Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Episode | Date |
---|---|
SOC Talk: Cyber Safety Review Board and the Log4j Report
|
Aug 10, 2022 |
Teaching and Learning Cybersecurity: Closing the Skills Gap, Part 2
|
Jun 23, 2022 |
Teaching and Learning Cybersecurity: Closing the Skills Gap, Part 1
|
Jun 06, 2022 |
Pentest Perspective: Taking a Look at Social Engineering
|
Apr 25, 2022 |
SOC Talk: Red Teaming for NECCDC
|
Apr 06, 2022 |
SOC Talk: The Russia-Ukraine War Follow-up
|
Mar 25, 2022 |
SOC Talk: VPNs and Personal Security
|
Mar 16, 2022 |
Preventing, Identifying, and Mitigating DDoS Attacks
|
Mar 02, 2022 |
SOC Talk: The Russia-Ukraine Crisis
|
Feb 25, 2022 |
SOC Talk: Our Favorite Open Source Security Tools
|
Feb 17, 2022 |
SOC Talk: Malware on USB
|
Feb 02, 2022 |
SOC Talk: Log4Shell
|
Jan 21, 2022 |
Pentesters’ Perspective: Log4Shell
|
Jan 19, 2022 |
Wireless Security: Identifying Risks and Hardening Your Network
|
Jan 05, 2022 |
SOC Talk: The Log4Shell Vulnerability
|
Dec 14, 2021 |
CISA Adds Single-Factor Authentication to list of Bad Practices
|
Nov 30, 2021 |
Ads and Safeframes: Keeping your site safe(r)
|
Nov 17, 2021 |
Physical Security: Identifying Risks and Hardening Your Systems
|
Nov 03, 2021 |
Cybersecurity Chat: A Perspective on Apple‘s Bug Bounty Program
|
Oct 22, 2021 |
Infosec Community: Diversity and Inclusion, Part 3
|
Oct 07, 2021 |
Infosec Community: Diversity and Inclusion, Part 2
|
Jul 20, 2021 |
Infosec Community: Diversity and Inclusion, Part 1
|
Jun 28, 2021 |
Security, Machine Learning, and Splunk
|
Jun 07, 2021 |
SOC Talk: IoT and Security
|
May 24, 2021 |
Pentest Insights: Attacking networks and applications
|
May 14, 2021 |
Addressing the Security Skills Gap
|
Apr 28, 2021 |
Pentest Stories: Responsible vulnerability disclosure
|
Apr 14, 2021 |
Designing a SOC Part 2: Successful partnerships with MSSPs
|
Mar 30, 2021 |
Designing a SOC: Internal or External? Part 1
|
Mar 08, 2021 |
Water Plant Breach: Security Best Practice Feature
|
Feb 24, 2021 |
An Inside Look at the Collegiate Penetration Testing Competition
|
Feb 09, 2021 |
Creating a Vulnerability Management Policy
|
Jan 28, 2021 |
FireEye & SolarWinds Follow-Up with Senior SOC Analyst Tony Robinson
|
Jan 13, 2021 |
FireEye and SolarWinds Breaches Q&A with Senior SOC Analyst Tony Robinson
|
Dec 14, 2020 |
Improving Security Defenses with MITRE ATT&CK: Part 2
|
Sep 17, 2020 |
Improving Security Defenses with MITRE ATT&CK: Part 1
|
Sep 15, 2020 |
Straight from the SOC: Team Interview with Heather Terry and Hurricane Labs
|
Jul 07, 2020 |
The Women in Tech-quila Episode: Raising a Toast to Women in STEM
|
Jun 05, 2020 |
Reflections on the Technical Communication Summit 2020
|
May 28, 2020 |
Hurricane Labs Podcast for Splunk: The "We may be broken, but we still know some stuff about Splunk" Episode
|
Jun 06, 2018 |
IoT: But y tho?
|
Feb 10, 2017 |
Hurricane Labs Podcast for Splunk: Third Edition
|
Oct 26, 2016 |
Isn't ransomware hosted in Transylvania?
|
May 13, 2016 |
Hurricane Labs Podcast for Splunk: Second Edition
|
Mar 16, 2016 |
No, You Can't Close Pandora's Box
|
Feb 26, 2016 |
Blurred Lines and the Murkiness of Cyberwar
|
Dec 18, 2015 |
Hurricane Labs Podcast for Splunk: First Edition
|
Nov 09, 2015 |
Out of Sight and Beyond Oversight
|
Oct 01, 2015 |
Oh, so life really can slap you with consequences...
|
Aug 28, 2015 |
"Don't Bother Trusting, Verify Everything" - Feat. Wolfgang Goerlich, Cyber Security Strategist, CBI
|
Jul 20, 2015 |
Security Issues Don't Just Appear Out Of Thin Air...
|
Jun 25, 2015 |
[Episode .03 Feature Debate] Are Airplane Hackers Good or Bad?
|
May 28, 2015 |
But Wait, Where's the Logjam Logo?!
|
May 27, 2015 |
The Cyber Buzzwordy Breachy WordPress Edition
|
Apr 22, 2015 |
The Reboot
|
Mar 16, 2015 |