Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
Phillip Wylie Show

Phillip Wylie Show

Phillip Wylie

Join Phillip Wylie Show host Phillip Wylie as he and his guests discuss the intriguing and ever-expanding field of cybersecurity, including topics from the offensive security side to the defensive and response sides of cybersecurity. Frequent offensive security topics include pentesting, red teaming, ethical hacking, security research, and bug bounties. Guests share their origin stories, tips, and career advice. Phillip and his guests discuss content creation and personal branding in this podcast. If you enjoyed Phillip's previous podcast, The Hacker Factory, you will love this!
bookmark
Share icon

All episodes

Best episodes

Seasons

Top 10 Phillip Wylie Show Episodes

Goodpods has curated a list of the 10 best Phillip Wylie Show episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Phillip Wylie Show for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Phillip Wylie Show episode by adding your comments to the episode page.

Phillip Wylie Show - Michael Jenks: Lessons from a Former DoD Professional

About the Guest:

Michael Jenks, commonly referred to as "Jenks," is an esteemed figure with an extensive background in the Department of Defense (DoD). With a penchant for cybersecurity and a wealth of experience in cyber warfare, Jenks offers a valuable skill set that has been honed in high-stakes environments where precision and accuracy are paramount. Having started his journey in computer science, he quickly developed a fascination with digital code and its impact. Transitioning from dial-up ISPs to L-3 Communications, where he gained clearance for classified work, Jenks eventually founded his own defense contracting company specializing in offensive and defensive cyber operations.

Episode Summary:

In this riveting episode of the Phillip Wylie Show, host Phillip examines the intersection of cybersecurity and defense backgrounds through his conversation with Michael Jenks from Interpris. The dynamic dialogue delves into how professionals from critical sectors, such as the Department of Defense, bring innovative solutions and meaningful perspectives to the cybersecurity industry.

Jenks shares his 'origin story,' which follows a trajectory starting from gaming and IRC administration, leading to a computer science degree and an impressive tenure at various defense-related roles. His story highlights a critical insight: that the best cybersecurity defenses are often forged in the crucible of real-world operations where the cost of failure is immense.

Central to the conversation, Jenks unravels the methodology behind Interpris—a platform designed to contextualize and elevate existing cybersecurity tools through continuous threat exposure management. Leveraging a thorough understanding of threat profiles, Interpris aims to help organizations prioritize potential risks based on industry, operations, and data sensitivity. The platform's philosophy is clear—fortify defenses by optimizing tools that organizations already possess, using informed strategies and continuous monitoring to proactively counter advanced cyber threats.

Key Takeaways:

Cyber professionals with DoD experience bring invaluable expertise to cybersecurity solutions.

Interpris focuses on improving an organization's security posture by providing context and strengthening existing tools.

Assume breach approach and implementing best practices are essential for a robust security posture.

Insider threats are as significant as external threat actors, making holistic security measures necessary.

The emergence of AI in both offensive and defensive cybersecurity tools is rapidly changing the landscape.

Notable Quotes:

"I mean, man, if you have it, background, a clearance, man, there are just a ton of jobs." -Michael Jenks

"From just the digital realm. Gamer growing up. Cut my teeth on hacking back in the day." -Michael Jenks

"You already have enough tools, right. It's really just that optimized configuration, that prioritization, that customization." -Michael Jenks

"It's my job to defend this environment. I have no idea where we're protected, where we're not." -Michael Jenks

"What we're doing is weaving together all of these products, from EDR, from network sensing, to firewall, to your ESM." Michael Jenks

Resources:

https://www.linkedin.com/in/michaeljenks/

https://www.linkedin.com/company/interpres-security/

https://twitter.com/InterpresSec

https://interpressecurity.com/

About the Guest:

Michael Jenks, commonly referred to as "Jenks," is an esteemed figure with an extensive background in the Department of Defense (DoD). With a penchant for cybersecurity and a wealth of experience in cyber warfare, Jenks offers a valuable skill set that has been honed in high-stakes environments where precision and accuracy are paramount. Having started his journey in computer science, he quickly developed a fascination with digital code and its impact. Transitioning from dial-up ISPs to L-3 Communications, where he gained clearance for classified work, Jenks eventually founded his own defense contracting company specializing in offensive and defensive cyber operations.

Episode Summary:

In this riveting episode of the Phillip Wylie Show, host Phillip examines the intersection of cybersecurity and defense backgrounds through his conversation with Michael Jenks from Interpris. The dynamic dialogue delves into how professionals from critical sectors, such as the Department of Defense, bring innovative solutions and meaningful perspectives to the cybersecurity industry.

