Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
headphones
CYBER LIFE

CYBER LIFE

Ken Underhill

Welcome to the Cyber Life podcast, your one-stop destination for learning cybersecurity best practices to help you protect what matters most.

Join us to uncover expert tips to fortify your business and shield your loved ones from digital threats. But that's not all – elevate your cybersecurity career with insights that'll set you on a path to success.

Click subscribe and notifications to know when new episodes drop.

bookmark
Share icon

All episodes

Best episodes

Seasons

Top 10 CYBER LIFE Episodes

Goodpods has curated a list of the 10 best CYBER LIFE episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to CYBER LIFE for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite CYBER LIFE episode by adding your comments to the episode page.

Paweł Łakomski is an experienced IT professional with focus on IT security, cloud services and virtualization. Currently he is working for Microsoft where his responsibilities include Azure security and compliance. Paweł lives in Warsaw, Poland. In this episode, he shares his thoughts on using generative AI in cybersecurity and specifically in cloud security and SOCs.

Here are the resources he shares in this episode:

Microsoft Security Copilot: https://www.microsoft.com/en-us/security/business/ai-machine-learning/microsoft-security-copilot

Responsible AI principles: https://www.microsoft.com/en-gb/ai/responsible-ai

Microsoft AI-powered solutions: https://www.microsoft.com/en-gb/ai

Ask me a Question Here: https://topmate.io/ken_underhill

Get better at job interviews and build your confidence with this short course.

https://cyberken23.gumroad.com/l/jbilol/youtube20

If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.

Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd

Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.

https://www.stationx.net/cyberlife


Support this podcast at — https://redcircle.com/cyber-life/donations
bookmark
plus icon
share episode

In this episode, Chris Foulon shares his insight into how organizations can build cyber security 🔐 talent pipelines to fill their skill gaps.

Connect with Chris:

https://cpf-coaching.com/

https://www.linkedin.com/in/christophefoulon

Chris holds multiple industry certifications, like CISSP. He's a dedicated security practitioner who's passionate about helping businesses tackle their cybersecurity risks while minimizing friction, resulting in increased resiliency. Chris also focuses on securing people and processes, all with a solid understanding of the technology involved.

Chris is also the brains behind CPF-coaching.com, where he helps cybersecurity professionals enhance their leadership skills. He's an International best-selling author of "Hack the Cybersecurity Interview", a podcast host of Breaking into Cybersecurity, and a dedicated volunteer with organizations such as InfraGard, Security Tinkerers, the Whole Cyber Human Initiative, and Boots2Books.

Chris answers questions like these:

- How can organizations build a strong cybersecurity talent pipeline?

- What creative ways can organizations explore to bridge the cybersecurity talent gap?

- How can collaboration 🤝 between academia, industry, and professional organizations contribute to a more skilled and versatile cybersecurity workforce?

- How do organizations nurture existing cybersecurity professionals to help them grow 🚀 their careers?

Don't forget to hit that like button, subscribe to the channel for more insightful cyber security content, and ring the notification bell so you never miss an episode.

Ask a Question Here: https://topmate.io/ken_underhill

Learn how to be successful in job interviews in less than one hour, so you can get higher job offers.

https://cyberken23.gumroad.com/l/jbilol/youtube20

If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.

Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd

Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.

https://www.stationx.net/cyberlife

#cybersecurity #SecurityLeadership #infosec #collaboration #careergrowth #CultureBuilding


Support this podcast at — https://redcircle.com/cyber-life/donations
bookmark
plus icon
share episode

In this episode, Katoria Henry, a multi-award winning cloud security and technical resilience expert, discusses the importance of building a resilient cloud architecture.

Katoria covers the key concepts of cloud resilience, the challenges of building resilient cloud architectures, and best practices for overcoming these challenges.

Katoria also shares her personal experiences working with organizations to help them build resilient cloud architectures. She provides practical advice on how to design, deploy, and manage microservices-based applications in a way that minimizes the risk of outages and data breaches.

Whether you're a cloud architect, developer, or security professional, this video is essential viewing for anyone who wants to build resilient cloud applications.

