Cyber Work cover art

All Episodes

Cyber Work — 392 episodes

#
Title
1

From stealing servers to saving lives: Working in red teaming | Jim Broome

2

Why Hackers Are Stealing Encrypted Data Now To Decrypt Later | David Close

3

Working in ransomware response, investigation and recovery | John Price

4

From security audits to privacy consulting: Building a GRC practice | Will Sweeney

5

From "dead-end job" to CEO: Building an IT consulting business | John Hansman

6

From FBI Cyber Agent to Police Tech Innovator | Andre McGregor

7

Build your own pentesting tools and master red teaming tactics | Ed Williams

8

The Future is Cloud: Master Azure Certs for Cybersecurity Success | Guest Wilfredo Lanz

9

Cloud career roadmap: Azure Administrator vs Security Engineer certs | Guest Wilfredo Lanz

10

When AI Goes Rogue: API Security in the Age of AI Agents | Guest Sam Chehab

11

Why Medical Device Security Needs Transparency: The SBOM Revolution | Guest Ken Zalevsky

12

From CIA to CISO: AI security predictions and career strategies | Guest Ross Young

13

Securing Apple vs Windows: Which is harder? | Guest Weldon Dodd

14

Using  ChatGPT for Offensive Security | Guest Robert Morel

15

CompTIA Network+ training: What to expect in a boot camp | Instructor Tommy Gober

16

Understanding CompTIA CEUs: How to renew your Network+ | Guest Tommy Gober

17

Network+ practice questions: Tips to pass your exam | Guest Tommy Gober

18

CompTIA Network+: Is it necessary for a cybersecurity career? | Guest Tommy Gober

19

Incident response: What I learned from a hands-on project | Guest Gamuchirai Muchafa

20

How to hack an API: A walkthrough | Guest Katie Paxton-Fear

21

CompTIA CySA+: Your key to cybersecurity analyst roles | Guest James Stanger

22

Penetration testing careers 101: Learning and getting certified | Cyber Work Hacks

23

Understanding DoD 8140 and CompTIA certifications | Cyber Work Hacks

24

Certifications 101: Why A+, Network+ and Security+ are game changers | Cyber Work Hacks

25

Navigating ISO 27001 and cybersecurity management | Guest Gry Evita Sivertsen

26

Mentorship and career growth in cybersecurity | Guest Anneka Gupta

27

How secure is your food: Cybersecurity threats and careers | Guest Jonathan Braley

28

Becoming an API security and bug bounty pro | Guest Katie Paxton-Fear

29

Navigating cybersecurity careers: Non-traditional roles to consider | Guest Paige Hanson

30

AI in GRC: Dr. Shayla Treadwell on balancing innovation and risk | Cyber Work Podcast

31

Cybersecurity in the AI era: Busting myths and practical advice | Guest Alex Sharpe

32

Cybersecurity's future: Preparing the next gen of professionals | Guest Tia Hopkins

33

What you will learn about cybersecurity soft skills | Guest Cicero Chimbanda

34

Honing your security manager soft skills on the job | Guest Cicero Chimbanda

35

One thing a cybersecurity manager should know | Guest Cicero Chimbanda

36

One tip for security managers to keep teams fulfilled | Guest Cicero Chimbanda

37

Cybersecurity projects to demonstrate your skills

38

Cybersecurity jobs — where to begin | Guest Professor Robert McMillen

39

How to begin cybersecurity training | Guest Professor Robert McMillen

40

How to get started in cybersecurity: Beginner steps you can take now | Cyber Work Live

41

Creating a career roadmap for the cybersecurity beginner

42

Why do C-suites instinctively fire the CISO when a breach happens? | Guest Jonathan Gill

43

Cyber resiliency and national defense | Guest Georgianna "George" Shea

44

Using the CEH to create an ethical hacker career path

45

Why is Log4J still so successful? | Guest Etay Maor

46

All about identity access management with the Identity Jedi | Guest David Lee

47

Cybersecurity’s role in U.S. foreign relations | Guest Tom Siu

48

Breaking down CEH exam questions with an Infosec expert

49

Roku’s hacked data breach – will we never learn our lesson? | Guest Zarik Megerdichian