Jenks shares his 'origin story,' which follows a trajectory starting from gaming and IRC administration, leading to a computer science degree and an impressive tenure at various defense-related roles. His story highlights a critical insight: that the best cybersecurity defenses are often forged in the crucible of real-world operations where the cost of failure is immense.

Central to the conversation, Jenks unravels the methodology behind Interpris—a platform designed to contextualize and elevate existing cybersecurity tools through continuous threat exposure management. Leveraging a thorough understanding of threat profiles, Interpris aims to help organizations prioritize potential risks based on industry, operations, and data sensitivity. The platform's philosophy is clear—fortify defenses by optimizing tools that organizations already possess, using informed strategies and continuous monitoring to proactively counter advanced cyber threats.

Key Takeaways:

Cyber professionals with DoD experience bring invaluable expertise to cybersecurity solutions.

Interpris focuses on improving an organization's security posture by providing context and strengthening existing tools.

Assume breach approach and implementing best practices are essential for a robust security posture.

Insider threats are as significant as external threat actors, making holistic security measures necessary.

The emergence of AI in both offensive and defensive cybersecurity tools is rapidly changing the landscape.

Notable Quotes:

"I mean, man, if you have it, background, a clearance, man, there are just a ton of jobs." -Michael Jenks

"From just the digital realm. Gamer growing up. Cut my teeth on hacking back in the day." -Michael Jenks

"You already have enough tools, right. It's really just that optimized configuration, that prioritization, that customization." -Michael Jenks

"It's my job to defend this environment. I have no idea where we're protected, where we're not." -Michael Jenks

"What we're doing is weaving together all of these products, from EDR, from network sensing, to firewall, to your ESM." Michael Jenks

Resources:

https://www.linkedin.com/in/michaeljenks/

https://www.linkedin.com/company/interpres-security/

https://twitter.com/InterpresSec

https://interpressecurity.com/

play

02/12/24 • 42 min

bookmark
plus icon
share episode
Phillip Wylie Show - Phillip Wylie Show Trailer

Phillip Wylie Show Trailer

Phillip Wylie Show

This trailer for the Phillip Wylie Show shares the topics discussed in episodes of the podcast.

This trailer for the Phillip Wylie Show shares the topics discussed in episodes of the podcast.

play

07/04/23 • 1 min

bookmark
plus icon
share episode
Phillip Wylie Show - The Art of Red Teaming with Shani Peled
About The Guest: Shani is a young and talented offensive security professional who has made a name for herself in the industry. With a background in computer science and physics, she started her cybersecurity journey in the Israeli intelligence course during her military service. After gaining valuable experience in the army, she joined CYE, where she currently works as a Red Teamer. Shani is passionate about helping organizations improve their security posture and enjoys the challenge of finding unique entry points and assessing real risks. Summary: In this episode, Phillip Wylie interviews Shani, a talented Red Teamer at CYE. Shani shares her journey into the cybersecurity world, starting with her military service in the Israeli intelligence course. She highlights the importance of hands-on training and the unique skills required to be successful in the Red Team industry. Shani also discusses the challenges faced by organizations in prioritizing vulnerabilities and assessing real risks. She emphasizes the need for Red Teamers to think like real attackers and understand the crown jewels of the organizations they are testing. Shani also dives into the world of cloud security and the common vulnerabilities she encounters during cloud assessments. She stresses the importance of proper cloud migration and the responsibility organizations have in securing their cloud environments. Throughout the conversation, Shani provides valuable insights and advice for aspiring Red Teamers, emphasizing the need for passion, creativity, and a deep understanding of the IT world. Key Takeaways: Prioritizing vulnerabilities and assessing real risks is a major challenge for organizations. Red Teamers should think like real attackers and understand the crown jewels of the organizations they are testing. Misconfigurations in storing technical secrets and exposed resources are common vulnerabilities in cloud environments. Proper cloud migration is crucial, and organizations have a responsibility to understand their cloud environment and secure it. Red Teamers should focus on reconnaissance and understand the techniques behind tools to be effective in their assessments. Shani's LinkedIn: https://www.linkedin.com/in/shani-peled-28b3211a3/ CYE LinkedIn and website: https://www.linkedin.com/company/cyesec/ https://cyesec.com/
About The Guest: Shani is a young and talented offensive security professional who has made a name for herself in the industry. With a background in computer science and physics, she started her cybersecurity journey in the Israeli intelligence course during her military service. After gaining valuable experience in the army, she joined CYE, where she currently works as a Red Teamer. Shani is passionate about helping organizations improve their security posture and enjoys the challenge of finding unique entry points and assessing real risks. Summary: In this episode, Phillip Wylie interviews Shani, a talented Red Teamer at CYE. Shani shares her journey into the cybersecurity world, starting with her military service in the Israeli intelligence course. She highlights the importance of hands-on training and the unique skills required to be successful in the Red Team industry. Shani also discusses the challenges faced by organizations in prioritizing vulnerabilities and assessing real risks. She emphasizes the need for Red Teamers to think like real attackers and understand the crown jewels of the organizations they are testing. Shani also dives into the world of cloud security and the common vulnerabilities she encounters during cloud assessments. She stresses the importance of proper cloud migration and the responsibility organizations have in securing their cloud environments. Throughout the conversation, Shani provides valuable insights and advice for aspiring Red Teamers, emphasizing the need for passion, creativity, and a deep understanding of the IT world. Key Takeaways: Prioritizing vulnerabilities and assessing real risks is a major challenge for organizations. Red Teamers should think like real attackers and understand the crown jewels of the organizations they are testing. Misconfigurations in storing technical secrets and exposed resources are common vulnerabilities in cloud environments. Proper cloud migration is crucial, and organizations have a responsibility to understand their cloud environment and secure it. Red Teamers should focus on reconnaissance and understand the techniques behind tools to be effective in their assessments. Shani's LinkedIn: https://www.linkedin.com/in/shani-peled-28b3211a3/ CYE LinkedIn and website: https://www.linkedin.com/company/cyesec/ https://cyesec.com/
play

