Phillip Wylie Show cover art

All Episodes

Phillip Wylie Show — 197 episodes

#
Title
1

Winn Schwartau: Hacker Culture, Cognitive Security, and the Human Element

2

Amar Sonik: Why Cybersecurity Fundamentals Still Matter

3

Zach Tackett: How Hands-On Experience and Networking Open Doors in Cybersecurity

4

Marie Hamilton: From Rejections to Success

5

From Pro Wrestler to Pentester: My Cybersecurity Origin Story

6

Jamy Casteel: From Small Town IT to Offensive Security

7

Travis Stein: Mastering Cybersecurity: Hands-On Skills and Networking Strategies

8

Gregory Carpenter: Beyond the Network | Threat Modeling, AI, and Real-World Pen Testing

9

Allie Mellen: Code War

10

Eve Maler: The Evolution of Identity Security

11

Sudhanshu Chauhan: Navigating the New Landscape of Cyber Threats

12

Dorota Kozlowska: Empowering Women in Cybersecurity

13

Keelan Knox: Breaking Things to Building Defenses

14

Michael Farnum & Sam Van Ryder: Building CYBR.SEC.Community

15

Travis Weathers: From Military to Physical Security Expert

16

Unpacking Cybersecurity: Stories from the Cyber Distortion Podcast

17

Shubham Khichi: Journey The Future of AI in Cybersecurity

18

Ron Eddings: Hacker to Podcaster

19

Chris Glanden: The Power of Content in Cybersecurity

20

Gideon Rasmussen: Preparing for Promotion in Cybersecurity & Tech Leadership

21

Christopher Russell: Balancing Skills in Cybersecurity

22

Ted Harrington: Demystifying the Hacker Mindset

23

Bat: The Evolution of a Threat Hunter

24

Mike Bell: AI Won't Take Your Job - If You Learn This

25

Victoria Mosby - Embracing Ideas: Overcoming Self-Doubt

26

Marshall Livingston: From Restaurant to Cybersecurity

27

Edna Jonsson: From Coding to Cybersecurity

28

Anand Singh: Data Security in the Age of AI

29

Emily Dobson: From Family Influence to Cybersecurity Success

30

Emile Fugulin: The Future of Bug Bounty Tools

31

Lisa Landau: From Military Intelligence to Cybersecurity

32

Jon Baker: Exploring MITRE's Impact on Cybersecurity

33

Casey Cammilleri: From Hacker to CEO

34

Jennifer Leggio: Building Your Personal Brand in Cybersecurity

35

Kat Cosgrove: From Developer to Advocate

36

Filipi Pires: 10 Years of Cybersecurity Lessons on Patience, Growth & Career Success

37

Alethe Denis: The Art of Social Engineering

38

Damien Burks: From Aspiring Game Dev to Cloud Security Leader

39

Ryan Williams: Building Community and Creativity in Cybersecurity Media

40

Jessica Hoffman: Live from Boardwalk Bytes 2025

41

Matt Brown: Hardware Hacking & Content Creation

42

Matt Toussain: From JAG Aspirations to Cybersecurity

43

Kevin Woods: Why Companies MUST Invest in Junior Cyber Talent

44

From Military to Cybersecurity: John Rodriguez on Mentorship, Ransomware, and Building Resilient Defenses

45

Dan DeCloss: The Evolution of Cybersecurity

46

Ashley Sequeira: The Importance of Community in Cybersecurity

47

Eric Cole: From CIA to Cybersecurity

48

Chris Traynor: Hack Your Way Into a Cyber Security Career

49

From Hacking to Entrepreneurship: The PhantomSec Story

50

Luke McOmie: Pyr0's Red Team Journey

51

Evan Dornbush: Desired Effect

52

Tim Fowler: Space Security The Final Cyber Frontier

53

Gerald Auger PhD: Transform Your Cybersecurity Career with Community

54

Bdubzz: Building Connections in Cybersecurity

55

Patrick Laverty: Layer 8

56

Jeff Caruso: Inside Cyber Warfare

57

Syntax976: From Curiosity to Cybersecurity

58

Mike Lisi: Mike Hacks Things

59

Joe Vest: OG Red Teamer

60

Jorge Reyes: From Atmospheric Sciences to Cybersecurity

61

My Zero Trust World 25 Hacking Labs Experience

62

Naveen Sunkavally: From Software Engineering to Pentest Automation

63

My ZeroTrust World 2025 Experience

64

Nicholas DiCola: Micro-Segmentation: A Game Changer in Network Security

65

Lesley Carhart: ICS DFIR Expert

66

Eva Benn: The Power of Resilience in Cybersecurity

67

NahamSec: Hacker, Content Creator, Pentester, Trainer

68

Fletus Poston III: Navigating The Ever Changing Career Landscape Of Cybersecurity

