Episodes

Latest Episode
Web Application Attacks - Episode 8 : Impersonation Games: The Dangers of Phishing Attacks in Web Security

Web Application Attacks - Episode 8 : Impersonation Games: The Dangers of Phishing Attacks in Web Security

Episode 196 · · 04:10

Web Application Attacks - Episode 7 : Crashing the Gates: Defending Against Distributed Denial of Service (DDoS)

Web Application Attacks - Episode 7 : Crashing the Gates: Defending Against Distributed Denial of Service (DDoS)

Episode 195 · · 04:29

Web Application Attacks - Episode 6 : Broken Access: Elevating Privileges and Breaking Control

Web Application Attacks - Episode 6 : Broken Access: Elevating Privileges and Breaking Control

Episode 194 · · 04:06

Web Application Attacks - Episode 5 : Exposed Secrets: The Threat of Sensitive Data Exposure

Web Application Attacks - Episode 5 : Exposed Secrets: The Threat of Sensitive Data Exposure

Episode 193 · · 04:06

Web Application Attacks - Episode 4 : Identity Theft: Unraveling Cross-Site Request Forgery (CSRF)

Web Application Attacks - Episode 4 : Identity Theft: Unraveling Cross-Site Request Forgery (CSRF)

Episode 192 · · 04:21

Web Application Attacks - Episode 3 : The World of Cross-Site Scripting (XSS)

Web Application Attacks - Episode 3 : The World of Cross-Site Scripting (XSS)

Episode 191 · · 03:54

Web Application Attacks - Episode 2 : Beneath the Surface: Unpacking SQL Injection Attacks

Web Application Attacks - Episode 2 : Beneath the Surface: Unpacking SQL Injection Attacks

Episode 190 · · 04:07

Web Application Attacks - Episode 1 : Diving into the Digital Abyss: Intro to Web App Attacks

Web Application Attacks - Episode 1 : Diving into the Digital Abyss: Intro to Web App Attacks

Episode 189 · · 02:59

Vulnerability Management - Episode 8 : Learning from the Battlefield: Real-World Case Studies in Vulnerability Management

Vulnerability Management - Episode 8 : Learning from the Battlefield: Real-World Case Studies in Vulnerability Management

Episode 188 · · 04:27

Vulnerability Management - Episode 7 : Crafting a Cyber-Resilient Culture: Education and Awareness

Vulnerability Management - Episode 7 : Crafting a Cyber-Resilient Culture: Education and Awareness

Episode 187 · · 04:15

Vulnerability Management - Episode 6 : Tools of the Trade: Essential Technology for Vulnerability Management

Vulnerability Management - Episode 6 : Tools of the Trade: Essential Technology for Vulnerability Management

Episode 186 · · 04:13

Vulnerability Management - Episode 5 : Closing the Gates: Strategies for Mitigating Identified Vulnerabilities

Vulnerability Management - Episode 5 : Closing the Gates: Strategies for Mitigating Identified Vulnerabilities

Episode 185 · · 04:02

Vulnerability Management - Episode 4 : Cyberthreat Intelligence: Navigating the Digital Threat Landscape

Vulnerability Management - Episode 4 : Cyberthreat Intelligence: Navigating the Digital Threat Landscape

Episode 184 · · 04:13

Vulnerability Management - Episode 3 : The Penetration Test Playbook: Simulating Cyber Attacks

Vulnerability Management - Episode 3 : The Penetration Test Playbook: Simulating Cyber Attacks

Episode 183 · · 04:40

Vulnerability Management - Episode 2 : The Risk Radar: Mastering Risk Assessment in Cybersecurity

Vulnerability Management - Episode 2 : The Risk Radar: Mastering Risk Assessment in Cybersecurity

Episode 182 · · 04:21

Vulnerability Management - Episode 1 : Unveiling the Shadows: Introduction to Vulnerability Assessment

Vulnerability Management - Episode 1 : Unveiling the Shadows: Introduction to Vulnerability Assessment

Episode 181 · · 04:39

Social Engineering - Episode 8 : Future Threats: Evolving Tactics in Social Engineering

Social Engineering - Episode 8 : Future Threats: Evolving Tactics in Social Engineering

Episode 180 · · 04:18

Social Engineering - Episode 7 : Vishing and Smishing: The Call You Shouldn’t Answer

Social Engineering - Episode 7 : Vishing and Smishing: The Call You Shouldn’t Answer

Episode 179 · · 04:16

Social Engineering - Episode 6 : Tailgating and Pretexting: Beyond the Digital Realm

Social Engineering - Episode 6 : Tailgating and Pretexting: Beyond the Digital Realm

Episode 178 · · 04:26

Social Engineering - Episode 5 : Psychology of a Social Engineer: Minds Behind the Mask

Social Engineering - Episode 5 : Psychology of a Social Engineer: Minds Behind the Mask

Episode 177 · · 04:35

Social Engineering - Episode 4 : Spear Phishing: When the Attack Gets Personal

Social Engineering - Episode 4 : Spear Phishing: When the Attack Gets Personal

Episode 176 · · 04:22

Social Engineering - Episode 3 : The Human Firewall: Building Your First Line of Defense

Social Engineering - Episode 3 : The Human Firewall: Building Your First Line of Defense

Episode 175 · · 04:24

Social Engineering - Episode 2 : Phishing Expeditions: Recognizing the Bait

Social Engineering - Episode 2 : Phishing Expeditions: Recognizing the Bait

Episode 174 · · 04:33

Social Engineering - Episode 1 : The Art of Deception: An Introduction to Social Engineering

Social Engineering - Episode 1 : The Art of Deception: An Introduction to Social Engineering

Episode 173 · · 04:30

Secure Software Development - Episode 8 : The Future of Secure Software Development

Secure Software Development - Episode 8 : The Future of Secure Software Development

Episode 172 · · 04:16

Secure Software Development - Episode 7 : Secure by Design: Embedding Security in Architecture

Secure Software Development - Episode 7 : Secure by Design: Embedding Security in Architecture

Episode 171 · · 04:29

Secure Software Development - Episode 6 : Incident Response in Software Development

Secure Software Development - Episode 6 : Incident Response in Software Development

Episode 170 · · 04:18

Secure Software Development - Episode 5 : Continuous Integration and Continuous Deployment (CI/CD) Security

Secure Software Development - Episode 5 : Continuous Integration and Continuous Deployment (CI/CD) Security

Episode 169 · · 04:22

Secure Software Development - Episode 4 : Leveraging Security Frameworks and Libraries

Secure Software Development - Episode 4 : Leveraging Security Frameworks and Libraries

Episode 168 · · 04:29

Secure Software Development - Episode 3 : Writing Secure Code: Best Practices and Avoidable Pitfalls

Secure Software Development - Episode 3 : Writing Secure Code: Best Practices and Avoidable Pitfalls

Episode 167 · · 04:17