50

Unlocking data privacy: Insights from the data diva | Guest Debbie Reynolds

51

Inside a CEH boot camp: Advice from an Infosec instructor

52

Revolutionizing digital identity, data privacy and data security | Guest Raj Ananthanpillai

53

OT cybersecurity jobs are everywhere, so why is nobody taking them? | Guest Mark Toussaint

54

Mastering the certified ethical hacker exam: Strategies and insights with Akyl Phillips

55

MGM Grand breach: How attackers got in and what it means for security | Guest Aaron Painter

56

Jumping into the CCNA with both feet | Cyber Work Hacks

57

What's it like to be the CISO for the state of Connecticut? | Guest Jeffrey Brown

58

Careers in operational technology: What does a security risk assessor do? | Guest Donovan Tindill

59

What a CCNA boot camp is like | Cyber Work Hacks

60

How to get started in industrial control systems cybersecurity | Guest Robin Berthier

61

Working as a CIO and the challenges of endpoint security| Guest Tom Molden

62

Are you ready for the CCNA exam? Test yourself with these questions | Cyber Work Hacks

63

Working in manufacturing security: Top challenges and career advice | Guest Theresa Lanowitz

64

Modern industrial control system security issues | Guest Thomas Pace

65

Passing the CCNA exam: Tips and tricks from an instructor | Cyber Work Hacks

66

CISSP is changing! Common body of knowledge changes for 2024 | Cyber Work Hacks

67

CISSP exam tips and tricks: Top test-taking strategies | Cyber Work Hacks

68

CISSP exam tips and tricks: Avoiding common mistakes | Cyber Work Hacks

69

What help do CISOs need in 2024? | Guest Alicia Olson

70

What a CISSP boot camp is like | Cyber Work Hacks

71

Ethical hacking careers vs. cinema: What it's like to work as a hacker | Cyber Work Live

72

Renewing your Security+ certification | Cyber Work Hacks

73

A career in dental cybersecurity? Drilling down into this unique role | Guest Tom Terronez

74

Security+ Boot Camp: What to expect during your training | Cyber Work Hacks

75

Are remote workers more security-savvy than on-premises? | Guest Joseph Nwanpka

76

Security+ exam questions and answers: What to expect | Cyber Work Hacks

77

45 billion cyberattacks a day?! Media myths and working in cybersecurity | Guest Ken Westin

78

Security+ exam tips: What changed and how to pass the new exam | Cyber Work Hacks

79

The Wild West era of data collection is over | Guest Sean Falconer

80

Don't chase unicorns to fix the cybersecurity skills gap | Guest Adrianna Iadarola

81

Neurodiversity and cybersecurity leadership positions | Guest Anthony Pacilio

82

What it's like to be a CISO — and why they don't need more tech | Guest Dan Roberts

83

Empowering African Women through Cybersecurity | Guest Confidence Staveley

84

The transformative power of neurodiversity in cybersecurity practices | Guest Ian Campbell

85

National security cyber issues and Stanford’s cyber policy program | Guest AJ Grotto

86

The role of film storytelling in making education stick | Cyber Work Hacks

87

The future of passwords | Guest Tomas Smalakys

88

AI and the rise of DDoS attacks | Guest Anna Claiborne

89

How generative AI can be used by bad actors | Guest Oliver Tavakoli

90

How AI is affecting GRC and the future of cybersecurity | Guest Heather Buker

91

Finding and supporting neurodiverse cybersecurity professionals | Guest Tara D. Anderson

92

Cybersecurity investment and launching new companies | Guest Leslie Lynn Smith

93

Bringing coding skills to underserved communities | Guest Brianne Caplan

94

From software engineer to career coach for women in tech leadership | Guest Limor Bergman-Gross

95

ICS security, Blue Team Con and security work in the Air Force Reserve | Guest Lesley Carhart

96

Digital forensics careers: Facts versus fiction | Cyber Work Live

97

Uplifting women for leadership in the cybersecurity industry | Guest Katie O'Malley

