All Episodes
Phillip Wylie Show — 197 episodes
Winn Schwartau: Hacker Culture, Cognitive Security, and the Human Element
Amar Sonik: Why Cybersecurity Fundamentals Still Matter
Zach Tackett: How Hands-On Experience and Networking Open Doors in Cybersecurity
Marie Hamilton: From Rejections to Success
From Pro Wrestler to Pentester: My Cybersecurity Origin Story
Jamy Casteel: From Small Town IT to Offensive Security
Travis Stein: Mastering Cybersecurity: Hands-On Skills and Networking Strategies
Gregory Carpenter: Beyond the Network | Threat Modeling, AI, and Real-World Pen Testing
Allie Mellen: Code War
Eve Maler: The Evolution of Identity Security
Sudhanshu Chauhan: Navigating the New Landscape of Cyber Threats
Dorota Kozlowska: Empowering Women in Cybersecurity
Keelan Knox: Breaking Things to Building Defenses
Michael Farnum & Sam Van Ryder: Building CYBR.SEC.Community
Travis Weathers: From Military to Physical Security Expert
Unpacking Cybersecurity: Stories from the Cyber Distortion Podcast
Shubham Khichi: Journey The Future of AI in Cybersecurity
Ron Eddings: Hacker to Podcaster
Chris Glanden: The Power of Content in Cybersecurity
Gideon Rasmussen: Preparing for Promotion in Cybersecurity & Tech Leadership
Christopher Russell: Balancing Skills in Cybersecurity
Ted Harrington: Demystifying the Hacker Mindset
Bat: The Evolution of a Threat Hunter
Mike Bell: AI Won't Take Your Job - If You Learn This
Victoria Mosby - Embracing Ideas: Overcoming Self-Doubt
Marshall Livingston: From Restaurant to Cybersecurity
Edna Jonsson: From Coding to Cybersecurity
Anand Singh: Data Security in the Age of AI
Emily Dobson: From Family Influence to Cybersecurity Success
Emile Fugulin: The Future of Bug Bounty Tools
Lisa Landau: From Military Intelligence to Cybersecurity
Jon Baker: Exploring MITRE's Impact on Cybersecurity
Casey Cammilleri: From Hacker to CEO
Jennifer Leggio: Building Your Personal Brand in Cybersecurity
Kat Cosgrove: From Developer to Advocate
Filipi Pires: 10 Years of Cybersecurity Lessons on Patience, Growth & Career Success
Alethe Denis: The Art of Social Engineering
Damien Burks: From Aspiring Game Dev to Cloud Security Leader
Ryan Williams: Building Community and Creativity in Cybersecurity Media
Jessica Hoffman: Live from Boardwalk Bytes 2025
Matt Brown: Hardware Hacking & Content Creation
Matt Toussain: From JAG Aspirations to Cybersecurity
Kevin Woods: Why Companies MUST Invest in Junior Cyber Talent
From Military to Cybersecurity: John Rodriguez on Mentorship, Ransomware, and Building Resilient Defenses
Dan DeCloss: The Evolution of Cybersecurity
Ashley Sequeira: The Importance of Community in Cybersecurity
Eric Cole: From CIA to Cybersecurity
Chris Traynor: Hack Your Way Into a Cyber Security Career
From Hacking to Entrepreneurship: The PhantomSec Story
Luke McOmie: Pyr0's Red Team Journey
Evan Dornbush: Desired Effect
Tim Fowler: Space Security The Final Cyber Frontier
Gerald Auger PhD: Transform Your Cybersecurity Career with Community
Bdubzz: Building Connections in Cybersecurity
Patrick Laverty: Layer 8
Jeff Caruso: Inside Cyber Warfare
Syntax976: From Curiosity to Cybersecurity
Mike Lisi: Mike Hacks Things
Joe Vest: OG Red Teamer
Jorge Reyes: From Atmospheric Sciences to Cybersecurity
My Zero Trust World 25 Hacking Labs Experience
Naveen Sunkavally: From Software Engineering to Pentest Automation
My ZeroTrust World 2025 Experience
Nicholas DiCola: Micro-Segmentation: A Game Changer in Network Security
Lesley Carhart: ICS DFIR Expert