07/04/23 • 27 min

bookmark
plus icon
share episode
Phillip Wylie Show - Get To Know MITRE Engenuity With Maggie MacAlpine!
​ Phillip welcomes Maggie MacAlpine of MITRE Engunity ( @mitreengenuity3171 ) to discuss MITRE Engunity and its cybersecurity initiatives. In addition to MITRE Engunity, in this episode, Maggie discusses election security. Connect with Maggie on social media: https://twitter.com/MaggieMacAlpine https://www.linkedin.com/in/margaretmacalpine/ MITRE Resources: https://mitre-engenuity.org/https://mitre-engenuity.org/cybersecurity/attack-evaluations/ https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/ https://mitre-engenuity.org/cybersecurity/mad/ https://attack.mitre.org/ https://twitter.com/MITREengenuity https://www.youtube.com/@UCGJjokBEqouIhVZvqnLQgYg If you enjoyed this podcast, check out Phillip's other podcast, The Hacker Factory: https://thehackerfactory.simplecast.com/ Connect with Phillip on social media, YouTube and visit his website: https://twitter.com/PhillipWylie https://www.linkedin.com/in/phillipwylie https://www.instagram.com/phillipwylie/ https://www.youtube.com/@phillipwylie https://www.thehackermaker.com/
​ Phillip welcomes Maggie MacAlpine of MITRE Engunity ( @mitreengenuity3171 ) to discuss MITRE Engunity and its cybersecurity initiatives. In addition to MITRE Engunity, in this episode, Maggie discusses election security. Connect with Maggie on social media: https://twitter.com/MaggieMacAlpine https://www.linkedin.com/in/margaretmacalpine/ MITRE Resources: https://mitre-engenuity.org/https://mitre-engenuity.org/cybersecurity/attack-evaluations/ https://mitre-engenuity.org/cybersecurity/center-for-threat-informed-defense/ https://mitre-engenuity.org/cybersecurity/mad/ https://attack.mitre.org/ https://twitter.com/MITREengenuity https://www.youtube.com/@UCGJjokBEqouIhVZvqnLQgYg If you enjoyed this podcast, check out Phillip's other podcast, The Hacker Factory: https://thehackerfactory.simplecast.com/ Connect with Phillip on social media, YouTube and visit his website: https://twitter.com/PhillipWylie https://www.linkedin.com/in/phillipwylie https://www.instagram.com/phillipwylie/ https://www.youtube.com/@phillipwylie https://www.thehackermaker.com/
play

05/31/23 • 26 min

bookmark
plus icon
share episode
Phillip Wylie Show - The Power of Bug Bounty Automation with Nenad Zaric

About The Guest(s):

Nenad Zarick is a cybersecurity expert and the founder of Trickest, a platform that automates offensive security workflows. With over 15 years of experience in the field, Nenad has a deep understanding of bug bounty programs and the importance of automation in cybersecurity.

Summary:

In this episode, Phillip interviews Nenad Zaric, the founder of Trickest, a platform that automates offensive security workflows. Nenad shares his background in cybersecurity and how he got started in bug bounty programs. He emphasizes the importance of automation in bug bounty and explains how Trickest can help bug hunters optimize their efforts. Nenad gives a live demo of the platform, showcasing its features and capabilities. He also discusses the scalability of the platform and the benefits of automation in the future of cybersecurity.

