Podcasts

ShowMeCon: Azure Vulnerabilities with Scott Miller

Published: April 4, 2024, 8 a.m.
Duration: 22 minutes 4 seconds

Listed in: Technology

ShowMeCon: Unraveling the Cybersecurity Fabric of Space and SCADA Networks with Paul Coggin

Published: April 2, 2024, 8 a.m.
Duration: 35 minutes 36 seconds

Listed in: Technology

ShowMeCon: Talking with the Iceland Viking Arnar

Published: March 26, 2024, 8 a.m.
Duration: 29 minutes 39 seconds

Listed in: Technology

ShowMeCon: Talking Sysmon with Amanda Berlin

Published: March 19, 2024, 10 a.m.
Duration: 29 minutes 5 seconds

Listed in: Technology

ShowMeCon: Couch to Compromise with Johnny Xmas

Published: March 12, 2024, 8 a.m.
Duration: 36 minutes 35 seconds

Listed in: Technology

ShowMeCon: Bypassing MFA with Shameer Amir

Published: March 7, 2024, 1 p.m.
Duration: 20 minutes 50 seconds

Listed in: Technology

Navigating the Currents of Open Source Intelligence: Insights from the Field

Published: March 5, 2024, 9 a.m.
Duration: 43 minutes 1 second

Listed in: Technology

What cybersecurity tools every organization should have

Published: Feb. 27, 2024, 9 a.m.
Duration: 44 minutes 23 seconds

Listed in: Technology

ShowMeCon: Bypassing MFA with Brandon Potter

Published: Feb. 22, 2024, 9 p.m.
Duration: 25 minutes 37 seconds

Listed in: Technology

What is a Canary?

Published: Feb. 20, 2024, 9 a.m.
Duration: 27 minutes 50 seconds

Listed in: Technology

ShowMeCon: Kevin Johnson and whatever he wants to talk about

Published: Feb. 15, 2024, 9 a.m.
Duration: 29 minutes 26 seconds

Listed in: Technology

How to implement a DAST

Published: Feb. 13, 2024, 9 a.m.
Duration: 50 minutes 43 seconds

Listed in: Technology

What is Mimikatz?

Published: Feb. 6, 2024, 9 a.m.
Duration: 30 minutes 36 seconds

Listed in: Technology

How responding to phishing has changed in the last five years

Published: Jan. 30, 2024, 10 a.m.
Duration: 50 minutes 29 seconds

Listed in: Technology

How to hack a satellite

Published: Jan. 23, 2024, 9 a.m.
Duration: 1 hour 14 minutes 36 seconds

Listed in: Technology

What are the hiring trends in cybersecurity for 2024?

Published: Jan. 16, 2024, 10 a.m.
Duration: 50 minutes 31 seconds

Listed in: Technology

What is ShowMeCon 2024?

Published: Jan. 9, 2024, 10 a.m.
Duration: 39 minutes

Listed in: Technology

The Exploring Information Security Relaunch

Published: Jan. 2, 2024, 4:48 p.m.
Duration: 19 minutes 40 seconds

Listed in: Technology

ColaSec News November 2023

Published: Dec. 12, 2023, 2:03 a.m.
Duration: 17 minutes 4 seconds

Listed in: Technology

The Final Episode

Published: March 7, 2019, 1:10 a.m.
Duration: 17 minutes 4 seconds

Listed in: Technology

What is Emotet?

Published: Jan. 14, 2019, 1 a.m.
Duration: 31 minutes 17 seconds

Listed in: Technology

State of the podcast for 2018

Published: Jan. 4, 2019, 3:28 a.m.
Duration: 20 minutes 50 seconds

Listed in: Technology

What's happening at DerbyCon 2018 - Part 2

Published: Nov. 26, 2018, 1 a.m.
Duration: 54 minutes 35 seconds

Listed in: Technology

What's happening at DerbyCon 2018 - Part 1

Published: Nov. 19, 2018, 1 a.m.
Duration: 51 minutes 1 second

Listed in: Technology

What is advanced OSINT?

Published: Nov. 8, 2018, 3:06 a.m.
Duration: 1 hour 5 minutes 14 seconds

Listed in: Technology

When will passwords go away?

