4 episodes

Bytes with Bec and Benji is your go-to podcast for all things cyber security. Hosted by the enthusiastic duo, Bec and Benji, each 30-minuteish episode dives into the digital world to uncover the latest in cyber security news, tips, and tricks. Whether you're a tech enthusiast, a professional in the field, or just keen to stay informed about how to protect your digital footprint, this podcast offers engaging and insightful content tailored to all levels of security awareness.

Bytes with Bec and Benji Phriendly Phishing

    • Technology

Bytes with Bec and Benji is your go-to podcast for all things cyber security. Hosted by the enthusiastic duo, Bec and Benji, each 30-minuteish episode dives into the digital world to uncover the latest in cyber security news, tips, and tricks. Whether you're a tech enthusiast, a professional in the field, or just keen to stay informed about how to protect your digital footprint, this podcast offers engaging and insightful content tailored to all levels of security awareness.

    A Day in the Life of an Ethical Hacker

    A Day in the Life of an Ethical Hacker

    Join us as Liam O’Shannessy, shares his insights into the dynamic world of ethical hacking. Learn about the evolving landscape of cyber security, the critical role of ethical hackers, and the importance of collaboration and continuous learning in staying ahead of cyber threats.

    • 46 min
    Legal Considerations of AI: Where do legal and security considerations meet?

    Legal Considerations of AI: Where do legal and security considerations meet?

    Join us for an insightful discussion on the complex legal and ethical considerations surrounding artificial intelligence.
    Our expert, Chris Sibree (Head of Legal at CyberCX) bytes into the key issues organisations and society must grapple with as AI becomes increasingly prevalent - from ensuring fairness and transparency to determining liability when AI makes mistakes.
    What governance approaches taking shape across the globe, and what practical steps for managing AI risks can individuals take?
    Whether you're an AI developer, business leader, policymaker, or concerned citizen, this conversation discusses the critical decisions that will shape our AI-powered working future.

    • 54 min
    Social Proof in the Age of AI: Bring Back Stranger Danger

    Social Proof in the Age of AI: Bring Back Stranger Danger

    A big part of the cyber criminal's toolkit is impersonation. Phishing and Business Email Compromise can start with impersonation of authority in an effort to manipulate their intended victim into revealing sensitive information, or separating them from their money.

    We're told to verify identities, but how do we do this, when Generative AI is making it so much easier to impersonate people over the phone, and in videos?

    • 31 min
    Introducing Bytes with Bec and Benji - Coming soon!

    Introducing Bytes with Bec and Benji - Coming soon!

    Just a quick hello to introduce Bytes with Bec and Benji - brought to you by Phriendly Phishing.

    • 1 min

Top Podcasts In Technology

All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
Search Engine
PJ Vogt, Audacy, Jigsaw
Lex Fridman Podcast
Lex Fridman
Hard Fork
The New York Times
TED Radio Hour
NPR