120 episodes

Each week on The No Name Security Podcast, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On No Name Security, we meet the people who do one or the other… and sometimes both.

The No Name Security Podcast Matt Stephenson

    • Technology
    • 4.6 • 23 Ratings

Each week on The No Name Security Podcast, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On No Name Security, we meet the people who do one or the other… and sometimes both.

    Greg Crabb: What CISOs can learn from the US Postal Service and… the Russian Security Service?

    Greg Crabb: What CISOs can learn from the US Postal Service and… the Russian Security Service?

    On today’s No Name Security Podcast, Matt Stephenson welcomes Greg Crabb, founder of TenEight Cyber where he consults with CISOs and organizations needing CISO levels of expertise. With 25 years in law enforcement specializing in mail and cyber fraud as well as 6 years as CISO of the United States Postal Service, Greg has learned some things about security. Want to hear about the time he worked with the Russian FSB on a particularly large fraud case? Stick around…

    • 1 hr
    Elisa Costante and Ellen Sundra: Do you know what the NicheStack TCP/IP stack is…?

    Elisa Costante and Ellen Sundra: Do you know what the NicheStack TCP/IP stack is…?

    On this Very Special Episode, Matt Stephenson welcomes Elisa Costante, VP of Research and Ellen Sundra, Chief Customer Officer at Forescout for a discussion about the vulnerabilities that plague Operational Technology and Critical Infrastructure. With nearly 40 years of combined experience finding, understanding and solving the security issues that can cripple a nation, our guests bring some very esoteric knowledge in a way that the rest of us can understand. Dig it…

    • 1 hr 2 min
    Clint Bodungen and Brian Proctor: How At Risk is our Critical Infrastructure?

    Clint Bodungen and Brian Proctor: How At Risk is our Critical Infrastructure?

    On this Very Special Episode, Matt Stephenson brings in ThreatGEN Founder/CEO and Hacking Exposed: Industrial Control Systems author Clint Bodungen alongside Forescout Technologies Inc. Principal OT Strategist Brian Proctor for a sit-down. We take a hard look at the state of security for Operational Technology, Blue and Red teaming for OT, the cybersecurity Skills Gap and a few other things.

    • 59 min
    Mitch Greenfield: Hospitals are Under Continuous Cyberattack… What Can We Do?

    Mitch Greenfield: Hospitals are Under Continuous Cyberattack… What Can We Do?

    On today’s No Name Security Podcast, Matt Stephenson welcomes Mitch Greenfield, Director of Core Security Architecture at Humana. We go all over the healthcare security map in a chat ranging from returning to work to securing telehealth operations to the intricacies of securing a wildly diverse enterprise... we might even squeeze in a little bit of pickle ball. Yeah… you read that right. Great stuff this on this episode!  Check it out…

    • 1 hr 13 min
    INFRA:HALT: Discovering and Mitigating Large-Scale Operational Technology Vulnerabilities

    INFRA:HALT: Discovering and Mitigating Large-Scale Operational Technology Vulnerabilities

    On today’s No Name Security Podcast, Matt Stephenson welcomes Forescout Researchers Daniel dos Santos, Stanislav Dashevskyi and Engineer Anil Mahale for a discussion of Forescout's and JFrog’s joint research project INFRA:HALT. We dive into what the NicheStack TCP/IP stack is, how it is vulnerable and what that means to the cybersecurity world and you. Seems like some pretty esoteric stuff, yeah? You’ll be surprised how much this impacts your life.

    • 1 hr 13 min
    Patrick Miller and Brian Proctor: What’s Left to Hack in Critical Infrastructure?

    Patrick Miller and Brian Proctor: What’s Left to Hack in Critical Infrastructure?

    Matt Stephenson welcomes Ampere Industrial Security CEO Patrick Miller and Forescout Principal OT Strategist Brian Proctor for a chat about what is left to hack in the world of Critical Infrastructure. We run all over the place talking about what is vulnerable and why… what is safe and how to protect everything in between. And... just so you know we are authentic… Proctor was broadcasting from the floor of a manufacturing facility in a hard hat, goggles and day-glo vest

    • 1 hr 5 min

Customer Reviews

4.6 out of 5
23 Ratings

23 Ratings

[REDACTED] USER ,

Great Podcast

Great podcast!

JoshCrist ,

Entertaining, insightful and actionable! 👏

Whether you’re well established as a cyber security innovator, or just getting started carving out your role as a change agent within your organization - this is a must-listen podcast for you! Matt and Michelle do an incredible job leading conversations that cover a huge breadth of topics related to the ins and outs of navigating an ever changing data security and compliance environment - from leaders who’ve actually experienced success themselves. Highly recommend listening and subscribing!

packmatt73 ,

Yes, there are BlackBerry Cylance episodes, but there is so much more

This might be lame, but I want to address the notion that InSecurity is strictly a promotional vehicle for BlackBerry Cylance.

Yes, we have done several episodes featuring Cylance

Top Podcasts In Technology

Lex Fridman
Jason Calacanis
NPR
Jack Rhysider
Gimlet
Bloomberg Intelligence

You Might Also Like

Jordan Harbinger
audiochuck