Listen to this episode to learn:

What is cloud resilience?

The challenges of building resilient cloud architectures and how to overcome them.

Practical advice on how to design, deploy, and manage microservices-based applications in a way that minimizes the risk of outages and data breaches.

Get a discount on StationX cybersecurity courses here: https://www.stationx.net/cyberlife

cloud resilience, microservices, cloud architecture, cloud security, data breaches, outages


Support this podcast at — https://redcircle.com/cyber-life/donations
bookmark
plus icon
share episode

Cloud Phishing Attacks are on the rise globally. In this episode, you will learn from cybersecurity and cloud security expert, Ruchira Pokhriyal.

Ask me a question here: https://topmate.io/ken_underhill

Ruchira is a member of Amazon AWS's incident response (IR) team, where she plays a crucial role in maintaining security. Her impressive background includes expertise in web app penetration testing, cloud security, incident response, and digital forensics.

Ruchira is a well-rounded professional in the cybersecurity 🔒 world and is frequently seen at various conferences advocating for diversity, equity, inclusion, and supporting the LGBTQ+ and Neurodivergent communities.

The information shared in this episode is for educational purposes only. The views expressed here are Ruchira's personal opinions and do not reflect her employer's or any affiliated communities' official stances.

Cloud phishing encompasses a range of attacks that target cloud services like Google Drive, Dropbox, and OneDrive, aiming to deceive users into revealing their credentials. These attacks often come in the form of phishing emails, complete with fake login pages and a sense of urgency.

One common attack Ruchira discusses in this episode is credential phishing. Attackers impersonate trusted cloud service providers, sending emails claiming that the user's account has been compromised and demanding immediate attention. These emails contain links to fake login pages that closely mimic the legitimate ones, leading unsuspecting users to share their sensitive data.

She also talks about the CloudFormation Stack Phishing attack, which specifically targets AWS CloudFormation users. In this attack, the bad guys send emails impersonating AWS, tricking users into clicking malicious links that compromise their AWS CloudFormation resources.

Ruchira delves into Cloud Billing Phishing emails as well. These emails pose as billing departments of cloud service providers, creating a sense of urgency by claiming issues with your payment details. Users are directed to fake billing portals, where they unwittingly enter their payment information, providing attackers with sensitive data.

To protect against these attacks, Ruchira recommends several best practices. These include educating users about phishing attacks, verifying sender email addresses, avoiding clicking on suspicious links, enabling multi-factor authentication, and implementing email filtering and anti-phishing tools.

In this episode, you'll learn some prevention strategies and security best practices to fortify your cloud defenses. Whether you're an individual or an organization, this episode will empower you to take action and protect your digital assets.

📢 Hit that "Subscribe" button and ring the notification bell to stay updated on the latest Cyber Life podcast episodes, where I interview some of the top cybersecurity experts in the world.

And be sure to share this episode with your colleagues, friends, and family because together, we can build a safer digital world.

Ask me a question here: https://topmate.io/ken_underhill

In less than one hour, build confidence for your next job interview. Limited time 20% discount because you support the YouTube channel.

https://cyberken23.gumroad.com/l/jbilol/youtube20

Schedule a mock job interview call with me at this link. https://topmate.io/ken_underhill/411153

If you need cybersecurity training, here are some good resources. Please note that I earn a small affiliate commission if you sign up through these links for the training.

Learn Ethical Hacking skills https://get.haikuinc.io/crk0rg6li6qd

Get Ethical Hacking skills, SOC Analyst skills, and more through StationX.

https://www.stationx.net/cyberlife

Cloud phishing attacks, Phishing in cloud computing, Cloud email phishing, Cloud phishing prevention, Cloud security breaches, Cloud account phishing, Protecting against cloud phishing, Cloud credential phishing, Cloud data security, Cloud cybersecurity threats, Cloud-based email scams, Multi-factor authentication for cloud, Cloud billing phishing, CloudFormation Stack phishing, Detecting cloud phishing attempts, Cloud phishing awareness, Secure cloud data from phishing, Cloud service provider phishing, Cloud phishing best practices, Cloud phishing statistics


Support this podcast at — https://redcircle.com/cyber-life/donations
bookmark
plus icon
share episode
CYBER LIFE - Season 3 Episode 7 JOBS
play

03/26/20 • 11 min

👕 Get your official Cyber Life swag here: https://bit.ly/CyberLifeSwag

Subscribe to the Cyber Life TV YouTube Channel

https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug

Follow us on LinkedIn: https://www.linkedin.com/company/cyber-life

Follow us across other social media in the coming months as well.

