Josh Mayfield is Director of Security Strategy at Absolute. Josh works with Absolute customers to leverage technology for stronger cybersecurity, continuous compliance, and reduced risk on the attack surface. He has spent years in cybersecurity with a special focus on network security, threat hunting, identity management, and endpoint security. His research has been featured in leading security publications, and he is often cited by business and tech journalists for his analysis of cryptocurrencies, security operations, and attacker psychology.
Marcus J. Carey is a cybersecurity researcher, hacker, and the founder and CEO of Threatcare. He describes himself as a hacker who helps people not suck at cybersecurity. He started his technology voyage in U.S. Navy Cryptology and later went on to refine his knowledge while working at the National Security Agency (NSA).
Marcus sat down with me at the RSA Security Conference in San Francisco in March to discuss his path to a career in cybersecurity, the NSA, Edward Snowden, his book Tribe of Hackers, the future of the cybersecurity industry and much more.
This episode’s guest is North Carolina based security researcher and podcast host Charles Tendell. He joins the podcast to discuss his path to a career in cybersecurity, his experience dealing with Hurricane Florence, Hacker’s List, social engineering, political correctness, virtue signaling, racism, dating apps, cybersecurity pet peeves, Twitter drama, laying the pipe and more!
Benjamin Caudill and Spencer Gietzen of Rhino Security Labs join me to discuss their research on Amazon Web Services privilege escalation vulnerabilities. Spencer recently revealed their AWS research on the Rhino Security Labs blog. Rhino is also rolling out a new open source AWS post-exploitation framework, designed for offensive security testing against AWS environments called Pacu. We also discuss how Ben and Spencer both found their way into the information security industry, pet peeves and more!
Mark is Vice President of Cloud Research at Trend Micro. He joined me at RSAC 2018 to discuss developing new email security gateway tools, operational technology in IoT, the new Cybersecurity Tech Accord, information security buzzwords and more!
Rachel discusses (and demonstrates) the art of “vishing” and social engineering. She placed 2nd twice in the Social Engineering Capture the Flag competition at DEFCON 24 and DEFCON 25 and has become a popular speaker and advocate for personal and organizational safety through social engineering awareness.