98

The changing responsibilities of the CISO position | Guest Mike Scott

99

Crafting a basic disaster recovery plan | Cyber Work Hacks

100

Digital safety services and equity in cybersecurity | Guest Leigh Honeywell

101

Disaster recovery plans for small businesses | Guest Eric Sugar

102

Asset detection at home | Cyber Work Hacks

103

The nuts and bolts of asset detection and asset mapping | Guest Huxley Barbee

104

The current state of crypto crime | Guest Lili Infante

105

Is CompTIA’s Cloud+ certification right for you? | Cyber Work Hacks

106

Reframing cybersecurity automation and its uses | Guest Leonid Belkind

107

The fundamentals of GitHub | Cyber Work Hacks

108

Changing careers to cybersecurity | Guest Dara Gibson

109

Women Impact Tech’s work in the cybersecurity industry | Guest Paula Bratcher Ratliff

110

Optimizing your digital forensics profile while job searching | Cyber Work Hacks

111

Moving from “shift left” to “born left” | Guest David Melamed

112

Set up your cybersecurity practice lab | Cyber Work Hacks

113

Overcoming burnout in cybersecurity and VMware’s XDR announcement | Guest Karen Worstell

114

Understanding developer behavior can augment DevSecOps | Guest Nir Valtman

115

Cybersecurity team cohesion in remote settings | Cyber Work Hacks

116

CompTIA Data+ certification: Is it a good fit for your career? | Guest James Stanger

117

Sorry, Terminator fans, ChatGPT is not going to become Skynet | Guest Jack Nichelson

118

Breaking down digital forensics certifications | Cyber Work Hacks

119

A deep dive into GitHub's security strategy | Guest Jacob DePriest

120

Goodbye (ISC)² CAP, hello new CGRC certification | Cyber Work Hacks

121

Asset visibility and vulnerability detection | Guest Yossi Appleboum

122

How to set up a digital forensics lab | Cyber Work Hacks

123

Inside the Pentagon's new zero-trust policy | Guest Steve Judd

124

Biggest cybercrime trends heading into 2023 | Guest Paul Giorgi

125

ISACA CISM changes: Less focus on management, more on security | Cyber Work Hacks

126

How SOCs are changing: Location, remote work and more | Guest A.N. Ananth

127

The changing roles of red teaming | Guest Matt Lorentzen

128

How to keep symmetric and asymmetric cryptography straight | Cyber Work Hacks

129

U.S. Cyber Games Season II: Behind the scenes with the head coach | Guest Ken Jenkins

130

Connecting cloud security, data privacy and cybersecurity | Guest Ameesh Divatia

131

K-12 cybersecurity: Protecting schools from cyber threats | Guest Mike Wilkinson

132

Behind the scenes of ransomware negotiation | Guest Tony Cook

133

CMMC has changed: Here's what you need to know | Guest Leighton Johnson

134

Cybersecurity public speaking techniques | Guest Lisa Tetrault

135

Digital identity and cybersecurity are inseparable | Guest Susan Morrow

136

Bad data privacy protocols can become an identity fraud disaster | Guest Stephen Cavey

137

Privacy and international business | Guest Noriswadi Ismail

138

Attack surface managers and the state of attack surfaces | Guest Dave Monnier

139

The importance of API security and PII | Guest Giora Engel

140

Corporate data breaches and security awareness training | Guest Mathieu Gorge

141

Overcoming challenges to build a cybersecurity career | Guest Dr. Chanel Suggs

142

What's it like to work in emergency response? | Guest Christopher Tarantino

143

Securing operational technology: ICS, IoT, AI and more | Guest Francis Cianfrocca

144

Cybersecurity project management: A peek behind the curtain | Cyber Work Live

145

OWASP Top 10: What cybersecurity professionals need to know | Guest John Wagnon

146

Your personal data is everywhere: What can you do about it? | Guest Mark Kapczynski

147

Keeping your inbox safe: Real-life BEC attacks and email fraud careers | Guest John Wilson