Key Takeaways: Bug bounty hunters need to automate their workflows to be successful.Trickest allows users to easily automate offensive security workflows without the need for manual scripting.The platform integrates various tools and provides a visual interface for building workflows.Users can schedule workflows and execute them on multiple machines for scalability.Automation is the key to the future of cybersecurity and can save time and improve efficiency.

Nenad's and Trickest's social media and website:

https://twitter.com/ZaricNenad_

https://www.linkedin.com/in/nenad-zaric/

https://twitter.com/trick3st

https://www.linkedin.com/company/trickest/

https://trickest.com/

About The Guest(s):

Nenad Zarick is a cybersecurity expert and the founder of Trickest, a platform that automates offensive security workflows. With over 15 years of experience in the field, Nenad has a deep understanding of bug bounty programs and the importance of automation in cybersecurity.

Summary:

In this episode, Phillip interviews Nenad Zaric, the founder of Trickest, a platform that automates offensive security workflows. Nenad shares his background in cybersecurity and how he got started in bug bounty programs. He emphasizes the importance of automation in bug bounty and explains how Trickest can help bug hunters optimize their efforts. Nenad gives a live demo of the platform, showcasing its features and capabilities. He also discusses the scalability of the platform and the benefits of automation in the future of cybersecurity.

Key Takeaways: Bug bounty hunters need to automate their workflows to be successful.Trickest allows users to easily automate offensive security workflows without the need for manual scripting.The platform integrates various tools and provides a visual interface for building workflows.Users can schedule workflows and execute them on multiple machines for scalability.Automation is the key to the future of cybersecurity and can save time and improve efficiency.

Nenad's and Trickest's social media and website:

https://twitter.com/ZaricNenad_

https://www.linkedin.com/in/nenad-zaric/

https://twitter.com/trick3st

https://www.linkedin.com/company/trickest/

https://trickest.com/

play

06/30/23 • 34 min

bookmark
plus icon
share episode
Phillip Wylie Show - Talking Content Creation and Marketing with Zach Hill
Zach Hill, content creator and marketer at TCM Academy and TCM Security, joined Philip Wylie on the Philip Wylie Show to discuss the significance of content creation and marketing in the cybersecurity industry. Hill emphasized that content creation is about helping the community by providing unique perspectives on cybersecurity topics. He highlighted the importance of social engineering, which hasn't changed in the last 24 years. Hill shared his transition from web development and search engine optimization to infrastructure and YouTube. Hill and his colleague, Heath, recently released a course, Practical Career Ready Professional, which teaches soft skills, technical skills, marketing skills, branding skills, and other skills necessary for success in the industry. Hill emphasized the need to be involved in social networks and put oneself out there, sharing success stories of individuals who found new or better employment through social networks. Hill stressed that soft skills are often overlooked but can give individuals an edge over their peers. Companies are starting to realize the value of video content creation and social media marketing and are using it as a cheaper form of advertising. Hill's YouTube channel started as a way to help people, and he never expected it to evolve the way it did. He shared a personal experience of how social media and networking can lead to job opportunities. Hill advised that finding a purpose for content creation is key, and recording the first video is always tough, but it is necessary to start somewhere. The value of providing genuine content to help people is crucial, and it can lead to a more solid brand and wider acceptance. Hill's goal is to see people succeed and do better than him, and he encourages individuals to never give up and take the first step. Zach's social media, website, and YouTube: https://www.linkedin.com/in/iamnerdy/ https://www.youtube.com/itcareerquestions https://iamnerdy.net/
Zach Hill, content creator and marketer at TCM Academy and TCM Security, joined Philip Wylie on the Philip Wylie Show to discuss the significance of content creation and marketing in the cybersecurity industry. Hill emphasized that content creation is about helping the community by providing unique perspectives on cybersecurity topics. He highlighted the importance of social engineering, which hasn't changed in the last 24 years. Hill shared his transition from web development and search engine optimization to infrastructure and YouTube. Hill and his colleague, Heath, recently released a course, Practical Career Ready Professional, which teaches soft skills, technical skills, marketing skills, branding skills, and other skills necessary for success in the industry. Hill emphasized the need to be involved in social networks and put oneself out there, sharing success stories of individuals who found new or better employment through social networks. Hill stressed that soft skills are often overlooked but can give individuals an edge over their peers. Companies are starting to realize the value of video content creation and social media marketing and are using it as a cheaper form of advertising. Hill's YouTube channel started as a way to help people, and he never expected it to evolve the way it did. He shared a personal experience of how social media and networking can lead to job opportunities. Hill advised that finding a purpose for content creation is key, and recording the first video is always tough, but it is necessary to start somewhere. The value of providing genuine content to help people is crucial, and it can lead to a more solid brand and wider acceptance. Hill's goal is to see people succeed and do better than him, and he encourages individuals to never give up and take the first step. Zach's social media, website, and YouTube: https://www.linkedin.com/in/iamnerdy/ https://www.youtube.com/itcareerquestions https://iamnerdy.net/
play

