<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/security-by-default/" rel="self" type="application/rss+xml"/><title><![CDATA[Security by Default]]></title><podcast:guid>b6e97b89-b8fe-5f33-9eef-6c1eb9a6101e</podcast:guid><lastBuildDate>Tue, 14 Apr 2026 12:00:19 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2026 Joseph Carson]]></copyright><managingEditor>Joseph Carson</managingEditor><itunes:summary><![CDATA[Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.]]></itunes:summary><image><url>https://artwork.captivate.fm/99c3c2e8-46d8-4d16-80b5-9bea3fa5408c/SecurityByDefault-Image-sqaure-3000.jpg</url><title>Security by Default</title><link><![CDATA[https://wiretrap.eu/podcast/]]></link></image><itunes:image href="https://artwork.captivate.fm/99c3c2e8-46d8-4d16-80b5-9bea3fa5408c/SecurityByDefault-Image-sqaure-3000.jpg"/><itunes:owner><itunes:name>Joseph Carson</itunes:name></itunes:owner><itunes:author>Joseph Carson</itunes:author><description>Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.</description><link>https://wiretrap.eu/podcast/</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:subtitle><![CDATA[Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends.]]></itunes:subtitle><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="Education"></itunes:category><itunes:category text="Business"></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>The Analyst&apos;s Role in Cybersecurity: Bridging Gaps and Shaping Trends with Fernando</title><itunes:title>The Analyst&apos;s Role in Cybersecurity: Bridging Gaps and Shaping Trends with Fernando</itunes:title><description><![CDATA[<p>In this episode, Fernando Montenegro shares his journey into the cybersecurity industry, insights on industry analysis, and the evolving trends shaping cybersecurity today. Discover how analysts bridge the gap between vendors, buyers, investors, and academia, and learn practical tips for engaging effectively with industry experts.</p><p></p><p><span class="ql-size-large">key  Takeaways</span></p><ul><li>Role of industry analysts in cybersecurity</li><li>Emerging trends in cybersecurity including AI and attack surface expansion</li><li>Effective engagement with analysts for decision support</li><li>Strategic cybersecurity budgeting and investment</li><li>Influence of economics and incentives on security decisions</li></ul><br/><p></p><p><span class="ql-size-large">sound bites</span></p><p>"Understanding what's going on in the world"</p><p>"Good enough security can be effective"</p><p>"Workload AI versus workforce AI"</p><p></p><p><span class="ql-size-large">Chapters</span></p><p>00:00 Introduction to Security by Default Podcast</p><p>00:53 Fernando Montenegro's Origin Story</p><p>05:16 The Role of an Industry Analyst</p><p>08:55 Maximizing Value from Analyst Interactions</p><p>13:16 Understanding AI in Conversations</p><p>15:44 Choosing the Right Solutions</p><p>16:40 Decision-Making in Technology and Business</p><p>17:13 Trends in Cybersecurity and AI</p><p>18:26 Understanding Workload vs. Workforce AI</p><p>19:40 The Evolving Role of Security Professionals</p><p>21:43 The Strategic Importance of Cybersecurity</p><p>23:58 Incentives and Decision-Making in Security</p><p>25:53 The Shift Left Approach in Development</p><p>27:16 Budgeting for Cybersecurity Investments</p><p>30:47 Navigating Cybersecurity Budgets</p><p>32:26 Engaging with Analysts and Staying Informed</p><p>34:33 Curating Information in a Data-Driven World</p><p>36:55 Balancing Operational and Strategic Insights</p><p>37:51 Connecting with Analysts and Final Thoughts</p><p></p><p><span class="ql-size-large">Resources</span></p><p>LinkedIn Profile of Fernando Montenegro - https://www.linkedin.com/in/fsmontenegro/ </p><p>Futurum Group - https://futurumgroup.com/</p><p>Obsidian Knowledge Management System - https://obsidian.md/</p><p>Book: Why Most Security Budgets Go to Waste by Ross Young - https://a.co/d/02BZPwdO </p>]]></description><content:encoded><![CDATA[<p>In this episode, Fernando Montenegro shares his journey into the cybersecurity industry, insights on industry analysis, and the evolving trends shaping cybersecurity today. Discover how analysts bridge the gap between vendors, buyers, investors, and academia, and learn practical tips for engaging effectively with industry experts.</p><p></p><p><span class="ql-size-large">key  Takeaways</span></p><ul><li>Role of industry analysts in cybersecurity</li><li>Emerging trends in cybersecurity including AI and attack surface expansion</li><li>Effective engagement with analysts for decision support</li><li>Strategic cybersecurity budgeting and investment</li><li>Influence of economics and incentives on security decisions</li></ul><br/><p></p><p><span class="ql-size-large">sound bites</span></p><p>"Understanding what's going on in the world"</p><p>"Good enough security can be effective"</p><p>"Workload AI versus workforce AI"</p><p></p><p><span class="ql-size-large">Chapters</span></p><p>00:00 Introduction to Security by Default Podcast</p><p>00:53 Fernando Montenegro's Origin Story</p><p>05:16 The Role of an Industry Analyst</p><p>08:55 Maximizing Value from Analyst Interactions</p><p>13:16 Understanding AI in Conversations</p><p>15:44 Choosing the Right Solutions</p><p>16:40 Decision-Making in Technology and Business</p><p>17:13 Trends in Cybersecurity and AI</p><p>18:26 Understanding Workload vs. Workforce AI</p><p>19:40 The Evolving Role of Security Professionals</p><p>21:43 The Strategic Importance of Cybersecurity</p><p>23:58 Incentives and Decision-Making in Security</p><p>25:53 The Shift Left Approach in Development</p><p>27:16 Budgeting for Cybersecurity Investments</p><p>30:47 Navigating Cybersecurity Budgets</p><p>32:26 Engaging with Analysts and Staying Informed</p><p>34:33 Curating Information in a Data-Driven World</p><p>36:55 Balancing Operational and Strategic Insights</p><p>37:51 Connecting with Analysts and Final Thoughts</p><p></p><p><span class="ql-size-large">Resources</span></p><p>LinkedIn Profile of Fernando Montenegro - https://www.linkedin.com/in/fsmontenegro/ </p><p>Futurum Group - https://futurumgroup.com/</p><p>Obsidian Knowledge Management System - https://obsidian.md/</p><p>Book: Why Most Security Budgets Go to Waste by Ross Young - https://a.co/d/02BZPwdO </p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/the-analysts-role-in-cybersecurity-bridging-gaps-and-shaping-trends-with-fernando]]></link><guid isPermaLink="false">f4fd5a97-d634-4a48-a00d-7af845b1872a</guid><itunes:image href="https://artwork.captivate.fm/046037aa-80a0-4cf1-a183-0d456ca103cb/generated-image-15.jpg"/><pubDate>Tue, 14 Apr 2026 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/f4fd5a97-d634-4a48-a00d-7af845b1872a.mp3" length="19590989" type="audio/mpeg"/><itunes:duration>40:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>28</itunes:episode><podcast:episode>28</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-d56be4ae-3f54-40ab-8fdd-18fd0fe7fdc8.json" type="application/json+chapters"/></item><item><title>The Cyber Hero Adventure - Making Security Engaging and Fun with Gary Berman</title><itunes:title>The Cyber Hero Adventure - Making Security Engaging and Fun with Gary Berman</itunes:title><description><![CDATA[<p>Join cybersecurity expert Joseph Carson and guest Gary as they explore innovative ways to make cybersecurity engaging, fun, and accessible. Discover how humor, storytelling, and community involvement can transform the industry and attract new talent.</p><p></p><p><strong class="ql-size-large">Chapters</strong></p><p>00:00 Welcome to the Cybersecurity Chaos</p><p>02:32 From Fear to Fun in Cybersecurity</p><p>05:27 The Journey of a Cyber Advocate</p><p>08:09 The Importance of Community and Collaboration</p><p>10:45 Bringing Laughter Back to Cybersecurity</p><p>13:13 Rebranding Cybersecurity for New Talent</p><p>16:00 The Power of Words in Cybersecurity</p><p>18:43 Innovative Approaches to Cyber Awareness</p><p>21:29 Lessons from Kids: Simplifying Cybersecurity</p><p>24:39 The Inner Child and Cognitive Dissonance</p><p>26:40 Gamification and Learning Innovations</p><p>28:19 Storytelling in Cybersecurity</p><p>29:15 Cybersecurity Starts at Home</p><p>30:36 Community Engagement and Employee Connection</p><p>32:14 The Importance of Acknowledgment</p><p>34:13 Finding Joy in Everyday Life</p><p>35:11 Humor as a Coping Mechanism</p><p>40:04 The Power of Positive Thinking</p><p>45:02 Mission Accomplished: Fun and Safety</p><p></p><p><strong class="ql-size-large">Resources</strong></p><p>Cyber Heroes Comics - https://cyberheroescomics.com/</p><p>Gary's LinkedIn Profile - https://www.linkedin.com/in/gary-berman/</p>]]></description><content:encoded><![CDATA[<p>Join cybersecurity expert Joseph Carson and guest Gary as they explore innovative ways to make cybersecurity engaging, fun, and accessible. Discover how humor, storytelling, and community involvement can transform the industry and attract new talent.</p><p></p><p><strong class="ql-size-large">Chapters</strong></p><p>00:00 Welcome to the Cybersecurity Chaos</p><p>02:32 From Fear to Fun in Cybersecurity</p><p>05:27 The Journey of a Cyber Advocate</p><p>08:09 The Importance of Community and Collaboration</p><p>10:45 Bringing Laughter Back to Cybersecurity</p><p>13:13 Rebranding Cybersecurity for New Talent</p><p>16:00 The Power of Words in Cybersecurity</p><p>18:43 Innovative Approaches to Cyber Awareness</p><p>21:29 Lessons from Kids: Simplifying Cybersecurity</p><p>24:39 The Inner Child and Cognitive Dissonance</p><p>26:40 Gamification and Learning Innovations</p><p>28:19 Storytelling in Cybersecurity</p><p>29:15 Cybersecurity Starts at Home</p><p>30:36 Community Engagement and Employee Connection</p><p>32:14 The Importance of Acknowledgment</p><p>34:13 Finding Joy in Everyday Life</p><p>35:11 Humor as a Coping Mechanism</p><p>40:04 The Power of Positive Thinking</p><p>45:02 Mission Accomplished: Fun and Safety</p><p></p><p><strong class="ql-size-large">Resources</strong></p><p>Cyber Heroes Comics - https://cyberheroescomics.com/</p><p>Gary's LinkedIn Profile - https://www.linkedin.com/in/gary-berman/</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/the-cyber-hero-adventure-making-security-engaging-and-fun-with-gary-berman]]></link><guid isPermaLink="false">eae97fc9-0e23-4790-b787-e2327c78a2e5</guid><itunes:image href="https://artwork.captivate.fm/2076f103-91e7-4ab3-9799-28d8f817b72b/ChatGPT-Image-Mar-31-2026-12-35-49-PM.jpg"/><pubDate>Tue, 31 Mar 2026 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/eae97fc9-0e23-4790-b787-e2327c78a2e5.mp3" length="22524644" type="audio/mpeg"/><itunes:duration>46:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>27</itunes:episode><podcast:episode>27</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-7ebb7c71-d4be-47f5-a364-02459d364382.json" type="application/json+chapters"/></item><item><title>Inside the Digital Battlefield: Cybersecurity in Geopolitical Conflicts with Chris Kubecka</title><itunes:title>Inside the Digital Battlefield: Cybersecurity in Geopolitical Conflicts with Chris Kubecka</itunes:title><description><![CDATA[<p>Join Joseph Carson in this insightful episode as he interviews cybersecurity expert Chris Kubecka. They discuss critical infrastructure security, cyber warfare, geopolitical risks, and the evolving landscape of digital threats, providing valuable lessons for cybersecurity professionals and policymakers.</p><p><strong class="ql-size-large">Key  Topics</strong></p><p>Cybersecurity in critical infrastructure</p><p>Geopolitical cyber threats and hybrid warfare</p><p>Evolving landscape of digital threats and resilience</p><p><br></p><p><strong class="ql-size-large"> Sound bites</strong></p><p>"GPS jamming has been a massive challenge."</p><p>"Digital Empires: China, Europe, and the US."</p><p>"Radio communications are a vital fallback."</p><p><br></p><p><strong class="ql-size-large">Chapters</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction and Background of Chris Kubecka</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>01:37 Cybersecurity Challenges in Critical Infrastructure</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>03:37 Evolving Nature of Cyber Threats</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:45 The Role of Drones in Modern Warfare</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>07:25 Hybrid Warfare and Global Diplomacy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>10:10 The Shift in Global Cybersecurity Dynamics</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:18 The Importance of International Cooperation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>14:33 Privacy and Ethics in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>16:50 Historical Context and Regional Cooperation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>18:55 Cyber Attacks on Civilian Infrastructure</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>22:04 Personal Experiences in Estonia</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>24:10 Geopolitical Tensions and Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>25:52 Challenges in Maritime Connectivity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>28:16 Critical Infrastructure Vulnerabilities</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>30:22 The Role of Radio in Authoritarian Regimes</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>33:43 International Maritime Law and Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>37:46 Recent Projects and Activism in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>39:51 Staying Informed in a Rapidly Changing Landscape</li></ol><br/><p><br></p><p><strong class="ql-size-large">Resources</strong></p><p>Chris Kubecka's LinkedIn - https://www.linkedin.com/in/chriskubecka/</p><p>Field Tested: How to Hack a Modern Dictatorship with AI - https://www.amazon.com/dp/B0C7F4XYZ</p>]]></description><content:encoded><![CDATA[<p>Join Joseph Carson in this insightful episode as he interviews cybersecurity expert Chris Kubecka. They discuss critical infrastructure security, cyber warfare, geopolitical risks, and the evolving landscape of digital threats, providing valuable lessons for cybersecurity professionals and policymakers.</p><p><strong class="ql-size-large">Key  Topics</strong></p><p>Cybersecurity in critical infrastructure</p><p>Geopolitical cyber threats and hybrid warfare</p><p>Evolving landscape of digital threats and resilience</p><p><br></p><p><strong class="ql-size-large"> Sound bites</strong></p><p>"GPS jamming has been a massive challenge."</p><p>"Digital Empires: China, Europe, and the US."</p><p>"Radio communications are a vital fallback."</p><p><br></p><p><strong class="ql-size-large">Chapters</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction and Background of Chris Kubecka</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>01:37 Cybersecurity Challenges in Critical Infrastructure</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>03:37 Evolving Nature of Cyber Threats</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:45 The Role of Drones in Modern Warfare</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>07:25 Hybrid Warfare and Global Diplomacy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>10:10 The Shift in Global Cybersecurity Dynamics</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:18 The Importance of International Cooperation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>14:33 Privacy and Ethics in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>16:50 Historical Context and Regional Cooperation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>18:55 Cyber Attacks on Civilian Infrastructure</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>22:04 Personal Experiences in Estonia</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>24:10 Geopolitical Tensions and Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>25:52 Challenges in Maritime Connectivity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>28:16 Critical Infrastructure Vulnerabilities</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>30:22 The Role of Radio in Authoritarian Regimes</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>33:43 International Maritime Law and Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>37:46 Recent Projects and Activism in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>39:51 Staying Informed in a Rapidly Changing Landscape</li></ol><br/><p><br></p><p><strong class="ql-size-large">Resources</strong></p><p>Chris Kubecka's LinkedIn - https://www.linkedin.com/in/chriskubecka/</p><p>Field Tested: How to Hack a Modern Dictatorship with AI - https://www.amazon.com/dp/B0C7F4XYZ</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/inside-the-digital-battlefield-cybersecurity-in-geopolitical-conflicts-with-chris-kubecka]]></link><guid isPermaLink="false">3a96c93e-32f9-4450-93ca-6ec9c9659c76</guid><itunes:image href="https://artwork.captivate.fm/ecf9db51-8e25-4f77-86b8-1c8a799ce925/generated-image-14.jpg"/><pubDate>Tue, 17 Mar 2026 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/3a96c93e-32f9-4450-93ca-6ec9c9659c76.mp3" length="21660723" type="audio/mpeg"/><itunes:duration>45:08</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>26</itunes:episode><podcast:episode>26</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-1ac1a296-3e37-4c75-baae-37ff555df00e.json" type="application/json+chapters"/></item><item><title>How Gamification and Community Help Beginners Break Into Cloud and AI Security</title><itunes:title>How Gamification and Community Help Beginners Break Into Cloud and AI Security</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson speaks with Ian Austin, co-founder of Pwned Labs, about his journey in cybersecurity, the evolution of learning in the field, and the challenges of Cloud and AI security. Ian shares insights on transitioning into cybersecurity roles, the importance of community engagement, and the need for continuous learning in an ever-evolving industry. They discuss the significance of gamification in training and the current trends in cloud security, emphasizing the importance of hands-on experience and collaboration.</p><p><span class="ql-size-large"> Key Takeaways</span></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ian Austin is a co-founder of Pwned Labs, specializing in cloud and AI security training.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>His journey in cybersecurity began with help desk roles and evolved into penetration testing.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Creating content is a great way to learn and contribute to the community.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cloud security presents unique challenges that require ongoing education and adaptation.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Gamification in training enhances engagement but should not overshadow practical learning.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Community involvement is crucial for personal and professional growth in cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Transitioning into security roles can be done from various backgrounds, including sysadmin and help desk.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Continuous learning is essential in the fast-paced cybersecurity landscape.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Mentorship can significantly impact career development and confidence.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cloud security is a growing field with increasing demand for skilled professionals.</li></ol><br/><p><br></p><p><span class="ql-size-large"> sound bites</span></p><p>"Learning is a great way to learn."</p><p>"Community is a powerful thing."</p><p>"Cloud is hard to secure."</p><p><br></p><p><span class="ql-size-large">Chapters</span></p><p>00:00 Introduction to the Podcast and Guest</p><p>00:40 Ian Austin's Journey in Cybersecurity</p><p>06:40 Transitioning into Security Roles</p><p>10:54 Evolution of Learning in Cybersecurity</p><p>16:19 The Importance of Community in Learning</p><p>22:58 Challenges in Cloud Security</p><p>28:46 Staying Updated in the Cybersecurity Field</p><p><br></p><p><span class="ql-size-large">Resources:</span></p><p>https://pwnedlabs.io/</p><p>https://www.linkedin.com/in/ian-austin/</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson speaks with Ian Austin, co-founder of Pwned Labs, about his journey in cybersecurity, the evolution of learning in the field, and the challenges of Cloud and AI security. Ian shares insights on transitioning into cybersecurity roles, the importance of community engagement, and the need for continuous learning in an ever-evolving industry. They discuss the significance of gamification in training and the current trends in cloud security, emphasizing the importance of hands-on experience and collaboration.</p><p><span class="ql-size-large"> Key Takeaways</span></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ian Austin is a co-founder of Pwned Labs, specializing in cloud and AI security training.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>His journey in cybersecurity began with help desk roles and evolved into penetration testing.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Creating content is a great way to learn and contribute to the community.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cloud security presents unique challenges that require ongoing education and adaptation.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Gamification in training enhances engagement but should not overshadow practical learning.