148

Cybersecurity has a marketing problem — and we're going to fix it | Guest Alyssa Miller

149

What does a secure coder do? | Cybersecurity Career Series

150

Cybersecurity jobs: How to better apply, get hired and fill open roles | Guest Diana Kelley

151

Ethical user data collection and machine learning | Guest Ché Wijesinghe

152

Working as a privacy manager | Cybersecurity Career Series

153

What does a cybersecurity beginner do? | Cybersecurity Career Series

154

What does an ICS security practitioner do? | Cybersecurity Career Series

155

A public discussion about privacy careers: Training, certification and experience | Cyber Work Live

156

What does a security engineer do? | Cybersecurity Career Series

157

What does an information risk analyst do? | Cybersecurity Career Series

158

The importance of cyber threat research | Guest Moshe Zioni

159

Security awareness and social engineering psychology | Guest Dr. Erik Huffman

160

Better cybersecurity practices for journalists | Guest Marcus Fowler

161

What makes a good cyber range? | Guest Justin Pelletier

162

Cybersecurity and all things privacy | Guest Chris Stevens

163

Working in DevOps | Guest Steve Pereira

164

Working as a digital forensics analyst | Cybersecurity Career Series

165

Three foundational cybersecurity certifications | Guest Mike Meyers

166

What does a security architect do? | Cybersecurity Career Series

167

Data backup in ransomware situations | Guest Curtis Preston, aka “Mr. Backup”

168

Long-term cybersecurity career strategies | Guest Maxime Lamothe-Brassard

169

Avoiding hardware-based cybersecurity threats | Guest Jessica Amado

170

What does a cloud security engineer do? | Cybersecurity Career Series

171

Cybersecurity project management: Your career starts here | Cyber Work Live

172

What does a SOC analyst do? | Cybersecurity Career Series

173

Top cybersecurity breaches of 2021 | Guest Keatron Evans

174

What does a security manager do? | Cybersecurity Career Series

175

Predictions for cybersecurity in 2022 | Guest Andrew Howard

176

What does a penetration tester do? | Cybersecurity Career Series

177

Security risks facing streamers on Twitch and YouTube | Guest Roderick Jones

178

High-tech hacking tools and how to defend against them | Guest Bentsi Ben-Atar

179

How to work in cloud security | Guest Menachem Shafran

180

How to get started with bug bounties and finding vulnerabilities | Guest Casey Ellis

181

How to begin your own cybersecurity consulting business | Guest Kyle McNulty

182

How to disrupt ransomware and cybercrime groups | Guest Adam Flatley

183

How to become a cyber threat researcher | Guest John Bambenek

184

How to become a great cybersecurity leader and manager | Guest Cicero Chimbanda

185

Cybersecurity collaboration, team building and working as CEO | Guest Wendy Thomas

186

How to learn web application security | Guest Ted Harrington

187

How to become a secure coder | Guest Chrys Thorsen

188

Learning Linux is key to building your cybersecurity skills | Guest Jasmine Jackson

189

Cryptography, encryption and building a secure photo app | Guest Alex Amiryan

190

Saving McDonald’s from a possible data breach | Guest Connor Greig

191

Inside the Security Yearbook: Industry trends, career advice and more! | Guest Richard Stiennon

192

Diversity, equity and inclusion in cybersecurity hiring | Cyber Work Live

193

Episode 200 extravaganza! Best of the Cyber Work Podcast (and $1,000 in prizes!)

194

How to excel at penetration testing | Guest Gemma Moore

195

Becoming an ethical hacker with Offensive Security | Guest Ning Wang

196

Consumer protection careers: Fraud, identity theft and social engineering | Guest Adam Levin

197

How to become a cybersecurity threat intelligence professional | Guest Neal Dennis

198

Tips on entering blue teaming, red teaming or purple teaming | Guest Snehal Antani

199

CMMC is coming: Here's what cybersecurity professionals need to know | Guest Frank Smith

200

Red teaming: The fun, and the fundamentals | Cyber Work Live

201

How remote work is impacting federal cybersecurity careers | Guest Becky Robertson

