• Phillip Wylie Show

  • 著者: Phillip Wylie
  • ポッドキャスト

Phillip Wylie Show

著者: Phillip Wylie
  • サマリー

  • Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!
    Phillip Wylie
    続きを読む 一部表示

あらすじ・解説

Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!
Phillip Wylie
エピソード
  • John Hammond: New Frontiers in Cybersecurity Education
    2024/12/10

    Summary


    In this episode of the Philip Wylie Show, host Phillip Wylie interviews cybersecurity expert John Hammond. They discuss John's journey into hacking, the importance of Capture the Flag competitions, and the value of training and certifications in cybersecurity. John shares insights about his new educational platform, Just Hacking Training, and emphasizes the role of content creation in advancing one's career in the cybersecurity field. The conversation highlights the collaborative nature of cybersecurity education and encourages listeners to share their knowledge and experiences.


    Takeaways


    • John Hammond's journey into cybersecurity began with a passion for video games and hacking.
    • Capture the Flag competitions provide valuable skills that are applicable in real-world scenarios.
    • Training resources for penetration testing are abundant and accessible online.
    • Just Hacking Training aims to provide free and affordable cybersecurity education.
    • Collaboration with other experts enhances the quality of educational content.
    • Certifications can help beginners get their foot in the door in cybersecurity.
    • The OSCP certification is highly regarded in the penetration testing community.
    • Content creation can significantly impact career opportunities in cybersecurity.
    • Sharing knowledge and experiences is crucial for community growth in cybersecurity.
    • Continuous learning and adaptation are essential in the ever-evolving field of cybersecurity.


    Sound Bites


    • "CTF is more difficult than real world."
    • "Building up free accessible training."
    • "It's a buffet assortment of training."


    Chapters


    00:00 Introduction to John Hammond

    01:36 John's Hacker Origin Story

    04:07 The Value of Capture the Flag Competitions

    07:08 Training for Aspiring Penetration Testers

    09:11 Introducing Just Hacking Training

    10:57 Collaborators in Cybersecurity Education

    13:24 The Role of Certifications in Cybersecurity

    16:55 Navigating Penetration Testing Certifications

    19:14 The Impact of Content Creation on Career Growth

    23:23 Encouragement for Aspiring Cybersecurity Professionals


    Resources https://www.linkedin.com/in/johnhammond010/ https://www.youtube.com/@_JohnHammond https://x.com/_JohnHammond https://www.justhacking.com/


    続きを読む 一部表示
    25 分
  • Jayson E. Street: Escaping Darkness
    2024/12/03

    Summary

    In this episode of the Phillip Wylie Show, Jayson E. Street shares his journey from a troubled childhood to becoming a prominent figure in the cybersecurity community. He discusses the importance of understanding the hacker mindset, the value of starting in blue team roles before transitioning to red team positions, and the significance of empathy and kindness in both personal and professional interactions. Through engaging stories and valuable insights, Jayson emphasizes the need for effective communication in security roles and the importance of fostering a supportive community.


    Takeaways

    • Jayson E. Street emphasizes that everyone has a hacker origin story.
    • Starting in blue team roles provides a solid foundation for cybersecurity careers.
    • Effective communication is crucial for red teamers to convey findings to management.
    • Success in security is measured by the impact on client awareness and behavior.
    • Empathy and kindness are essential in navigating personal and professional relationships.
    • The hacker mindset is about questioning and challenging the status quo.
    • Networking and community support are vital in the cybersecurity field.
    • Red teaming should focus on improving blue team defenses, not just breaking in.
    • Personal growth often comes from overcoming past traumas and making conscious choices.
    • It's important to remain humble and recognize that everyone has valuable insights to share.


    Sound Bites

    • "You're one of my inspirations."
    • "I was able to destroy them."
    • "It's always time to be kind."