Eva Benn: The Power of Resilience in Cybersecurity
NahamSec: Hacker, Content Creator, Pentester, Trainer
Fletus Poston III: Navigating The Ever Changing Career Landscape Of Cybersecurity
Marina Ciavatta: From Journalism to Physical Pen Testing & Social Engineering
Chris Wysopal: From L0pht to Veracode, an OG Hacker's Journey
STÖK: Hacking, Content Creation, and Good Vibes
Han Kanthi: Han's Journey From Corporate to Startup
Celina Stewart: Demystifying Cyber Risk Management
SquareX CISO Series: David Malicoat & Vivek Ramachandran
SquareX CISO Series: Robert Pace & Vivek Ramachandran
Int Eighty of Dualcore: Hack All The Things
Lauren Andrus: Cybersecurity Marketing Professional
John Hammond: New Frontiers in Cybersecurity Education
Jayson E. Street: Escaping Darkness
Rob Allen: Defending Against Modern Threats with ThreatLocker
Sean Metcalf: Active Directory Security
Mishaal Khan: The Evolution of OSINT in Cybersecurity
Wirefall: An OG Hacker's Journey
Alyse Zavala: Rockstar Hacker
Marcus Carey: The Legacy of Tribe of Hackers
Trey Bilbrey: From Marine to Offensive Security
White Knight Labs: Part 2
Ryan Feder: The Resilience Factor
Snehal Antani: A New Cybersecurity Paradigm
Christophe Foulon: Certifications, Are They Still Necessary?
Len Noe: World's First Augmented Hacker
HOU.SEC.CON.
Be Fearless Online: In-Browser Email Security
Joe Brinkley aka The Blind Hacker
Live from BSides Twin Cities 2024
Dahvid Schloss: From JSOC to Offensive Security
Eric Teichmiller: Exploring Cybersecurity Careers
Jeff Man: From NSA to Pentesting
Andrew Lemon: Engineering Your Own Opportunities
Anthony "TonyP" Pillitiere: Offense Driven Defense
KJ Haywood: Exploring AI and Cybersecurity
Rob Fuller (aka Mubix): From Hacking Games to Professional Hacker
Noah King: From Sales to Offensive Security Engineer
Jake Krasnov: From Aerospace to Cybersecurity
McKenna Dallmeyer: From Veterinarian Aspirations to Pentester
White Knight Labs: Navigating Advanced Red Team Operations
Matt Scheurer: Finding Your Passion in Cybersecurity
John Woodling: The Power of Community and Self Learning
Tennisha Martin: Cracking the Diversity Code
Dirce Hernandez: Breaking into Cybersecurity
Dr. Anmol Agarwal: AI and Machine Learning in Cybersecurity
Managing Threat Exposures with Flare
Tyler Day: The Challenges and Rewards of Becoming a Pen Tester
Be Fearless Online: Vivek Ramachandran a Year of Browser Security Innovation
Ryan Pullen: Insights from a Cybersecurity Pro and TED Talk Featured Speaker
Huxley Barbee: The Dark Side of Technology
Ricky Allen: The Evolution of Cybersecurity Challenges
Matt Johansen: Vulnerability and Mental Health in Cybersecurity.
Michael Kim: DJ turned Red Teamer
Be Fearless Online: In Browser Malicious File Detection Part 4
Be Fearless Online: In Browser Malicious File Detection Part 3
Cecile Mengue: From Hacked to Hacker
Mariana Padilla: Building Relationships and Networking in Cybersecurity
Justin Elze: A CTO's Offensive Security Insights
Cathy Ullman: The Power of Active Defense
Andy Liverman Anderson: Scaling Cybersecurity Functions with AI
Be Fearless Online: In Browser Malicious File Detection Part 2
Michael Jenks: Lessons from a Former DoD Professional
Be Fearless Online: In Browser Malicious File Detection Part 1
Chris Glanden, Kevin Pentecost, & Jason Popillion: Welcome to The Circus
Jason Haddix: A Conversation on AI, Bug Bounty, and Red Teaming
Bryson Bort: From Red to Purple: The Evolution of Cybersecurity
Unleash Your Personal Brand & Master Professional Networking!