👉 Facebook https://www.facebook.com/therealcyberlife

👉 InstaGram https://www.instagram.com/officialcyberlife/

👉 Twitter https://twitter.com/RealCyberLife

www.cyberlife.tv

In this episode, I will talk about the jobs that were tagged in a recent LinkedIn post. Also, the next several episodes of the podcast will focus on helping people find jobs in the industry.

Recruiters:

Renee Small

https://www.linkedin.com/in/reneebrownsmall/

Ric Christopher

https://www.linkedin.com/in/ric-christopher-a9570670/

Helen Hovey

https://www.linkedin.com/in/helen-hovey-hovey-7664a36/

Raj Mayank

https://www.linkedin.com/in/mayank-raj-84aa20117/

Pete Strouse (owns talent company)

https://www.linkedin.com/in/pete-strouse-b2193b42/

Neeraj Bhardwaj - [email protected]

Travis Ralph

https://www.linkedin.com/in/travis-ralph/

Eric W.

https://www.linkedin.com/in/-eric-w/

Kory Kiviharju

https://www.linkedin.com/in/kory-kiviharju-3ab457192/

Karl Sharman (not recruiter)

[email protected]

https://www.linkedin.com/in/karl-sharmancybersecurity/

Drew Klauser (not recruiter – offering resume review and practice interviews)

https://www.linkedin.com/in/drewklauser/

Craig Philip (friend has an ISSO role open)

https://www.linkedin.com/in/craig-philip/

John Haden (Trend Micro – not a recruiter but had knowledge of some openings)

https://www.linkedin.com/in/johndhaden/

Zolile Mvabaza (had some roles in South Africa)

https://www.linkedin.com/in/zolile-mvabaza-00599431/

Gargee Chatterjee (had a role in Ohio)

https://www.linkedin.com/in/gargee-chatterjee-869596174/

Caleb Mattingly (has roles open at Aleta Technologies)

https://www.linkedin.com/in/caleb-mattingly-a15b1343/

Nadica Hlechner (had some roles open in Austria)

https://www.linkedin.com/in/nhlechner/

Judy (JD) Cole

https://www.linkedin.com/in/judy-danielle-jd-cole-3ab787154/

Charlei P.

https://www.linkedin.com/in/charlei-p-8353a6a6/

COMPANIES

Mercury Systems

https://recruiting.adp.com/srccar/public/RTI.home?c=1162151&r=5000590579406&d=jobs.mrcy.com#/

Toronto-Dominion Bank

https://jobs.td.com/

Secure Strux (c...

bookmark
plus icon
share episode

👕 Get your official Cyber Life swag here: https://bit.ly/CyberLifeSwag

Subscribe to the Cyber Life TV YouTube Channel

https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug

Follow us on LinkedIn: https://www.linkedin.com/company/cyber-life

Follow us across other social media in the coming months as well.

👉 Facebook https://www.facebook.com/therealcyberlife

👉 InstaGram https://www.instagram.com/officialcyberlife/

👉 Twitter https://twitter.com/RealCyberLife

www.cyberlife.tv

In this episode, I'm joined by two industry veterans, Michael Farnum and Sam Van Ryder, as they discuss why they started up HOU.SEC.CON and how attending can benefit you.

Get your tickets to HOU.SEC.CON here:

https://www.eventbrite.com/e/houseccon-100-2020-sessions-tickets-75777136455

Connect with Michael and Sam via LinkedIn.