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Community involvement is crucial for personal and professional growth in cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Transitioning into security roles can be done from various backgrounds, including sysadmin and help desk.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Continuous learning is essential in the fast-paced cybersecurity landscape.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Mentorship can significantly impact career development and confidence.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Cloud security is a growing field with increasing demand for skilled professionals.</li></ol><br/><p><br></p><p><span class="ql-size-large"> sound bites</span></p><p>"Learning is a great way to learn."</p><p>"Community is a powerful thing."</p><p>"Cloud is hard to secure."</p><p><br></p><p><span class="ql-size-large">Chapters</span></p><p>00:00 Introduction to the Podcast and Guest</p><p>00:40 Ian Austin's Journey in Cybersecurity</p><p>06:40 Transitioning into Security Roles</p><p>10:54 Evolution of Learning in Cybersecurity</p><p>16:19 The Importance of Community in Learning</p><p>22:58 Challenges in Cloud Security</p><p>28:46 Staying Updated in the Cybersecurity Field</p><p><br></p><p><span class="ql-size-large">Resources:</span></p><p>https://pwnedlabs.io/</p><p>https://www.linkedin.com/in/ian-austin/</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/how-gamification-and-community-help-beginners-break-into-cloud-and-ai-security]]></link><guid isPermaLink="false">7a4871b9-b33f-4e9d-9be2-788eadef04f8</guid><itunes:image href="https://artwork.captivate.fm/9178118d-3248-4c97-9ee7-cdef3c54a5ad/generated-image-2.jpg"/><pubDate>Tue, 03 Mar 2026 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/7a4871b9-b33f-4e9d-9be2-788eadef04f8.mp3" length="16060697" type="audio/mpeg"/><itunes:duration>33:28</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>25</itunes:episode><podcast:episode>25</podcast:episode><podcast:season>1</podcast:season></item><item><title>Cracking Passwords and the Future of Passwords with Evil Mog</title><itunes:title>Cracking Passwords and the Future of Passwords with Evil Mog</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson welcomes Evil Mog, an expert in password cracking and cybersecurity. They discuss the importance of Hacker Jeopardy in making cybersecurity fun, the ongoing challenges with passwords, and the evolving role of AI in password cracking. The conversation also touches on incident response, the significance of documentation, and the future trends in cybersecurity, including the shift towards passwordless authentication and the impact of AI on both attackers and defenders.</p><p><strong class="ql-size-large">Takeaways</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Hacker Jeopardy is a fun way to engage with cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Teaching others helps reinforce your own knowledge.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Passwords will remain a necessary evil in security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI is enhancing password cracking methodologies.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Documentation is crucial in incident response.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The cost of hacking is increasing due to advanced techniques.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Collaboration between red and blue teams is essential.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Insider threats are on the rise in cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Password management is fundamentally an asset management issue.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Future trends indicate a shift towards passwordless authentication.</li></ol><br/><p><br></p><p><strong class="ql-size-large"> Sound bites</strong></p><p>"Teaching helps you learn better."</p><p>"Security is about enabling the business."</p><p>"The cost of hacking is rising."</p><p><br></p><p><strong class="ql-size-large">Chapters</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Evil Mog and Hacker Jeopardy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:37 The Importance of Community and Teaching in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:22 Password Security: The Louvre Incident</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>07:59 The Evolution of Authentication Methods</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>10:35 Challenges in Asset Management and Password Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>13:15 Operational Technology (OT) Security Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>15:53 The Role of Documentation in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>18:42 AI in Cybersecurity: Automation and Password Recovery</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>21:52 AI in Password Cracking</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>24:56 Enhancing Human Capabilities with AI</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>27:18 The Evolution of Cybercrime</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>30:02 Trends and Predictions for Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>34:41 Collaboration in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>37:24 The Future of Cybercrime and AI</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>40:59 Connecting with Evil Mog</li></ol><br/>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson welcomes Evil Mog, an expert in password cracking and cybersecurity. They discuss the importance of Hacker Jeopardy in making cybersecurity fun, the ongoing challenges with passwords, and the evolving role of AI in password cracking. The conversation also touches on incident response, the significance of documentation, and the future trends in cybersecurity, including the shift towards passwordless authentication and the impact of AI on both attackers and defenders.</p><p><strong class="ql-size-large">Takeaways</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Hacker Jeopardy is a fun way to engage with cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Teaching others helps reinforce your own knowledge.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Passwords will remain a necessary evil in security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI is enhancing password cracking methodologies.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Documentation is crucial in incident response.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The cost of hacking is increasing due to advanced techniques.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Collaboration between red and blue teams is essential.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Insider threats are on the rise in cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Password management is fundamentally an asset management issue.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Future trends indicate a shift towards passwordless authentication.</li></ol><br/><p><br></p><p><strong class="ql-size-large"> Sound bites</strong></p><p>"Teaching helps you learn better."</p><p>"Security is about enabling the business."</p><p>"The cost of hacking is rising."</p><p><br></p><p><strong class="ql-size-large">Chapters</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Evil Mog and Hacker Jeopardy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:37 The Importance of Community and Teaching in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:22 Password Security: The Louvre Incident</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>07:59 The Evolution of Authentication Methods</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>10:35 Challenges in Asset Management and Password Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>13:15 Operational Technology (OT) Security Challenges</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>15:53 The Role of Documentation in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>18:42 AI in Cybersecurity: Automation and Password Recovery</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>21:52 AI in Password Cracking</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>24:56 Enhancing Human Capabilities with AI</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>27:18 The Evolution of Cybercrime</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>30:02 Trends and Predictions for Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>34:41 Collaboration in Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>37:24 The Future of Cybercrime and AI</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>40:59 Connecting with Evil Mog</li></ol><br/>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/cracking-passwords-and-the-future-of-passwords-with-evil-mog]]></link><guid isPermaLink="false">f166e3b4-952c-4b53-8009-eed7c72dde1d</guid><itunes:image href="https://artwork.captivate.fm/5dea235f-97a8-4919-baa9-8044afa0c596/Thumbnail.jpg"/><pubDate>Tue, 17 Feb 2026 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/f166e3b4-952c-4b53-8009-eed7c72dde1d.mp3" length="20298385" type="audio/mpeg"/><itunes:duration>42:17</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>24</itunes:episode><podcast:episode>24</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-583a1ba2-e4c5-4528-b9e8-5edfa4b5f989.json" type="application/json+chapters"/></item><item><title>Exploring Identity Security Trends with Charles Chase</title><itunes:title>Exploring Identity Security Trends with Charles Chase</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson speaks with Charles Chase about his journey into the cybersecurity field, focusing on identity security and privilege access management. They discuss the evolving trends in identity security, the importance of maintaining identity hygiene, and the impact of regulations like NIST 2 and DORA on organizational practices. The conversation also covers the shift towards passwordless security, the role of AI in identity management, and resources for those looking to enter the field. The episode concludes with reflections on the importance of identities in business and society.</p><p><span class="ql-size-large">Takeaways</span></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Charles Chase fell into cybersecurity from a military background.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The importance of understanding what you don't know in identity security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organizations often have dormant accounts that pose security risks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Regulatory bodies are pushing organizations to improve their identity security practices.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The shift towards passwordless security is gaining momentum.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI is becoming a valuable tool in identity management.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Identity hygiene is crucial for reducing risks in organizations.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The commoditization of identity solutions allows smaller businesses to implement security measures.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Engaging with customers is key to understanding their unique identity security needs.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The future of identity management is focused on user experience and automation.</li></ol><br/><p><br></p><p><span class="ql-size-large">Sound bites</span></p><p>"What do I not know?"</p><p>"It's a learning tool."</p><p>"It's a fun industry."</p><p><br></p><p><span class="ql-size-large">Chapters</span></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to the Podcast and Guest</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:47 Charles Chase's Journey into Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:22 Trends in Identity Security and Best Practices</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:54 Understanding Dormant Accounts and Their Risks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:54 The Shift Towards Passwordless Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:45 The Role of AI in Identity Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>18:35 The Importance of Digital Identity in Society</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>26:45 Resources for Entering the Identity Space</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>30:49 Conclusion and Final Thoughts</li></ol><br/><p><br></p><p><span class="ql-size-large">Keywords</span></p><p>cybersecurity, identity security, privilege access management, trends, best practices, passwordless security, AI in identity management, regulatory impact, identity hygiene, resources for cybersecurity</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson speaks with Charles Chase about his journey into the cybersecurity field, focusing on identity security and privilege access management. They discuss the evolving trends in identity security, the importance of maintaining identity hygiene, and the impact of regulations like NIST 2 and DORA on organizational practices. The conversation also covers the shift towards passwordless security, the role of AI in identity management, and resources for those looking to enter the field. The episode concludes with reflections on the importance of identities in business and society.</p><p><span class="ql-size-large">Takeaways</span></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Charles Chase fell into cybersecurity from a military background.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The importance of understanding what you don't know in identity security.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Organizations often have dormant accounts that pose security risks.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Regulatory bodies are pushing organizations to improve their identity security practices.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The shift towards passwordless security is gaining momentum.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>AI is becoming a valuable tool in identity management.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Identity hygiene is crucial for reducing risks in organizations.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The commoditization of identity solutions allows smaller businesses to implement security measures.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Engaging with customers is key to understanding their unique identity security needs.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The future of identity management is focused on user experience and automation.</li></ol><br/><p><br></p><p><span class="ql-size-large">Sound bites</span></p><p>"What do I not know?"</p><p>"It's a learning tool."</p><p>"It's a fun industry."</p><p><br></p><p><span class="ql-size-large">Chapters</span></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to the Podcast and Guest</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:47 Charles Chase's Journey into Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>02:22 Trends in Identity Security and Best Practices</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:54 Understanding Dormant Accounts and Their Risks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>09:54 The Shift Towards Passwordless Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>12:45 The Role of AI in Identity Management</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>18:35 The Importance of Digital Identity in Society</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>26:45 Resources for Entering the Identity Space</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>30:49 Conclusion and Final Thoughts</li></ol><br/><p><br></p><p><span class="ql-size-large">Keywords</span></p><p>cybersecurity, identity security, privilege access management, trends, best practices, passwordless security, AI in identity management, regulatory impact, identity hygiene, resources for cybersecurity</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/exploring-identity-security-trends-with-charles-chase]]></link><guid isPermaLink="false">fe6b4cc1-f639-4ee6-ac34-722cef1a1e88</guid><itunes:image href="https://artwork.captivate.fm/9a7d8375-e2d6-4a0c-ac14-e968f725a18f/generated-image-14.jpg"/><pubDate>Tue, 03 Feb 2026 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/fe6b4cc1-f639-4ee6-ac34-722cef1a1e88.mp3" length="14453644" type="audio/mpeg"/><itunes:duration>30:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>23</itunes:episode><podcast:episode>23</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-eeb8d3a4-115a-4e7f-925c-698197baec8d.json" type="application/json+chapters"/></item><item><title>Cyber Ops and OSINT with the Grugq</title><itunes:title>Cyber Ops and OSINT with the Grugq</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joseph Carson engages with the Grugq, a cybersecurity expert and PhD student, discussing his journey into the field, the evolution of cybersecurity practices, and the complexities of information warfare. The Grugq shares insights on anti-forensics, the importance of understanding human behavior in cybersecurity, and the current landscape of cyber warfare, particularly in the context of the ongoing conflict in Ukraine. The conversation highlights the challenges and changes in the cybersecurity field, emphasizing the need for clarity and understanding in a chaotic information environment.</p><p><span class="ql-size-large">Takeaways</span></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The Grugq's journey into cybersecurity began with a Unix book.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>He transitioned from internships to freelancing in cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Moving to Thailand helped reduce living costs while consulting.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Understanding anti-forensics is crucial for effective cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The rules of cyber warfare differ significantly from peacetime operations.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Information warfare involves changing how people interpret information.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The Grugq emphasizes the importance of human behavior in cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Staying updated in cybersecurity requires monitoring current events and engaging with experts.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The evolution of cybersecurity tools has made it easier for new actors to operate.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The Grugq's PhD research focuses on the realities of cyber warfare.</li></ol><br/><p><span class="ql-size-large">Additional Resources:</span></p><p>https://x.com/thegrugq</p><p>https://github.com/grugq</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joseph Carson engages with the Grugq, a cybersecurity expert and PhD student, discussing his journey into the field, the evolution of cybersecurity practices, and the complexities of information warfare. The Grugq shares insights on anti-forensics, the importance of understanding human behavior in cybersecurity, and the current landscape of cyber warfare, particularly in the context of the ongoing conflict in Ukraine. The conversation highlights the challenges and changes in the cybersecurity field, emphasizing the need for clarity and understanding in a chaotic information environment.</p><p><span class="ql-size-large">Takeaways</span></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The Grugq's journey into cybersecurity began with a Unix book.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>He transitioned from internships to freelancing in cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Moving to Thailand helped reduce living costs while consulting.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Understanding anti-forensics is crucial for effective cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The rules of cyber warfare differ significantly from peacetime operations.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Information warfare involves changing how people interpret information.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The Grugq emphasizes the importance of human behavior in cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Staying updated in cybersecurity requires monitoring current events and engaging with experts.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The evolution of cybersecurity tools has made it easier for new actors to operate.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The Grugq's PhD research focuses on the realities of cyber warfare.