202

Building a billion-dollar cybersecurity company | Guest Sam King

203

How to pick your cybersecurity career path | Guest Alyssa Miller

204

How hackathons can help propel your career | Guest Jonathan Tanner

205

Working as a cybersecurity researcher and industry analyst | Guest French Caldwell

206

Healthcare cybersecurity issues and legacy health systems | Guest Dirk Schrader

207

Project management careers in the military and private sector | Guest Ginny Morton

208

Data governance strategy in 2021 | Guest Rita Gurevich

209

Lessons cybersecurity can learn from physical security | Guest Jeff Schmidt

210

Supporting economic advancement among women in cybersecurity | Guest Christina Van Houten

211

Supply-chain security and servant leadership | Guest Manish Gupta

212

What does a digital forensic investigator do in the government? | Guest Ondrej Krehel

213

Your beginner cybersecurity career questions, answered! | Cyber Work Live

214

Defending the grid: From water supply hacks to nation-state attacks | Guest Emily Miller

215

How to become a cybersecurity project manager | Guest Jackie Olshack

216

How to become a security awareness manager | Guest Tiffany Franklin

217

Working at The Analyst Syndicate, AI ethics and sneaking into DARPA | Guest Diana Kelley

218

Working at Google: Security, anti-abuse and artificial intelligence | Guest Elie Bursztein

219

CompTIA Security+ SY0-601 update: Everything you need to know | Guest Patrick Lane

220

Launch your cybersecurity career by finding a mentor | Guest Mike Gentile

221

Malware analyst careers: Getting hired and building your skills | Guest Dr. Richard Ford

222

Gamification: Making cybersecurity training fun for everyone | Guest Jessica Gulick

223

Moving up in cybersecurity: From help desk to FireEye to CEO | Guest Jason Meller

224

SecOps and the keys to a successful cybersecurity startup | Guest Raju Chekuri

225

Cybersecurity careers: Risk management, privacy and healthcare security | Guest Tyler Cohen Wood

226

Kubernetes: Vulnerabilities, efficiency and cloud security | Guest Michael Foster

227

Running a digital forensics business | Guest Tyler Hatch

228

The 5 pillars of cybersecurity framework | Guest Mathieu Gorge

229

SolarWinds breach: Insights from the trenches | Guest Keatron Evans | Bonus incident response walkthroughs in description

230

Hiring a ransomware negotiator: Tactics, tips and careers | Guest Kurtis Minder

231

Vulnerability hunting and ecommerce safety | Guest Ted Harrington

232

Securing Apple devices: Managing growing cyberattacks and risk | Guest Kelli Conlin

233

Privileged access management and work-from-home tips | Guest Terence Jackson

234

Ask us anything: Security awareness, behavior and culture (part 2) | Infosec Inspire 2020

235

Collaboration and cultural relevance: Taking security awareness global | Infosec Inspire 2020

236

Influencing security mindsets and culture | Infosec Inspire 2020

237

Ask us anything: Security awareness, behavior and culture (part 1) | Infosec Inspire 2020

238

Why we need to rethink the human factor | Infosec Inspire 2020

239

Storytelling in cybersecurity: The impact of a great story | Infosec Inspire 2020

240

Ask us anything: Developing security talent and teams (part 2) | Infosec Inspire 2020

241

Building stronger teams: Career path development strategies | Infosec Inspire 2020

242

Upskilling to deepen employee engagement and retention | Infosec Inspire 2020

243

Ask us anything: Developing security talent and teams (part 1) | Infosec Inspire 2020

244

Close your skills gap: Putting the NICE Workforce Framework for Cybersecurity to work | Infosec Inspire 2020

245

Flip the funnel: Fixing the cybersecurity talent pipeline challenge | Infosec Inspire 2020

246

BAHAMUT: Uncovering a massive hack-for-hire cyberespionage group | Guest Eric Milam

247

Getting started and moving up in IT and security | Guest George McPherson

248

Protecting sensitive information: Growing data, regulations and risks | Guest Mahmoud Abdelkader

