Phillip Wylie Show
Phillip Wylie
All episodes
Best episodes
Seasons
Top 10 Phillip Wylie Show Episodes
Goodpods has curated a list of the 10 best Phillip Wylie Show episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Phillip Wylie Show for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Phillip Wylie Show episode by adding your comments to the episode page.
Michael Jenks: Lessons from a Former DoD Professional
Phillip Wylie Show
About the Guest:
Michael Jenks, commonly referred to as "Jenks," is an esteemed figure with an extensive background in the Department of Defense (DoD). With a penchant for cybersecurity and a wealth of experience in cyber warfare, Jenks offers a valuable skill set that has been honed in high-stakes environments where precision and accuracy are paramount. Having started his journey in computer science, he quickly developed a fascination with digital code and its impact. Transitioning from dial-up ISPs to L-3 Communications, where he gained clearance for classified work, Jenks eventually founded his own defense contracting company specializing in offensive and defensive cyber operations.
Episode Summary:
In this riveting episode of the Phillip Wylie Show, host Phillip examines the intersection of cybersecurity and defense backgrounds through his conversation with Michael Jenks from Interpris. The dynamic dialogue delves into how professionals from critical sectors, such as the Department of Defense, bring innovative solutions and meaningful perspectives to the cybersecurity industry.
Jenks shares his 'origin story,' which follows a trajectory starting from gaming and IRC administration, leading to a computer science degree and an impressive tenure at various defense-related roles. His story highlights a critical insight: that the best cybersecurity defenses are often forged in the crucible of real-world operations where the cost of failure is immense.
Central to the conversation, Jenks unravels the methodology behind Interpris—a platform designed to contextualize and elevate existing cybersecurity tools through continuous threat exposure management. Leveraging a thorough understanding of threat profiles, Interpris aims to help organizations prioritize potential risks based on industry, operations, and data sensitivity. The platform's philosophy is clear—fortify defenses by optimizing tools that organizations already possess, using informed strategies and continuous monitoring to proactively counter advanced cyber threats.
Key Takeaways:
Cyber professionals with DoD experience bring invaluable expertise to cybersecurity solutions.
Interpris focuses on improving an organization's security posture by providing context and strengthening existing tools.
Assume breach approach and implementing best practices are essential for a robust security posture.
Insider threats are as significant as external threat actors, making holistic security measures necessary.
The emergence of AI in both offensive and defensive cybersecurity tools is rapidly changing the landscape.
Notable Quotes:
"I mean, man, if you have it, background, a clearance, man, there are just a ton of jobs." -Michael Jenks
"From just the digital realm. Gamer growing up. Cut my teeth on hacking back in the day." -Michael Jenks
"You already have enough tools, right. It's really just that optimized configuration, that prioritization, that customization." -Michael Jenks
"It's my job to defend this environment. I have no idea where we're protected, where we're not." -Michael Jenks
"What we're doing is weaving together all of these products, from EDR, from network sensing, to firewall, to your ESM." Michael Jenks
Resources:
https://www.linkedin.com/in/michaeljenks/
https://www.linkedin.com/company/interpres-security/
https://twitter.com/InterpresSec
https://interpressecurity.com/
About the Guest:
Michael Jenks, commonly referred to as "Jenks," is an esteemed figure with an extensive background in the Department of Defense (DoD). With a penchant for cybersecurity and a wealth of experience in cyber warfare, Jenks offers a valuable skill set that has been honed in high-stakes environments where precision and accuracy are paramount. Having started his journey in computer science, he quickly developed a fascination with digital code and its impact. Transitioning from dial-up ISPs to L-3 Communications, where he gained clearance for classified work, Jenks eventually founded his own defense contracting company specializing in offensive and defensive cyber operations.
Episode Summary:
In this riveting episode of the Phillip Wylie Show, host Phillip examines the intersection of cybersecurity and defense backgrounds through his conversation with Michael Jenks from Interpris. The dynamic dialogue delves into how professionals from critical sectors, such as the Department of Defense, bring innovative solutions and meaningful perspectives to the cybersecurity industry.
Jenks shares his 'origin story,' which follows a trajectory starting from gaming and IRC administration, leading to a computer science degree and an impressive tenure at various defense-related roles. His story highlights a critical insight: that the best cybersecurity defenses are often forged in the crucible of real-world operations where the cost of failure is immense.