Andy Thompson: Journey From It To Offensive Security Research Evangelist
Reanna Schultz: Tips on Breaking into Cybersecurity and Public Speaking
Cheryl Biswas: From Political Science Major to Cyber Threat Intelligence
Chris Marks: From Network Technician to Security Management
Be Fearless Online: Protect Yourself Online with SquareX URL Safety Features
Be Fearless Online: SquareX Introduces Disposable Emails to Combat Spam and Phishing Attacks
Justin "Hutch" Hutchens: AI's Impact on Cybersecurity
Be Fearless Online: Safely Deal with Files Online with SquareX
Andy Robbins: The Evolution of Bloodhound
Jason Downey: Semi-Pro Kickboxer Turned Pentester
Jessie Bolton: Building Your Personal Brand and Networking in Cybersecurity
Be Fearless Online: Open emails without being tracked or hacked with SquareX
Diamond Forbes: From Homelessness to Security Engineer
Katie Paxton-Fear: The Importance of Content Creation in Cybersecurity Careers
Maxie Reynolds: From hacker to underwater data center entrepeneur
Olivia Gallucci: Offensive Security, Coding, and Content Creation
Jessica Barker: The importance of cybersecurity culture and awareness
Lilly Chalupowski's Journey Into Malware Analysis
Shenetworks: Leveraging Content Creation to Build a Career in Cybersecurity
InfoSec Pat: Content Creation and Cybersecurity Careers
From NSA to CISO: A Conversation with Ira Winkler
Importance of Fundamentals and Home Labs with Kevin Apolinario
Web Application Pentesting and the Importance of Specialization with Tib3rius
Jakoby's Journey
Michael Taggart's Journey in Education and Information Security
A Journey From Offensive Security to Leadership with Tom Eston
Powerlifting and PowerShell: A Discussion with Jake Hildreth
Yuri Diogenes Discusses Building a Career in Cybersecurity
The Power of Community: A Conversation with Kevin Johnson
A Discussion with Active Directory Security Consultant Brandon Colley
A Conversation about Hack Red Con with Dan and Ken
The Importance of Quality Pen Testing: A Conversation with Katerina Tasiopoulou
Product Marketing in the Cybersecurity Industry: A Conversation with Liron Mendel
The Evolution of Active Directory Security: A Conversation with James Potter
Introducing Amass v4.0 and the OAM: A Conversation with Jeff Foley
Cloud-Centric Permission Management: A Conversation with Ron Nissim
A Conversation with Chloé Messdaghi
The Evolution of Pen Testing: A Conversation with Tim Medin
The Future of Cybersecurity: A Conversation with Julien Richard
Discovering the Power of Mindfulness and Self-Awareness with Shawn Alexander
How I Rob Banks: A Journey into the World of Ethical Hacking with Freakyclown
The Evolution of Identity and Access Management with Adam Migus
Ankita Dhakar: Revolutionizing Bug Bounty Platforms with AI Integration
Danny "Rand0h" Akacki discusses his love for streaming and community
Phillip Wylie Show Trailer
The Art of Red Teaming with Shani Peled
The Power of Bug Bounty Automation with Nenad Zaric
The Evolution of Offensive Security: Insights from Dave Mayer
Hacking Past and Present: A Conversation with Moses Frost
Talking Content Creation and Marketing with Zach Hill
A Conversation with Red Team Expert Manit Sahib
Cybersecurity Certifications a Discussion with Sumit "Sid" Siddharth
Talking AI and Content Creation with Daniel Miessler
Insights from Evan Ottinger on Building Skills, Networking, and Job Hunting
Casey Ellis: Pioneering The Bug Bounty Platform To Empower Ethical Hackers
Hacker, Researcher, Educator, Entrepreneur, a Glimpse into The World of Vivek Ramachandran
Get To Know MITRE Engenuity With Maggie MacAlpine!
Pentester Darin Fredde Shares Favorite Hacks And Tips For Career Success
A Conversation with Offensive Security Pro Corey LeBleu
From Military Red Teamer to CEO and Cofounder: A Conversation with Reuven "Rubi" Aronashvili
A Conversation with Buckhorn Consulting Founder and Director Don Dobson
Kenny Parsons Introduces, PwnKube, a Purposely Vulnerable Kubernetes Environment
A Conversation with DFW Hacker Community Member Emily S.
A Conversation with Cybersecurity Community OG and EH-net Founder Don Donzal