Published: Oct. 31, 2018, 1:39 a.m.
Duration: 9 minutes 16 seconds

Listed in: Technology

What we can learn from unusual journeys into infosec - Part 1

Published: Oct. 15, 2018, midnight
Duration: 28 minutes

Listed in: Technology

Why communication in infosec is important - Part 2

Published: Oct. 8, 2018, midnight
Duration: 26 minutes 37 seconds

Listed in: Technology

Why communication in infosec is important - Part 1

Published: Oct. 1, 2018, midnight
Duration: 28 minutes

Listed in: Technology

A conversation with Justin Seitz

Published: Sept. 24, 2018, midnight
Duration: 24 minutes 19 seconds

Listed in: Technology

Why container security is important - Part 2

Published: Sept. 17, 2018, midnight
Duration: 19 minutes 20 seconds

Listed in: Technology

Why container security is important - Part 1

Published: Sept. 10, 2018, 1:34 a.m.
Duration: 25 minutes 41 seconds

Listed in: Technology

What is Hunchly?

Published: Sept. 5, 2018, 1:18 p.m.
Duration: 22 minutes 9 seconds

Listed in: Technology

How to make a Burp extension

Published: Aug. 27, 2018, midnight
Duration: 28 minutes 55 seconds

Listed in: Technology

How to handle CFP rejection(s)

Published: Aug. 20, 2018, midnight
Duration: 28 minutes 29 seconds

Listed in: Technology

How to create a phishing email - Part 2

Published: Aug. 13, 2018, midnight
Duration: 24 minutes 55 seconds

Listed in: Technology

How to create a phishing email - Part 1

Published: Aug. 6, 2018, midnight
Duration: 29 minutes 20 seconds

Listed in: Technology

What is OSINT ORCS YOGA?

Published: July 31, 2018, 3:01 a.m.
Duration: 31 minutes 11 seconds

Listed in: Technology

How to implement GDPR - Part 2

Published: July 16, 2018, midnight
Duration: 26 minutes 10 seconds

Listed in: Technology

How to implement GDPR - Part 1

Published: July 9, 2018, midnight
Duration: 24 minutes 35 seconds

Listed in: Technology

How to crack passwords

Published: July 2, 2018, midnight
Duration: 30 minutes 29 seconds

Listed in: Technology

What is the General Data Protection Regulation (GDPR)

Published: June 25, 2018, midnight
Duration: 25 minutes 20 seconds

Listed in: Technology

How to talk to developers

Published: June 18, 2018, 12:37 p.m.
Duration: 25 minutes 39 seconds

Listed in: Technology

ShowMeCon 2018 Live

Published: June 14, 2018, 2:13 a.m.
Duration: 56 minutes 10 seconds

Listed in: Technology

How to achieve security awareness through social engineering - Part 1

Published: May 28, 2018, midnight
Duration: 30 minutes 16 seconds

Listed in: Technology

What's happening at Converge and Detroit BSides?

Published: May 21, 2018, midnight
Duration: 1 hour 37 minutes 5 seconds

Listed in: Technology

Why mental health is important

Published: May 14, 2018, 1:26 a.m.
Duration: 35 minutes 20 seconds

Listed in: Technology

What are bug bounty programs?

Published: May 7, 2018, 12:59 a.m.
Duration: 37 minutes 30 seconds

Listed in: Technology

What is SANS SEC487? Part 2

Published: April 30, 2018, midnight
Duration: 20 minutes 24 seconds

Listed in: Technology

What is SANS SEC487? Part 1

Published: April 23, 2018, midnight
Duration: 27 minutes 46 seconds

Listed in: Technology

What are BEC attacks?

Published: April 16, 2018, midnight
Duration: 27 minutes 48 seconds

Listed in: Technology

How to prepare for an infosec interview

Published: April 9, 2018, midnight
Duration: 19 minutes 2 seconds

Listed in: Technology

How to build a malicious link clicker

Published: April 2, 2018, midnight
Duration: 40 minutes 59 seconds

Listed in: Technology

Why contributing to the infosec community is important

Published: March 26, 2018, midnight
Duration: 19 minutes 18 seconds

Listed in: Technology

How to submit a presentation to a conference - Part 1

Published: March 12, 2018, midnight
Duration: 22 minutes 27 seconds

Listed in: Technology

What is Social Engineering for the Blue Team?

Published: March 5, 2018, 1 a.m.
Duration: 16 minutes 2 seconds

Listed in: Technology

What's happening in OSINT?