Central to the conversation, Jenks unravels the methodology behind Interpris—a platform designed to contextualize and elevate existing cybersecurity tools through continuous threat exposure management. Leveraging a thorough understanding of threat profiles, Interpris aims to help organizations prioritize potential risks based on industry, operations, and data sensitivity. The platform's philosophy is clear—fortify defenses by optimizing tools that organizations already possess, using informed strategies and continuous monitoring to proactively counter advanced cyber threats.
Key Takeaways:
Cyber professionals with DoD experience bring invaluable expertise to cybersecurity solutions.
Interpris focuses on improving an organization's security posture by providing context and strengthening existing tools.
Assume breach approach and implementing best practices are essential for a robust security posture.
Insider threats are as significant as external threat actors, making holistic security measures necessary.
The emergence of AI in both offensive and defensive cybersecurity tools is rapidly changing the landscape.
Notable Quotes:
"I mean, man, if you have it, background, a clearance, man, there are just a ton of jobs." -Michael Jenks
"From just the digital realm. Gamer growing up. Cut my teeth on hacking back in the day." -Michael Jenks
"You already have enough tools, right. It's really just that optimized configuration, that prioritization, that customization." -Michael Jenks
"It's my job to defend this environment. I have no idea where we're protected, where we're not." -Michael Jenks
"What we're doing is weaving together all of these products, from EDR, from network sensing, to firewall, to your ESM." Michael Jenks
Resources:
https://www.linkedin.com/in/michaeljenks/
https://www.linkedin.com/company/interpres-security/
https://twitter.com/InterpresSec
https://interpressecurity.com/
02/12/24 • 42 min
Phillip Wylie Show Trailer
Phillip Wylie Show
This trailer for the Phillip Wylie Show shares the topics discussed in episodes of the podcast.
This trailer for the Phillip Wylie Show shares the topics discussed in episodes of the podcast.
07/04/23 • 1 min
The Art of Red Teaming with Shani Peled
Phillip Wylie Show
07/04/23 • 27 min
Get To Know MITRE Engenuity With Maggie MacAlpine!
Phillip Wylie Show
05/31/23 • 26 min
The Power of Bug Bounty Automation with Nenad Zaric
Phillip Wylie Show
About The Guest(s):
Nenad Zarick is a cybersecurity expert and the founder of Trickest, a platform that automates offensive security workflows. With over 15 years of experience in the field, Nenad has a deep understanding of bug bounty programs and the importance of automation in cybersecurity.
Summary:
In this episode, Phillip interviews Nenad Zaric, the founder of Trickest, a platform that automates offensive security workflows. Nenad shares his background in cybersecurity and how he got started in bug bounty programs. He emphasizes the importance of automation in bug bounty and explains how Trickest can help bug hunters optimize their efforts. Nenad gives a live demo of the platform, showcasing its features and capabilities. He also discusses the scalability of the platform and the benefits of automation in the future of cybersecurity.
Key Takeaways: Bug bounty hunters need to automate their workflows to be successful.Trickest allows users to easily automate offensive security workflows without the need for manual scripting.The platform integrates various tools and provides a visual interface for building workflows.Users can schedule workflows and execute them on multiple machines for scalability.Automation is the key to the future of cybersecurity and can save time and improve efficiency.
Nenad's and Trickest's social media and website:
https://twitter.com/ZaricNenad_
https://www.linkedin.com/in/nenad-zaric/
About The Guest(s):
Nenad Zarick is a cybersecurity expert and the founder of Trickest, a platform that automates offensive security workflows. With over 15 years of experience in the field, Nenad has a deep understanding of bug bounty programs and the importance of automation in cybersecurity.
Summary:
In this episode, Phillip interviews Nenad Zaric, the founder of Trickest, a platform that automates offensive security workflows. Nenad shares his background in cybersecurity and how he got started in bug bounty programs. He emphasizes the importance of automation in bug bounty and explains how Trickest can help bug hunters optimize their efforts. Nenad gives a live demo of the platform, showcasing its features and capabilities. He also discusses the scalability of the platform and the benefits of automation in the future of cybersecurity.