06/22/23 • 34 min

bookmark
plus icon
share episode
Phillip Wylie Show - Insights from Evan Ottinger on Building Skills, Networking, and Job Hunting
Phillip's guest in this episode is Evan Ottinger, a senior security engineer at TCM Security. Evan shares his background and journey in the technology field. Evan shares his experience in the military as a Middle Eastern linguist and how it sparked his interest in cybersecurity. He emphasizes the importance of foundational knowledge and hands-on experience in systems administration. The conversation also touches upon resources for learning, including Professor Messer's free YouTube (@professormessercontent) and platforms like TryHackMe. They discuss the benefits of networking, attending conferences, and local meetups for career opportunities. The interview concludes with a reflection on the challenges of job hunting and the need for more realistic job listings in the industry. Overall, the conversation highlights the value of diverse skills, continuous learning, and building connections within the cybersecurity field. Evan's LinkedIn: https://www.linkedin.com/in/eottinger/
Phillip's guest in this episode is Evan Ottinger, a senior security engineer at TCM Security. Evan shares his background and journey in the technology field. Evan shares his experience in the military as a Middle Eastern linguist and how it sparked his interest in cybersecurity. He emphasizes the importance of foundational knowledge and hands-on experience in systems administration. The conversation also touches upon resources for learning, including Professor Messer's free YouTube (@professormessercontent) and platforms like TryHackMe. They discuss the benefits of networking, attending conferences, and local meetups for career opportunities. The interview concludes with a reflection on the challenges of job hunting and the need for more realistic job listings in the industry. Overall, the conversation highlights the value of diverse skills, continuous learning, and building connections within the cybersecurity field. Evan's LinkedIn: https://www.linkedin.com/in/eottinger/
play

06/09/23 • 25 min

bookmark
plus icon
share episode
Phillip Wylie Show - Maxie Reynolds: From hacker to underwater data center entrepeneur

About The Guest:Maxie Reynolds is a former offshore oil and gas worker turned entrepreneur. She is the founder and CEO of a company that specializes in placing data centers underwater, reducing cooling costs and carbon emissions. Maxie is also a stuntwoman and has a background in robotics and computer science.

Summary:Maxie Reynolds shares her journey from working offshore in the oil and gas industry to becoming an entrepreneur in the data center industry. She discusses the challenges she faced and the lessons she learned along the way. Maxie explains how her company solves the problem of high cooling costs and carbon emissions by placing data centers underwater. She also addresses misconceptions about the environmental impact of data centers and the importance of sustainability.

Key Takeaways:

  • Maxie Reynolds started her career as an offshore oil and gas worker before transitioning to cybersecurity and eventually founding her own company.
  • Placing data centers underwater reduces cooling costs by 40% and eliminates the need for electrically driven cooling systems.
  • Data centers placed underwater also reduce carbon emissions by 750 tons per megawatt hour of electricity used.
  • Water has a higher specific heat than air, making it a more efficient heat sink and preventing the surrounding water from heating up significantly.
  • Maxie emphasizes the importance of acknowledging the realities of sustainability and finding innovative solutions to address them.

Quotes:

  • "Whatever you want to do as a female, try, go, try, do it, and see how far you get." - Maxie Reynolds
  • "To have a good company, you have to be solving a problem." - Maxie Reynolds
  • "We are reliant on fossil fuel in every single way." - Maxie Reynolds
  • "There's no incentive to use our commodities efficiently." - Maxie Reynolds
  • "Reach out to people that you think are smart, even if they aren't in your circle, and start to find some of the right answers." - Maxie Reynolds

Socials and Resources:

⁠https://twitter.com/SubseaCloud⁠

⁠https://www.linkedin.com/in/maxiereynolds/⁠

Book: The Art of Attack: Attacker Mindset for Security Professionals: ⁠https://www.wiley.com/en-us/The+Art+of+Attack%3A+Attacker+Mindset+for+Security+Professionals-p-9781119805472⁠

About The Guest:Maxie Reynolds is a former offshore oil and gas worker turned entrepreneur. She is the founder and CEO of a company that specializes in placing data centers underwater, reducing cooling costs and carbon emissions. Maxie is also a stuntwoman and has a background in robotics and computer science.

Summary:Maxie Reynolds shares her journey from working offshore in the oil and gas industry to becoming an entrepreneur in the data center industry. She discusses the challenges she faced and the lessons she learned along the way. Maxie explains how her company solves the problem of high cooling costs and carbon emissions by placing data centers underwater. She also addresses misconceptions about the environmental impact of data centers and the importance of sustainability.

