Security Noise

By TrustedSec

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by TrustedSec

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 52
Reviews: 0
Episodes: 100

Description

In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, an end-to-end cybersecurity consulting company using our expertise, technical skills, and ethical character to secure what's important and achieve what matters.

Episode Date
8.5 - Footprint Discovery for Red Teamers
Nov 03, 2025
8.4 - CON Men: Wild West Hackin' Fest + GrrCON
Oct 24, 2025
8.3 - Cybersecurity Awareness Month 2025
Oct 06, 2025
8.2 - Can You Wear a White Hat After Labor Day?
Sep 22, 2025
8.1 - Hacker Summer Camp
Sep 08, 2025
7.19 - Hacker Culture: The Self Modifying Code
Jul 01, 2025
7.18 - Hacking with AI
Jun 16, 2025
7.17 - RE: Active Directory
Jun 02, 2025
7.16 - What the DIT?
May 12, 2025
7.15 - Trust Me, at Least This Week!
Apr 28, 2025
7.14 - SOC Market: Trends in Threat Detection
Apr 14, 2025
7.13 - Oops I Clicked It Again: Business Email Compromise Explained
Mar 24, 2025
7.12 - CactusCon: A Succulent Security Event
Mar 06, 2025
7.11 - Time Is Running Out For TikTok
Feb 21, 2025
7.10 - Authentication in 2025
Feb 04, 2025
7.9 - User Enum CONversation w/ nyxgeek
Jan 17, 2025
7.8 - Farewell 2024
Dec 20, 2024
7.7 - Amazing Stories in InfoSec
Dec 06, 2024
7.6 - Ghost in The Machine: Hardware Hacking w/ Rob Simon
Nov 14, 2024
7.5 - The Rootin' Tootin' Best of Wild West Hackin' Fest
Nov 01, 2024
7.4 - Who's On My Network?
Oct 18, 2024
7.3 - Security Outlook: Cloudy
Oct 04, 2024
7.2 - What I Did at Hacker Summer Camp
Sep 19, 2024
7.1 - CrowdStrike After Action
Sep 03, 2024
6.23 - InfoSec Leaders of the Future
Jun 28, 2024
6.22 - VPNs: Can You Keep a Secret?
Jun 07, 2024
6.21 - JS-Tap Mk II: A Powerful Tool for Web Application Monitoring and Attack
May 23, 2024
6.20 - Targets Operations, Co-Pwnership
May 10, 2024
6.19 - InfoSec: Cybersecurity Education at Bedford High
Apr 26, 2024
6.18 - Careers in InfoSec: Where do you want to go today?
Apr 11, 2024
6.17 - A Royal OSINT
Mar 29, 2024
6.16 - Leak Week: Plumbing the Depths of Privacy Pitfalls
Mar 08, 2024
6.15 - OSINT: Digital Detective or Cyber Stalking?
Feb 23, 2024
6.14 - Extraordinary Incident Responders and Where to Find Them
Feb 02, 2024
6.13 - Cyber Prophecies for 2024
Jan 19, 2024
6.12 - Yule Time Tool Time
Dec 08, 2023
6.11 - The Road Ahead: Red Teaming and Targeted Ops
Nov 10, 2023
6.10 - The Road Ahead: Network Penetration Testing
Oct 27, 2023
6.9 - The Road Ahead: Evolution of AppSec Blue Team
Oct 06, 2023
6.8 - The Road Ahead: AppSec
Sep 15, 2023
6.7 - DEF CON Debrief
Aug 25, 2023
6.6 - Episode VI: Farewell Mr. Mitnick
Aug 04, 2023
6.5 - Episode V: GreyHats Strike Back
Jul 21, 2023