249

Security awareness: How to influence others and change behavior | Guest Bruce Hallas

250

Red teamers arrested conducting a penetration test | Guests Gary DeMercurio and Justin Wynn

251

Starting a cybersecurity business and building a diverse workforce | Guest Christine Izuakor

252

Cloud security best practices and career tips | Guest Oliver Tavakoli

253

Job hunting tips for cybersecurity professionals | Guest Eric Jeffery

254

Get started in computer forensics: Entry-level tips, skills and career paths | Guest Amber Schroader

255

Getting into security architecture: Careers, skills and ransomware | Guest Pranshu Bajpai

256

Data privacy careers: GDPR, CCPA and the right to be forgotten | Guest Gabe Gumbs

257

Computer forensics careers: Taking down a $1.2 billion Ponzi scheme | Guest Sam Rubin

258

Threat modeling: Breaking the design with pen, paper and creativity | Guest Geoffrey Hill

259

NICE Cybersecurity Workforce Framework: Close your skills gap with role-based training | Guests Leo Van Duyn and Bill Newhouse

260

API security, vulnerability research and LGBTQ+ representation | Guest Alissa Knight

261

From network engineer to pentester: Tips for moving into cybersecurity | Guest Brad Pierce

262

Inside a purple team: Pentesting, vulnerabilities and other key skills | Guest Luke Willadsen

263

How to become a malware analyst | Guest Danny Jenkins

264

Preparing the next generation of cybersecurity professionals | Guest Victor “Vic” Malloy

265

Cyber threat intelligence: Learn to become a cybersecurity tactician | Guest Charles DeBeck

266

Offensive or defensive security: Which career is for you? | Guest Fabien Dombard

267

CompTIA CySA+ certification changes: Everything you need to know | Guest Patrick Lane

268

How COVID-19 is changing phishing, social engineering and security | Guest Aaron Cockerill

269

Cybersecurity careers: How to stand out, get hired and make more money | Guest Karl Sharman

270

2020 election security: Vulnerabilities, lockdowns and disinformation | Guest John Dickson

271

Hunting criminals and stolen identities across the internet | Guest Amyn Gilani

272

What’s new in ethical hacking: Latest careers, skills and certifications | Guest Keatron Evans

273

From AI to deepfakes: How machine learning is affecting cybersecurity | Guest Emmanuel Tsukerman

274

Red team hacking in the age of COVID-19 | Guest John Cartrett

275

What does a military forensics and incident response expert do? | Guest Daniel Young

276

Cybersecurity and compliance: What's here, what's next? | Guests Scott Madsen and Jeff Dennis

277

How is the open exchange of information affecting cybersecurity? | Guest Cody Cornell

278

Teaching internet safety to children, teens and the elderly | Guest Patrick Craven

279

Military cybersecurity jobs, offensive security and CTFs | Guest Ken Jenkins

280

Fuzzing, security testing and tips for a career in AppSec | Guest Dr. Jared DeMott

281

How to become a cyber risk specialist | Guest Ryan Wallace

282

Identifying worms, bots, fraud and other malicious traffic | Guest Fang Yu

283

How universities are evolving to teach cybersecurity | Guest Chad Hardaway

284

How to become a penetration tester | Guest Dr. Wesley McGrew

285

How to get a cybersecurity startup off the ground | Guest Kevin O'Brien

286

Cryptography careers and IoT vulnerabilities | Guest Ted Shorter

287

How to keep your cybersecurity knowledge fresh | Guest Robert McMillen

288

Teach yourself cybersecurity with skills-based education | Guest John Wagnon

289

Digital forensics and incident response: Is it the career for you? | Guest Cindy Murphy

290

Election security issues for 2020 | Guest Adam Darrah

291

FREE cybersecurity training for everyone — 100th episode celebration!

