Phillip Wylie Show

Phillip Wylie

Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!

  1. Emile Fugulin: The Future of Bug Bounty Tools

    21 THG 9

    Emile Fugulin: The Future of Bug Bounty Tools

    Summary In this episode of the Phillip Wylie Show, Emile Fugulin, co-founder of Caido, discusses the evolution of cybersecurity tools, his personal journey into hacking, and the importance of community engagement in the bug bounty space. He highlights the performance challenges faced by traditional security tools and how Caido aims to address these issues through innovative design and architecture. Emile also shares insights on the integration of AI in cybersecurity, the learning curve for new users, and the future of automation in the industry. Takeaways Emile Fugulin emphasizes the importance of competition in the cybersecurity tool market.Caido aims to improve performance and usability compared to traditional tools.The tool is designed to facilitate collaboration between hackers and developers.Caido's architecture allows for remote deployment, enhancing flexibility for users.Community engagement is crucial for Caido's development, especially in plugin creation.The bug bounty community has been a primary focus for Caido's growth and features.Efficiency in manual testing is a key consideration in Caido's design.The learning curve for Caido is designed to be less steep than traditional tools.AI integration is being approached with user control and privacy in mind.The future of cybersecurity will likely see increased automation, but human intuition remains essential. Connect with Emile! https://www.linkedin.com/in/efugulin/ https://caido.io/ Chapters 00:00 Introduction to Caido and Emil's Background 03:19 Emil's Hacker Origin Story 06:05 Performance and Usability Challenges in Security Tools 09:35 Caido's Technical Architecture and Community Engagement 12:11 Plugin Development and Community Contributions 14:14 Focus on Bug Bounty Community 15:34 The Role of Automation in Pen Testing 18:05 Learning Curve and Documentation for Caido 21:35 AI Integration and Future of Pen Testing 24:39 The Future of Cybersecurity Jobs 26:51 Closing Remarks and Community Engagement

    29 phút
  2. Lisa Landau: From Military Intelligence to Cybersecurity

    15 THG 9

    Lisa Landau: From Military Intelligence to Cybersecurity

    Summary In this episode of the Phillip Wylie Show, host Phillip Wylie interviews Lisa Landau, a cybersecurity expert and co-founder of Threat Light. They discuss Lisa's unique journey from military intelligence to the startup world, the challenges and opportunities in cybersecurity, and the importance of hiring talent with diverse backgrounds. Lisa shares insights on how to break into the cybersecurity field, the significance of passion and critical thinking in candidates, and her vision for making cybersecurity solutions more accessible. The conversation culminates in an exploration of the founding of Threat Light and its mission to provide effective incident response solutions. Takeaways Lisa Landau emphasizes the importance of diverse experiences in cybersecurity.Working in startups allows individuals to wear many hats and gain varied skills.Hiring managers should consider potential over specific past experience.Passion for cybersecurity is crucial for success in the field.Critical thinking and the ability to work under pressure are essential traits.Cybersecurity roles often require a mindset that goes beyond a 9-to-5 job.The startup environment can be daunting but offers unique learning opportunities.Threat Light aims to make enterprise-level security accessible to all.Incident response requires speed and efficiency to mitigate risks.Hiring managers should be open-minded to candidates from non-traditional backgrounds. Connect with Lisa! http://linkedin.com/in/lisa-landau/ https://www.linkedin.com/company/threatlight/ https://www.threatlight.com Chapters 00:00 Introduction and Background 03:09 Lisa's Origin Story in Cybersecurity 08:46 Transitioning from Corporate to Startup Life 11:33 Opportunities for New Graduates in Startups 20:31 Hiring Strategies for Cybersecurity Talent 23:23 The Birth of ThreatLight and Its Mission

    35 phút
  3. Alethe Denis: The Art of Social Engineering

    4 THG 8

    Alethe Denis: The Art of Social Engineering

    Summary In this episode of the Phillip Wylie Show, Phillip Wylie interviews Alethe Denis from Bishop Fox, exploring her journey into hacking, the significance of social engineering in cybersecurity, and the evolving landscape of phishing and red teaming. Alethe shares her unique origin story, insights into the importance of real phishing engagements, and creative methods for gaining access during physical pen tests. The conversation also touches on the ethical implications of social engineering, the challenges posed by increasing security awareness, and valuable advice for aspiring security professionals. Takeaways Alethe's journey into hacking began with an interest in social engineering as a child.The evolution of hacking has always involved human manipulation.Real phishing engagements provide a more accurate assessment of security posture.Red teaming is essential for testing security assumptions and controls.Physical pen testing requires creative strategies to gain access.Voice phishing techniques are becoming increasingly sophisticated.Security awareness training is improving, but challenges remain.Ethical considerations are crucial in social engineering practices.AI is being misused to create fake explicit images for extortion.Networking and community engagement are vital for career growth in cybersecurity. Connect with Alethe! https://www.linkedin.com/in/alethe/ https://alethedenis.com/ Chapters 00:00 Introduction and Background 02:29 Alethe's Hacker Origin Story 06:40 The Evolution of Hacking and Social Engineering 08:11 Role of Social Engineering in Red Teaming 10:23 The Importance of Realistic Phishing Engagements 13:42 Physical Pen Testing and Access Strategies 16:15 Creative Methods for Gaining Access 20:03 Voice Phishing Techniques and Challenges 22:56 Navigating Social Engineering and Security Awareness 28:02 The Evolution of Scams and Manipulation Techniques 32:43 Career Pathways in Cybersecurity 40:31 Balancing Offensive and Defensive Security Roles

    43 phút

Trailers

Xếp Hạng & Nhận Xét

4,9
/5
18 Xếp hạng

Giới Thiệu

Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!

Có Thể Bạn Cũng Thích