69

Marina Ciavatta: From Journalism to Physical Pen Testing & Social Engineering

70

Chris Wysopal: From L0pht to Veracode, an OG Hacker's Journey

71

STÖK: Hacking, Content Creation, and Good Vibes

72

Han Kanthi: Han's Journey From Corporate to Startup

73

Celina Stewart: Demystifying Cyber Risk Management

74

SquareX CISO Series: David Malicoat & Vivek Ramachandran

75

SquareX CISO Series: Robert Pace & Vivek Ramachandran

76

Int Eighty of Dualcore: Hack All The Things

77

Lauren Andrus: Cybersecurity Marketing Professional

78

John Hammond: New Frontiers in Cybersecurity Education

79

Jayson E. Street: Escaping Darkness

80

Rob Allen: Defending Against Modern Threats with ThreatLocker

81

Sean Metcalf: Active Directory Security

82

Mishaal Khan: The Evolution of OSINT in Cybersecurity

83

Wirefall: An OG Hacker's Journey

84

Alyse Zavala: Rockstar Hacker

85

Marcus Carey: The Legacy of Tribe of Hackers

86

Trey Bilbrey: From Marine to Offensive Security

87

White Knight Labs: Part 2

88

Ryan Feder: The Resilience Factor

89

Snehal Antani: A New Cybersecurity Paradigm

90

Christophe Foulon: Certifications, Are They Still Necessary?

91

Len Noe: World's First Augmented Hacker

92

HOU.SEC.CON.

93

Be Fearless Online: In-Browser Email Security

94

Joe Brinkley aka The Blind Hacker

95

Live from BSides Twin Cities 2024

96

Dahvid Schloss: From JSOC to Offensive Security

97

Eric Teichmiller: Exploring Cybersecurity Careers

98

Jeff Man: From NSA to Pentesting

99

Andrew Lemon: Engineering Your Own Opportunities

100

Anthony "TonyP" Pillitiere: Offense Driven Defense

101

KJ Haywood: Exploring AI and Cybersecurity

102

Rob Fuller (aka Mubix): From Hacking Games to Professional Hacker

103

Noah King: From Sales to Offensive Security Engineer

104

Jake Krasnov: From Aerospace to Cybersecurity

105

McKenna Dallmeyer: From Veterinarian Aspirations to Pentester

106

White Knight Labs: Navigating Advanced Red Team Operations

107

Matt Scheurer: Finding Your Passion in Cybersecurity

108

John Woodling: The Power of Community and Self Learning

109

Tennisha Martin: Cracking the Diversity Code

110

Dirce Hernandez: Breaking into Cybersecurity

111

Dr. Anmol Agarwal: AI and Machine Learning in Cybersecurity

112

Managing Threat Exposures with Flare

113

Tyler Day: The Challenges and Rewards of Becoming a Pen Tester

114

Be Fearless Online: Vivek Ramachandran a Year of Browser Security Innovation

115

Ryan Pullen: Insights from a Cybersecurity Pro and TED Talk Featured Speaker

116

Huxley Barbee: The Dark Side of Technology

117

Ricky Allen: The Evolution of Cybersecurity Challenges

118

Matt Johansen: Vulnerability and Mental Health in Cybersecurity.

119

Michael Kim: DJ turned Red Teamer

120

Be Fearless Online: In Browser Malicious File Detection Part 4

121

Be Fearless Online: In Browser Malicious File Detection Part 3

122

Cecile Mengue: From Hacked to Hacker

123

Mariana Padilla: Building Relationships and Networking in Cybersecurity

124

Justin Elze: A CTO's Offensive Security Insights

125

Cathy Ullman: The Power of Active Defense

126

Andy Liverman Anderson: Scaling Cybersecurity Functions with AI

127

Be Fearless Online: In Browser Malicious File Detection Part 2

128

Michael Jenks: Lessons from a Former DoD Professional

129

Be Fearless Online: In Browser Malicious File Detection Part 1

130

Chris Glanden, Kevin Pentecost, & Jason Popillion: Welcome to The Circus

131

Jason Haddix: A Conversation on AI, Bug Bounty, and Red Teaming

132

Bryson Bort: From Red to Purple: The Evolution of Cybersecurity

133

Unleash Your Personal Brand & Master Professional Networking!