Key Takeaways: Bug bounty hunters need to automate their workflows to be successful.Trickest allows users to easily automate offensive security workflows without the need for manual scripting.The platform integrates various tools and provides a visual interface for building workflows.Users can schedule workflows and execute them on multiple machines for scalability.Automation is the key to the future of cybersecurity and can save time and improve efficiency.
Nenad's and Trickest's social media and website:
https://twitter.com/ZaricNenad_
https://www.linkedin.com/in/nenad-zaric/
06/30/23 • 34 min
Talking Content Creation and Marketing with Zach Hill
Phillip Wylie Show
06/22/23 • 34 min
06/09/23 • 25 min
Maxie Reynolds: From hacker to underwater data center entrepeneur
Phillip Wylie Show
About The Guest:Maxie Reynolds is a former offshore oil and gas worker turned entrepreneur. She is the founder and CEO of a company that specializes in placing data centers underwater, reducing cooling costs and carbon emissions. Maxie is also a stuntwoman and has a background in robotics and computer science.
Summary:Maxie Reynolds shares her journey from working offshore in the oil and gas industry to becoming an entrepreneur in the data center industry. She discusses the challenges she faced and the lessons she learned along the way. Maxie explains how her company solves the problem of high cooling costs and carbon emissions by placing data centers underwater. She also addresses misconceptions about the environmental impact of data centers and the importance of sustainability.
Key Takeaways:
- Maxie Reynolds started her career as an offshore oil and gas worker before transitioning to cybersecurity and eventually founding her own company.
- Placing data centers underwater reduces cooling costs by 40% and eliminates the need for electrically driven cooling systems.
- Data centers placed underwater also reduce carbon emissions by 750 tons per megawatt hour of electricity used.
- Water has a higher specific heat than air, making it a more efficient heat sink and preventing the surrounding water from heating up significantly.
- Maxie emphasizes the importance of acknowledging the realities of sustainability and finding innovative solutions to address them.
Quotes:
- "Whatever you want to do as a female, try, go, try, do it, and see how far you get." - Maxie Reynolds
- "To have a good company, you have to be solving a problem." - Maxie Reynolds
- "We are reliant on fossil fuel in every single way." - Maxie Reynolds
- "There's no incentive to use our commodities efficiently." - Maxie Reynolds
- "Reach out to people that you think are smart, even if they aren't in your circle, and start to find some of the right answers." - Maxie Reynolds
Socials and Resources:
https://twitter.com/SubseaCloud
https://www.linkedin.com/in/maxiereynolds/
Book: The Art of Attack: Attacker Mindset for Security Professionals: https://www.wiley.com/en-us/The+Art+of+Attack%3A+Attacker+Mindset+for+Security+Professionals-p-9781119805472
About The Guest:Maxie Reynolds is a former offshore oil and gas worker turned entrepreneur. She is the founder and CEO of a company that specializes in placing data centers underwater, reducing cooling costs and carbon emissions. Maxie is also a stuntwoman and has a background in robotics and computer science.
Summary:Maxie Reynolds shares her journey from working offshore in the oil and gas industry to becoming an entrepreneur in the data center industry. She discusses the challenges she faced and the lessons she learned along the way. Maxie explains how her company solves the problem of high cooling costs and carbon emissions by placing data centers underwater. She also addresses misconceptions about the environmental impact of data centers and the importance of sustainability.
Key Takeaways:
- Maxie Reynolds started her career as an offshore oil and gas worker before transitioning to cybersecurity and eventually founding her own company.
- Placing data centers underwater reduces cooling costs by 40% and eliminates the need for electrically driven cooling systems.
- Data centers placed underwater also reduce carbon emissions by 750 tons per megawatt hour of electricity used.
- Water has a higher specific heat than air, making it a more efficient heat sink and preventing the surrounding water from heating up significantly.
- Maxie emphasizes the importance of acknowledging the realities of sustainability and finding innovative solutions to address them.