292

The rise of insider cybersecurity threats | Guest Irena Mroz

293

How Women’s Society of Cyberjutsu is diversifying security | Guest Mari Galloway

294

Email attack trend predictions for 2020 | Guest Evan Reiser

295

PCI Security Standards Council talks security awareness and training | Guests Elizabeth Terry and Lisa Plaggemier

296

Top 5 soft skills and the Federal Cybersecurity Reskilling Academy | Guest Chris Triolo

297

Take your career to the next level with CompTIA and Infosec Skills | Guest Patrick Lane

298

Stay safe when shopping online | Guest Sam Bouso

299

Cognitive biases in security decision-making | Guest Kelly Shortridge

300

Cybersecurity needs in megacorporations | Guest Gene Yoo

301

Hacking since age six | Guest Nir Gaist

302

2020 election cybersecurity strategies | Guest Bob Stevens

303

The ROI of security awareness training | Guest Michael Osterman and Lisa Plaggemmier

304

Hyperspecialization in cybersecurity | Guest John Wheeler

305

Insider tips from a cybersecurity CEO | Guest Scott Madsen

306

How being hacked inspired a comic book series | Guest Gary Berman

307

Privacy is shaping the future of cybersecurity careers: Are you ready? | Guest Byron Johnson

308

Networking, engineering and education | Guest Tia Hopkins

309

Engineering, cybersecurity and changing careers | Guest Dave Farrow

310

Combating phishing, malware and hackers | Guest Atif Mushtaq

311

30 days of free training! | Breaking into cybersecurity with CompTIA | Guest James Stanger

312

The future of cybersecurity training: Subscription-based learning | Guest Jason Dion

313

Digital forensics, data analysis and data recovery | Guest Allan Buxton

314

Alissa Knight talks API security, formjacking and hacking | Guest Alissa Knight

315

From hacker to lawyer: An expert in cybersecurity law | Guest Bradley Gross

316

Ask an expert: How to start and advance your cybersecurity career | Guest Keatron Evans

317

The human element of cybersecurity careers | Guest Cheryl Kerrigan

318

How to become a cybersecurity analyst | Guest Jonathan Butler

319

Phish testing: What to do about so-called “repeat offenders” | Guest Tory Dombrowski

320

What’s it like being a cybersecurity risk analyst? | Guest John Bree

321

The importance of cybersecurity education | Guest Dave Hatter

322

PenTest+ Everything you need to know about CompTIA’s new certification | Guest Patrick Lane

323

Leveraging board governance for cybersecurity | Guest Michael Figueroa

324

The dangers of role-based access control (RBAC) | Guest Balaji Parimi

325

Getting started in digital forensics | Guest Keatron Evans

326

What does a vulnerability verification specialist do? | Guest Lauren McCaslin

327

Hacking cars, getting arrested and a career in cybersecurity | Guest Alissa Knight

328

Closing the cyber skills gap: Advice from a CEO, CTO and educator | Guests Kathleen Hyde, Scott Madsen and Henry Harrison

329

Preventing and repairing security breaches | Guest John Torres

330

Impostor syndrome, burnout and the challenges of a career in security | Guest Susan Morrow

331

DoH! Will the new protocol change how infosec professionals work? | Guest Andrew Wertkin

332

Latest malware trends are bad news for business | Guest Adam Kujawa

333

How data science and machine learning are affecting cybersecurity | Guest Anu Yamunan

334

How to become an APT hunter with Carbon Black | Guest David Balcar

335

Fraud trends from the latest ThreatMetrix cybercrime report | Guest Rebekah Moody

336

Protecting customer data at contact centers | Guest Ben Rafferty

337

Cybersecurity reporting and closing the skills gap with Dark Reading | Guest Kelly Sheridan

338

Benefits and challenges of securing your cloud data | Guest Andrew Howard

339

Focusing on users is the only way to improve cybersecurity | Guest Ben Johnson

340

Risk management and understanding what matters most | Guest Liz Mann

341

How to become a Certified Ethical Hacker (CEH) | Guest Keatron Evans

342

What does a director of fraud and identity do? | Guest Kimberly Sutherland

343

What’s it like to be a help desk manager? | Guest Gloria Milton

344

Saving lives with ICS and critical infrastructure security | Guest Emily Miller

345

Creating a more diverse cybersecurity workforce | Guest Ruth Gomel-Kafri

346

Take control of your infosec career with CyberSeek | Guest Tim Herbert

347

VPNs and the ongoing battle for privacy | Guest Pete Zaborszky

348

Where are All the Government Infosec Professionals? | Guest Gregory Garrett

349

The Business Impact of Cyber Risk | Guests David Kruse, Jeff McCollum and Justin Webb

