Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10
Introduction
00:00 • 2min
Exploit Log for Jay - The Easy Way to Exploit Oner
01:53 • 2min
Data Loss
04:01 • 2min
Fishing Attacks - What's the Solution?
06:25 • 2min
Is This a Threat Protection?
08:51 • 2min
The Myth of Automating Security Processes
10:36 • 2min
Do You Need a Background Check?
12:29 • 2min
The Cryptocurrency Crisis
14:25 • 5min
The Quantum Computing Security Conundrum
19:07 • 2min
Is Capital One Hiring?
20:53 • 3min