Quotes:
- "Whatever you want to do as a female, try, go, try, do it, and see how far you get." - Maxie Reynolds
- "To have a good company, you have to be solving a problem." - Maxie Reynolds
- "We are reliant on fossil fuel in every single way." - Maxie Reynolds
- "There's no incentive to use our commodities efficiently." - Maxie Reynolds
- "Reach out to people that you think are smart, even if they aren't in your circle, and start to find some of the right answers." - Maxie Reynolds
Socials and Resources:
https://twitter.com/SubseaCloud
https://www.linkedin.com/in/maxiereynolds/
Book: The Art of Attack: Attacker Mindset for Security Professionals: https://www.wiley.com/en-us/The+Art+of+Attack%3A+Attacker+Mindset+for+Security+Professionals-p-9781119805472
11/21/23 • 36 min
John Woodling: The Power of Community and Self Learning
Phillip Wylie Show
About the Guest:
John Woodling is a seasoned cybersecurity expert with seven years of experience in the industry. He currently holds the position of Senior Information Security Analyst. John has a diverse background that includes a blend of hands-on technical expertise and a profound understanding of different cybersecurity domains. As a member of the DFW Cybersecurity community and DEFCON 940 Group in Denton, Texas, John is known for his mentorship and willingness to share his insights. With an initial career path in art and finance, John’s journey into cybersecurity showcases his passion and curiosity for technology and security.
Episode Summary:
Welcome to another insightful episode of the Phillip Wylie Show! In this episode, Phillip sits down with John Woodling, a prominent figure in the DFW Cybersecurity community and an adept Senior Information Security Analyst. John shares his journey into the world of cybersecurity, providing invaluable advice for those looking to transition into this ever-evolving field. Known for his deep knowledge and practical experience, John offers listeners a comprehensive look into the necessary skills, potential career paths, and the importance of community in cybersecurity.
The conversation delves into different entry points into the cybersecurity industry, emphasizing the significance of hands-on learning, certifications, and networking. John discusses the transformation of cybersecurity from a niche technical field into a widespread and essential discipline, highlighting various roles like GRC, red teaming, and social engineering. He also reflects on his personal career choices and lessons learned, offering today’s aspiring cybersecurity professionals actionable advice and encouragement. Additionally, the episode touches upon the evolving job market, the importance of diverse backgrounds, and the role of modern resources like bug bounties in global talent development.
Key Takeaways:
- Evolving Cybersecurity Landscape: Cybersecurity has transitioned from a specialized technical field to a broad industry encompassing various roles, making it accessible to people with diverse backgrounds.
- Importance of Networking and Community: Building relationships and engaging with community members can significantly enhance career opportunities and knowledge sharing.
- Hands-On Learning and Certification: Practical experience and certifications remain crucial in breaking into the cybersecurity field, with resources more accessible than ever.
- Career Advice for Aspiring Professionals: John emphasizes understanding networking fundamentals and finding accessible, high-quality training programs that offer real-world applicability.
- Global Opportunities with Technology: Modern technological advancements and resources like bug bounties provide opportunities for individuals worldwide, potentially mitigating the need for unethical hacking behaviors.
Notable Quotes:
- "I think that there's a lot of room for a lot of different individuals."
- "Nobody knows anything. I thought you all knew everything."
- "It's a way that I can connect with people, and talk to them about these things."
- "I think today is definitely, it feels more of a trade than it does the traditional white-collar position that it was 20 years ago."
- "You belong. That would be the big piece to it."
Resources
https://x.com/statictear
https://www.linkedin.com/in/johnwoodling/
DC940 Discord https://discord.gg/DDZEnFHFbt
About the Guest:
John Woodling is a seasoned cybersecurity expert with seven years of experience in the industry. He currently holds the position of Senior Information Security Analyst. John has a diverse background that includes a blend of hands-on technical expertise and a profound understanding of different cybersecurity domains. As a member of the DFW Cybersecurity community and DEFCON 940 Group in Denton, Texas, John is known for his mentorship and willingness to share his insights. With an initial career path in art and finance, John’s journey into cybersecurity showcases his passion and curiosity for technology and security.
Episode Summary:
Welcome to another insightful episode of the Phillip Wylie Show! In this episode, Phillip sits down with John Woodling, a prominent figure in the DFW Cybersecurity community and an adept Senior Information Security Analyst. John shares his journey into the world of cybersecurity, providing invaluable advice for those looking to transition into this ever-evolving field. Known for his deep knowledge and practical experience, John offers listeners a comprehensive look into the necessary skills, potential career paths, and the importance of community in cybersecurity.
