Power
47:12 • 3min
The Great Hack and What Cambridge Analytica Did
50:29 • 4min
The Threat Briefing With IPSEC
54:43 • 3min
The Importance of Server Patching
57:22 • 5min
How to Get Accepted to the Defcon Meetup
01:02:18 • 3min
How to Get Your Cybersecurity Breakthrough Email
01:05:07 • 2min
How to Promote a Fake It Till You Make It Mindset
01:07:06 • 4min
How to Comply With NIST 871 Control Crosswalk
01:11:22 • 5min
Hacker in the Fed: A Threat Hunting Course
01:16:40 • 5min
The David Bianco Pyramid of Pain
01:21:28 • 2min
How to Deal With Threat Intel Feeds
01:23:31 • 2min
Leonardo's Ninja Hooded Ninja
01:25:47 • 2min
The Simply Cyber Cafe: A Casual Weekend
01:27:23 • 2min
The Importance of Social Media
01:29:45 • 4min