Key Takeaways:

  • Maxie Reynolds started her career as an offshore oil and gas worker before transitioning to cybersecurity and eventually founding her own company.
  • Placing data centers underwater reduces cooling costs by 40% and eliminates the need for electrically driven cooling systems.
  • Data centers placed underwater also reduce carbon emissions by 750 tons per megawatt hour of electricity used.
  • Water has a higher specific heat than air, making it a more efficient heat sink and preventing the surrounding water from heating up significantly.
  • Maxie emphasizes the importance of acknowledging the realities of sustainability and finding innovative solutions to address them.

Quotes:

  • "Whatever you want to do as a female, try, go, try, do it, and see how far you get." - Maxie Reynolds
  • "To have a good company, you have to be solving a problem." - Maxie Reynolds
  • "We are reliant on fossil fuel in every single way." - Maxie Reynolds
  • "There's no incentive to use our commodities efficiently." - Maxie Reynolds
  • "Reach out to people that you think are smart, even if they aren't in your circle, and start to find some of the right answers." - Maxie Reynolds

Socials and Resources:

⁠https://twitter.com/SubseaCloud⁠

⁠https://www.linkedin.com/in/maxiereynolds/⁠

Book: The Art of Attack: Attacker Mindset for Security Professionals: ⁠https://www.wiley.com/en-us/The+Art+of+Attack%3A+Attacker+Mindset+for+Security+Professionals-p-9781119805472⁠

play

11/21/23 • 36 min

bookmark
plus icon
share episode
Phillip Wylie Show - John Woodling: The Power of Community and Self Learning

About the Guest:

John Woodling is a seasoned cybersecurity expert with seven years of experience in the industry. He currently holds the position of Senior Information Security Analyst. John has a diverse background that includes a blend of hands-on technical expertise and a profound understanding of different cybersecurity domains. As a member of the DFW Cybersecurity community and DEFCON 940 Group in Denton, Texas, John is known for his mentorship and willingness to share his insights. With an initial career path in art and finance, John’s journey into cybersecurity showcases his passion and curiosity for technology and security.

Episode Summary:

Welcome to another insightful episode of the Phillip Wylie Show! In this episode, Phillip sits down with John Woodling, a prominent figure in the DFW Cybersecurity community and an adept Senior Information Security Analyst. John shares his journey into the world of cybersecurity, providing invaluable advice for those looking to transition into this ever-evolving field. Known for his deep knowledge and practical experience, John offers listeners a comprehensive look into the necessary skills, potential career paths, and the importance of community in cybersecurity.

The conversation delves into different entry points into the cybersecurity industry, emphasizing the significance of hands-on learning, certifications, and networking. John discusses the transformation of cybersecurity from a niche technical field into a widespread and essential discipline, highlighting various roles like GRC, red teaming, and social engineering. He also reflects on his personal career choices and lessons learned, offering today’s aspiring cybersecurity professionals actionable advice and encouragement. Additionally, the episode touches upon the evolving job market, the importance of diverse backgrounds, and the role of modern resources like bug bounties in global talent development.

Key Takeaways:

  • Evolving Cybersecurity Landscape: Cybersecurity has transitioned from a specialized technical field to a broad industry encompassing various roles, making it accessible to people with diverse backgrounds.
  • Importance of Networking and Community: Building relationships and engaging with community members can significantly enhance career opportunities and knowledge sharing.
  • Hands-On Learning and Certification: Practical experience and certifications remain crucial in breaking into the cybersecurity field, with resources more accessible than ever.
  • Career Advice for Aspiring Professionals: John emphasizes understanding networking fundamentals and finding accessible, high-quality training programs that offer real-world applicability.
  • Global Opportunities with Technology: Modern technological advancements and resources like bug bounties provide opportunities for individuals worldwide, potentially mitigating the need for unethical hacking behaviors.

Notable Quotes:

  • "I think that there's a lot of room for a lot of different individuals."
  • "Nobody knows anything. I thought you all knew everything."
  • "It's a way that I can connect with people, and talk to them about these things."
  • "I think today is definitely, it feels more of a trade than it does the traditional white-collar position that it was 20 years ago."
  • "You belong. That would be the big piece to it."

Resources

https://x.com/statictear

https://www.linkedin.com/in/johnwoodling/

DC940 Discord https://discord.gg/DDZEnFHFbt

About the Guest:

John Woodling is a seasoned cybersecurity expert with seven years of experience in the industry. He currently holds the position of Senior Information Security Analyst. John has a diverse background that includes a blend of hands-on technical expertise and a profound understanding of different cybersecurity domains. As a member of the DFW Cybersecurity community and DEFCON 940 Group in Denton, Texas, John is known for his mentorship and willingness to share his insights. With an initial career path in art and finance, John’s journey into cybersecurity showcases his passion and curiosity for technology and security.