</li></ol><br/><p><span class="ql-size-large">Additional Resources:</span></p><p>https://x.com/thegrugq</p><p>https://github.com/grugq</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/cyber-ops-with-the-grugq]]></link><guid isPermaLink="false">5ef666f0-956b-4a88-986a-ba057d6e588e</guid><itunes:image href="https://artwork.captivate.fm/63761b69-fe91-44b0-a103-e6066b9571ad/Thumbnail.jpg"/><pubDate>Tue, 20 Jan 2026 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/5ef666f0-956b-4a88-986a-ba057d6e588e.mp3" length="22124683" type="audio/mpeg"/><itunes:duration>46:06</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>22</itunes:episode><podcast:episode>22</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-87c0d117-3914-46da-9575-d9fb683a4a6d.json" type="application/json+chapters"/></item><item><title>From Prosecutor to CSO: Joe Sullivan on Cybersecurity Leadership, Crisis, and Resilience</title><itunes:title>From Prosecutor to CSO: Joe Sullivan on Cybersecurity Leadership, Crisis, and Resilience</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joseph Carson interviews Joe Sullivan, a prominent figure in cybersecurity. They discuss Joe's journey from a federal prosecutor to the Chief Security Officer at Facebook, exploring the challenges and expectations in transitioning from government to private sector roles. The conversation delves into the evolving landscape of cybersecurity, the impact of ransomware, and the importance of crisis management and preparedness. Joe shares valuable lessons for aspiring security executives and highlights the significance of understanding technology in leadership roles. The episode concludes with Joe's current projects, including his nonprofit initiative, Ukraine Friends, which provides laptops to children affected by the war in Ukraine.</p><p><strong class="ql-size-large">Takeaways</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Security is possible for everyone.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Joe Sullivan's journey reflects a unique path into cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Transitioning from government to private sector presents challenges.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Understanding corporate culture is crucial for success.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Measuring success in cybersecurity requires clear metrics.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ransomware has fundamentally changed the cybersecurity landscape.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Security leaders are increasingly reporting to CEOs.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Crisis management is essential for organizational resilience.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Aspiring security executives should focus on business understanding.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Giving back to the community is a vital part of the cybersecurity profession.</li></ol><br/><p><br></p><p><strong class="ql-size-large">Sound bites</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>"Security is possible for everyone."</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>"I got an MBA through osmosis."</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>"The expectations were so high."</li></ol><br/><p><br></p><p><strong class="ql-size-large">Chapters</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Security by Default Podcast</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>01:02 Joe Sullivan's Journey into Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:10 Transition from Government to Private Sector</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:06 Navigating the Corporate Landscape</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>15:48 Measuring Success in Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>20:04 The Impact of Ransomware on Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>28:01 The Evolving Role of Security Leaders</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>30:57 Understanding Business Strategy in Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>32:59 Risk Management and Business Partnership</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>33:52 Navigating Technology Risks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>35:54 The Race for AI Innovation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>38:03 Crisis Management and Preparedness</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>39:59 Building Resilience in Security Teams</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>42:16 The Importance of Response Training</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>44:10 Lessons from Emergency Services</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>47:41 Community Impact through Technology</li></ol><br/><p><br></p><p><strong class="ql-size-large">Additional Resources:</strong></p><p>https://www.joesullivansecurity.com/about</p><p>https://ukrainefriends.org/</p><p>https://www.linkedin.com/in/joesu11ivan/</p><p>https://en.wikipedia.org/wiki/Joe_Sullivan_(cybersecurity)</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joseph Carson interviews Joe Sullivan, a prominent figure in cybersecurity. They discuss Joe's journey from a federal prosecutor to the Chief Security Officer at Facebook, exploring the challenges and expectations in transitioning from government to private sector roles. The conversation delves into the evolving landscape of cybersecurity, the impact of ransomware, and the importance of crisis management and preparedness. Joe shares valuable lessons for aspiring security executives and highlights the significance of understanding technology in leadership roles. The episode concludes with Joe's current projects, including his nonprofit initiative, Ukraine Friends, which provides laptops to children affected by the war in Ukraine.</p><p><strong class="ql-size-large">Takeaways</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Security is possible for everyone.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Joe Sullivan's journey reflects a unique path into cybersecurity.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Transitioning from government to private sector presents challenges.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Understanding corporate culture is crucial for success.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Measuring success in cybersecurity requires clear metrics.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ransomware has fundamentally changed the cybersecurity landscape.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Security leaders are increasingly reporting to CEOs.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Crisis management is essential for organizational resilience.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Aspiring security executives should focus on business understanding.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Giving back to the community is a vital part of the cybersecurity profession.</li></ol><br/><p><br></p><p><strong class="ql-size-large">Sound bites</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>"Security is possible for everyone."</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>"I got an MBA through osmosis."</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>"The expectations were so high."</li></ol><br/><p><br></p><p><strong class="ql-size-large">Chapters</strong></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to Security by Default Podcast</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>01:02 Joe Sullivan's Journey into Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>05:10 Transition from Government to Private Sector</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>11:06 Navigating the Corporate Landscape</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>15:48 Measuring Success in Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>20:04 The Impact of Ransomware on Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>28:01 The Evolving Role of Security Leaders</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>30:57 Understanding Business Strategy in Security</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>32:59 Risk Management and Business Partnership</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>33:52 Navigating Technology Risks</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>35:54 The Race for AI Innovation</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>38:03 Crisis Management and Preparedness</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>39:59 Building Resilience in Security Teams</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>42:16 The Importance of Response Training</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>44:10 Lessons from Emergency Services</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>47:41 Community Impact through Technology</li></ol><br/><p><br></p><p><strong class="ql-size-large">Additional Resources:</strong></p><p>https://www.joesullivansecurity.com/about</p><p>https://ukrainefriends.org/</p><p>https://www.linkedin.com/in/joesu11ivan/</p><p>https://en.wikipedia.org/wiki/Joe_Sullivan_(cybersecurity)</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/from-prosecutor-to-cso-joe-sullivan-on-cybersecurity-leadership-crisis-and-resilience]]></link><guid isPermaLink="false">4d73b768-8f8a-44ae-9438-452b4c837927</guid><itunes:image href="https://artwork.captivate.fm/d8bffdf5-b073-4f83-93e0-473e26ff6ece/generated-image-12.jpg"/><pubDate>Tue, 06 Jan 2026 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/4d73b768-8f8a-44ae-9438-452b4c837927.mp3" length="22948246" type="audio/mpeg"/><itunes:duration>47:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>21</itunes:episode><podcast:episode>21</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-a004c967-479e-4127-b7b3-9adcc1a15bd3.json" type="application/json+chapters"/></item><item><title>Laughing with Cyber - A Standup Comedy Special with Ian</title><itunes:title>Laughing with Cyber - A Standup Comedy Special with Ian</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joseph Carson welcomes Ian Murphy, a cybersecurity expert and stand-up comedian. They discuss Ian's unconventional journey into cybersecurity, his experiences at the MOD and Symantec, and his transition to self-employment and comedy. Ian shares insights on the importance of storytelling in both cybersecurity awareness and comedy, as well as navigating online criticism and audience interactions. The conversation highlights the need for humor in serious industries and the value of real human connections.</p><p><span class="ql-size-large">Takeaways</span></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ian's journey into cybersecurity was unplanned and unconventional.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The importance of storytelling in both cybersecurity and comedy.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Self-employment offers freedom but comes with challenges.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Humor can be a powerful tool in serious industries.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Navigating online criticism requires thick skin and perspective.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Comedy is subjective, and not everyone will appreciate it.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Real human interactions are essential in today's digital age.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Learning from experiences is crucial for growth in any field.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Networking and peer relationships are vital for success.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Life is better when you find joy and laughter in everyday situations.</li></ol><br/><p><br></p><p><span class="ql-size-large">Titles</span></p><p>From Cybersecurity to Comedy: Ian Murphy's Journey</p><p>The Power of Storytelling in Cybersecurity and Comedy</p><p><br></p><p><span class="ql-size-large">Sound bites</span></p><p>"I wanted to be a footballer."</p><p>"Comedy is subjective."</p><p>"You need to grow the fuck up."</p><p><br></p><p><span class="ql-size-large">Chapters</span></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to the Podcast and Guest</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:56 Ian's Origin Story and Journey into Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>06:29 Experiences at MOD and Symantec</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>10:44 Transitioning to Self-Employment and Freedom</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>14:27 The Switch to Stand-Up Comedy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>22:05 The Impact of Humor in Cybersecurity Awareness</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>30:06 Audience Feedback and Social Media Interaction</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>31:54 The Power of Audience Engagement</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>34:49 Navigating Controversy in Comedy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>37:43 The Art of Timing and Response</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>40:47 Comedy as a Reflection of Life</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>43:44 The Evolution of Comedy and Storytelling</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>49:53 Learning and Growth Through Comedy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>53:50 Connecting with the Audience</li></ol><br/>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joseph Carson welcomes Ian Murphy, a cybersecurity expert and stand-up comedian. They discuss Ian's unconventional journey into cybersecurity, his experiences at the MOD and Symantec, and his transition to self-employment and comedy. Ian shares insights on the importance of storytelling in both cybersecurity awareness and comedy, as well as navigating online criticism and audience interactions. The conversation highlights the need for humor in serious industries and the value of real human connections.</p><p><span class="ql-size-large">Takeaways</span></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Ian's journey into cybersecurity was unplanned and unconventional.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>The importance of storytelling in both cybersecurity and comedy.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Self-employment offers freedom but comes with challenges.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Humor can be a powerful tool in serious industries.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Navigating online criticism requires thick skin and perspective.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Comedy is subjective, and not everyone will appreciate it.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Real human interactions are essential in today's digital age.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Learning from experiences is crucial for growth in any field.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Networking and peer relationships are vital for success.</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>Life is better when you find joy and laughter in everyday situations.</li></ol><br/><p><br></p><p><span class="ql-size-large">Titles</span></p><p>From Cybersecurity to Comedy: Ian Murphy's Journey</p><p>The Power of Storytelling in Cybersecurity and Comedy</p><p><br></p><p><span class="ql-size-large">Sound bites</span></p><p>"I wanted to be a footballer."</p><p>"Comedy is subjective."</p><p>"You need to grow the fuck up."</p><p><br></p><p><span class="ql-size-large">Chapters</span></p><ol><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:00 Introduction to the Podcast and Guest</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>00:56 Ian's Origin Story and Journey into Cybersecurity</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>06:29 Experiences at MOD and Symantec</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>10:44 Transitioning to Self-Employment and Freedom</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>14:27 The Switch to Stand-Up Comedy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>22:05 The Impact of Humor in Cybersecurity Awareness</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>30:06 Audience Feedback and Social Media Interaction</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>31:54 The Power of Audience Engagement</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>34:49 Navigating Controversy in Comedy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>37:43 The Art of Timing and Response</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>40:47 Comedy as a Reflection of Life</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>43:44 The Evolution of Comedy and Storytelling</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>49:53 Learning and Growth Through Comedy</li><li data-list="bullet"><span class="ql-ui" contenteditable="false"></span>53:50 Connecting with the Audience</li></ol><br/>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/laughing-with-cyber-a-standup-comedy-special-with-ian]]></link><guid isPermaLink="false">a7d030f8-245d-4700-b5eb-2fbec43cdd88</guid><itunes:image href="https://artwork.captivate.fm/a53b9904-2530-4798-b054-6ed1e30bf877/generated-image.jpg"/><pubDate>Tue, 23 Dec 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/a7d030f8-245d-4700-b5eb-2fbec43cdd88.mp3" length="27251345" type="audio/mpeg"/><itunes:duration>56:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>20</itunes:episode><podcast:episode>20</podcast:episode><podcast:season>1</podcast:season></item><item><title>From Hacker to Hollywood: Alissa Knight&apos;s Journey</title><itunes:title>From Hacker to Hollywood: Alissa Knight&apos;s Journey</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson engages with cybersecurity expert Alissa Knight, who shares her unique journey into the world of hacking and cybersecurity. They discuss the evolution of hacking, the challenges of API security, and the transformative impact of AI on the industry. Alissa emphasizes the importance of continuous learning and adapting to new technologies, while also reflecting on her career shifts and the significance of storytelling in cybersecurity marketing. The conversation highlights the need for organizations to invest in their employees' education and the future of cybersecurity innovation.</p><p><span class="ql-size-large">Takeaways</span></p><ul><li>Alissa started hacking at the age of 13, driven by curiosity.</li><li>The early days of hacking were like the wild west, with fewer resources.</li><li>A significant turning point in Alissa's life was her arrest at 17.</li><li>Cybersecurity offers lucrative career opportunities for skilled individuals.</li><li>API security is a growing concern as more services rely on APIs.</li><li>AI is reshaping the cybersecurity landscape, creating new challenges and opportunities.</li><li>Continuous learning is essential in the fast-evolving field of cybersecurity.</li><li>Organizations must invest in training their developers in secure coding practices.</li><li>Storytelling can be a powerful tool in cybersecurity marketing. </li><li>The future of cybersecurity will heavily involve AI and automation.</li></ul><br/><p><br></p><p><span class="ql-size-large">Sound bites</span></p><p>"It was the wild, wild west."</p><p>"I was arrested on my school campus."</p><p>"This industry pays very well."</p><p><br></p><p><span class="ql-size-large">Chapters</span></p><ul><li>00:00 Introduction to the Podcast and Guest</li><li>00:57 Alissa Knight's Unique Origin Story</li><li>05:30 The Evolution of Hacking and Cybersecurity</li><li>10:54 Turning Points and Career Shifts</li><li>16:10 The Impact of DDoS Attacks on Career Paths</li><li>20:57 The Importance of API Security</li><li>24:06 Hacking APIs and Security Vulnerabilities</li><li>27:52 The Evolution of AI in Coding</li><li>31:30 From Cybersecurity to Hollywood</li><li>36:32 Introducing ARIES: AI for Cybersecurity</li><li>39:03 The Importance of Continuous Learning in Cybersecurity</li></ul><br/><p><br></p><p><span class="ql-size-large">Resources</span></p><p>https://www.linkedin.com/in/alissaknight/</p><p>https://www.knightgroup.co/</p><p>https://microreels.com/ </p><p>https://www.youtube.com/@AlissaKnightArchives</p><p><br></p>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson engages with cybersecurity expert Alissa Knight, who shares her unique journey into the world of hacking and cybersecurity. They discuss the evolution of hacking, the challenges of API security, and the transformative impact of AI on the industry. Alissa emphasizes the importance of continuous learning and adapting to new technologies, while also reflecting on her career shifts and the significance of storytelling in cybersecurity marketing. The conversation highlights the need for organizations to invest in their employees' education and the future of cybersecurity innovation.</p><p><span class="ql-size-large">Takeaways</span></p><ul><li>Alissa started hacking at the age of 13, driven by curiosity.</li><li>The early days of hacking were like the wild west, with fewer resources.</li><li>A significant turning point in Alissa's life was her arrest at 17.</li><li>Cybersecurity offers lucrative career opportunities for skilled individuals.</li><li>API security is a growing concern as more services rely on APIs.</li><li>AI is reshaping the cybersecurity landscape, creating new challenges and opportunities.</li><li>Continuous learning is essential in the fast-evolving field of cybersecurity.</li><li>Organizations must invest in training their developers in secure coding practices.</li><li>Storytelling can be a powerful tool in cybersecurity marketing. </li><li>The future of cybersecurity will heavily involve AI and automation.</li></ul><br/><p><br></p><p><span class="ql-size-large">Sound bites</span></p><p>"It was the wild, wild west."</p><p>"I was arrested on my school campus."</p><p>"This industry pays very well."