Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26
Introduction
00:00 • 5min
Eric Taylor Barricades Cyber Solutions
04:46 • 4min
The Australian Senate Recommends Banning We Chat in the Country
08:53 • 2min
The Senate Recommends a Ban on Chinese Social Media Apps
10:55 • 4min
How to Deploy Ransomware as a Service
15:14 • 4min
CDC Cult of the Dead Cow
19:21 • 2min
Cult of the Dead Cow: A Legendary OG Org
21:31 • 2min
The Value of Having Access to Update and Edit Existing Products
23:07 • 3min
The Amazon Employees Who Have Access to Telegram
26:34 • 3min
The Anti-Siphon Training Arm of Black Hills Information Security
29:12 • 2min
How to Get Rid of Trash in Your LinkedIn Feed and Network
31:20 • 4min
How to Fix a Zero Day Exploit With a Vonti
35:32 • 4min
The Visual Threat in Intelligence Books
40:01 • 1min
The Rise and Fall of the Cyber Insurance Market
41:23 • 5min
Spectre Op Rewrites Bloodhound
46:33 • 1min
How to Run a Lab to Do Bloodhound
47:58 • 3min
How to Use Dropbox to Steal Data From Removable Drives
50:58 • 5min
The Simply Cyber Con Cyber Conference in November
56:24 • 2min
How to Get Started With Cyber Insurance
58:46 • 4min
How to Be a Successful Mentor in the Cyber Industry
01:02:17 • 4min
The Importance of Ethics Hacking
01:06:10 • 2min
Robo Shadow Vulnerability Manager
01:08:16 • 3min
How to Leverage a Cert Like Blue Team Labs on Your Resume for Hr
01:11:00 • 2min
How to Set Up a Pen Testing Lab
01:12:33 • 2min
How to Get a Cyber Insurance Talk
01:14:40 • 6min
How to Take Cyber Security to the Next Level
01:20:24 • 3min