Michael Farnum

https://www.linkedin.com/in/mfarnum/

Sam Van Ryder

https://www.linkedin.com/in/svanryder/


Support this podcast at — https://redcircle.com/cyber-life/donations
bookmark
plus icon
share episode
CYBER LIFE - Season 2 Episode 4: Adriana Bito
play

12/23/19 • 10 min

👕 Get your official Cyber Life swag here: https://bit.ly/CyberLifeSwag

Subscribe to the Cyber Life TV YouTube Channel

https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug

Follow us on LinkedIn: https://www.linkedin.com/company/cyber-life

Follow us across other social media in the coming months as well.

👉 Facebook https://www.facebook.com/therealcyberlife

👉 InstaGram https://www.instagram.com/officialcyberlife/

👉 Twitter https://twitter.com/RealCyberLife

www.cyberlife.tv

As we approach the end of the year, many of us take time for personal reflection. Join Adriana Bito, Founder of H Consulting, and I in this episode, where we talk about being happier in your life.

Adriana worked internationally as an engineer, making great money, but something was missing.

Listen to this episode and learn to be happier in life. Life is too short not to be happy.

Connect with Adriana.

Website: https://www.honestym.com/

LinkedIn: https://www.linkedin.com/in/adriana-bito-honesty/

Subscribe on YouTube: https://www.youtube.com/channel/UCAZxg-LIokQUifcgaNVKsmA


Support this podcast at — https://redcircle.com/cyber-life/donations
bookmark
plus icon
share episode

👕 Get your official Cyber Life swag here: https://bit.ly/CyberLifeSwag

Subscribe to the Cyber Life TV YouTube Channel

https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug

Follow us on LinkedIn: https://www.linkedin.com/company/cyber-life

Follow us across other social media in the coming months as well.

👉 Facebook https://www.facebook.com/therealcyberlife

👉 InstaGram https://www.instagram.com/officialcyberlife/

👉 Twitter https://twitter.com/RealCyberLife

www.cyberlife.tv

Welcome to Episode 6 of the Cyber Life podcast, where I interview Vulnerability Management and Forensic expert, Corey Charles, PhD.

Corey owns his own consulting company, is an online educator, author, and mentors many people in the cybersecurity industry.

He is also a Martial Arts expert and family man.

What does Corey think are some of the keys to success in business?

..."Be led by helping others."

Tune in to hear some other Secret Advice on life and your career from Corey Charles.

Connect with Corey on LinkedIn

https://www.linkedin.com/in/corey-charles-08753323/

Check out Corey's books on Amazon

https://www.amazon.com/Corey-Charles/e/B07PZ1YG2J?ref=sr_ntt_srch_lnk_1&qid=1563132333&sr=8-1

Schedule a consultation for your business with Corey here

https://calendly.com/corey-charles


Support this podcast at — https://redcircle.com/cyber-life/donations
bookmark
plus icon
share episode
CYBER LIFE - Episode 15 Joe Perry "Certified Cool Guy"
play

05/14/20 • 24 min

👕 Get your official Cyber Life swag here: https://bit.ly/CyberLifeSwag

Subscribe to the Cyber Life TV YouTube Channel

https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug

Follow us on LinkedIn: https://www.linkedin.com/company/cyber-life

Follow us across other social media in the coming months as well.

👉 Facebook https://www.facebook.com/therealcyberlife

👉 InstaGram https://www.instagram.com/officialcyberlife/

👉 Twitter https://twitter.com/RealCyberLife

www.cyberlife.tv

Joe Perry joins us in this episode as we talk about his journey as a secret spy into his current role for Mandiant/FireEye.

Joe provides some great career advice and even shows a demonstration of some Python coding.


Support this podcast at — https://redcircle.com/cyber-life/donations
bookmark
plus icon
share episode
CYBER LIFE - Weekly Jobs Jan 22nd - Season 4 Episode 8
play

01/22/21 • 21 min

Weekly Job List

Please ping me jobs you know of via LinkedIn, so I can include them in this list.