</p><p><br></p><p><span class="ql-size-large">Chapters</span></p><ul><li>00:00 Introduction to the Podcast and Guest</li><li>00:57 Alissa Knight's Unique Origin Story</li><li>05:30 The Evolution of Hacking and Cybersecurity</li><li>10:54 Turning Points and Career Shifts</li><li>16:10 The Impact of DDoS Attacks on Career Paths</li><li>20:57 The Importance of API Security</li><li>24:06 Hacking APIs and Security Vulnerabilities</li><li>27:52 The Evolution of AI in Coding</li><li>31:30 From Cybersecurity to Hollywood</li><li>36:32 Introducing ARIES: AI for Cybersecurity</li><li>39:03 The Importance of Continuous Learning in Cybersecurity</li></ul><br/><p><br></p><p><span class="ql-size-large">Resources</span></p><p>https://www.linkedin.com/in/alissaknight/</p><p>https://www.knightgroup.co/</p><p>https://microreels.com/ </p><p>https://www.youtube.com/@AlissaKnightArchives</p><p><br></p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/from-hacker-to-hollywood-alissa-knights-journey]]></link><guid isPermaLink="false">c106e38f-f96b-4ba6-9ef4-dfbee746c88e</guid><itunes:image href="https://artwork.captivate.fm/8cf6175d-394b-43c9-ae1f-e0c661e672cd/generated-image-15-sqaure.jpg"/><pubDate>Tue, 16 Dec 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/c106e38f-f96b-4ba6-9ef4-dfbee746c88e.mp3" length="22455890" type="audio/mpeg"/><itunes:duration>46:47</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>19</itunes:episode><podcast:episode>19</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-9ae29716-2250-4c7b-89e8-18cb455b2fbb.json" type="application/json+chapters"/></item><item><title>Building Trust in Customer Success with David Muniz</title><itunes:title>Building Trust in Customer Success with David Muniz</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, Joseph Carson engages with David Muniz to explore the evolving landscape of cybersecurity. They discuss the importance of diversity in the field, the distinction between customer success and support, and the critical role of trust in business relationships. The conversation also delves into the Zero Trust paradigm, emphasizing the need for a human-centric approach in cybersecurity. David shares insights on staying updated in a rapidly changing industry and the significance of happiness in the workplace, concluding with thoughts on the human element in cybersecurity.</p><p><strong class="ql-size-large">Keywords</strong></p><p>cybersecurity, customer success, zero trust, trust in business, diversity in tech, human relationships, customer support, industry insights, happiness in work, staying updated</p><p><strong class="ql-size-large">Takeaways</strong></p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Customer success focuses on long-term relationships, not just immediate problem-solving.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Trust is a key component in building successful customer relationships.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Zero Trust is about managing trust dynamically, not eliminating it.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Customer success involves understanding what success means to the customer.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Building trust requires consistent and reliable service.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Human interactions are crucial in customer success, even in a digital world.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Customer success can lead to increased revenue through renewals and up-selling.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Trust in cybersecurity involves both technical and human elements.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Effective customer success strategies can differentiate a company in the market.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Balancing security with user experience is essential for customer satisfaction.</p><p><br></p><p><strong class="ql-size-large">Sound bites</strong></p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Customer success is about long-term relationships." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Trust is not just assumed; it must be earned." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Zero Trust is about managing trust, not eliminating it." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Success is defined by the customer's perspective." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Human interactions are crucial in a digital world." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Trust leads to increased revenue and loyalty." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Cybersecurity involves both technical and human elements." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Balancing security with user experience is key." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Customer success can differentiate a company." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Trust is a business differentiator."</p><p><br></p><p><strong class="ql-size-large">Chapters</strong></p><p>00:00 Introduction to Cybersecurity and Guest Background</p><p>04:10 The Importance of Diversity in Cybersecurity</p><p>08:41 Understanding Customer Success vs. Customer Support</p><p>12:52 Building Trust in Customer Relationships</p><p>17:15 The Role of Zero Trust in Cybersecurity</p><p>22:07 Understanding Zero Trust and Its Implications</p><p>27:33 The Dynamic Nature of Trust in Cybersecurity</p><p>32:01 The Human Element in Building Trust</p><p><br></p><p><strong class="ql-size-large">Additional Resources</strong></p><p><strong>The Trust Paradox: A Cybersecurity Mindset for Human Relationships</strong></p><p>https://www.linkedin.com/pulse/trust-paradox-cybersecurity-mindset-human-david-muniz-f9fzf </p><p><strong>The Hidden ROI of Trust in Business and Cybersecurity </strong></p><p>https://www.linkedin.com/pulse/hidden-roi-trust-business-cybersecurity-david-muniz-7r3jc </p><p><br></p><p>https://segura.security/ </p><p>https://segura.security/blog</p><p>https://en.wikipedia.org/wiki/The_Power_of_Now</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, Joseph Carson engages with David Muniz to explore the evolving landscape of cybersecurity. They discuss the importance of diversity in the field, the distinction between customer success and support, and the critical role of trust in business relationships. The conversation also delves into the Zero Trust paradigm, emphasizing the need for a human-centric approach in cybersecurity. David shares insights on staying updated in a rapidly changing industry and the significance of happiness in the workplace, concluding with thoughts on the human element in cybersecurity.</p><p><strong class="ql-size-large">Keywords</strong></p><p>cybersecurity, customer success, zero trust, trust in business, diversity in tech, human relationships, customer support, industry insights, happiness in work, staying updated</p><p><strong class="ql-size-large">Takeaways</strong></p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Customer success focuses on long-term relationships, not just immediate problem-solving.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Trust is a key component in building successful customer relationships.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Zero Trust is about managing trust dynamically, not eliminating it.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Customer success involves understanding what success means to the customer.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Building trust requires consistent and reliable service.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Human interactions are crucial in customer success, even in a digital world.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Customer success can lead to increased revenue through renewals and up-selling.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Trust in cybersecurity involves both technical and human elements.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Effective customer success strategies can differentiate a company in the market.</p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Balancing security with user experience is essential for customer satisfaction.</p><p><br></p><p><strong class="ql-size-large">Sound bites</strong></p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Customer success is about long-term relationships." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Trust is not just assumed; it must be earned." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Zero Trust is about managing trust, not eliminating it." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Success is defined by the customer's perspective." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Human interactions are crucial in a digital world." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Trust leads to increased revenue and loyalty." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Cybersecurity involves both technical and human elements." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Balancing security with user experience is key." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Customer success can differentiate a company." </p><p>·&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; "Trust is a business differentiator."</p><p><br></p><p><strong class="ql-size-large">Chapters</strong></p><p>00:00 Introduction to Cybersecurity and Guest Background</p><p>04:10 The Importance of Diversity in Cybersecurity</p><p>08:41 Understanding Customer Success vs. Customer Support</p><p>12:52 Building Trust in Customer Relationships</p><p>17:15 The Role of Zero Trust in Cybersecurity</p><p>22:07 Understanding Zero Trust and Its Implications</p><p>27:33 The Dynamic Nature of Trust in Cybersecurity</p><p>32:01 The Human Element in Building Trust</p><p><br></p><p><strong class="ql-size-large">Additional Resources</strong></p><p><strong>The Trust Paradox: A Cybersecurity Mindset for Human Relationships</strong></p><p>https://www.linkedin.com/pulse/trust-paradox-cybersecurity-mindset-human-david-muniz-f9fzf </p><p><strong>The Hidden ROI of Trust in Business and Cybersecurity </strong></p><p>https://www.linkedin.com/pulse/hidden-roi-trust-business-cybersecurity-david-muniz-7r3jc </p><p><br></p><p>https://segura.security/ </p><p>https://segura.security/blog</p><p>https://en.wikipedia.org/wiki/The_Power_of_Now</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/building-trust-in-customer-success-with-david-muniz]]></link><guid isPermaLink="false">735f24d6-d1bf-4aa3-b75d-d9680e86ec03</guid><itunes:image href="https://artwork.captivate.fm/34175a27-467f-4f57-be12-5ec9c6ec4a85/generated-image-11.jpg"/><pubDate>Tue, 09 Dec 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/735f24d6-d1bf-4aa3-b75d-d9680e86ec03.mp3" length="20096928" type="audio/mpeg"/><itunes:duration>41:52</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>18</itunes:episode><podcast:episode>18</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-28a8282a-edf3-43b6-87bd-36b9e4497e1b.json" type="application/json+chapters"/></item><item><title>Transforming Cybersecurity Awareness Training with Michael Waite</title><itunes:title>Transforming Cybersecurity Awareness Training with Michael Waite</itunes:title><description><![CDATA[<p>In this episode of <em>Security by Default</em>, host Joe Carson sits down with Michael Waite from Dune Security to explore how AI is reshaping cybersecurity and why it’s time to rethink traditional awareness training.</p><p>As cyber threats become more sophisticated, personalized, and AI-powered, organizations can no longer rely on outdated, one-size-fits-all learning models. Joe and Michael break down what modern cybersecurity training should look like, how to engage employees more effectively, and why empowering people both inside and outside the office is essential to strong defense.</p><h2><strong class="ql-size-large">What You’ll Learn</strong></h2><ul><li>How AI is transforming both cyber attacks and defensive strategies</li><li>Why the volume and quality of phishing attempts continue to rise</li><li>The limitations of traditional annual awareness training</li><li>The shift toward personalized, role-based learning</li><li>How real-time intervention improves security habits</li><li>Why cybersecurity awareness must extend beyond the workplace</li><li>Practical ways to engage employees and build a security-first culture</li><li>The importance of collaboration and communication across teams</li><li>How threat intelligence informs more effective training programs</li></ul><br/><h2><strong class="ql-size-large">Key Takeaways</strong></h2><ul><li>AI is rewriting the threat landscape.</li><li>Attackers are faster, more convincing, and more scalable than ever.</li><li>Generic awareness training is no longer enough.</li><li>Personalization is essential to reducing real-world risk.</li><li>Engagement drives stronger security culture and better outcomes.</li><li>Cybersecurity begins at home, not just at work.</li><li>Bite-sized, real-time lessons are more effective than long annual videos.</li><li>Employees are part of the detection engine—and must be empowered accordingly.</li></ul><br/><h2><strong class="ql-size-large">Memorable Quotes</strong></h2><ul><li>“Cybersecurity doesn’t start in the office.”</li><li>“The one size fits all approach is dead.”</li><li>“We need to democratize security.”</li><li>“Let’s give individuals the tools they need.”</li><li>“We need to make cybersecurity more fun.”</li><li>“This is my favorite thing to talk about.”</li></ul><br/><h2><strong class="ql-size-large">Episode Chapters</strong></h2><p><strong>00:00</strong> – Introduction to the Chaos of Cybersecurity</p><p><strong>03:05</strong> – The Impact of AI on Cybersecurity</p><p><strong>09:40</strong> – Best Practices for Cybersecurity Awareness</p><p><strong>18:51</strong> – Personalizing Cybersecurity Training</p><p><strong>27:00</strong> – Engaging Employees in Cybersecurity</p><p><strong>29:20</strong> – Resources for Further Learning</p><p><strong class="ql-size-large">Additional Resources:</strong></p><p>https://www.linkedin.com/in/mr-michael-waite/</p><p>https://www.dune.security/</p><p>https://www.dune.security/threat-intelligence-report </p>]]></description><content:encoded><![CDATA[<p>In this episode of <em>Security by Default</em>, host Joe Carson sits down with Michael Waite from Dune Security to explore how AI is reshaping cybersecurity and why it’s time to rethink traditional awareness training.</p><p>As cyber threats become more sophisticated, personalized, and AI-powered, organizations can no longer rely on outdated, one-size-fits-all learning models. Joe and Michael break down what modern cybersecurity training should look like, how to engage employees more effectively, and why empowering people both inside and outside the office is essential to strong defense.</p><h2><strong class="ql-size-large">What You’ll Learn</strong></h2><ul><li>How AI is transforming both cyber attacks and defensive strategies</li><li>Why the volume and quality of phishing attempts continue to rise</li><li>The limitations of traditional annual awareness training</li><li>The shift toward personalized, role-based learning</li><li>How real-time intervention improves security habits</li><li>Why cybersecurity awareness must extend beyond the workplace</li><li>Practical ways to engage employees and build a security-first culture</li><li>The importance of collaboration and communication across teams</li><li>How threat intelligence informs more effective training programs</li></ul><br/><h2><strong class="ql-size-large">Key Takeaways</strong></h2><ul><li>AI is rewriting the threat landscape.</li><li>Attackers are faster, more convincing, and more scalable than ever.</li><li>Generic awareness training is no longer enough.</li><li>Personalization is essential to reducing real-world risk.</li><li>Engagement drives stronger security culture and better outcomes.</li><li>Cybersecurity begins at home, not just at work.</li><li>Bite-sized, real-time lessons are more effective than long annual videos.</li><li>Employees are part of the detection engine—and must be empowered accordingly.</li></ul><br/><h2><strong class="ql-size-large">Memorable Quotes</strong></h2><ul><li>“Cybersecurity doesn’t start in the office.”</li><li>“The one size fits all approach is dead.”</li><li>“We need to democratize security.”</li><li>“Let’s give individuals the tools they need.”</li><li>“We need to make cybersecurity more fun.”</li><li>“This is my favorite thing to talk about.”</li></ul><br/><h2><strong class="ql-size-large">Episode Chapters</strong></h2><p><strong>00:00</strong> – Introduction to the Chaos of Cybersecurity</p><p><strong>03:05</strong> – The Impact of AI on Cybersecurity</p><p><strong>09:40</strong> – Best Practices for Cybersecurity Awareness</p><p><strong>18:51</strong> – Personalizing Cybersecurity Training</p><p><strong>27:00</strong> – Engaging Employees in Cybersecurity</p><p><strong>29:20</strong> – Resources for Further Learning</p><p><strong class="ql-size-large">Additional Resources:</strong></p><p>https://www.linkedin.com/in/mr-michael-waite/</p><p>https://www.dune.security/</p><p>https://www.dune.security/threat-intelligence-report </p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/transforming-cybersecurity-awareness-training-with-michael-waite]]></link><guid isPermaLink="false">07edf3b9-29f2-4eca-b97d-d89794d645d3</guid><itunes:image href="https://artwork.captivate.fm/7e31224e-bde0-434d-81ba-2b379e5dc701/generated-image-1.jpg"/><pubDate>Wed, 03 Dec 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/07edf3b9-29f2-4eca-b97d-d89794d645d3.mp3" length="15272635" type="audio/mpeg"/><itunes:duration>31:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>17</itunes:episode><podcast:episode>17</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-79d79291-185e-4403-9bbd-085659189109.json" type="application/json+chapters"/></item><item><title>Hacking AI and Building Trustworthy Systems: Insights from Satu Korhonen</title><itunes:title>Hacking AI and Building Trustworthy Systems: Insights from Satu Korhonen</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, Joseph Carson and guest Satu Korhonen a passionate practitioner, researcher and founder of Helheim Labs delve into the intersection of AI and cybersecurity. They discuss the challenges and opportunities in creating trustworthy AI systems, the importance of collaboration between AI and cybersecurity professionals, and the role of regulation in ensuring AI safety. Satu shares her journey from education to AI, highlighting key moments and insights from her career. The conversation also touches on the EU AI Act, the importance of understanding AI's limitations, and the need for a balanced approach to AI development.</p><p><strong class="ql-size-large">Key Takeaways</strong></p><ul><li>AI systems are fundamentally probability-based, not perfect.</li><li>Collaboration between AI and cybersecurity is crucial for safety.</li><li>The EU AI Act focuses on human rights and risk management.</li><li>Understanding AI's limitations is key to using it effectively.</li><li>AI can enhance productivity but requires careful implementation.</li><li>Training AI with both good and bad data improves its robustness.</li><li>AI should serve humans, not the other way around.</li><li>Hacking AI can reveal vulnerabilities and improve security.</li><li>Community events like hacker camps foster innovation and learning.</li><li>AI's role in society should be carefully considered and discussed.</li></ul><br/><p><strong class="ql-size-large">Chapters</strong></p><p>00:00:00 Introduction to AI and Cybersecurity</p><p>00:03:00 Satu's Journey into AI</p><p>00:09:00 Trustworthy AI and the EU AI Act</p><p>00:15:00 Challenges in AI and Cybersecurity Collaboration</p><p>00:21:00 The Role of Community and Events in AI</p><p><strong class="ql-size-large">Resources:</strong></p><p>https://hackai.quest/</p><p>https://helheimlabs.ai/</p><p>https://helheimlabs.ai/about-satu-korhonen/</p><p>https://www.linkedin.com/in/satu-m-korhonen/</p><p>https://why2025.org/</p><p>https://www.ccc.de/en/home</p><p>https://events.ccc.de/en/</p><p>https://disobey.fi/2026/</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, Joseph Carson and guest Satu Korhonen a passionate practitioner, researcher and founder of Helheim Labs delve into the intersection of AI and cybersecurity. They discuss the challenges and opportunities in creating trustworthy AI systems, the importance of collaboration between AI and cybersecurity professionals, and the role of regulation in ensuring AI safety. Satu shares her journey from education to AI, highlighting key moments and insights from her career. The conversation also touches on the EU AI Act, the importance of understanding AI's limitations, and the need for a balanced approach to AI development.</p><p><strong class="ql-size-large">Key Takeaways</strong></p><ul><li>AI systems are fundamentally probability-based, not perfect.</li><li>Collaboration between AI and cybersecurity is crucial for safety.</li><li>The EU AI Act focuses on human rights and risk management.</li><li>Understanding AI's limitations is key to using it effectively.</li><li>AI can enhance productivity but requires careful implementation.</li><li>Training AI with both good and bad data improves its robustness.</li><li>AI should serve humans, not the other way around.</li><li>Hacking AI can reveal vulnerabilities and improve security.</li><li>Community events like hacker camps foster innovation and learning.</li><li>AI's role in society should be carefully considered and discussed.