The ITSPmagazine Podcast

ITSPmagazine, Sean Martin, Marco Ciappelli
undefined
Dec 24, 2021 • 37min

From Esports To Ethical Hacker | A Conversation With Ippsec | The Hacker Factory With Phillip Wylie

Ippsec shares his story of his journey into ethical hacking. He discusses how he used esports commentary to overcome some speaking challenges and went on to become well known streamer and content creator._______________________GuestIppsecOn YouTube | https://www.youtube.com/c/ippsecOn Twitter | https://twitter.com/ippsec______________________HostPhillip WylieOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________ResourcesIppsec Website: https://ippsec.rocks______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Dec 21, 2021 • 13min

The One With The Macbook M1 Max And Mac Pro Shootout | KnightLife On ITSPmagazine With Alissa Valentina Knight

In this first-ever unboxing episode of KnightLife, I unbox my new $5K M1 Max Macbook Pro and compare it to the render performance of my $18K Mac Pro.And what's your money on  which system rendered the Black Magic 12K RAW video the fastest? The answer just might surprise you!________________________________HostAlissa Valentina KnightOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alissa-valentina-knight________________________________This Episode’s Sponsors________________________________To watch the video version of this conversation on YouTube: https://youtu.be/Gax7cVDaEiQFor more podcast stories from KnightLife on ITSPmagazine With Alissa Valentina Knight: https://www.itspmagazine.com/knightlife-on-itspmagazineAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Dec 21, 2021 • 45min

The Blindspot Of Infosec Training | Redefining Security With Eric Thomas

It's time to change the way we think about cyber security training. Evidently, the cybersecurity community agrees — just look at the post made recently by Eric Thomas (you can find it in the resources section).To help us with this endeavor, Eric, a practitioner and training professional, takes us on a journey into the past, present, and future of bringing the next wave of cybersecurity professionals to market.____________________________GuestEric ThomasOn LinkedIn | https://www.linkedin.com/in/thomasthetech/On Twitter | https://twitter.com/TheEis4Extra____________________________This Episode’s SponsorsImperva: https://itspm.ag/rsaarchwebHITRUST: https://itspm.ag/itsphitweb____________________________ResourcesInspiring post: https://twitter.com/TheEis4Extra/status/1419154490435964929____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-securityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Dec 21, 2021 • 1h 3min

Cybersecurity Threat Modeling? Why not use some of these principles in our daily life? We talk about it all with our guest - Adam Shostack | Birds Aren’t Real, and they are government’s drones spying on us - WHAT?! | Is this how SocialMedia manipulate users | The difference between zero-emission and net-zero | And then we get philosophical, again | Through The TechVine Radio Program Episode TwentyEight

In this Episode Diana, Sean, and Marco talk about: In this Episode Diana, Sean, and Marco talk about: Cybersecurity Threat Modeling? Why not use some of these principles in our daily life? We talk about it all with our guest - Adam Shostack | Birds Aren’t Real, and they are government’s drones spying on us - WHAT?! | Is this how SocialMedia manipulate users | The difference between zero-emission and net-zero | And then we get philosophical, again | Through The TechVine Radio Program Episode TwentyEightWe have officially decided to keep Through The TechVine a live recording but Radio Style. We just love old school radio too much!Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐We are serious about thinking about the many ways technology is and will impact our society. Still, we do not miss the opportunity to share some other stories, oddities, rarities, and some laughs.Join us!______________________________There is one truth that is not told enough: technology is not magic — but it can be magical.Technology is human — it is part of who we are… our evolution… our future.Will it be a Dystopian or Utopian one? Well, that is up to us, and nobody else._____________________________Join us for our live recording on… Twitter 👉  https://twitter.com/ITSPmagazineLinkedIn 👉  https://www.linkedin.com/company/itspmagazineFacebook 👉  https://www.facebook.com/ITSPMagazineYouTube (New Channel — follow us for video content coming soon) 👉 https://www.youtube.com/channel/UCbo3ZeBn3eyBnjE7IRiADKA…as we discuss more technology stories.Through The TechVine every week, with Diana, Sean, and Marco: https://www.itspmagazine.com/through-the-techvine____________________________Guests:Adam ShostackOn Twitter | https://twitter.com/adamshostackOn Linkedin | https://www.linkedin.com/in/shostack/ResourcesThreat Modeling Whitepapers from AdamFast, Cheap, and Good 👉 https://shostack.org/resources/whitepapers____________________________This Episode SponsorsBlueLava ✨ https://itspm.ag/blue-lava-w2qs Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships____________________________Meet The HostsDiana KelleyOn ITSPmagazine  👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/diana-kelleySean MartinOn ITSPmagazine  👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco CiappelliOn ITSPmagazine  👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Dec 17, 2021 • 1h 1min