👕 Get your official Cyber Life swag here: https://bit.ly/CyberLifeSwag

Subscribe to the Cyber Life TV YouTube Channel

https://www.youtube.com/channel/UCWpsCeUK8Wz58mFOm1vvGug

Follow us on LinkedIn: https://www.linkedin.com/company/cyber-life

Follow us across other social media in the coming months as well.

👉 Facebook https://www.facebook.com/therealcyberlife

👉 InstaGram https://www.instagram.com/officialcyberlife/

👉 Twitter https://twitter.com/RealCyberLife www.cyberlife.tv

Job/Course Links Mentioned in this Episode

Battleship free course

https://academy.battleshipsecurity.com/course/get_infosec_interviews

RangeForce

Has paid intern roles available

https://www.rangeforce.com/careers

Ultimate Software

Remote System Consultant

https://recruiting.ultipro.com/USG1006/JobBoard/dfc53730-57d1-3460-336f-ddafabd108f3/OpportunityDetail?opportunityId=865721a7-e656-4ffc-b65d-f944072fb1ba

  • 3-5 yrs experience implementing HRMS solutions
  • Project management skills
  • Custom service skills
  • Prior payroll implementation experience
  • Time Management skills
  • Communication skills
  • Motivated
  • Strong Excel knowledge

Cybersecurity Vulnerability Analyst

https://recruiting.ultipro.com/USG1006/JobBoard/dfc53730-57d1-3460-336f-ddafabd108f3/OpportunityDetail?opportunityId=5015ec69-cbc1-4e4d-82df-1cf20307ccb0

-Be current on CVEs

-Vulnerability assessments, reports, and remediation

-Communication skills

-RSA Archer a plus

-Programming/Scripting experience

-Hardening skills

Conquest Cyber

Linux Security Engineer -mid level role

https://www.linkedin.com/jobs/view/2377019536/

-Advanced Linux experience

-Development/Scripting experience

-Plus to have Golang and Elastic stack management experience

DevSecOps Engineer -mid level role

https://www.linkedin.com/jobs/view/2377021798/

-Advanced Linux experience

-Kubernetes experience

-Development/Scripting experience

-Plus to have Golang

Application Security Engineer- mid level role

https://www.linkedin.com/jobs/view/2386004317/

-Threat modeling

-Code review (Golang, .Net, Javascript)

-Investigating security defects found by SAST/DAST (static and dynamic code analysis)

Golang Developer- mid level role

https://www.linkedin.com/jobs/view/2361241990/

- Plus to have experience with Javascript frameworks - React.js, Next.js and other front end technology

Cloud Engineer - senior level role

https://www.linkedin.com/jobs/view/2371389170/

- Azure architecture

-8-10 years experience in security/cloud

- Plus to have CISSP, CISM, or Azure certs

Comcast

Customer Success Engineer

https://comcast.wd5.myworkdayjobs.com/Comcast_Careers/job/MD---Virtual---C/Customer-Success-Engineer_227757

-Python

-Windows AD

-Splunk

-IDS

-Linux Server - main skillset they want

Note: Lots of Product Manager roles open at Comcast as well.

Deloitte

------------------------------------------

Lots of jobs open, including some entry level

https://www2.deloitte.com/us/en.html


Support this podcast at — https://redcircle.com/cyber-life/donations
bookmark
plus icon
share episode

Show more best episodes

Toggle view more icon

FAQ

How many episodes does CYBER LIFE have?

CYBER LIFE currently has 91 episodes available.

What topics does CYBER LIFE cover?

The podcast is about News, Tech News, Podcasts and Technology.

What is the most popular episode on CYBER LIFE?

The episode title 'Episode 16: Ron Brash ICS/OT Expert' is the most popular.

What is the average episode length on CYBER LIFE?

The average episode length on CYBER LIFE is 29 minutes.

How often are episodes of CYBER LIFE released?

Episodes of CYBER LIFE are typically released every 6 days, 23 hours.

When was the first episode of CYBER LIFE?

The first episode of CYBER LIFE was released on Jun 19, 2019.

Show more FAQ

Toggle view more icon

Comments