Logo
    Search

    ethical hacking

    Explore "ethical hacking" with insightful episodes like "Pig Butchering, Ring Cam Swatters, and Raspberry Robin", "Smart Talks with IBM: The Good Hacker: Hacking Businesses before Criminals Do", "117: Daniel the Paladin", "88: Victor" and "83: NSA Cryptologists" from podcasts like ""Hacked", "Stuff To Blow Your Mind", "Darknet Diaries", "Darknet Diaries" and "Darknet Diaries"" and more!

    Episodes (6)

    Smart Talks with IBM: The Good Hacker: Hacking Businesses before Criminals Do

    Smart Talks with IBM: The Good Hacker: Hacking Businesses before Criminals Do

    The headlines tell us cyberattacks are a big, consistent threat to business data – and ours. In this episode of Smart Talks with IBM, Malcolm Gladwell takes on this topic with Tim Harford, host of Cautionary Tales, and Stephanie “Snow” Carruthers, Chief People Hacker for X-Force, IBM. Snow and her team are finding creative solutions to test their clients’ security, including hacking into their systems before criminal hackers do.

    This is a paid advertisement from IBM.

    See omnystudio.com/listener for privacy information.

    117: Daniel the Paladin

    117: Daniel the Paladin
    Daniel Kelley (https://twitter.com/danielmakelley) was equal parts mischievousness and clever when it came to computers. Until the day his mischief overtook his cleverness. Sponsors Support for this show comes from Keeper Security. Keeper Security’s is an enterprise password management system. Keeper locks down logins, payment cards, confidential documents, API keys, and database passwords in a patented Zero-Knowledge encrypted vault. And, it takes less than an hour to deploy across your organization. Get started by visiting keepersecurity.com/darknet. Support for this podcast comes from Cybereason. Cybereason reverses the attacker’s advantage and puts the power back in the defender’s hands. End cyber attacks. From endpoints to everywhere. Learn more at Cybereason.com/darknet. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    88: Victor

    88: Victor
    Victor looks for vulnerabilities on the web and reports them responsibly. This is the story about discloser number 5780. Listen to episodes 86, and 87 before this one to be caught up on the story leading up to this. Sponsors This podcast is sponsored by Navisite. Accelerate IT transformation to respond to new demands, lower costs and prepare for whatever comes next. Visit Navisite.com/go. This podcast is sponsored by the JSCM Group. They have a service called ClosedPort: Scan, and it’s is a monthly Penetration Test performed by Cyber Security Experts. Contact JSCM Group today at jscmgroup.com/darknet. Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    83: NSA Cryptologists

    83: NSA Cryptologists
    In this episode we interview two NSA Cryptologists, Marcus J. Carey and Jeff Man. We hear their story of how they got into the NSA and what they did while there. To hear more stories from Jeff tune into Paul’s Security Weekly where Jeff is a regular co-host and shares a lot of stories and insights. Marcus has written several books on security. They are Tribe of Hackers, Tribe of Hackers Blue Team, Tribe of Hackers Red Team, Tribe of Hackers Security Leaders, Think in Code, and a childrens book called Three Little Hackers. Also check out the Tribe of Hackers podcast to hear interviews with all these amazing people! Sponsors Support for this show comes from IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25. Support for this show comes from Linode. Linode supplies you with virtual servers. Visit linode.com/darknet and get a special offer. View all active sponsors. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    #105 - Thomas Johnson - What Is An Ethical Hacker?

    #105 - Thomas Johnson - What Is An Ethical Hacker?
    Thomas Johnson is an ethical hacker and social engineer. Hacking is often thought of as a dark art. Dark basements and illegal activities. But there's an entire other world of hackers who are using their skills to subvert security systems both online and offline for good. Expect to learn just how Tom hacks both people and computers to break into secure buildings, how safe your information is online, what tools Tom uses to bypass the systems that are meant to keep him out and his best advice for staying secure online. Also get ready for him to hack into a university's CCTV system only using Google while we are recording. Extra Stuff: Check out everything I recommend from books to products and help support the podcast at no extra cost to you by shopping through this link - https://www.amazon.co.uk/shop/modernwisdom - Get in touch. Join the discussion with me and other like minded listeners in the episode comments on the MW YouTube Channel or message me... Instagram: https://www.instagram.com/chriswillx Twitter: https://www.twitter.com/chriswillx YouTube: https://www.youtube.com/ModernWisdomPodcast Email: https://www.chriswillx.com/contact Learn more about your ad choices. Visit megaphone.fm/adchoices