Published: Feb. 26, 2018, 1 a.m.
Duration: 1 hour 27 minutes 16 seconds

Listed in: Technology

How to become a social engineer - Part 2

Published: Feb. 19, 2018, 1 a.m.
Duration: 20 minutes 29 seconds

Listed in: Technology

How to become a social engineer - Part 1

Published: Feb. 12, 2018, 1 a.m.
Duration: 20 minutes 36 seconds

Listed in: Technology

How to hack iOS - Part 2

Published: Feb. 5, 2018, 1 a.m.
Duration: 28 minutes

Listed in: Technology

How to hack iOS - Part 1

Published: Jan. 29, 2018, midnight
Duration: 27 minutes 4 seconds

Listed in: Technology

What is Converge and BSides Detroit?

Published: Jan. 22, 2018, 1 a.m.
Duration: 30 minutes 27 seconds

Listed in: Technology

How to build an AppSec Pipeline

Published: Jan. 15, 2018, 1 a.m.
Duration: 27 minutes 22 seconds

Listed in: Technology

What's ahead for the Exploring Information Security podcast in 2018

Published: Jan. 8, 2018, 1:28 a.m.
Duration: 14 minutes 39 seconds

Listed in: Technology

How to overcome imposter syndrome

Published: Jan. 1, 2018, 1 a.m.
Duration: 28 minutes 41 seconds

Listed in: Technology

What is the Rural Technology Fund?

Published: Dec. 24, 2017, 1 p.m.
Duration: 28 minutes 6 seconds

Listed in: Technology

How to build your own tools - Part 2

Published: Dec. 18, 2017, 1 a.m.
Duration: 18 minutes 38 seconds

Listed in: Technology

How to build your own tools - Part 1

Published: Dec. 11, 2017, 1 a.m.
Duration: 25 minutes 4 seconds

Listed in: Technology

What is the Orange Team?

Published: Dec. 4, 2017, 1 a.m.
Duration: 30 minutes 11 seconds

Listed in: Technology

How to secure NodeJS

Published: Nov. 27, 2017, 1 a.m.
Duration: 30 minutes 46 seconds

Listed in: Technology

What is the Node Security Platform?

Published: Nov. 20, 2017, 1 a.m.
Duration: 29 minutes 15 seconds

Listed in: Technology

Why we need to get outside the infosec echo chamber

Published: Nov. 13, 2017, 1:13 a.m.
Duration: 11 minutes 29 seconds

Listed in: Technology

How to hack a car

Published: Nov. 6, 2017, 1 a.m.
Duration: 25 minutes 55 seconds

Listed in: Technology

How to implement the CSF from NIST

Published: Oct. 30, 2017, midnight
Duration: 30 minutes 34 seconds

Listed in: Technology

What is the OWASP Threat Dragon?

Published: Oct. 24, 2017, 12:17 a.m.
Duration: 28 minutes 53 seconds

Listed in: Technology

What's happening at DerbyCon?

Published: Oct. 16, 2017, midnight
Duration: 1 hour 26 minutes 45 seconds

Listed in: Technology

What's happening at BSides Augusta?

Published: Oct. 9, 2017, 1:13 a.m.
Duration: 1 hour 34 minutes 54 seconds

Listed in: Technology

How to setup a pineapple?

Published: Oct. 2, 2017, midnight
Duration: 28 minutes 34 seconds

Listed in: Technology

What is isolated browsing?

Published: Sept. 25, 2017, midnight
Duration: 28 minutes 29 seconds

Listed in: Technology

Why getting into infosec is hard

Published: Sept. 19, 2017, 3:14 a.m.
Duration: 29 minutes 18 seconds

Listed in: Technology

What it's like in the SECTF soundbooth

Published: Sept. 11, 2017, midnight
Duration: 26 minutes 33 seconds

Listed in: Technology

What are memory forensics?

Published: Sept. 4, 2017, midnight
Duration: 27 minutes 37 seconds

Listed in: Technology

What does Chris Maddalena, Kyle Andrus, and Daniel Ebbutt think about security at DEFCON?

Published: Aug. 28, 2017, midnight
Duration: 1 hour 29 minutes 17 seconds

Listed in: Technology

What is BSides Bordeaux

Published: Aug. 21, 2017, midnight
Duration: 29 minutes 57 seconds

Listed in: Technology

How to prepare for the OSCP - Part 2

Published: Aug. 14, 2017, midnight
Duration: 29 minutes

Listed in: Technology

How to prepare for the OSCP - Part 1

Published: Aug. 7, 2017, midnight
Duration: 26 minutes 54 seconds

Listed in: Technology

What are the steps to secure application development?