Episode Summary:

Welcome to another insightful episode of the Phillip Wylie Show! In this episode, Phillip sits down with John Woodling, a prominent figure in the DFW Cybersecurity community and an adept Senior Information Security Analyst. John shares his journey into the world of cybersecurity, providing invaluable advice for those looking to transition into this ever-evolving field. Known for his deep knowledge and practical experience, John offers listeners a comprehensive look into the necessary skills, potential career paths, and the importance of community in cybersecurity.

The conversation delves into different entry points into the cybersecurity industry, emphasizing the significance of hands-on learning, certifications, and networking. John discusses the transformation of cybersecurity from a niche technical field into a widespread and essential discipline, highlighting various roles like GRC, red teaming, and social engineering. He also reflects on his personal career choices and lessons learned, offering today’s aspiring cybersecurity professionals actionable advice and encouragement. Additionally, the episode touches upon the evolving job market, the importance of diverse backgrounds, and the role of modern resources like bug bounties in global talent development.

Key Takeaways:

  • Evolving Cybersecurity Landscape: Cybersecurity has transitioned from a specialized technical field to a broad industry encompassing various roles, making it accessible to people with diverse backgrounds.
  • Importance of Networking and Community: Building relationships and engaging with community members can significantly enhance career opportunities and knowledge sharing.
  • Hands-On Learning and Certification: Practical experience and certifications remain crucial in breaking into the cybersecurity field, with resources more accessible than ever.
  • Career Advice for Aspiring Professionals: John emphasizes understanding networking fundamentals and finding accessible, high-quality training programs that offer real-world applicability.
  • Global Opportunities with Technology: Modern technological advancements and resources like bug bounties provide opportunities for individuals worldwide, potentially mitigating the need for unethical hacking behaviors.

Notable Quotes:

  • "I think that there's a lot of room for a lot of different individuals."
  • "Nobody knows anything. I thought you all knew everything."
  • "It's a way that I can connect with people, and talk to them about these things."
  • "I think today is definitely, it feels more of a trade than it does the traditional white-collar position that it was 20 years ago."
  • "You belong. That would be the big piece to it."

Resources

https://x.com/statictear

https://www.linkedin.com/in/johnwoodling/

DC940 Discord https://discord.gg/DDZEnFHFbt

play

06/11/24 • 36 min

bookmark
plus icon
share episode
Phillip Wylie Show - Be Fearless Online: In Browser Malicious File Detection Part 2

About the Guest:

Dakshitaa Babu is a Software Engineer at SquareX, where she is engaged in data engineering and analytics.

She is also the pen behind the engineering blogs written on SquareX's infrastructure and security research. After completing her Bachelor's degree at the National University of Singapore, Dakshitaa joined SquareX, marking her foray into the cybersecurity industry. While new to the field, her enthusiasm for discovering and understanding new concepts has quickly established her as a committed contributor to the evolving sector. Her interests are in Browser Security and consumer education.

Episode Summary:

In this captivating episode of The Phillip Wylie Show, cybersecurity enthusiasts witnessed a deep dive into the cutting-edge realm of in-browser malicious file detection with Dakshitaa Babu. Dakshitaa, showcasing her prowess in the industry, illustrates sophisticated features of her company's flagship cybersecurity product designed to enhance online safety.

Dakshitaa demonstrates the product's ability to detect malicious macros within files, emphasizing the significance of privacy in their detection methods which occur directly within the browser environment. Focusing primarily on Gmail due to its widespread use, she articulates how the product can reveal hidden dangers within office documents and macros. The episode highlights not only the detection of conventional threats but also uncovers tactics like file renaming, VBA purging, and old file format analysis to pinpoint potentially harmful activity.

The conversation shifts towards the efficiency and privacy advantages of in-browser detection. Dakshitaa explains how this approach offers immediate and private threat recognition compared to traditional methods. She confidently positions her company's product as a vital layer of defense, complementing existing antivirus solutions and empowering users with immediate insights into file safety before downloads occur.

Key Takeaways:

In-browser malicious file detection technology offers advanced privacy and fast analysis by scanning files directly within the email client.

Dakshitaa demoed the tech's proficiency in detecting renamed files, large file components, and outdated file formats—all indicative of potential malware.

The product integrates seamlessly with Gmail, providing users with immediate warnings and detailed insights into file contents without downloads.

Unique detection methods allow for identifying suspicious activities such as VBA purging, which can bypass some antivirus solutions.

The browser extension is free and compatible with all chromium-based browsers, encouraging user adoption for an added layer of cybersecurity.