The conversation delves into different entry points into the cybersecurity industry, emphasizing the significance of hands-on learning, certifications, and networking. John discusses the transformation of cybersecurity from a niche technical field into a widespread and essential discipline, highlighting various roles like GRC, red teaming, and social engineering. He also reflects on his personal career choices and lessons learned, offering today’s aspiring cybersecurity professionals actionable advice and encouragement. Additionally, the episode touches upon the evolving job market, the importance of diverse backgrounds, and the role of modern resources like bug bounties in global talent development.
Key Takeaways:
- Evolving Cybersecurity Landscape: Cybersecurity has transitioned from a specialized technical field to a broad industry encompassing various roles, making it accessible to people with diverse backgrounds.
- Importance of Networking and Community: Building relationships and engaging with community members can significantly enhance career opportunities and knowledge sharing.
- Hands-On Learning and Certification: Practical experience and certifications remain crucial in breaking into the cybersecurity field, with resources more accessible than ever.
- Career Advice for Aspiring Professionals: John emphasizes understanding networking fundamentals and finding accessible, high-quality training programs that offer real-world applicability.
- Global Opportunities with Technology: Modern technological advancements and resources like bug bounties provide opportunities for individuals worldwide, potentially mitigating the need for unethical hacking behaviors.
Notable Quotes:
- "I think that there's a lot of room for a lot of different individuals."
- "Nobody knows anything. I thought you all knew everything."
- "It's a way that I can connect with people, and talk to them about these things."
- "I think today is definitely, it feels more of a trade than it does the traditional white-collar position that it was 20 years ago."
- "You belong. That would be the big piece to it."
Resources
https://x.com/statictear
https://www.linkedin.com/in/johnwoodling/
DC940 Discord https://discord.gg/DDZEnFHFbt
06/11/24 • 36 min
Be Fearless Online: In Browser Malicious File Detection Part 2
Phillip Wylie Show
About the Guest:
Dakshitaa Babu is a Software Engineer at SquareX, where she is engaged in data engineering and analytics.
She is also the pen behind the engineering blogs written on SquareX's infrastructure and security research. After completing her Bachelor's degree at the National University of Singapore, Dakshitaa joined SquareX, marking her foray into the cybersecurity industry. While new to the field, her enthusiasm for discovering and understanding new concepts has quickly established her as a committed contributor to the evolving sector. Her interests are in Browser Security and consumer education.
Episode Summary:
In this captivating episode of The Phillip Wylie Show, cybersecurity enthusiasts witnessed a deep dive into the cutting-edge realm of in-browser malicious file detection with Dakshitaa Babu. Dakshitaa, showcasing her prowess in the industry, illustrates sophisticated features of her company's flagship cybersecurity product designed to enhance online safety.
Dakshitaa demonstrates the product's ability to detect malicious macros within files, emphasizing the significance of privacy in their detection methods which occur directly within the browser environment. Focusing primarily on Gmail due to its widespread use, she articulates how the product can reveal hidden dangers within office documents and macros. The episode highlights not only the detection of conventional threats but also uncovers tactics like file renaming, VBA purging, and old file format analysis to pinpoint potentially harmful activity.
The conversation shifts towards the efficiency and privacy advantages of in-browser detection. Dakshitaa explains how this approach offers immediate and private threat recognition compared to traditional methods. She confidently positions her company's product as a vital layer of defense, complementing existing antivirus solutions and empowering users with immediate insights into file safety before downloads occur.
Key Takeaways:
In-browser malicious file detection technology offers advanced privacy and fast analysis by scanning files directly within the email client.
Dakshitaa demoed the tech's proficiency in detecting renamed files, large file components, and outdated file formats—all indicative of potential malware.
The product integrates seamlessly with Gmail, providing users with immediate warnings and detailed insights into file contents without downloads.
Unique detection methods allow for identifying suspicious activities such as VBA purging, which can bypass some antivirus solutions.
The browser extension is free and compatible with all chromium-based browsers, encouraging user adoption for an added layer of cybersecurity.