</li></ul><br/><p><strong class="ql-size-large">Chapters</strong></p><p>00:00:00 Introduction to AI and Cybersecurity</p><p>00:03:00 Satu's Journey into AI</p><p>00:09:00 Trustworthy AI and the EU AI Act</p><p>00:15:00 Challenges in AI and Cybersecurity Collaboration</p><p>00:21:00 The Role of Community and Events in AI</p><p><strong class="ql-size-large">Resources:</strong></p><p>https://hackai.quest/</p><p>https://helheimlabs.ai/</p><p>https://helheimlabs.ai/about-satu-korhonen/</p><p>https://www.linkedin.com/in/satu-m-korhonen/</p><p>https://why2025.org/</p><p>https://www.ccc.de/en/home</p><p>https://events.ccc.de/en/</p><p>https://disobey.fi/2026/</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/hacking-ai-and-building-trustworthy-systems-insights-from-satu-korhonen]]></link><guid isPermaLink="false">8905bf12-8c80-4328-b353-d39249af4385</guid><itunes:image href="https://artwork.captivate.fm/abc73e8d-a1d0-4b59-a376-cfa866b80f93/generated-image-3.jpg"/><pubDate>Wed, 19 Nov 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/8905bf12-8c80-4328-b353-d39249af4385.mp3" length="19434071" type="audio/mpeg"/><itunes:duration>40:29</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>16</itunes:episode><podcast:episode>16</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-9a5fcf64-b978-4bd6-b1d2-aa0b24fb3d0d.json" type="application/json+chapters"/></item><item><title>Identity Threats, AI Attacks, and the Power of Community with Filipi Pires</title><itunes:title>Identity Threats, AI Attacks, and the Power of Community with Filipi Pires</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson welcomes back Filipi Pires, <strong>Head of Identity Threat Labs &amp; Global Product Advocate at Segura®</strong> to discuss the latest trends in identity threats and cybersecurity. They explore the evolution of attacks, particularly focusing on social engineering and the role of AI in both offensive and defensive strategies. Filipi shares insights from recent events, including the significance of BSides conferences in fostering community and knowledge sharing. The conversation emphasizes the importance of a zero trust approach and the need for continuous education in cybersecurity.</p><p>Key Takeaways</p><ul><li>The BSides community is essential for cybersecurity education.</li><li>Attackers are increasingly using social engineering techniques.</li><li>AI is being leveraged by both attackers and defenders.</li><li>Zero trust is a critical framework for modern security.</li><li>Organizations must implement multiple layers of protection.</li><li>Credential theft is a major concern in identity threats.</li><li>B-Sides events provide networking opportunities for newcomers.</li><li>Cybersecurity Awareness Month is a time for reflection and improvement.</li><li>The rise of AI in social engineering poses new challenges.</li><li>Community-driven events like B-Sides foster collaboration and learning.</li></ul><br/><p>Chapters</p><ul><li>00:00 Introduction to Security by Default Podcast</li><li>01:59 Understanding BSides Events</li><li>05:57 Current Trends in Identity Threats</li><li>11:50 The Evolution of Authentication Methods</li><li>14:57 The Rise of InfoStealer Malware</li><li>18:52 AI's Role in Cybersecurity Threats</li><li>21:13 AI in Cybersecurity: Defensive and Offensive Perspectives</li><li>24:36 The Role of APIs and Observers in Cybersecurity</li><li>26:06 Best Practices for Securing AI in Organizations</li><li>31:04 BSides Porto: Community and Event Insights</li><li>39:06 Future BSides: Expanding to Porto Alegre</li></ul><br/><p>Resources:</p><p>https://www.linkedin.com/in/filipipires/</p><p>https://segura.security/</p><p>https://www.instagram.com/filipipires.sec/</p><p>https://segura.security/events/filipi-pires</p><p>https://www.linkedin.com/showcase/identity-threat-labs/about/</p><p>https://labs.segura.blog/</p><p><br></p><p><strong>About Segura®</strong></p><p>Segura® is an Identity Security Platform built to help organizations secure privileged access, detect identity threats, and respond rapidly to attacks targeting human and machine identities.</p><p><br></p><p>Designed for hybrid and high-risk environments, Segura delivers identity threat detection and response (ITDR), secure remote access, and privileged session protection — ensuring that only verified users, devices, and applications can access critical systems.</p><p><br></p><p>From infrastructure and servers to cloud platforms and the supply chain, Segura provides unified visibility and control across every identity interaction. By combining advanced analytics, behavioural detection, and Zero Trust access principles, Segura empowers companies to prevent credential misuse, lateral movement, and privilege escalation before damage occurs.</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson welcomes back Filipi Pires, <strong>Head of Identity Threat Labs &amp; Global Product Advocate at Segura®</strong> to discuss the latest trends in identity threats and cybersecurity. They explore the evolution of attacks, particularly focusing on social engineering and the role of AI in both offensive and defensive strategies. Filipi shares insights from recent events, including the significance of BSides conferences in fostering community and knowledge sharing. The conversation emphasizes the importance of a zero trust approach and the need for continuous education in cybersecurity.</p><p>Key Takeaways</p><ul><li>The BSides community is essential for cybersecurity education.</li><li>Attackers are increasingly using social engineering techniques.</li><li>AI is being leveraged by both attackers and defenders.</li><li>Zero trust is a critical framework for modern security.</li><li>Organizations must implement multiple layers of protection.</li><li>Credential theft is a major concern in identity threats.</li><li>B-Sides events provide networking opportunities for newcomers.</li><li>Cybersecurity Awareness Month is a time for reflection and improvement.</li><li>The rise of AI in social engineering poses new challenges.</li><li>Community-driven events like B-Sides foster collaboration and learning.</li></ul><br/><p>Chapters</p><ul><li>00:00 Introduction to Security by Default Podcast</li><li>01:59 Understanding BSides Events</li><li>05:57 Current Trends in Identity Threats</li><li>11:50 The Evolution of Authentication Methods</li><li>14:57 The Rise of InfoStealer Malware</li><li>18:52 AI's Role in Cybersecurity Threats</li><li>21:13 AI in Cybersecurity: Defensive and Offensive Perspectives</li><li>24:36 The Role of APIs and Observers in Cybersecurity</li><li>26:06 Best Practices for Securing AI in Organizations</li><li>31:04 BSides Porto: Community and Event Insights</li><li>39:06 Future BSides: Expanding to Porto Alegre</li></ul><br/><p>Resources:</p><p>https://www.linkedin.com/in/filipipires/</p><p>https://segura.security/</p><p>https://www.instagram.com/filipipires.sec/</p><p>https://segura.security/events/filipi-pires</p><p>https://www.linkedin.com/showcase/identity-threat-labs/about/</p><p>https://labs.segura.blog/</p><p><br></p><p><strong>About Segura®</strong></p><p>Segura® is an Identity Security Platform built to help organizations secure privileged access, detect identity threats, and respond rapidly to attacks targeting human and machine identities.</p><p><br></p><p>Designed for hybrid and high-risk environments, Segura delivers identity threat detection and response (ITDR), secure remote access, and privileged session protection — ensuring that only verified users, devices, and applications can access critical systems.</p><p><br></p><p>From infrastructure and servers to cloud platforms and the supply chain, Segura provides unified visibility and control across every identity interaction. By combining advanced analytics, behavioural detection, and Zero Trust access principles, Segura empowers companies to prevent credential misuse, lateral movement, and privilege escalation before damage occurs.</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/identity-threats-ai-attacks-and-the-power-of-community-with-filipi-pires]]></link><guid isPermaLink="false">05988a75-3db6-4e73-bc39-5b58824e7f91</guid><itunes:image href="https://artwork.captivate.fm/bf7a550b-a8d2-41a3-a834-bc265d10e802/generated-image-2.jpg"/><pubDate>Wed, 05 Nov 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/05988a75-3db6-4e73-bc39-5b58824e7f91.mp3" length="18528746" type="audio/mpeg"/><itunes:duration>38:36</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>15</itunes:episode><podcast:episode>15</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-54d8d9c2-b787-4106-848a-84343cd0859d.json" type="application/json+chapters"/></item><item><title>Navigating the Complex World of Cyber Law - Insights from a Pentester-Turned-Lawyer with Pamela</title><itunes:title>Navigating the Complex World of Cyber Law - Insights from a Pentester-Turned-Lawyer with Pamela</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson engages with Pamela Victor Ibitamuno, a lawyer with a unique background in penetration testing. They discuss the critical intersection of cyber law and cybersecurity, exploring the challenges faced in prosecuting cyber crimes, the importance of understanding intent, and the need for adaptive legal frameworks in the face of rapid technological advancements. The conversation also delves into the role of AI in the legal field and how professionals can stay updated in this ever-evolving landscape.</p><p><strong>Takeaways</strong></p><ul><li>Pamela's journey from penetration testing to cyber law highlights the importance of understanding both fields.</li><li>Legal professionals often struggle to grasp the technicalities of cybersecurity.</li><li>Regulations may not effectively address the problems they aim to solve.</li><li>Cyber crime often transcends borders, complicating prosecution efforts.</li><li>Partnerships between tech companies and governments can enhance cyber crime prevention. </li><li>Misconceptions about hacking can hinder legal processes.</li><li>Intent is a crucial factor in determining the legality of cyber actions.</li><li>The law is lagging behind technological innovations, necessitating updates. </li><li>AI can streamline legal processes but cannot replace human empathy.</li><li>Staying informed through conferences and subscriptions is vital for legal professionals. </li></ul><br/><p><strong>Chapters</strong></p><ul><li>00:00 Introduction to Cyber Law and Its Importance</li><li>02:57 Pamela's Journey: From Penetration Testing to Cyber Law</li><li>06:08 The Intersection of Law and Cybersecurity</li><li>08:50 Challenges in Cyber Crime Prosecution</li><li>12:04 The Role of Intent in Cyber Crime</li><li>14:58 The Need for Adaptive Legal Frameworks</li><li>17:50 AI's Impact on Cyber Law</li><li>20:53 Staying Updated in Cyber Law</li><li>23:59 Conclusion and Future Outlook</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson engages with Pamela Victor Ibitamuno, a lawyer with a unique background in penetration testing. They discuss the critical intersection of cyber law and cybersecurity, exploring the challenges faced in prosecuting cyber crimes, the importance of understanding intent, and the need for adaptive legal frameworks in the face of rapid technological advancements. The conversation also delves into the role of AI in the legal field and how professionals can stay updated in this ever-evolving landscape.</p><p><strong>Takeaways</strong></p><ul><li>Pamela's journey from penetration testing to cyber law highlights the importance of understanding both fields.</li><li>Legal professionals often struggle to grasp the technicalities of cybersecurity.</li><li>Regulations may not effectively address the problems they aim to solve.</li><li>Cyber crime often transcends borders, complicating prosecution efforts.</li><li>Partnerships between tech companies and governments can enhance cyber crime prevention. </li><li>Misconceptions about hacking can hinder legal processes.</li><li>Intent is a crucial factor in determining the legality of cyber actions.</li><li>The law is lagging behind technological innovations, necessitating updates. </li><li>AI can streamline legal processes but cannot replace human empathy.</li><li>Staying informed through conferences and subscriptions is vital for legal professionals. </li></ul><br/><p><strong>Chapters</strong></p><ul><li>00:00 Introduction to Cyber Law and Its Importance</li><li>02:57 Pamela's Journey: From Penetration Testing to Cyber Law</li><li>06:08 The Intersection of Law and Cybersecurity</li><li>08:50 Challenges in Cyber Crime Prosecution</li><li>12:04 The Role of Intent in Cyber Crime</li><li>14:58 The Need for Adaptive Legal Frameworks</li><li>17:50 AI's Impact on Cyber Law</li><li>20:53 Staying Updated in Cyber Law</li><li>23:59 Conclusion and Future Outlook</li></ul><br/>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/navigating-the-complex-world-of-cyber-law-insights-from-a-pentester-turned-lawyer-with-pamela]]></link><guid isPermaLink="false">30416607-eec0-4cdf-b61b-e2ce57331f78</guid><itunes:image href="https://artwork.captivate.fm/1450cf53-3878-4ff2-bcd5-f5807153222e/generated-image.jpg"/><pubDate>Wed, 22 Oct 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/30416607-eec0-4cdf-b61b-e2ce57331f78.mp3" length="13876233" type="audio/mpeg"/><itunes:duration>28:55</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>14</itunes:episode><podcast:episode>14</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-ddc4212e-1c43-4c73-9652-02a71122e211.json" type="application/json+chapters"/></item><item><title>The Power of Games in Cybersecurity with Peadar</title><itunes:title>The Power of Games in Cybersecurity with Peadar</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson engages with game designer Peadar, Gamification Lecturer at Tallinn University to explore the intersection of game design and cybersecurity training. Peadar shares his journey from teaching to game design, emphasizing the importance of using games to facilitate learning in complex subjects like cybersecurity. The conversation delves into the fundamental elements of games, the challenges of creating effective training games, and the need for conceptual transfer games that bridge the gap between technical and non-technical audiences. Peadar also discusses the future of cybersecurity training, the significance of soft skills, and the different player types in game design. The episode concludes with recommended resources for those interested in game design and cybersecurity.</p><p>Peadar Callaghan, Gamification Lecturer at Tallinn University, Digital Learning Games Lab,&nbsp;Digital Technologies Institute,&nbsp;Tallinn University. </p><p>Lecturer in Gamification, Learning Game Design, and Fundamentals of Game Design in the Digital Learning Games Master's program.</p><p><span class="ql-size-large">Key Takeaways</span></p><ul><li>Games can help people understand complex subjects.</li><li>Cybersecurity is a business problem, not just an IT problem.</li><li>Effective training requires engaging and simple game mechanics.</li><li>Checkbox training is ineffective for real learning.</li><li>Conceptual transfer games are essential for non-technical audiences.</li><li>The average age of gamers is increasing, indicating a shift in demographics.</li><li>Soft skills are crucial for effective communication in cybersecurity.</li><li>Games can create a safe space for learning from failure.</li><li>Understanding player types can enhance game design for training.</li><li>The future of cybersecurity training lies in small-scale, experiential games.</li></ul><br/><p><br></p><p><span class="ql-size-large">Chapters</span></p><ul><li>00:00 Introduction to Cybersecurity and Game Design</li><li>02:45 The Role of Games in Learning and Cybersecurity</li><li>05:52 Fundamental Elements of Game Design</li><li>09:00 Applying Game Mechanics to Cybersecurity Training</li><li>11:46 Challenges in Cybersecurity Training Games</li><li>14:38 Conceptual Transfer Games for Non-Technical Audiences</li><li>17:44 The Future of Cybersecurity Training</li><li>20:52 Understanding Player Types in Game Design</li><li>23:47 The Importance of Soft Skills in Cybersecurity</li><li>26:28 Recommended Resources for Game Design and Cybersecurity</li><li>29:24 Conclusion and Future Directions</li></ul><br/><p><br></p><p><span class="ql-size-large">Resources:</span></p><p>https://www.linkedin.com/in/peadar-callaghan-a218721a/</p><p>https://www.linkedin.com/school/tallinn-university/</p><p>https://www.tlu.ee/</p><p>Book - Reality Is Broken: Why Games Make Us Better and How They Can Change the World - https://a.co/d/hzvwYtf </p><p>Book - Game Design Workshop: A Playcentric Approach to Creating Innovative Games by Tracey Fullerton- https://a.co/d/5jnbDg6</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson engages with game designer Peadar, Gamification Lecturer at Tallinn University to explore the intersection of game design and cybersecurity training. Peadar shares his journey from teaching to game design, emphasizing the importance of using games to facilitate learning in complex subjects like cybersecurity. The conversation delves into the fundamental elements of games, the challenges of creating effective training games, and the need for conceptual transfer games that bridge the gap between technical and non-technical audiences. Peadar also discusses the future of cybersecurity training, the significance of soft skills, and the different player types in game design. The episode concludes with recommended resources for those interested in game design and cybersecurity.</p><p>Peadar Callaghan, Gamification Lecturer at Tallinn University, Digital Learning Games Lab,&nbsp;Digital Technologies Institute,&nbsp;Tallinn University. </p><p>Lecturer in Gamification, Learning Game Design, and Fundamentals of Game Design in the Digital Learning Games Master's program.</p><p><span class="ql-size-large">Key Takeaways</span></p><ul><li>Games can help people understand complex subjects.</li><li>Cybersecurity is a business problem, not just an IT problem.</li><li>Effective training requires engaging and simple game mechanics.</li><li>Checkbox training is ineffective for real learning.</li><li>Conceptual transfer games are essential for non-technical audiences.</li><li>The average age of gamers is increasing, indicating a shift in demographics.</li><li>Soft skills are crucial for effective communication in cybersecurity.</li><li>Games can create a safe space for learning from failure.</li><li>Understanding player types can enhance game design for training.</li><li>The future of cybersecurity training lies in small-scale, experiential games.</li></ul><br/><p><br></p><p><span class="ql-size-large">Chapters</span></p><ul><li>00:00 Introduction to Cybersecurity and Game Design</li><li>02:45 The Role of Games in Learning and Cybersecurity</li><li>05:52 Fundamental Elements of Game Design</li><li>09:00 Applying Game Mechanics to Cybersecurity Training</li><li>11:46 Challenges in Cybersecurity Training Games</li><li>14:38 Conceptual Transfer Games for Non-Technical Audiences</li><li>17:44 The Future of Cybersecurity Training</li><li>20:52 Understanding Player Types in Game Design</li><li>23:47 The Importance of Soft Skills in Cybersecurity</li><li>26:28 Recommended Resources for Game Design and Cybersecurity</li><li>29:24 Conclusion and Future Directions</li></ul><br/><p><br></p><p><span class="ql-size-large">Resources:</span></p><p>https://www.linkedin.com/in/peadar-callaghan-a218721a/</p><p>https://www.linkedin.com/school/tallinn-university/</p><p>https://www.tlu.ee/</p><p>Book - Reality Is Broken: Why Games Make Us Better and How They Can Change the World - https://a.co/d/hzvwYtf </p><p>Book - Game Design Workshop: A Playcentric Approach to Creating Innovative Games by Tracey Fullerton- https://a.co/d/5jnbDg6</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/the-power-of-games-in-cybersecurity-with-peadar]]></link><guid isPermaLink="false">8169912a-f3b5-4a64-bb80-26fc01faa830</guid><itunes:image href="https://artwork.captivate.fm/be2f2e3a-9c69-4d04-a44f-7695b0222677/generated-image.jpg"/><pubDate>Wed, 08 Oct 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/8169912a-f3b5-4a64-bb80-26fc01faa830.mp3" length="19987632" type="audio/mpeg"/><itunes:duration>41:38</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>13</itunes:episode><podcast:episode>13</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-7268958d-615f-4ff1-9654-8f6864b360e4.json" type="application/json+chapters"/></item><item><title>Unlocking the Secrets of RFID Hacking with Iceman</title><itunes:title>Unlocking the Secrets of RFID Hacking with Iceman</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson interviews Christian Herrmann, also known as Iceman, who shares his journey into the world of RFID hacking. The conversation covers Christian's origin story, his passion for technology, and the challenges he faced while learning and developing his skills. They discuss the importance of community engagement, open-source contributions, and the evolution of hacking tools like Proxmark. The episode also touches on risk management in cybersecurity, the ethical implications of hacking tools, and the significance of finding balance in personal and professional life. Christian emphasizes the value of asking for help and surrounding oneself with supportive individuals in the tech community.</p><p><strong>Takeaways</strong></p><ul><li>Christian Herrmann, known as Iceman, shares his journey into RFID hacking.</li><li>He emphasizes the importance of community engagement and open-source contributions.</li><li>The evolution of Proxmark has significantly impacted the RFID hacking community.</li><li>Tools used in hacking can have ethical implications that need to be considered.</li><li>Risk management is a crucial aspect of cybersecurity and hacking.