Notable Quotes:

"We are going deeper than what surface level checks do in Gmail, for instance." -Dakshitaa Babu

"We have no idea why you're still using it in 2024." -Dakshitaa Babu

"We are trying to create a product that has never been there before that is truly important for every user." -Dakshitaa Babu

"We can't always take our own sweet time to scan through every single file thoroughly before letting the user use it." -Dakshitaa Babu

"We want to make sure that before you give the file a chance to even penetrate to your local device or to your network... we want to be there first and give you a first line of defense." -Dakshitaa Babu

Resources:

Get your free Chrome plugin: ⁠⁠⁠http://sqrx.io/pw_x⁠⁠⁠

⁠⁠⁠https://www.linkedin.com/company/getsquarex/⁠⁠⁠

⁠⁠⁠https://twitter.com/getsquarex⁠⁠⁠

⁠⁠⁠https://www.instagram.com/getsquarex/

About the Guest:

Dakshitaa Babu is a Software Engineer at SquareX, where she is engaged in data engineering and analytics.

She is also the pen behind the engineering blogs written on SquareX's infrastructure and security research. After completing her Bachelor's degree at the National University of Singapore, Dakshitaa joined SquareX, marking her foray into the cybersecurity industry. While new to the field, her enthusiasm for discovering and understanding new concepts has quickly established her as a committed contributor to the evolving sector. Her interests are in Browser Security and consumer education.

Episode Summary:

In this captivating episode of The Phillip Wylie Show, cybersecurity enthusiasts witnessed a deep dive into the cutting-edge realm of in-browser malicious file detection with Dakshitaa Babu. Dakshitaa, showcasing her prowess in the industry, illustrates sophisticated features of her company's flagship cybersecurity product designed to enhance online safety.

Dakshitaa demonstrates the product's ability to detect malicious macros within files, emphasizing the significance of privacy in their detection methods which occur directly within the browser environment. Focusing primarily on Gmail due to its widespread use, she articulates how the product can reveal hidden dangers within office documents and macros. The episode highlights not only the detection of conventional threats but also uncovers tactics like file renaming, VBA purging, and old file format analysis to pinpoint potentially harmful activity.

The conversation shifts towards the efficiency and privacy advantages of in-browser detection. Dakshitaa explains how this approach offers immediate and private threat recognition compared to traditional methods. She confidently positions her company's product as a vital layer of defense, complementing existing antivirus solutions and empowering users with immediate insights into file safety before downloads occur.

Key Takeaways:

In-browser malicious file detection technology offers advanced privacy and fast analysis by scanning files directly within the email client.

Dakshitaa demoed the tech's proficiency in detecting renamed files, large file components, and outdated file formats—all indicative of potential malware.

The product integrates seamlessly with Gmail, providing users with immediate warnings and detailed insights into file contents without downloads.

Unique detection methods allow for identifying suspicious activities such as VBA purging, which can bypass some antivirus solutions.

The browser extension is free and compatible with all chromium-based browsers, encouraging user adoption for an added layer of cybersecurity.

Notable Quotes:

"We are going deeper than what surface level checks do in Gmail, for instance." -Dakshitaa Babu

"We have no idea why you're still using it in 2024." -Dakshitaa Babu

"We are trying to create a product that has never been there before that is truly important for every user." -Dakshitaa Babu

"We can't always take our own sweet time to scan through every single file thoroughly before letting the user use it." -Dakshitaa Babu

"We want to make sure that before you give the file a chance to even penetrate to your local device or to your network... we want to be there first and give you a first line of defense." -Dakshitaa Babu

Resources:

Get your free Chrome plugin: ⁠⁠⁠http://sqrx.io/pw_x⁠⁠⁠

⁠⁠⁠https://www.linkedin.com/company/getsquarex/⁠⁠⁠

⁠⁠⁠https://twitter.com/getsquarex⁠⁠⁠

⁠⁠⁠https://www.instagram.com/getsquarex/

play

02/13/24 • 34 min

bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does Phillip Wylie Show have?

Phillip Wylie Show currently has 126 episodes available.

What topics does Phillip Wylie Show cover?

The podcast is about Podcasts and Technology.

What is the most popular episode on Phillip Wylie Show?

The episode title 'Get To Know MITRE Engenuity With Maggie MacAlpine!' is the most popular.

What is the average episode length on Phillip Wylie Show?

The average episode length on Phillip Wylie Show is 37 minutes.

How often are episodes of Phillip Wylie Show released?

Episodes of Phillip Wylie Show are typically released every 5 days, 23 hours.

When was the first episode of Phillip Wylie Show?

The first episode of Phillip Wylie Show was released on Apr 30, 2023.

Show more FAQ

Toggle view more icon

Comments