    Chapters

    00:00 Introduction and Inspiration

    03:18 The Hacker Origin Story

    07:40 Starting in Cybersecurity: Blue Team First

    13:03 Engaging Stories from the Field

    21:58 The Importance of Communication in Security

    25:26 Active Intrusions and Real-World Experiences

    26:19 The Art of Social Engineering

    30:56 The Hacker's Humility

    36:05 From Rage to Empathy

    41:02 Choosing Kindness Over Anger


    Resources

    • https://www.linkedin.com/in/jstreet/
    • https://x.com/jaysonstreet
    • https://jaysonestreet.com/
    続きを読む 一部表示
    48 分
  • Rob Allen: Defending Against Modern Threats with ThreatLocker
    2024/11/25

    About the Guest:

    Rob Allen is a seasoned cybersecurity expert currently working as the Chief Product Officer at ThreatLocker. With over 25 years of experience in the IT industry, Rob has a rich background in managing IT environments, having spent nearly two decades at an MSP (Managed Service Provider) in Ireland. He transitioned from cleaning up ransomware attacks to helping organizations actively prevent them through Threat Locker's innovative cybersecurity solutions. Rob is known for his in-depth understanding of evolving cyber threats and promoting effective preventive measures against them. Episode Summary:

    In this engaging episode of the Phillip Wylie Show, host Phillip Wylie welcomes cybersecurity veteran Rob Allen from Threat Locker. Together, they delve into the intricacies of modern cybersecurity threats, focusing on Threat Locker's innovative approaches to tackling ransomware and other malicious attacks. Listeners get a unique insight into the Threat Locker software, known for its preventive rather than reactive approach to cybersecurity, which includes features like default deny policies, ring fencing, and network control. Rob Allen unveils how the default deny approach helps mitigate cyber threats, including ransomware and living-off-the-land binaries, by blocking unauthorized actions before they happen. He emphasizes the need for robust security measures to limit what applications and scripts like PowerShell can do, thus preventing these tools from being weaponized by cybercriminals. Besides discussing practical security steps, Rob highlights how Threat Locker addresses the ever-evolving threat landscape using its innovative network control and threat detection capabilities. This conversation is packed with insights into how organizations can safeguard their IT environments in an era of increasingly complex cyber threats. Key Takeaways: * Default Deny Approach: Rob highlights the efficiency of Threat Locker's default deny policy, preventing unauthorized programs from running by approving only necessary applications. * Living Off the Land Prevention: The discussion covers methods to control and restrict the use of common Windows utilities like PowerShell, preventing them from serving malicious purposes. * Network Control: Insights into handling remote encryption threats through a unique approach to network traffic control, ensuring only trusted devices can connect. * The Role of AI: A glimpse into how AI can be both a tool for cybersecurity advancements and a potential threat when used by bad actors for phishing and malware development. * Zero Trust World Conference: Rob invites listeners to the Zero Trust World event focusing on hands-on cybersecurity training and knowledge exchange. Notable Quotes: * "100% of successful cyber attacks are not detected in time or at all." * "Prevent ransomware, lock it by default." * "AI is just as likely to be used against you as it is to protect you." * "The fact of the matter is, if nobody ever paid, there would be no such thing as ransomware." * "You cannot trust a ransomware gang." Resources: * Threat Locker Website: https://www.threatlocker.com * ThreatLocker LinkedIn: https://www.linkedin.com/company/threatlockerinc/ * Zero Trust World Event: Explore more at ZTW.com * Zero Trust World $200 off discount code: ZTWPW25 * ThreatLocker YouTube: https://www.youtube.com/@ThreatLocker * Rob's LinkedIn: https://www.linkedin.com/in/threatlockerrob/


    Chapters


    00:00 Introduction to ThreatLocker and Rob Allen

    03:30 Rob Allen's Hacker Origin Story

    06:23 Understanding ThreatLocker’s Approach to Cybersecurity

    12:29 Living Off the Land: A Cybersecurity Challenge

    16:39 Macro Vulnerabilities in Office Applications

    19:20 Ransomware Prevention Strategies

    23:40 The Importance of Network Control

    31:55 AI in Cybersecurity: A Double-Edged Sword

    37:37 Zero Trust World Conference Overview

    39:56 Closing Thoughts and Resources

    42:02 Zero Trust World discount code



    続きを読む 一部表示
    43 分

Phillip Wylie Showに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。