</li><li>Finding balance between personal life and professional commitments is essential.</li><li>Asking for help and engaging with the community can accelerate learning.</li><li>Surrounding oneself with supportive individuals enhances personal growth.</li><li>The importance of continuous learning and adapting in the tech field.</li><li>Gamification can be an effective way to improve hacking skills.</li></ul><br/><p><strong>Chapters</strong></p><ul><li>00:00 Introduction and Guest Background</li><li>01:23 The Journey into Hacking and RFID</li><li>09:23 The Thrill of Hacking and Career Development</li><li>20:03 Open Source Contributions and Community Engagement</li><li>30:54 Navigating Tools and Legal Considerations in Hacking</li><li>36:03 Conference Experiences and Community Engagement</li><li>42:00 Tools and Their Misinterpretations</li><li>44:25 Risk Management in Technology</li><li>46:06 Current Projects and Future Plans</li><li>49:40 The Importance of Hobbies and Balance</li><li>55:33 Learning from Failures and Community Support</li><li>01:02:22 The Value of Networking and Collaboration</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson interviews Christian Herrmann, also known as Iceman, who shares his journey into the world of RFID hacking. The conversation covers Christian's origin story, his passion for technology, and the challenges he faced while learning and developing his skills. They discuss the importance of community engagement, open-source contributions, and the evolution of hacking tools like Proxmark. The episode also touches on risk management in cybersecurity, the ethical implications of hacking tools, and the significance of finding balance in personal and professional life. Christian emphasizes the value of asking for help and surrounding oneself with supportive individuals in the tech community.</p><p><strong>Takeaways</strong></p><ul><li>Christian Herrmann, known as Iceman, shares his journey into RFID hacking.</li><li>He emphasizes the importance of community engagement and open-source contributions.</li><li>The evolution of Proxmark has significantly impacted the RFID hacking community.</li><li>Tools used in hacking can have ethical implications that need to be considered.</li><li>Risk management is a crucial aspect of cybersecurity and hacking.</li><li>Finding balance between personal life and professional commitments is essential.</li><li>Asking for help and engaging with the community can accelerate learning.</li><li>Surrounding oneself with supportive individuals enhances personal growth.</li><li>The importance of continuous learning and adapting in the tech field.</li><li>Gamification can be an effective way to improve hacking skills.</li></ul><br/><p><strong>Chapters</strong></p><ul><li>00:00 Introduction and Guest Background</li><li>01:23 The Journey into Hacking and RFID</li><li>09:23 The Thrill of Hacking and Career Development</li><li>20:03 Open Source Contributions and Community Engagement</li><li>30:54 Navigating Tools and Legal Considerations in Hacking</li><li>36:03 Conference Experiences and Community Engagement</li><li>42:00 Tools and Their Misinterpretations</li><li>44:25 Risk Management in Technology</li><li>46:06 Current Projects and Future Plans</li><li>49:40 The Importance of Hobbies and Balance</li><li>55:33 Learning from Failures and Community Support</li><li>01:02:22 The Value of Networking and Collaboration</li></ul><br/>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/unlocking-the-secrets-of-rfid-hacking-with-iceman]]></link><guid isPermaLink="false">7edf8131-85eb-4a9a-83a3-68f48843a482</guid><itunes:image href="https://artwork.captivate.fm/98d0be5e-6456-43d8-a9af-ddeba8a9d1eb/generated-image.jpg"/><pubDate>Wed, 24 Sep 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/7edf8131-85eb-4a9a-83a3-68f48843a482.mp3" length="31512674" type="audio/mpeg"/><itunes:duration>01:05:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>12</itunes:episode><podcast:episode>12</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-3ad0ec1b-845d-44f6-886b-771d8e394aaf.json" type="application/json+chapters"/></item><item><title>Special Episode - Building Cybersecurity Communities with George Kamide</title><itunes:title>Special Episode - Building Cybersecurity Communities with George Kamide</itunes:title><description><![CDATA[<p>In this episode, Joe Carson speaks with George Kamide about the evolving landscape of cybersecurity, emphasizing the importance of community building, branding, and effective communication. They discuss how cybersecurity is no longer just an IT issue but a societal one, and how understanding user experience is crucial for success. The conversation also highlights the role of podcasts in educating the cybersecurity community and the challenges of building meaningful connections in a digital world.</p><p><strong>Takeaways</strong></p><ul><li>Cybersecurity is a societal problem, not just an IT issue.</li><li>Branding is essential for standing out in a crowded market.</li><li>Understanding user experience is critical for product success.</li><li>Podcasts can provide valuable education and insights in cybersecurity.</li><li>Building communities takes time and effort without immediate ROI.</li><li>Effective communication is key to conveying value propositions.</li><li>Listening to customers is more important than broadcasting solutions.</li><li>Time is the most valuable resource we have.</li><li>Engagement on social media should be curated and positive.</li><li>Building relationships requires giving before asking. </li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Cybersecurity and Community Building</p><p>02:25 The Importance of Branding in Cybersecurity</p><p>08:54 User Experience and Customer Understanding</p><p>19:36 The Role of Podcasts in Cybersecurity Education</p><p>22:42 Building Communities and Navigating Social Media</p>]]></description><content:encoded><![CDATA[<p>In this episode, Joe Carson speaks with George Kamide about the evolving landscape of cybersecurity, emphasizing the importance of community building, branding, and effective communication. They discuss how cybersecurity is no longer just an IT issue but a societal one, and how understanding user experience is crucial for success. The conversation also highlights the role of podcasts in educating the cybersecurity community and the challenges of building meaningful connections in a digital world.</p><p><strong>Takeaways</strong></p><ul><li>Cybersecurity is a societal problem, not just an IT issue.</li><li>Branding is essential for standing out in a crowded market.</li><li>Understanding user experience is critical for product success.</li><li>Podcasts can provide valuable education and insights in cybersecurity.</li><li>Building communities takes time and effort without immediate ROI.</li><li>Effective communication is key to conveying value propositions.</li><li>Listening to customers is more important than broadcasting solutions.</li><li>Time is the most valuable resource we have.</li><li>Engagement on social media should be curated and positive.</li><li>Building relationships requires giving before asking. </li></ul><br/><p><strong>Chapters</strong></p><p>00:00 Introduction to Cybersecurity and Community Building</p><p>02:25 The Importance of Branding in Cybersecurity</p><p>08:54 User Experience and Customer Understanding</p><p>19:36 The Role of Podcasts in Cybersecurity Education</p><p>22:42 Building Communities and Navigating Social Media</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/special-episode-building-cybersecurity-communities-with-george-kamide]]></link><guid isPermaLink="false">b9f6ff1a-e3d9-46f9-b565-6049aec7ff9d</guid><itunes:image href="https://artwork.captivate.fm/c3db89a8-b94f-4097-be5b-fd4f0be31c3f/generated-image-10.jpg"/><pubDate>Tue, 23 Sep 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/b9f6ff1a-e3d9-46f9-b565-6049aec7ff9d.mp3" length="13768634" type="audio/mpeg"/><itunes:duration>28:41</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>11</itunes:episode><podcast:episode>11</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-a7058dc7-7ad4-4b2b-92d4-782f2ae404e2.json" type="application/json+chapters"/></item><item><title>The Power of OSINT, Data, and Differentiation in Cybersecurity with Zaira Pirzada</title><itunes:title>The Power of OSINT, Data, and Differentiation in Cybersecurity with Zaira Pirzada</itunes:title><description><![CDATA[<p><strong>The Power of OSINT, Data, and Differentiation in Cybersecurity with Zaira Pirzada</strong></p><p><strong>Learning, Listening, and Leading in Cybersecurity</strong></p><p>In this episode of the Security by Default podcast, host Joe Carson speaks with Zaira Pirzada, managing partner of Infinitus Management Consulting. They discuss Zaira's journey into cybersecurity, the importance of open source intelligence, and the lessons learned from her time at Gartner. Together, they delve into the intricate world of cybersecurity marketing, exploring the unique challenges faced by CMOs in this dynamic industry. From the perception of marketing as a cost center to the complexities of standing out in a crowded market, Zaira shares her insights on navigating these hurdles. Tune in to discover how effective storytelling, data-driven strategies, and a deep understanding of market dynamics can transform cybersecurity marketing efforts.  The conversation also covers the significance of unique value propositions, and the evolving landscape of cybersecurity vendors. Zaira emphasizes the role of data in decision-making and the need for continuous learning in a rapidly changing field.</p><p>#Cybersecurity #MarketingChallenges #Podcast</p><p><strong>Takeaways</strong></p><ul><li>Zaira Pirzada's journey into cybersecurity was unintentional but evolved into a passion.</li><li>Open source intelligence (OSINT) played a crucial role in Zaira's early career.</li><li>Listening and learning from others is vital in the cybersecurity industry.</li><li>The transition from analyst to CMO involves understanding market dynamics and customer needs.</li><li>Unique value propositions are essential for startups to stand out in a crowded market.</li><li>Data is a key asset in cybersecurity, influencing decision-making and strategy.</li><li>Building trust and reliability is crucial in cybersecurity communications.</li><li>Negotiation in cybersecurity is evolving with the introduction of AI and data valuation.</li><li>Education and knowledge sharing are fundamental to success in the cybersecurity community.</li><li>Continuous learning is necessary to keep up with the fast-paced changes in the industry.</li></ul><br/><p><strong>Chapters</strong></p><ul><li>00:00 Introduction to Cybersecurity Journeys</li><li>02:58 The Path to Cybersecurity: Education and Early Experiences</li><li>06:04 The Role of Open Source Intelligence in Cybersecurity</li><li>09:09 The Evolution of Cybersecurity Careers</li><li>11:59 Lessons from Gartner: Listening and Learning</li><li>14:44 The Transition to CMO: Marketing in Cybersecurity</li><li>17:48 The Importance of Unique Value Propositions</li><li>20:51 Navigating the Cybersecurity Vendor Landscape</li><li>23:59 The Role of Data in Cybersecurity</li><li>26:50 Staying Updated in a Rapidly Changing Field</li><li>29:41 Conclusion and Future Directions</li></ul><br/>]]></description><content:encoded><![CDATA[<p><strong>The Power of OSINT, Data, and Differentiation in Cybersecurity with Zaira Pirzada</strong></p><p><strong>Learning, Listening, and Leading in Cybersecurity</strong></p><p>In this episode of the Security by Default podcast, host Joe Carson speaks with Zaira Pirzada, managing partner of Infinitus Management Consulting. They discuss Zaira's journey into cybersecurity, the importance of open source intelligence, and the lessons learned from her time at Gartner. Together, they delve into the intricate world of cybersecurity marketing, exploring the unique challenges faced by CMOs in this dynamic industry. From the perception of marketing as a cost center to the complexities of standing out in a crowded market, Zaira shares her insights on navigating these hurdles. Tune in to discover how effective storytelling, data-driven strategies, and a deep understanding of market dynamics can transform cybersecurity marketing efforts.  The conversation also covers the significance of unique value propositions, and the evolving landscape of cybersecurity vendors. Zaira emphasizes the role of data in decision-making and the need for continuous learning in a rapidly changing field.</p><p>#Cybersecurity #MarketingChallenges #Podcast</p><p><strong>Takeaways</strong></p><ul><li>Zaira Pirzada's journey into cybersecurity was unintentional but evolved into a passion.</li><li>Open source intelligence (OSINT) played a crucial role in Zaira's early career.</li><li>Listening and learning from others is vital in the cybersecurity industry.</li><li>The transition from analyst to CMO involves understanding market dynamics and customer needs.</li><li>Unique value propositions are essential for startups to stand out in a crowded market.</li><li>Data is a key asset in cybersecurity, influencing decision-making and strategy.</li><li>Building trust and reliability is crucial in cybersecurity communications.</li><li>Negotiation in cybersecurity is evolving with the introduction of AI and data valuation.</li><li>Education and knowledge sharing are fundamental to success in the cybersecurity community.</li><li>Continuous learning is necessary to keep up with the fast-paced changes in the industry.</li></ul><br/><p><strong>Chapters</strong></p><ul><li>00:00 Introduction to Cybersecurity Journeys</li><li>02:58 The Path to Cybersecurity: Education and Early Experiences</li><li>06:04 The Role of Open Source Intelligence in Cybersecurity</li><li>09:09 The Evolution of Cybersecurity Careers</li><li>11:59 Lessons from Gartner: Listening and Learning</li><li>14:44 The Transition to CMO: Marketing in Cybersecurity</li><li>17:48 The Importance of Unique Value Propositions</li><li>20:51 Navigating the Cybersecurity Vendor Landscape</li><li>23:59 The Role of Data in Cybersecurity</li><li>26:50 Staying Updated in a Rapidly Changing Field</li><li>29:41 Conclusion and Future Directions</li></ul><br/>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/the-power-of-osint-data-and-differentiation-in-cybersecurity-with-zaira-pirzada]]></link><guid isPermaLink="false">3063379d-2416-4b6e-ad26-67d71114cfa1</guid><itunes:image href="https://artwork.captivate.fm/d46164d9-45a5-480e-a149-13610cbfae87/generated-image.jpg"/><pubDate>Wed, 10 Sep 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/3063379d-2416-4b6e-ad26-67d71114cfa1.mp3" length="24395012" type="audio/mpeg"/><itunes:duration>50:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>10</itunes:episode><podcast:episode>10</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-f1a2d102-bb23-4e68-acf6-748a6ed9a60f.json" type="application/json+chapters"/></item><item><title>From Chaos to Clarity: A Cybersecurity Journey with Secretary Harry Coker Jr.</title><itunes:title>From Chaos to Clarity: A Cybersecurity Journey with Secretary Harry Coker Jr.</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson speaks with Secretary Harry Coker Jr. about his journey into cybersecurity, the importance of mentorship, and the challenges faced in leadership roles. They discuss the evolving role of AI in government and cybersecurity, the significance of resilience in the face of failures, and personal interests that help them unplug from their busy lives. The conversation emphasizes the need for clarity in chaos and the importance of learning from every experience.</p><p><strong class="ql-size-large">Takeaways</strong></p><ul><li>Bringing clarity to chaos is essential for success.</li><li>Mentorship plays a crucial role in career development.</li><li>Every day in leadership presents new challenges and opportunities.</li><li>Learning from both successes and failures is vital.</li><li>Trust but verify is a key principle in leadership.</li><li>AI is transforming government operations and cybersecurity.</li><li>Cyber resilience is becoming more important than ever.</li><li>Personal interests help leaders to unplug and recharge.</li><li>Success is often shared, while failure is solitary.</li><li>The human element must remain in AI decision-making.</li></ul><br/><p><strong class="ql-size-large">Chapters</strong></p><p>00:00 Introduction to Cybersecurity and Personal Journeys</p><p>06:05 The Importance of Mentorship and Teamwork</p><p>11:48 A Day in the Life of a Cybersecurity Leader</p><p>17:51 Lessons Learned from Challenges and Failures</p><p>21:53 The Impact of AI on Cybersecurity and Governance</p><p>29:42 Personal Interests and Unplugging from Work</p><p><strong class="ql-size-large">Resources</strong></p><p>The following books and resources were mentioned:</p><ol><li><strong>"Character" by retired U.S. Army General Stan McChrystal</strong>&nbsp;- Harry Coker mentioned he started reading this book and found it insightful, particularly about self-awareness and challenging oneself.</li><li><strong>"The Power of Now"</strong>&nbsp;- Joseph Carson mentioned this book as one he was recommended to read and was working towards.</li></ol><br/>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson speaks with Secretary Harry Coker Jr. about his journey into cybersecurity, the importance of mentorship, and the challenges faced in leadership roles. They discuss the evolving role of AI in government and cybersecurity, the significance of resilience in the face of failures, and personal interests that help them unplug from their busy lives. The conversation emphasizes the need for clarity in chaos and the importance of learning from every experience.</p><p><strong class="ql-size-large">Takeaways</strong></p><ul><li>Bringing clarity to chaos is essential for success.</li><li>Mentorship plays a crucial role in career development.</li><li>Every day in leadership presents new challenges and opportunities.</li><li>Learning from both successes and failures is vital.</li><li>Trust but verify is a key principle in leadership.</li><li>AI is transforming government operations and cybersecurity.</li><li>Cyber resilience is becoming more important than ever.</li><li>Personal interests help leaders to unplug and recharge.</li><li>Success is often shared, while failure is solitary.</li><li>The human element must remain in AI decision-making.</li></ul><br/><p><strong class="ql-size-large">Chapters</strong></p><p>00:00 Introduction to Cybersecurity and Personal Journeys</p><p>06:05 The Importance of Mentorship and Teamwork</p><p>11:48 A Day in the Life of a Cybersecurity Leader</p><p>17:51 Lessons Learned from Challenges and Failures</p><p>21:53 The Impact of AI on Cybersecurity and Governance</p><p>29:42 Personal Interests and Unplugging from Work</p><p><strong class="ql-size-large">Resources</strong></p><p>The following books and resources were mentioned:</p><ol><li><strong>"Character" by retired U.S. Army General Stan McChrystal</strong>&nbsp;- Harry Coker mentioned he started reading this book and found it insightful, particularly about self-awareness and challenging oneself.</li><li><strong>"The Power of Now"</strong>&nbsp;- Joseph Carson mentioned this book as one he was recommended to read and was working towards.</li></ol><br/>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/from-chaos-to-clarity-a-cybersecurity-journey-with-secretary-harry-coker-jr-]]></link><guid isPermaLink="false">62dc53ba-dace-4586-b630-2c76924bf613</guid><itunes:image href="https://artwork.captivate.fm/55469c26-b2ea-4f8a-8dd9-5ec94814e7ac/ChatGPT-Image-Dec-2-2025-11-48-53-AM.jpg"/><pubDate>Wed, 27 Aug 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/62dc53ba-dace-4586-b630-2c76924bf613.mp3" length="17642672" type="audio/mpeg"/><itunes:duration>36:45</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>9</itunes:episode><podcast:episode>9</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-3aa3c00a-773a-4f76-925e-4593e577a337.json" type="application/json+chapters"/></item><item><title>Special Episode with Mikko Hyppönen: From Malware to Drones – A Black Hat Farewell</title><itunes:title>Special Episode with Mikko Hyppönen: From Malware to Drones – A Black Hat Farewell</itunes:title><description><![CDATA[<p>In this special edition episode of the Security by Default podcast, Mikko discusses his extensive career in cybersecurity, his transition to a new role in drone defense, and the innovative Museum of Malware that showcases the intersection of art and cybersecurity. He reflects on his journey, memorable experiences, and the importance of storytelling in engaging audiences</p><p>Takeaways</p><ul><li>Mikko's alternative career choice was journalism.</li><li>He started in programming and transitioned to cybersecurity.</li><li>Keynote speaking at Black Hat involves storytelling.</li><li>Experience reduces anxiety in public speaking.</li><li>The Omega virus was Mikko's first memorable malware.</li><li>The Museum of Malware archives the history of cyber threats.</li><li>The museum features art inspired by malware and cyberattacks.</li><li>Mikko is transitioning to a drone defense company.</li><li>He sees parallels between cybersecurity and drone defense.</li><li>Mikko expresses gratitude for his 34 years in the cybersecurity industry.</li></ul><br/><p>Resources:</p><p>https://www.withsecure.com/en/experiences/museum-of-malware-art </p>]]></description><content:encoded><![CDATA[<p>In this special edition episode of the Security by Default podcast, Mikko discusses his extensive career in cybersecurity, his transition to a new role in drone defense, and the innovative Museum of Malware that showcases the intersection of art and cybersecurity. He reflects on his journey, memorable experiences, and the importance of storytelling in engaging audiences</p><p>Takeaways</p><ul><li>Mikko's alternative career choice was journalism.