350

The Current State of Artificial Intelligence in Cybersecurity | Guest Eric Stevens

351

Closing the Cyber Skills Gap | Guest Kathleen Hyde

352

CIS Top 20 Security Controls with Tony Sager | Guest Tony Sager

353

Growing the Number of Women in Cybersecurity | Guest Olivia Rose

354

California Consumer Privacy Act: Are You Prepared for 2020? | Guests Jay Rodne and Aaron Weller

355

Getting Started in Red Teaming and Offensive Security | Guest Curtis Brazzell

356

How to Become a Chief Information Security Officer | Guest Joshua Knight

357

Community Cyber-Attacks, Simulations and Cooperation | Guest Michael Figueroa

358

How to Launch a Career in Application Security | Guest Dan Cornell

359

Red Team Operations: Attack and Think Like a Criminal | Guest Jeremy Martin

360

Career Advice from McAfee’s Lead Scientist | Guest Christiaan Beek

361

Cyber Threat Hunting: Identify and Hunt Down Intruders | Guest Jeremy Martin

362

What’s It Like to be a High-End Red Team Member? | Guest David "Moose" Wolpoff

363

DNS Exploits, Concerns and Easy Fixes | Guest Andrew Wertkin

364

Malware Removal and Security Tips with Malwarebytes | Guest Michael Sherwood

365

10 Proven Security Awareness Tips From Osterman Research | Guest Michael Osterman

366

Drilling Holes in ATMs, Card Skimming and Other Fraud | Guest Stan Engelbrecht

367

Are Third-Party Vendors Your Biggest Cybersecurity Risk? | Guest Fred Kneip

368

Transform Your Organization with a Security Champion | Guest Jeff Williams

369

Securing the Internet-of-Things (IoT) | Guest Dr. Jared DeMott

370

Developing Security Champions within DevOps | Guest Ty Sbano

371

How is Cybercrime Impacting the Financial Sector? | Guest Todd Weller

372

New Phishing Trends, Old Tactics and Security Awareness | Guest Pedram Amini

373

Get Started in Cybersecurity: Beginner Tips, Certifications and Career Paths | Guest Keatron Evans

374

Armed Services, Social Engineering and Sensationalist Reporting | Guest Michel Huffaker

375

Breaking into IT: From First Job to Advanced Certs with CompTIA | Teresa Sears and Christine Tuttleman

376

Midterm Elections, Hacking and Information Warfare | Guest John Dickson

377

Defending Against and Recovering from Ransomware | Guest Bill Siegel

378

Turn the Tables on Your Attackers with Deception Technology | Guest Carolyn Crandall

379

CISSP Exam Changes: Tips to Pass the New CAT Format (and Free E-book) | Guest Ken Magee

380

Privacy and Anonymity in the Modern World | Guest Lance Cottrell

381

Healthcare’s Many Cybersecurity Challenges | Guest Lisa Hedges

382

Cybersecurity Startups and Minority Representation | Guest Ron Gula

383

How to Become a Network Admin | Guest Elias Papatestas

384

Post GDPR Best Practices | Guest Susan Morrow

385

CRISC Roadmap: The Highest-Paying Certification | Guest Leighton Johnson

386

How to Become a Computer Forensics Investigator | Guest Amber Schroader

387

Privacy Certifications Boosted by New Regulations | Guest Aaron Stevens

388

The Problem with Passwords | Guest Susan Morrow

389

PMP Certification: Boost Your Career and Earn More Money | Guest Chris Danek

390

How to Become an Incident Responder | Guest Keatron Evans

391

The $9 Billion BEC Threat You Can’t Ignore | Guests Roger Sels and Jack Koziol

392

How to Become a Security Architect | Guest Leighton Johnson