Search
Close this search box.

PODCAST EPISODES

EP 96: SDP 1: Least Privilege

In this episode, we unpack the first of the Security Design Principles, Least Privilege.

If you have never heard of it before, Least Privilege is the act of giving a person the most minimal amount of privilege for them to be able to do their job.

Listen Now »

EP 92: Password Managers

In this short episode, our hosts Jason Dion and Kip Boyle discuss the critically important topic of password managers.

In the beginning, Jason quickly describes password managers, their use cases, and how they work highlighting both the security and convenience aspects of using a password manager.

Listen Now »

EP 91: Mobile Device Security with Haseeb Awan

In this episode, our host Kip Boyle interviews Haseeb Awan, CEO of Efani Secure Mobile, to discuss the latest risk in mobile security and look at how Haseeb got into the cyber world.

In the beginning, Haseeb tells the story of how his phone number was compromised not once, not twice, but three times, with basically the same type of attack and how that forced him into cybersecurity.

Listen Now »

EP 89: Getting My First Job in Cybersecurity with Ayub Yusuf

In this episode, our host Jason interviews Ayub Yusuf (@WhiteCyberDuck) about how he got into the cybersecurity industry.

This time, we go over a very common case where people tend to study something in college that does not relate to cybersecurity and then shift over to the Cyber world after graduation.

Ayub mentions that you are going to have to deal with a lot of silence and rejections when applying for your first job and that it took him 134 applications to get only 5 interviews.

Listen Now »

EP 88: The CIA Triad – The Basis of Cybersecurity (Authentication)

In this episode we arrive at the end of our five-part series talking about the CIA NA Pentagram, this time discussing the last pillar, Authentication.

Authentication is always associated with passwords and how you can prove that you are who you say you are.

When you hear Authentication, always have things like tokens, digital certificates, multi factor authentication or two factor authentication in mind but remember that Authentication will keep changing and evolving over the years and new ways, techniques or protocols could be introduced to the field.

Listen Now »

EP 87: The CIA Triad – The Basis of Cybersecurity (Nonrepudiation)

In the fourth video of this five-part series discussing the CIA-NA pentagram, Kips and Jason talk about nonrepudiation.

In simple terms, nonrepudiation means you can’t say you didn’t do the thing that you did.

Jason and Kip go over some examples of nonrepudiation in both the physical realm and the digital world highlighting that you should always use some type of example when you’re asked about a specific term like nonrepudiation.

Listen Now »