</li><li>He started in programming and transitioned to cybersecurity.</li><li>Keynote speaking at Black Hat involves storytelling.</li><li>Experience reduces anxiety in public speaking.</li><li>The Omega virus was Mikko's first memorable malware.</li><li>The Museum of Malware archives the history of cyber threats.</li><li>The museum features art inspired by malware and cyberattacks.</li><li>Mikko is transitioning to a drone defense company.</li><li>He sees parallels between cybersecurity and drone defense.</li><li>Mikko expresses gratitude for his 34 years in the cybersecurity industry.</li></ul><br/><p>Resources:</p><p>https://www.withsecure.com/en/experiences/museum-of-malware-art </p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/special-edition-mikko-hypponen-from-malware-to-drones-a-black-hat-farewell]]></link><guid isPermaLink="false">78e4f57e-e154-42ae-952a-aa279f56ef1d</guid><itunes:image href="https://artwork.captivate.fm/a06e3b1e-1b69-489f-a822-526ad21ea1cf/MCBrnN472dyym6uxpQuZ_rJT.jpeg"/><pubDate>Thu, 14 Aug 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/78e4f57e-e154-42ae-952a-aa279f56ef1d.mp3" length="4556579" type="audio/mpeg"/><itunes:duration>09:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>8</itunes:episode><podcast:episode>8</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-11483779-e930-4d69-b22a-66bb47943f85.json" type="application/json+chapters"/></item><item><title>Exploring Machine Identities in Cybersecurity with Evandro</title><itunes:title>Exploring Machine Identities in Cybersecurity with Evandro</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, Joseph Carson and Evandro Goncalves discuss the critical topic of machine identities also known as non-human identities (NHI), exploring their definitions, challenges, and best practices for management.  They delve into the complexities of managing non-human identities in cybersecurity, emphasizing the importance of visibility, risk management, and the principle of least privilege. </p><p>The conversation also highlights experiences from the NATO Lock Shield event, showcasing the real-world implications of identity security. Evandro shares insights on staying updated in the cybersecurity field and the importance of hands-on learning.</p><p>Takeaways</p><ul><li>The podcast aims to make security accessible to everyone.</li><li>Machine identities are non-interactive identities used in IT environments.</li><li>Organizations may have up to 80 machine identities for every human identity.</li><li>Visibility and management of machine identities are significant challenges.</li><li>Over-privileged accounts are a common issue in organizations.</li><li>Applying the principle of least privilege is crucial for security.</li><li>Communication and coordination are vital during cybersecurity events.</li><li>Hands-on experience and laboratories are effective for learning new technologies.</li><li>Staying updated with threat reports is essential for cybersecurity professionals.</li><li>Networking through platforms like LinkedIn is beneficial for knowledge sharing.</li></ul><br/><p>Keywords</p><p>machine identities, cybersecurity, identity security,</p><p>non-human identities, security management, best practices, NATO Lock Shield,</p><p>visibility, risk management, zero trust</p>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, Joseph Carson and Evandro Goncalves discuss the critical topic of machine identities also known as non-human identities (NHI), exploring their definitions, challenges, and best practices for management.  They delve into the complexities of managing non-human identities in cybersecurity, emphasizing the importance of visibility, risk management, and the principle of least privilege. </p><p>The conversation also highlights experiences from the NATO Lock Shield event, showcasing the real-world implications of identity security. Evandro shares insights on staying updated in the cybersecurity field and the importance of hands-on learning.</p><p>Takeaways</p><ul><li>The podcast aims to make security accessible to everyone.</li><li>Machine identities are non-interactive identities used in IT environments.</li><li>Organizations may have up to 80 machine identities for every human identity.</li><li>Visibility and management of machine identities are significant challenges.</li><li>Over-privileged accounts are a common issue in organizations.</li><li>Applying the principle of least privilege is crucial for security.</li><li>Communication and coordination are vital during cybersecurity events.</li><li>Hands-on experience and laboratories are effective for learning new technologies.</li><li>Staying updated with threat reports is essential for cybersecurity professionals.</li><li>Networking through platforms like LinkedIn is beneficial for knowledge sharing.</li></ul><br/><p>Keywords</p><p>machine identities, cybersecurity, identity security,</p><p>non-human identities, security management, best practices, NATO Lock Shield,</p><p>visibility, risk management, zero trust</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/exploring-machine-identities-in-cybersecurity-with-evandro]]></link><guid isPermaLink="false">10b6451e-b890-48b9-9728-b901c9ea2f3f</guid><itunes:image href="https://artwork.captivate.fm/9b07ff8f-d5cf-44fb-8dbf-e47c1b51713d/generated-image-2.jpg"/><pubDate>Wed, 13 Aug 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/10b6451e-b890-48b9-9728-b901c9ea2f3f.mp3" length="18912014" type="audio/mpeg"/><itunes:duration>39:24</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>7</itunes:episode><podcast:episode>7</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Episode 7 - Exploring Machine Identities in Cybersecurity with Evandro"><podcast:source uri="https://youtu.be/zx0P--Qtj0w"/></podcast:alternateEnclosure></item><item><title>From Hacker to Hero: Hieu Minh Ngo&apos;s Journey</title><itunes:title>From Hacker to Hero: Hieu Minh Ngo&apos;s Journey</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson interviews Hieu Minh Ngo, a former cyber-criminal turned cybersecurity advocate. Hieu shares his journey from a curious teenager in Vietnam to a successful hacker, his time in prison, and his eventual redemption as he now works to help others avoid the pitfalls he faced. He discusses the importance of honesty, mentorship, and using one's skills for good, emphasizing the need for awareness in cybersecurity and the potential for change in the lives of young hackers.</p><p><strong>Takeaways</strong></p><ul><li>Hieu Minh Ngo transitioned from a cyber-criminal to a cybersecurity advocate.</li><li>His journey began with curiosity about computers and the internet.</li><li>He faced severe consequences for his hacking activities, including imprisonment.</li><li>Prison became a time for self-reflection and personal growth for Hieu.</li><li>He emphasizes the importance of being honest with oneself.</li><li>After prison, he was recruited by the Vietnamese government for cybersecurity work.</li><li>Hieu now mentor’s young hackers to use their skills for good.</li><li>He believes in the power of community and positive influences.</li><li>Hieu encourages young hackers to participate in bug bounty programs.</li><li>He stresses that good things will happen when you do the right thing.</li></ul><br/><p><strong>Chapters</strong></p><ul><li>00:00 Introduction to Cybercrime and Transformation</li><li>11:56 The Journey from Hacking to Cybersecurity</li><li>23:48 The Dark Web and Identity Theft</li><li>29:46 Finding Purpose in Prison</li><li>31:41 The Journey to Redemption</li><li>35:59 Consequences and Redemption</li><li>37:27 Life After Prison: A New Beginning</li><li>42:31 Using Skills for Good</li><li>49:23 Awards and Recognition</li><li>51:22 Future Aspirations and Mentorship</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson interviews Hieu Minh Ngo, a former cyber-criminal turned cybersecurity advocate. Hieu shares his journey from a curious teenager in Vietnam to a successful hacker, his time in prison, and his eventual redemption as he now works to help others avoid the pitfalls he faced. He discusses the importance of honesty, mentorship, and using one's skills for good, emphasizing the need for awareness in cybersecurity and the potential for change in the lives of young hackers.</p><p><strong>Takeaways</strong></p><ul><li>Hieu Minh Ngo transitioned from a cyber-criminal to a cybersecurity advocate.</li><li>His journey began with curiosity about computers and the internet.</li><li>He faced severe consequences for his hacking activities, including imprisonment.</li><li>Prison became a time for self-reflection and personal growth for Hieu.</li><li>He emphasizes the importance of being honest with oneself.</li><li>After prison, he was recruited by the Vietnamese government for cybersecurity work.</li><li>Hieu now mentor’s young hackers to use their skills for good.</li><li>He believes in the power of community and positive influences.</li><li>Hieu encourages young hackers to participate in bug bounty programs.</li><li>He stresses that good things will happen when you do the right thing.</li></ul><br/><p><strong>Chapters</strong></p><ul><li>00:00 Introduction to Cybercrime and Transformation</li><li>11:56 The Journey from Hacking to Cybersecurity</li><li>23:48 The Dark Web and Identity Theft</li><li>29:46 Finding Purpose in Prison</li><li>31:41 The Journey to Redemption</li><li>35:59 Consequences and Redemption</li><li>37:27 Life After Prison: A New Beginning</li><li>42:31 Using Skills for Good</li><li>49:23 Awards and Recognition</li><li>51:22 Future Aspirations and Mentorship</li></ul><br/>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/from-hacker-to-hero-hieu-minh-ngos-journey]]></link><guid isPermaLink="false">1f47656c-a775-4f40-8421-23362e5e5ee8</guid><itunes:image href="https://artwork.captivate.fm/742f8162-5228-4b26-90e0-a360079633be/generated-image-3.jpg"/><pubDate>Wed, 30 Jul 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/1f47656c-a775-4f40-8421-23362e5e5ee8.mp3" length="23277389" type="audio/mpeg"/><itunes:duration>48:30</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>6</itunes:episode><podcast:episode>6</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-826a4f5a-16c4-44fa-aab9-6f811e120110.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Episode 6 - From Hacker to Hero: Hieu Minh Ngo&apos;s Journey"><podcast:source uri="https://youtu.be/1PsMbGsvsDo"/></podcast:alternateEnclosure></item><item><title>Understanding Identity Threats in Cybersecurity with Filipi Pires</title><itunes:title>Understanding Identity Threats in Cybersecurity with Filipi Pires</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson speaks with Filipi Pires, a cybersecurity expert with a diverse background in both technical and sales roles. They discuss Filipi's journey into cybersecurity, the importance of identity in security, and the challenges organizations face with misconfiguration. The conversation also covers tools and techniques used in cybersecurity research, the significance of observability, and the need for continuous learning in the field. Filipi shares insights on community engagement and the importance of respecting the journey in one's cybersecurity career.</p><p><strong class="ql-size-large">Takeaways</strong></p><ul><li>Identity is a central theme in cybersecurity.</li><li>Misconfiguration is a leading cause of security issues.</li><li>Continuous learning is essential in the cybersecurity field.</li><li>Tools should be used to understand techniques, not just for their own sake.</li><li>Community engagement is vital for knowledge sharing.</li><li>Phishing remains a simple yet effective attack method. </li><li>Legacy software poses significant risks to organizations.</li><li>Observability is crucial for effective security management.</li><li>Respecting the journey in cybersecurity is important for growth.</li></ul><br/><p><strong class="ql-size-large">Chapters</strong></p><ul><li>00:00 Introduction to Cybersecurity Journey</li><li>02:49 Exploring Cybersecurity Research and Trends</li><li>05:32 Tools and Techniques in Cybersecurity Research</li><li>08:34 Learning Through Capture The Flag Events</li><li>11:28 Identity Threats and Misconfigurations</li><li>14:16 Legacy Systems and Their Impact on Security</li><li>25:40 Understanding Use Cases in Security Permissions</li><li>27:36 The Principle of Least Privilege</li><li>29:31 The Complexity of Identity Management</li><li>30:28 Challenges in Observability and Access Control</li><li>32:16 Navigating Multi-Cloud Permissions</li><li>34:07 Tools for Enhancing Security Visibility </li><li>36:14 Continuous Learning in Cybersecurity </li><li>41:53 Community Engagement and Knowledge Sharing</li><li>45:32 Respecting the Journey in Cybersecurity</li></ul><br/>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson speaks with Filipi Pires, a cybersecurity expert with a diverse background in both technical and sales roles. They discuss Filipi's journey into cybersecurity, the importance of identity in security, and the challenges organizations face with misconfiguration. The conversation also covers tools and techniques used in cybersecurity research, the significance of observability, and the need for continuous learning in the field. Filipi shares insights on community engagement and the importance of respecting the journey in one's cybersecurity career.</p><p><strong class="ql-size-large">Takeaways</strong></p><ul><li>Identity is a central theme in cybersecurity.</li><li>Misconfiguration is a leading cause of security issues.</li><li>Continuous learning is essential in the cybersecurity field.</li><li>Tools should be used to understand techniques, not just for their own sake.</li><li>Community engagement is vital for knowledge sharing.</li><li>Phishing remains a simple yet effective attack method. </li><li>Legacy software poses significant risks to organizations.</li><li>Observability is crucial for effective security management.</li><li>Respecting the journey in cybersecurity is important for growth.</li></ul><br/><p><strong class="ql-size-large">Chapters</strong></p><ul><li>00:00 Introduction to Cybersecurity Journey</li><li>02:49 Exploring Cybersecurity Research and Trends</li><li>05:32 Tools and Techniques in Cybersecurity Research</li><li>08:34 Learning Through Capture The Flag Events</li><li>11:28 Identity Threats and Misconfigurations</li><li>14:16 Legacy Systems and Their Impact on Security</li><li>25:40 Understanding Use Cases in Security Permissions</li><li>27:36 The Principle of Least Privilege</li><li>29:31 The Complexity of Identity Management</li><li>30:28 Challenges in Observability and Access Control</li><li>32:16 Navigating Multi-Cloud Permissions</li><li>34:07 Tools for Enhancing Security Visibility </li><li>36:14 Continuous Learning in Cybersecurity </li><li>41:53 Community Engagement and Knowledge Sharing</li><li>45:32 Respecting the Journey in Cybersecurity</li></ul><br/>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/understanding-identity-threats-in-cybersecurity-with-filipi-pires]]></link><guid isPermaLink="false">b5e2bdcb-4c84-46fd-9a38-4c6a649a397c</guid><itunes:image href="https://artwork.captivate.fm/e21b7828-d9e5-4935-aeb3-e53cfb321613/generated-image-7.jpg"/><pubDate>Wed, 16 Jul 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/b5e2bdcb-4c84-46fd-9a38-4c6a649a397c.mp3" length="23375426" type="audio/mpeg"/><itunes:duration>48:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>5</itunes:episode><podcast:episode>5</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-15c47c1b-85cf-4832-9e74-d90e455dbd46.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Episode 5 - Understanding Identity Threats in Cybersecurity with Filipi Pires"><podcast:source uri="https://youtu.be/vnJ1H6QU0eY"/></podcast:alternateEnclosure></item><item><title>HackTricks AI - The Ethical Cybersecurity AI Assistant with Carlos Polop</title><itunes:title>HackTricks AI - The Ethical Cybersecurity AI Assistant with Carlos Polop</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson welcomes back cybersecurity expert Carlos Polop. They discuss Carlos's journey into the cybersecurity field, the creation and impact of HackTricks, and the role of AI in cybersecurity. Carlos shares insights on using large language models for hacking, the future of AI, and upcoming training courses.</p><p>The conversation emphasizes the importance of ethical hacking and the need for continuous learning in the rapidly evolving tech landscape.</p><p><strong>Key Takeaways</strong></p><ul><li>HackTricks was created as a personal resource for learning and sharing knowledge.</li><li>The community has greatly benefited from HackTricks in their learning journeys.</li><li>AI is revolutionizing the field of cybersecurity and coding.</li><li>Large language models can assist in finding vulnerabilities and automating tasks.</li><li>It's important to ask the right questions when using AI tools.</li><li>Carlos is developing new training courses focused on cloud security and privilege escalation.</li><li>Hacktricks AI is designed to help users with specific cybersecurity queries.</li><li>The future of AI in cybersecurity is promising but requires ethical considerations.</li><li>Continuous learning and adaptation are crucial in the cybersecurity field.</li></ul><br/><p><strong>Chapters:</strong></p><ul><li>00:00 Introduction to Cybersecurity and Hacktricks</li><li>02:54 The Journey into Hacking and OSCP</li><li>05:54 The Impact of Hacktricks on the Community</li><li>08:58 Recent Projects and Innovations in Cybersecurity</li><li>12:00 The Role of AI in Cybersecurity</li><li>14:57 Automating Code Creation with AI</li><li>18:01 Future of Hacktricks and Upcoming Courses</li><li>20:53 Final Thoughts on AI and Cybersecurity</li></ul><br/><p><strong>Resources:</strong></p><p><a href="https://book.hacktricks.wiki/en/index.html" rel="noopener noreferrer" target="_blank">https://book.hacktricks.wiki/en/index.html</a></p><p><a href="https://training.hacktricks.xyz/" rel="noopener noreferrer" target="_blank">https://training.hacktricks.xyz/</a></p><p><a href="https://www.hacktricks.ai/" rel="noopener noreferrer" target="_blank">https://www.hacktricks.ai/</a></p><p><a href="https://github.com/peass-ng/PEASS-ng" rel="noopener noreferrer" target="_blank">https://github.com/peass-ng/PEASS-ng</a></p>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joe Carson welcomes back cybersecurity expert Carlos Polop. They discuss Carlos's journey into the cybersecurity field, the creation and impact of HackTricks, and the role of AI in cybersecurity. Carlos shares insights on using large language models for hacking, the future of AI, and upcoming training courses.</p><p>The conversation emphasizes the importance of ethical hacking and the need for continuous learning in the rapidly evolving tech landscape.</p><p><strong>Key Takeaways</strong></p><ul><li>HackTricks was created as a personal resource for learning and sharing knowledge.</li><li>The community has greatly benefited from HackTricks in their learning journeys.</li><li>AI is revolutionizing the field of cybersecurity and coding.</li><li>Large language models can assist in finding vulnerabilities and automating tasks.</li><li>It's important to ask the right questions when using AI tools.</li><li>Carlos is developing new training courses focused on cloud security and privilege escalation.</li><li>Hacktricks AI is designed to help users with specific cybersecurity queries.</li><li>The future of AI in cybersecurity is promising but requires ethical considerations.</li><li>Continuous learning and adaptation are crucial in the cybersecurity field.</li></ul><br/><p><strong>Chapters:</strong></p><ul><li>00:00 Introduction to Cybersecurity and Hacktricks</li><li>02:54 The Journey into Hacking and OSCP</li><li>05:54 The Impact of Hacktricks on the Community</li><li>08:58 Recent Projects and Innovations in Cybersecurity</li><li>12:00 The Role of AI in Cybersecurity</li><li>14:57 Automating Code Creation with AI</li><li>18:01 Future of Hacktricks and Upcoming Courses</li><li>20:53 Final Thoughts on AI and Cybersecurity</li></ul><br/><p><strong>Resources:</strong></p><p><a href="https://book.hacktricks.wiki/en/index.html" rel="noopener noreferrer" target="_blank">https://book.hacktricks.wiki/en/index.html</a></p><p><a href="https://training.hacktricks.xyz/" rel="noopener noreferrer" target="_blank">https://training.hacktricks.xyz/</a></p><p><a href="https://www.hacktricks.ai/" rel="noopener noreferrer" target="_blank">https://www.hacktricks.ai/</a></p><p><a href="https://github.com/peass-ng/PEASS-ng" rel="noopener noreferrer" target="_blank">https://github.com/peass-ng/PEASS-ng</a></p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/hacktricks-ai-the-ethical-cybersecurity-ai-assistant]]></link><guid isPermaLink="false">44cb12c9-47a9-49fd-af6a-12979a3f94a3</guid><itunes:image href="https://artwork.captivate.fm/805827b3-ccb6-4785-b5aa-924def47c068/generated-image-9.jpg"/><pubDate>Wed, 02 Jul 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/44cb12c9-47a9-49fd-af6a-12979a3f94a3.mp3" length="13779893" type="audio/mpeg"/><itunes:duration>28:42</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>4</itunes:episode><podcast:episode>4</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-9d548e13-8f70-48cd-9f37-1f65f6e535c4.