6.4 - Episode IV: More Scary Stories
Jun 30, 2023
6.3 - Episode III: The Search For Terrestrial Artificial Intelligence
Jun 02, 2023
6.2 - Episode II Attacks on the Mobile Clients
May 12, 2023
6.1 - Head in the Clouds
Apr 20, 2023
5.21 - Turn 21
Mar 24, 2023
5.20 - Chatting with Code in the Cloud
Mar 17, 2023
5.19 - The Coffeemaker Needs a VLAN
Mar 03, 2023
5.18 - Looking Inside the Things
Feb 10, 2023
5.17 - C++ On the No-Fly List
Jan 27, 2023
5.16 - LastPass the Last Time Honest (Well Maybe)
Jan 06, 2023
5.15 - Quantum Malware and Your Passwords (again)
Dec 09, 2022
5.14 - Nothing to See Here, Move Along
Nov 21, 2022
5.13 - A Dastardly End for Windows 7
Nov 07, 2022
5.12 - BYO-Driver and GrrCon
Oct 17, 2022
5.11 - Word Clouds, Password Clouds
Sep 27, 2022
5.10 - Uber Responsibility
Sep 27, 2022
5.9 - Pre-Shared (Private) Keys
Aug 29, 2022
5.8 - Who is Reading Your Gmail?
Aug 05, 2022
5.7 - Privacy Screen
Jul 22, 2022
5.6 - A Nice Relaxing Dip into Powershell
Jul 05, 2022
5.5 - Outspending the Ransomware Gangs
Jun 17, 2022
5.4 - Free Sushi
Jun 03, 2022
5.3 - Intergalactic Security Outpost
May 13, 2022
5.2 - Hope I Never Lose My Crypto-Wallet
Apr 25, 2022
5.1 - Hi, I am Officer Friendly
Apr 11, 2022
5.0 - Report All The Things
Mar 18, 2022
5.0preAlpha1 - Shocking Revelations
Mar 04, 2022
4.27 - Macro Vision
Feb 11, 2022
4.26 - Calling all Malware Authors
Jan 28, 2022
4.25 - Dependency Hell
Jan 14, 2022
4.24 - Sealing Wax and Other Fancy Stuff
Dec 10, 2021
4.23 - Don't Sideload This Podcast
Nov 15, 2021
4.22 - That is a Lot Mobile Data You Have There
Oct 29, 2021
4.21 - A Route to Failure
Oct 08, 2021
4.20 - How the Sausage is a Made
Sep 24, 2021
4.19 - Where Do Want to Work Today?
Sep 03, 2021
4.18 - Hacker to Hacker - Petit Potam
Aug 06, 2021
4.17 - It's Zero-day in the Mobile Phone World
Jul 23, 2021
4.16 - What Do Printer Techs Make These Days?
Jul 02, 2021
4.15 - A Breach is a Breach No Matter How Small
Jun 18, 2021
4.14 - Because 4.13 Could Never Have Brought Us Luck
May 28, 2021
4.12 - Got Gas?
May 14, 2021
4.11 - A Bountiful Harvest of Exploits
Apr 30, 2021
4.10.1998 - You Have Only Yourself to Blame
Apr 16, 2021
4.9 - Message Me that Review
Mar 26, 2021
4.8 - Go Watch Exchange
Mar 12, 2021
4.7 - Flash and Malware Sharing One Last Headline?
Feb 26, 2021
4.6 - Let's Pour Cold Water on Your F A V I C O N S!
Feb 12, 2021
4.5 - Hello Fellow 0-day Researchers!
Jan 29, 2021
4.4 - Opsec is Hard
Jan 15, 2021
4.3 - Security Dumpster Fire
Dec 14, 2020
4.2 - Can you Trust Criminal Types with your IPs?
Nov 16, 2020
4.1 - A Preview of Things to Come
Oct 30, 2020
4.0 - Shameless Version Bump!
Oct 02, 2020
3.36 - Download My Tesla Theme
Sep 11, 2020
3.35 - Pub
Aug 28, 2020
3.34 - Taken your Pulse Lately?
Aug 07, 2020