The Real Story About LOG4J - No FUD - No Clickbait - No BS | A Special ITSPmagazine Redefining Security Webcast Panel With Alyssa Miller, Katie Nickels, Eric Thomas, And Mark Nunnikhoven

Back in 2013, I wrote a piece for TechTarget (sadly, it’s no longer online). It focused on mobile security and app security and referenced a report that included some interesting open source software stats that showed one particular shared library’s use outpacing the others by a longshot. Can you guess which one? 🤔Eight years later, that same library is making the news again — arguably, on a much grander scale.Let's discuss. Let's learn. Let's enjoy this much-needed no-FUD, no-BS conversation. We recorded this one live - which you can watch here if you like.Ready? GO! 📺🎙🤘____________________________GuestsAlyssa MillerOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alyssa-millerOn LinkedIn | https://www.linkedin.com/in/alyssam-infosec/On Twitter | https://twitter.com/AlyssaM_InfoSecKatie NickelsOn LinkedIn | https://www.linkedin.com/in/katie-nickels-631a044/On Twitter | https://twitter.com/likethecoinsEric ThomasOn LinkedIn | https://www.linkedin.com/in/thomasthetech/On Twitter | https://twitter.com/TheEis4ExtraMark NunnikhovenOn LinkedIn | https://www.linkedin.com/in/marknca/On Twitter | https://twitter.com/marknca____________________________This Episode’s Sponsors ____________________________ResourcesWatch the live recorded webcast: https://youtu.be/4gZoHp5LYVESimple overview video from Mark: https://www.linkedin.com/feed/update/urn:li:activity:6876932435272101888/   https://twitter.com/marknca/status/1471187984741507073____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-securityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Dec 17, 2021 • 39min

From Marine, to Geek Squad, to Red Team - A Conversation with Jeremiah Roe | The Hacker Factory With Phillip Wylie

Jeremiah like a lot of others worked in various other areas before finding his home in red teaming. He was a Marine, a mall cop, a Geek Squad tech, and found what he was meant be, a red teamer. Join us as Jeremiah shares his story, knowledge, and advice._______________________GuestJeremiah RoeOn Linkedin | https://www.linkedin.com/in/jeremiahroe/On Twitter | https://twitter.com/c1ph3rflux______________________HostPhillip WylieOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________Resources______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Dec 16, 2021 • 33min

Holiday Tech Wish List: Fun, Functional, And Safe | A Conversation With Scott Scheferman | Your Everyday Cyber With Limor Kessem And Diana Kelley

Technology for the 2021 holidays! Check out the cool tech gear that's at the top of guest Scott Scheferman’s wish list as he shares how to use them safely.Conversation highlights:VR headsets - what’s the latest?How attackers are targeting VRThe latest in streaming deck technologyRisks with streaming desksAre voice activated assistants a potential privacy risk?Can Alexa call 911 in an emergency?Security considerations when using the latest gaming consolesHow your wireless mouse lead to a loss of your banking data?Does you wearable have an ulterior functionality motive for a foreign government?Should you turn wearables on airplane mode when traveling?The future of attacks: digital extortion and how wearables could enable these attacks________________________________GuestScott SchefermanOn LinkedIn | https://www.linkedin.com/in/scottscheferman/On Twitter | https://twitter.com/transhackerism________________________________HostsLimor KessemOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/limor-kessemDiana KelleyOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/diana-kelley________________________________Resources ________________________________This Episode’s Sponsors ________________________________For more podcast stories from Your Everyday Cyber With Limor Kessem and Diana Kelley 🎙✨ https://www.itspmagazine.com/your-everyday-cyber-podcastIf you’d like to sponsor this or any other podcast episode on ITSPmagazine, you can learn more here 👍  https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Dec 15, 2021 • 29min

From Help Desk To CIO | A Conversation With Jonathan Arena | Hackerz And Haecksen Podcast With Jaclyn (Jax) Scott, Erika McDuffie, And Jon Helmus

