In the beginning, our hosts Jason Dion and Kip Boyle talk a little bit about their new company Akylade, which is going to provide affordable cybersecurity training. They discuss their initial motivations to start the company, what the plan for the company is, and what’s the road map for Akylade.
In this special episode, we are going to share with you a live webinar hosted by the North Texas Information Systems Security Association. They invited our own Jason Dion and Kip Boyle for the CyberWIDE Panel’s InfoSec Certification Soup to discuss careers, hiring, resumes, and of course, certifications.
In this short episode, our hosts Jason Dion and Kip Boyle discuss the critically important topic of password managers.
In the beginning, Jason quickly describes password managers, their use cases, and how they work highlighting both the security and convenience aspects of using a password manager.
In this episode, our host Kip Boyle interviews Haseeb Awan, CEO of Efani Secure Mobile, to discuss the latest risk in mobile security and look at how Haseeb got into the cyber world.
In the beginning, Haseeb tells the story of how his phone number was compromised not once, not twice, but three times, with basically the same type of attack and how that forced him into cybersecurity.
In this episode our host Jason Dion goes over the very exciting topic of how to
get your first job as a Pentester with Chris Horner, banking expert turned Security engineer and Penetration tester and together they go through Chris’s background, how he got into banking and why he made the switch to Cybersecurity.
In this episode, our host Jason interviews Ayub Yusuf (@WhiteCyberDuck) about how he got into the cybersecurity industry.
This time, we go over a very common case where people tend to study something in college that does not relate to cybersecurity and then shift over to the Cyber world after graduation.
Ayub mentions that you are going to have to deal with a lot of silence and rejections when applying for your first job and that it took him 134 applications to get only 5 interviews.
In this episode we arrive at the end of our five-part series talking about the CIA NA Pentagram, this time discussing the last pillar, Authentication.
Authentication is always associated with passwords and how you can prove that you are who you say you are.
When you hear Authentication, always have things like tokens, digital certificates, multi factor authentication or two factor authentication in mind but remember that Authentication will keep changing and evolving over the years and new ways, techniques or protocols could be introduced to the field.
In the fourth video of this five-part series discussing the CIA-NA pentagram, Kips and Jason talk about nonrepudiation.
In simple terms, nonrepudiation means you can’t say you didn’t do the thing that you did.
Jason and Kip go over some examples of nonrepudiation in both the physical realm and the digital world highlighting that you should always use some type of example when you’re asked about a specific term like nonrepudiation.
In this episode, Kip and Jason discuss everything that makes the A in the CIA Triad, Availability.
Availability is when you like to use a system and it’s there ready for you to use, because no matter how secure a system is, if you cannot access it when you need to, it serves no purpose.
Kip explains how the way you think about availability is also going to change depending on the industry you’re in and the niche you interact with the most.
Edward Skipka, a vulnerability management analyst, goes over his experience and how he managed to double his pay in just over two and a half years. He highlights that doing your best and solving problems can take you to another level within your company.