134

Andy Thompson: Journey From It To Offensive Security Research Evangelist

135

Reanna Schultz: Tips on Breaking into Cybersecurity and Public Speaking

136

Cheryl Biswas: From Political Science Major to Cyber Threat Intelligence

137

Chris Marks: From Network Technician to Security Management

138

Be Fearless Online: Protect Yourself Online with SquareX URL Safety Features

139

Be Fearless Online: SquareX Introduces Disposable Emails to Combat Spam and Phishing Attacks

140

Justin "Hutch" Hutchens: AI's Impact on Cybersecurity

141

Be Fearless Online: Safely Deal with Files Online with SquareX

142

Andy Robbins: The Evolution of Bloodhound

143

Jason Downey: Semi-Pro Kickboxer Turned Pentester

144

Jessie Bolton: Building Your Personal Brand and Networking in Cybersecurity

145

Be Fearless Online: Open emails without being tracked or hacked with SquareX

146

Diamond Forbes: From Homelessness to Security Engineer

147

Katie Paxton-Fear: The Importance of Content Creation in Cybersecurity Careers

148

Maxie Reynolds: From hacker to underwater data center entrepeneur

149

Olivia Gallucci: Offensive Security, Coding, and Content Creation

150

Jessica Barker: The importance of cybersecurity culture and awareness

151

Lilly Chalupowski's Journey Into Malware Analysis

152

Shenetworks: Leveraging Content Creation to Build a Career in Cybersecurity

153

InfoSec Pat: Content Creation and Cybersecurity Careers

154

From NSA to CISO: A Conversation with Ira Winkler

155

Importance of Fundamentals and Home Labs with Kevin Apolinario

156

Web Application Pentesting and the Importance of Specialization with Tib3rius

157

Jakoby's Journey

158

Michael Taggart's Journey in Education and Information Security

159

A Journey From Offensive Security to Leadership with Tom Eston

160

Powerlifting and PowerShell: A Discussion with Jake Hildreth

161

Yuri Diogenes Discusses Building a Career in Cybersecurity

162

The Power of Community: A Conversation with Kevin Johnson

163

A Discussion with Active Directory Security Consultant Brandon Colley

164

A Conversation about Hack Red Con with Dan and Ken

165

The Importance of Quality Pen Testing: A Conversation with Katerina Tasiopoulou

166

Product Marketing in the Cybersecurity Industry: A Conversation with Liron Mendel

167

The Evolution of Active Directory Security: A Conversation with James Potter

168

Introducing Amass v4.0 and the OAM: A Conversation with Jeff Foley

169

Cloud-Centric Permission Management: A Conversation with Ron Nissim

170

A Conversation with Chloé Messdaghi

171

The Evolution of Pen Testing: A Conversation with Tim Medin

172

The Future of Cybersecurity: A Conversation with Julien Richard

173

Discovering the Power of Mindfulness and Self-Awareness with Shawn Alexander

174

How I Rob Banks: A Journey into the World of Ethical Hacking with Freakyclown

175

The Evolution of Identity and Access Management with Adam Migus

176

Ankita Dhakar: Revolutionizing Bug Bounty Platforms with AI Integration

177

Danny "Rand0h" Akacki discusses his love for streaming and community

178

Phillip Wylie Show Trailer

179

The Art of Red Teaming with Shani Peled

180

The Power of Bug Bounty Automation with Nenad Zaric

181

The Evolution of Offensive Security: Insights from Dave Mayer

182

Hacking Past and Present: A Conversation with Moses Frost

183

Talking Content Creation and Marketing with Zach Hill

184

A Conversation with Red Team Expert Manit Sahib

185

Cybersecurity Certifications a Discussion with Sumit "Sid" Siddharth

186

Talking AI and Content Creation with Daniel Miessler

187

Insights from Evan Ottinger on Building Skills, Networking, and Job Hunting

188

Casey Ellis: Pioneering The Bug Bounty Platform To Empower Ethical Hackers

189

Hacker, Researcher, Educator, Entrepreneur, a Glimpse into The World of Vivek Ramachandran

190

Get To Know MITRE Engenuity With Maggie MacAlpine!

191

Pentester Darin Fredde Shares Favorite Hacks And Tips For Career Success

192

A Conversation with Offensive Security Pro Corey LeBleu

193

From Military Red Teamer to CEO and Cofounder: A Conversation with Reuven "Rubi" Aronashvili

194

A Conversation with Buckhorn Consulting Founder and Director Don Dobson

195

Kenny Parsons Introduces, PwnKube, a Purposely Vulnerable Kubernetes Environment

196

A Conversation with DFW Hacker Community Member Emily S.

197

A Conversation with Cybersecurity Community OG and EH-net Founder Don Donzal