Notable Quotes:
"We are going deeper than what surface level checks do in Gmail, for instance." -Dakshitaa Babu
"We have no idea why you're still using it in 2024." -Dakshitaa Babu
"We are trying to create a product that has never been there before that is truly important for every user." -Dakshitaa Babu
"We can't always take our own sweet time to scan through every single file thoroughly before letting the user use it." -Dakshitaa Babu
"We want to make sure that before you give the file a chance to even penetrate to your local device or to your network... we want to be there first and give you a first line of defense." -Dakshitaa Babu
Resources:
Get your free Chrome plugin: http://sqrx.io/pw_x
https://www.linkedin.com/company/getsquarex/
https://twitter.com/getsquarex
https://www.instagram.com/getsquarex/
About the Guest:
Dakshitaa Babu is a Software Engineer at SquareX, where she is engaged in data engineering and analytics.
She is also the pen behind the engineering blogs written on SquareX's infrastructure and security research. After completing her Bachelor's degree at the National University of Singapore, Dakshitaa joined SquareX, marking her foray into the cybersecurity industry. While new to the field, her enthusiasm for discovering and understanding new concepts has quickly established her as a committed contributor to the evolving sector. Her interests are in Browser Security and consumer education.
Episode Summary:
In this captivating episode of The Phillip Wylie Show, cybersecurity enthusiasts witnessed a deep dive into the cutting-edge realm of in-browser malicious file detection with Dakshitaa Babu. Dakshitaa, showcasing her prowess in the industry, illustrates sophisticated features of her company's flagship cybersecurity product designed to enhance online safety.
Dakshitaa demonstrates the product's ability to detect malicious macros within files, emphasizing the significance of privacy in their detection methods which occur directly within the browser environment. Focusing primarily on Gmail due to its widespread use, she articulates how the product can reveal hidden dangers within office documents and macros. The episode highlights not only the detection of conventional threats but also uncovers tactics like file renaming, VBA purging, and old file format analysis to pinpoint potentially harmful activity.
The conversation shifts towards the efficiency and privacy advantages of in-browser detection. Dakshitaa explains how this approach offers immediate and private threat recognition compared to traditional methods. She confidently positions her company's product as a vital layer of defense, complementing existing antivirus solutions and empowering users with immediate insights into file safety before downloads occur.
Key Takeaways:
In-browser malicious file detection technology offers advanced privacy and fast analysis by scanning files directly within the email client.
Dakshitaa demoed the tech's proficiency in detecting renamed files, large file components, and outdated file formats—all indicative of potential malware.
The product integrates seamlessly with Gmail, providing users with immediate warnings and detailed insights into file contents without downloads.
Unique detection methods allow for identifying suspicious activities such as VBA purging, which can bypass some antivirus solutions.
The browser extension is free and compatible with all chromium-based browsers, encouraging user adoption for an added layer of cybersecurity.
Notable Quotes:
"We are going deeper than what surface level checks do in Gmail, for instance." -Dakshitaa Babu
"We have no idea why you're still using it in 2024." -Dakshitaa Babu
"We are trying to create a product that has never been there before that is truly important for every user." -Dakshitaa Babu
"We can't always take our own sweet time to scan through every single file thoroughly before letting the user use it." -Dakshitaa Babu
"We want to make sure that before you give the file a chance to even penetrate to your local device or to your network... we want to be there first and give you a first line of defense." -Dakshitaa Babu
Resources:
Get your free Chrome plugin: http://sqrx.io/pw_x
https://www.linkedin.com/company/getsquarex/
https://twitter.com/getsquarex
https://www.instagram.com/getsquarex/
02/13/24 • 34 min
Show more best episodes
Show more best episodes
FAQ
How many episodes does Phillip Wylie Show have?
Phillip Wylie Show currently has 126 episodes available.
What topics does Phillip Wylie Show cover?
The podcast is about Podcasts and Technology.
What is the most popular episode on Phillip Wylie Show?
The episode title 'Get To Know MITRE Engenuity With Maggie MacAlpine!' is the most popular.
What is the average episode length on Phillip Wylie Show?
The average episode length on Phillip Wylie Show is 37 minutes.
How often are episodes of Phillip Wylie Show released?
Episodes of Phillip Wylie Show are typically released every 5 days, 23 hours.
When was the first episode of Phillip Wylie Show?
The first episode of Phillip Wylie Show was released on Apr 30, 2023.
Show more FAQ
Show more FAQ