Have you ever been curious about how small businesses tackle cybersecurity challenges? In a world hyper-focused on risk and technology, there’s an increasing need for businesses of all scales to focus on their security posture. Join us for an informative discussion with a CIO who specializes in risk management and business continuity/disaster recovery domains.Jonathan Arena is the president and Chief Information Officer of a technology company, an adjunct professor at Wilmington University, a published author, an advisory board member and a mentor. He has 25+ years of experience in the tech space.__________________________GuestJonathan ArenaOn Linkedin | https://www.linkedin.com/in/jfarena/__________________________HostsJaclyn (Jax) ScottOn ITSPmagazine  👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jaclyn-jax-scottErika McDuffieOn ITSPmagazine  👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/erika-mcduffieJon HelmusOn ITSPmagazine  👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jon-helmus__________________________Sponsors__________________________Resources__________________________For more podcast stories from Hackerz And Haecksen with Jaclyn (Jax) Scott, Erika McDuffie, and Jon Helmus, visit: 👉 https://www.itspmagazine.com/hackerz-and-haecksen-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Dec 15, 2021 • 54min

From Ancient Tomb Traps To Modern-Day Honeypots | Intrusion Detection And Deception: The Role Of Honey Pots And Human Nature In Cybersecurity Education | Redefining Security With Assistant Professor C. Jordan Howell, Author Chris Sanders, And Student William Palafox

It's easy to get sucked into the world of technology, often forgetting that there are humans behind the keyboards creating the technology. There's a program out of Texas changing this reality by using a book on deception and honeypots to study cyber attacker behavior.When I saw this post (https://twitter.com/Dr_Cybercrime/status/1462506991012786190/), I knew immediately I wanted to learn more about how a practitioner's book could be used  to change how we teach the next generation of cybersecurity practitioners - blue teams, red teams, and purple teams alike.During this conversation we get to hear from a practitioner/author, a professor, and a student. We look back to ancient Egyptian tomb-protection practices and work our way to a future where we keep a close eye on the humans with technology. Yes, even though we continue to throw all sorts of technology at the problems we face (yep, the same ones we humans have created), the human is still at the center of these scenarios.As with most things, there's no single easy answer to a problem. This remains true here in this conversation as we ended up talking about the ethical lines drawn around how and where we can study the how/when/why people (bad actors) act when presented with a a variety of opportunities to take advantage of a situation. Is it OK to track bad actors and their behavior? How far can that be taken? Can we do like the ancient Egyptians and lock someone in our cyber tomb if we catch them in a place they shouldn't be?Regardless of your position on this matter, we bring this episode to you "em hotep."____________________________GuestsC. Jordan HowellOn LinkedIn | https://www.linkedin.com/in/c-jordan-howell-39ba4718b/On Twitter | https://twitter.com/Dr_CybercrimeChris SandersOn LinkedIn | https://www.linkedin.com/in/chrissanders88/On Twitter | https://twitter.com/chrissanders88William PalafoxOn LinkedIn | https://www.linkedin.com/in/williamjpalafox/On Twitter | https://twitter.com/wpalafox91____________________________This Episode’s SponsorsHITRUST: https://itspm.ag/itsphitwebImperva: https://itspm.ag/rsaarchweb____________________________ResourcesBook | Intrusion Detection Honeypots: Detection through Deception: https://www.amazon.com/dp/1735188301/____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-securityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Dec 14, 2021 • 46min

Book | Threat Hunting In The Cloud | Redefining Security With Abbas Kudrati, Binil Pillai, And Diana Kelley

The cloud changes many things for businesses and the teams responsible for running their operations in one or more of these as-a-service-oriented environments. An organization's security operations for (and in) the cloud must follow suit.Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against CyberattacksBook AbstractIn Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors.You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation.Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy.____________________________GuestsAbbas KudratiOn LinkedIn | https://www.linkedin.com/in/akudrati/On Twitter | https://twitter.com/askudratiBinil PillaiOn LinkedIn | https://www.linkedin.com/in/binilpillai/On Twitter | https://twitter.com/pillai_binil____________________________Co-HostDiana KelleyOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/diana-kelley____________________________This Episode’s SponsorsArcher: https://itspm.ag/rsaarchwebHITRUST: https://itspm.ag/itsphitweb____________________________ResourcesThreat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks: https://www.amazon.com/Threat-Hunting-Cloud-Defending-Cyberattacks/dp/111980406X/____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-securityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app