Published: July 31, 2017, midnight
Duration: 23 minutes 29 seconds

Listed in: Technology

Why is passion an infosec requirement?

Published: July 24, 2017, midnight
Duration: 31 minutes 2 seconds

Listed in: Technology

How to join the infosec community - part 2

Published: July 17, 2017, midnight
Duration: 17 minutes 53 seconds

Listed in: Technology

How to join the infosec community - part 1

Published: July 10, 2017, midnight
Duration: 27 minutes 18 seconds

Listed in: Technology

What does Jayson E. Street, Dave Chronister, Johnny Xmas, April Wright, and Ben Brown think about security?

Published: July 3, 2017, midnight
Duration: 1 hour 32 minutes 47 seconds

Listed in: Technology

What is malware analysis - part 2

Published: June 26, 2017, midnight
Duration: 30 minutes 27 seconds

Listed in: Technology

What is malware analysis - part 1

Published: June 19, 2017, midnight
Duration: 24 minutes 44 seconds

Listed in: Technology

Why social skills are important - part 3

Published: June 12, 2017, midnight
Duration: 21 minutes 19 seconds

Listed in: Technology

Why social skills are important - part 2

Published: June 5, 2017, midnight
Duration: 19 minutes 55 seconds

Listed in: Technology

Why social skills are important - part 1

Published: May 29, 2017, midnight
Duration: 25 minutes 31 seconds

Listed in: Technology

How to pick a lock

Published: May 22, 2017, midnight
Duration: 29 minutes 3 seconds

Listed in: Technology

How to get a DerbyCon ticket

Published: May 15, 2017, midnight
Duration: 11 minutes 43 seconds

Listed in: Technology

What is hardware hacking?

Published: May 8, 2017, midnight
Duration: 22 minutes 38 seconds

Listed in: Technology

What is threat intelligence? - Part 2

Published: May 1, 2017, midnight
Duration: 23 minutes 59 seconds

Listed in: Technology

What is threat intelligence? - Part 1

Published: April 24, 2017, midnight
Duration: 30 minutes 12 seconds

Listed in: Technology

How Macs get Malware

Published: April 17, 2017, midnight
Duration: 26 minutes 16 seconds

Listed in: Technology

What is ShowMeCon?

Published: April 10, 2017, midnight
Duration: 23 minutes 9 seconds

Listed in: Technology

What is the OSINT Framework?

Published: April 3, 2017, midnight
Duration: 20 minutes 2 seconds

Listed in: Technology

What is the internet of things?

Published: March 27, 2017, midnight
Duration: 31 minutes 32 seconds

Listed in: Technology

What is BSides Nashville?

Published: March 20, 2017, midnight
Duration: 24 minutes 37 seconds

Listed in: Technology

What is it like to work in a security operations center (SOC)?

Published: March 13, 2017, midnight
Duration: 27 minutes 20 seconds

Listed in: Technology

How to secure Docker

Published: March 6, 2017, 1 a.m.
Duration: 19 minutes 3 seconds

Listed in: Technology

Who is looking for more in infosec - Feb 27, 2017

Published: Feb. 28, 2017, 1 p.m.
Duration: N/A

Listed in: Technology

How to become a penetration tester - Part 2

Published: Feb. 27, 2017, 1 a.m.
Duration: 18 minutes 22 seconds

Listed in: Technology

How to become a penetration tester - Part 1

Published: Feb. 20, 2017, 1 a.m.
Duration: 25 minutes 30 seconds

Listed in: Technology

What is BSides Indy?

Published: Feb. 13, 2017, 1 a.m.
Duration: 16 minutes 35 seconds

Listed in: Technology

What is DefectDojo?

Published: Feb. 6, 2017, 1 a.m.
Duration: 22 minutes 38 seconds

Listed in: Technology

What is decentralized IT? - Part 2

Published: Jan. 30, 2017, 1 a.m.
Duration: 20 minutes 5 seconds

Listed in: Technology

What is decentralized IT? - Part 1

Published: Jan. 23, 2017, 1 a.m.
Duration: 18 minutes 30 seconds

Listed in: Technology

What is BSides Hunstville?

Published: Jan. 16, 2017, 1 a.m.
Duration: 21 minutes 2 seconds

Listed in: Technology