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Episode  4 - HackTricks AI - The Ethical Cybersecurity AI Assistant with Carlos Polop"><podcast:source uri="https://youtu.be/OKe5gor9SWA"/></podcast:alternateEnclosure></item><item><title>Evolution of Identity Governance in Modern Organizations with Martin Sandren</title><itunes:title>Evolution of Identity Governance in Modern Organizations with Martin Sandren</itunes:title><description><![CDATA[<p>In this conversation, Joseph Carson and Martin Sandren delve into the evolving landscape of Identity Governance and Access Management (IGA).  They discuss the significance of IGA in modern organizations, the challenges faced, and the impact of cloud solutions and AI on identity management. The conversation highlights the need for contextual and adaptive policies, the importance of interoperability, and the role of community engagement through conferences to stay updated in this rapidly changing field.</p><p>Key Takeaways</p><ul><li>IGA is essential for managing access and compliance in organizations.</li><li>The shift to cloud-based IGA solutions has transformed the landscape.</li><li>Contextual and adaptive policies are becoming the norm in identity management.</li><li>AI is playing a crucial role in enhancing identity governance.</li><li>Interoperability between systems is a significant challenge.</li><li>Phishing attacks are increasingly sophisticated due to AI advancements.</li><li>Zero trust principles emphasize reducing friction in access management.</li><li>Shadow IT and shadow AI pose risks to organizational security.</li><li>The signal-to-noise ratio in ITDR systems is a major concern.</li><li>Engagement in conferences and communities is vital for professional growth in IGA.</li></ul><br/><p>Chapters</p><ul><li>00:00 Introduction to Identity Governance and Administration</li><li>01:43 Understanding IGA vs. IAM</li><li>04:02 Challenges and Shortcomings of IGA</li><li>10:05 The Role of IGA in Modern Organizations</li><li>17:20 Modernizing IGA: Cloud Solutions and Innovations</li><li>19:07 The Acceleration of Cloud Adoption</li><li>21:01 Evolving Identity Management Landscape</li><li>22:53 AI's Role in Identity Governance</li><li>24:41 Managing Non-Human Identities</li><li>26:05 The Rise of Shadow IT and AI</li><li>28:37 Future of AI in Identity Management</li><li>30:35 Staying Updated in a Rapidly Changing Field</li></ul><br/><p>Resources:</p><p>Join an IdentiBeer meetup near you</p><p>https://identi.beer/</p>]]></description><content:encoded><![CDATA[<p>In this conversation, Joseph Carson and Martin Sandren delve into the evolving landscape of Identity Governance and Access Management (IGA).  They discuss the significance of IGA in modern organizations, the challenges faced, and the impact of cloud solutions and AI on identity management. The conversation highlights the need for contextual and adaptive policies, the importance of interoperability, and the role of community engagement through conferences to stay updated in this rapidly changing field.</p><p>Key Takeaways</p><ul><li>IGA is essential for managing access and compliance in organizations.</li><li>The shift to cloud-based IGA solutions has transformed the landscape.</li><li>Contextual and adaptive policies are becoming the norm in identity management.</li><li>AI is playing a crucial role in enhancing identity governance.</li><li>Interoperability between systems is a significant challenge.</li><li>Phishing attacks are increasingly sophisticated due to AI advancements.</li><li>Zero trust principles emphasize reducing friction in access management.</li><li>Shadow IT and shadow AI pose risks to organizational security.</li><li>The signal-to-noise ratio in ITDR systems is a major concern.</li><li>Engagement in conferences and communities is vital for professional growth in IGA.</li></ul><br/><p>Chapters</p><ul><li>00:00 Introduction to Identity Governance and Administration</li><li>01:43 Understanding IGA vs. IAM</li><li>04:02 Challenges and Shortcomings of IGA</li><li>10:05 The Role of IGA in Modern Organizations</li><li>17:20 Modernizing IGA: Cloud Solutions and Innovations</li><li>19:07 The Acceleration of Cloud Adoption</li><li>21:01 Evolving Identity Management Landscape</li><li>22:53 AI's Role in Identity Governance</li><li>24:41 Managing Non-Human Identities</li><li>26:05 The Rise of Shadow IT and AI</li><li>28:37 Future of AI in Identity Management</li><li>30:35 Staying Updated in a Rapidly Changing Field</li></ul><br/><p>Resources:</p><p>Join an IdentiBeer meetup near you</p><p>https://identi.beer/</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/the-evolution-of-identity-governance-in-modern-organizations]]></link><guid isPermaLink="false">b1c70caa-4da1-46b5-b78b-e7df6f1f7bad</guid><itunes:image href="https://artwork.captivate.fm/ef380ab8-9892-4647-b440-08a26b9bc497/generated-image-4.jpg"/><pubDate>Wed, 18 Jun 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/b1c70caa-4da1-46b5-b78b-e7df6f1f7bad.mp3" length="16691397" type="audio/mpeg"/><itunes:duration>34:46</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><podcast:episode>3</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-8ecd2c0f-c524-4e0f-b014-e92231eb642d.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Episode 3 - Evolution of Identity Governance in Modern Organizations"><podcast:source uri="https://youtu.be/KrfFCP0ePiE"/></podcast:alternateEnclosure></item><item><title>The Journey of a Hardware Hacker with Joe Grand</title><itunes:title>The Journey of a Hardware Hacker with Joe Grand</itunes:title><description><![CDATA[<p>In this episode, Joe Carson interviews Joe Grand, a renowned hardware hacker and educator. They discuss Joe Grand's journey into hacking, the importance of community and collaboration in the field, and the evolution of technology and security challenges over the years. Joe shares his early experiences with computers, his transition from engineering to hardware hacking, and the pivotal role of the Loft in shaping his career. The conversation also touches on the founding of @Stake (ATstake, Inc.) and the challenges of balancing passion with corporate expectations in the cybersecurity industry. </p><p>In this conversation, Joe Grand discusses his journey in the hacking community, including his experiences designing badges for Defcon, the importance of artistic engineering, and the impact of live hacking events. He shares insights on parenting in the digital age, the significance of legacy software security, and the challenges of vendor communication. Joe also highlights his current projects, the learning process through failure, and resources for aspiring hackers, culminating in a discussion about his involvement in a film related to cryptocurrency.</p><h2><strong>Takeaways</strong></h2><ul><li>Community and collaboration are vital in the hacking world.</li><li>Hacking is a continuous learning process; you never know everything.</li><li>Early experiences with computers often start with games and curiosity.</li><li>The Loft provided a transformative experience for Joe Grand.</li><li>Transitioning from engineering to hacking can be a natural progression.</li><li>AtStake was a significant step in Joe's career, merging hacking with business.</li><li>Finding purpose in teaching others about hardware hacking is fulfilling.</li><li>The importance of viewing security from an adversarial perspective.</li><li>Hacking and engineering can complement each other in unique ways. Joe Grand returned to design the Defcon badge after years away.</li><li>He emphasizes the blend of art and engineering in hacking.</li><li>Live events showcase the real-time problem-solving process in hacking.</li><li>Parenting involves guiding children through the digital landscape.</li><li>Not all hacks need to be groundbreaking to be significant.</li><li>Legacy software security remains a critical issue.</li><li>Effective communication between vendors and hackers is essential.</li><li>Current projects focus on refining fault injection techniques.</li><li>Learning through failure is a vital part of the hacking process.</li><li>Documentation is crucial for replicating and building on work.</li></ul><br/><h2><strong>Chapters</strong></h2><ul><li>00:00 Introduction to the Podcast and Guest</li><li>01:43 The Journey of a Hardware Hacker</li><li>05:16 The Importance of Community in Hacking</li><li>09:50 Early Experiences and Hacker Origins</li><li>14:41 Transitioning from Engineering to Hardware Hacking</li><li>18:16 The Loft: A Transformational Experience</li><li>23:51 From Passion to Career: The AtStake Journey</li><li>30:56 Finding Purpose in Teaching and Hacking</li><li>33:21 Reviving the Defcon Badge Design</li><li>34:47 Exploring Artistic Engineering in Hacking</li><li>35:44 The Impact of Live Hacking Events</li><li>37:33 Parenting in the Digital Age</li><li>39:28 Lessons from Hacking Time</li><li>42:48 The Importance of Legacy Software Security</li><li>46:37 Vendor Communication and Security</li><li>48:58 Current Projects and Future Directions</li><li>51:51 Learning Through Failure</li><li>54:54 Resources for Aspiring Hackers</li><li>58:56 The Intersection of Hacking and Film</li></ul><br/><h2><strong>Additional Resources:</strong></h2><p>https://grandideastudio.com/</p><p>https://www.youtube.com/watch?v=o5IySpAkThg </p><p>https://www.imdb.com/title/tt27307826/</p>]]></description><content:encoded><![CDATA[<p>In this episode, Joe Carson interviews Joe Grand, a renowned hardware hacker and educator. They discuss Joe Grand's journey into hacking, the importance of community and collaboration in the field, and the evolution of technology and security challenges over the years. Joe shares his early experiences with computers, his transition from engineering to hardware hacking, and the pivotal role of the Loft in shaping his career. The conversation also touches on the founding of @Stake (ATstake, Inc.) and the challenges of balancing passion with corporate expectations in the cybersecurity industry. </p><p>In this conversation, Joe Grand discusses his journey in the hacking community, including his experiences designing badges for Defcon, the importance of artistic engineering, and the impact of live hacking events. He shares insights on parenting in the digital age, the significance of legacy software security, and the challenges of vendor communication. Joe also highlights his current projects, the learning process through failure, and resources for aspiring hackers, culminating in a discussion about his involvement in a film related to cryptocurrency.</p><h2><strong>Takeaways</strong></h2><ul><li>Community and collaboration are vital in the hacking world.</li><li>Hacking is a continuous learning process; you never know everything.</li><li>Early experiences with computers often start with games and curiosity.</li><li>The Loft provided a transformative experience for Joe Grand.</li><li>Transitioning from engineering to hacking can be a natural progression.</li><li>AtStake was a significant step in Joe's career, merging hacking with business.</li><li>Finding purpose in teaching others about hardware hacking is fulfilling.</li><li>The importance of viewing security from an adversarial perspective.</li><li>Hacking and engineering can complement each other in unique ways. Joe Grand returned to design the Defcon badge after years away.</li><li>He emphasizes the blend of art and engineering in hacking.</li><li>Live events showcase the real-time problem-solving process in hacking.</li><li>Parenting involves guiding children through the digital landscape.</li><li>Not all hacks need to be groundbreaking to be significant.</li><li>Legacy software security remains a critical issue.</li><li>Effective communication between vendors and hackers is essential.</li><li>Current projects focus on refining fault injection techniques.</li><li>Learning through failure is a vital part of the hacking process.</li><li>Documentation is crucial for replicating and building on work.</li></ul><br/><h2><strong>Chapters</strong></h2><ul><li>00:00 Introduction to the Podcast and Guest</li><li>01:43 The Journey of a Hardware Hacker</li><li>05:16 The Importance of Community in Hacking</li><li>09:50 Early Experiences and Hacker Origins</li><li>14:41 Transitioning from Engineering to Hardware Hacking</li><li>18:16 The Loft: A Transformational Experience</li><li>23:51 From Passion to Career: The AtStake Journey</li><li>30:56 Finding Purpose in Teaching and Hacking</li><li>33:21 Reviving the Defcon Badge Design</li><li>34:47 Exploring Artistic Engineering in Hacking</li><li>35:44 The Impact of Live Hacking Events</li><li>37:33 Parenting in the Digital Age</li><li>39:28 Lessons from Hacking Time</li><li>42:48 The Importance of Legacy Software Security</li><li>46:37 Vendor Communication and Security</li><li>48:58 Current Projects and Future Directions</li><li>51:51 Learning Through Failure</li><li>54:54 Resources for Aspiring Hackers</li><li>58:56 The Intersection of Hacking and Film</li></ul><br/><h2><strong>Additional Resources:</strong></h2><p>https://grandideastudio.com/</p><p>https://www.youtube.com/watch?v=o5IySpAkThg </p><p>https://www.imdb.com/title/tt27307826/</p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/the-journey-of-a-hardware-hacker-with-joe-grand]]></link><guid isPermaLink="false">fd03a84e-890d-4d1e-8fa4-38cc59a63c07</guid><itunes:image href="https://artwork.captivate.fm/84e503c4-1c28-4d0c-9d7c-e9c309377d61/generated-image-6.jpg"/><pubDate>Wed, 04 Jun 2025 15:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/fd03a84e-890d-4d1e-8fa4-38cc59a63c07.mp3" length="26100285" type="audio/mpeg"/><itunes:duration>54:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>2</itunes:episode><podcast:episode>2</podcast:episode><podcast:season>1</podcast:season><podcast:alternateEnclosure type="video/youtube" title="Episode 2 - The Journey of a Hardware Hacker with Joe Grand"><podcast:source uri="https://youtu.be/A-oRJRR4Rj8"/></podcast:alternateEnclosure></item><item><title>Shadow AI and AI&apos;s Impact on Cybersecurity Strategies with Terence Jackson</title><itunes:title>Shadow AI and AI&apos;s Impact on Cybersecurity Strategies with Terence Jackson</itunes:title><description><![CDATA[<p>In this episode of the Security by Default podcast, host Joseph Carson speaks with cybersecurity expert Terence Jackson about the evolving landscape of cybersecurity, the challenges faced by CISOs, and the importance of data security and governance. They discuss the impact of AI on security practices, the role of the CISO as a risk manager, and the need for organizations to prioritize foundational security measures in a rapidly changing technological environment. </p><p>In this conversation, Terence Jackson and Joseph discuss the evolving landscape of cybersecurity, emphasizing the importance of asset management, the role of AI in business intelligence, and the need for a balance between security and user experience. They explore the future of CISOs in a world increasingly governed by digital intelligence and the necessity of continuous learning and community engagement in the cybersecurity field.</p><p><strong>Key Takeaways</strong></p><ul><li>The cybersecurity landscape is constantly evolving, with new challenges emerging.</li><li>AI is transforming both the attack and defense sides of cybersecurity.</li><li>Data security remains a critical concern for organizations.</li><li>CISOs are increasingly seen as risk managers rather than just security officers.</li><li>Governance and compliance are essential for effective data management.</li><li>Organizations must prioritize identity and access management.</li><li>The role of the CISO has become more strategic and board-level.</li><li>Understanding data exposure risks is crucial for compliance.</li><li>Foundational security practices are necessary for effective defense.</li><li>Continuous learning and adaptation are vital in the fast-paced tech world. AI will play a crucial role in enhancing business intelligence.</li><li>Effective asset management is foundational for organizational security.</li><li>Zero trust must be balanced with zero friction for user experience.</li><li>Creating a positive security culture is essential for engagement.</li><li>CISOs will increasingly focus on data governance and business risks.</li><li>The proliferation of AI agents presents new security challenges.</li><li>Security should be integrated seamlessly into user workflows.</li><li>Continuous learning is vital in the rapidly changing cybersecurity landscape.</li><li>Community engagement fosters knowledge sharing and support.</li><li>Focusing on the basics is key to effective cybersecurity.</li></ul><br/><p><strong>Chapters</strong></p><ul><li>00:00 Introduction to Cybersecurity Journeys</li><li>02:17 Challenges in Cybersecurity Today</li><li>06:43 The Evolving Role of the CISO</li><li>11:06 Governance, Compliance, and Data Security</li><li>14:56 Prioritizing Security in a Fast-Paced World</li><li>19:39 The Role of AI in Business Intelligence</li><li>20:02 Importance of Asset Management</li><li>21:52 Zero Trust and Zero Friction Security</li><li>23:38 Creating a Positive Security Culture</li><li>24:27 The Future of CISOs and Digital Intelligence</li><li>29:32 Continuous Learning and Community Engagement</li></ul><br/><p><strong>Additional Resources:</strong></p><p>Connect with Terence: https://www.linkedin.com/in/terencejackson/</p><p>https://www.terencedjackson.com/ </p>]]></description><content:encoded><![CDATA[<p>In this episode of the Security by Default podcast, host Joseph Carson speaks with cybersecurity expert Terence Jackson about the evolving landscape of cybersecurity, the challenges faced by CISOs, and the importance of data security and governance. They discuss the impact of AI on security practices, the role of the CISO as a risk manager, and the need for organizations to prioritize foundational security measures in a rapidly changing technological environment. </p><p>In this conversation, Terence Jackson and Joseph discuss the evolving landscape of cybersecurity, emphasizing the importance of asset management, the role of AI in business intelligence, and the need for a balance between security and user experience. They explore the future of CISOs in a world increasingly governed by digital intelligence and the necessity of continuous learning and community engagement in the cybersecurity field.</p><p><strong>Key Takeaways</strong></p><ul><li>The cybersecurity landscape is constantly evolving, with new challenges emerging.</li><li>AI is transforming both the attack and defense sides of cybersecurity.</li><li>Data security remains a critical concern for organizations.</li><li>CISOs are increasingly seen as risk managers rather than just security officers.</li><li>Governance and compliance are essential for effective data management.</li><li>Organizations must prioritize identity and access management.</li><li>The role of the CISO has become more strategic and board-level.</li><li>Understanding data exposure risks is crucial for compliance.</li><li>Foundational security practices are necessary for effective defense.</li><li>Continuous learning and adaptation are vital in the fast-paced tech world. AI will play a crucial role in enhancing business intelligence.</li><li>Effective asset management is foundational for organizational security.</li><li>Zero trust must be balanced with zero friction for user experience.</li><li>Creating a positive security culture is essential for engagement.</li><li>CISOs will increasingly focus on data governance and business risks.</li><li>The proliferation of AI agents presents new security challenges.</li><li>Security should be integrated seamlessly into user workflows.</li><li>Continuous learning is vital in the rapidly changing cybersecurity landscape.</li><li>Community engagement fosters knowledge sharing and support.</li><li>Focusing on the basics is key to effective cybersecurity.</li></ul><br/><p><strong>Chapters</strong></p><ul><li>00:00 Introduction to Cybersecurity Journeys</li><li>02:17 Challenges in Cybersecurity Today</li><li>06:43 The Evolving Role of the CISO</li><li>11:06 Governance, Compliance, and Data Security</li><li>14:56 Prioritizing Security in a Fast-Paced World</li><li>19:39 The Role of AI in Business Intelligence</li><li>20:02 Importance of Asset Management</li><li>21:52 Zero Trust and Zero Friction Security</li><li>23:38 Creating a Positive Security Culture</li><li>24:27 The Future of CISOs and Digital Intelligence</li><li>29:32 Continuous Learning and Community Engagement</li></ul><br/><p><strong>Additional Resources:</strong></p><p>Connect with Terence: https://www.linkedin.com/in/terencejackson/</p><p>https://www.terencedjackson.com/ </p>]]></content:encoded><link><![CDATA[https://wiretrap.eu/podcast/shadow-ai-and-ais-impact-on-cybersecurity-strategies]]></link><guid isPermaLink="false">121c341e-7c27-4ef6-9a34-ed1a562bd0c1</guid><itunes:image href="https://artwork.captivate.fm/ce8faebc-7ab5-4c30-bc27-fedf2931f19f/generated-image-8.jpg"/><pubDate>Wed, 21 May 2025 14:00:00 +0300</pubDate><enclosure url="https://episodes.captivate.fm/episode/121c341e-7c27-4ef6-9a34-ed1a562bd0c1.mp3" length="16707932" type="audio/mpeg"/><itunes:duration>34:48</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><podcast:episode>1</podcast:episode><podcast:season>1</podcast:season><podcast:chapters url="https://transcripts.captivate.fm/chapter-266ccece-c364-4e39-a274-7e052e21fd4b.json" type="application/json+chapters"/><podcast:alternateEnclosure type="video/youtube" title="Episode 1 - Shadow AI and AI&apos;s Impact on Cybersecurity Strategies with Terence"><podcast:source uri="https://youtu.be/M8m_yWWGYY8"/></podcast:alternateEnclosure></item></channel></rss>