Security Explained
Chris Grayson, Drew Porter, Logan Lamb
All episodes
Best episodes
Seasons
Top 10 Security Explained Episodes
Goodpods has curated a list of the 10 best Security Explained episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Security Explained for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Security Explained episode by adding your comments to the episode page.
Security In The News May 2022
Security Explained
05/11/22 • 41 min
We cover 3 security related news events as well as 1 space related news event in this weeks episode.
From ransomware to NASA sending nudes into space, get your download of news that sparked our interest in this episode.
Radio Security & Ukraine
Security Explained
05/04/22 • 63 min
Join us as we discuss the black magic of radio communications! What is a radio? Why do phones have so many of them? After covering the basics of radio we delve into radio security (confidentiality/availability/integrity) and its implications with the war in Ukraine.
Twitch Hack, Facebook Outage, Epik Hack Part Deux, and Pandora Papers!
Security Explained
10/13/21 • 54 min
We weren't planning on it, but too much happened since our last episode to not do another security in the news episode! We'll be covering the Twitch hack, Facebook global outage, another Epik hack release from Anonymous, and the Pandora Papers.
Are Hack Back Attacks Whack??
Security Explained
01/23/23 • 48 min
In today's episode listen to Chris, Drew, and Logan struggle with the potential ramifications of companies retaliating against hackers by hacking them back!
How do you handle attribution? What about collateral damage?
Who in the world would actually notify the FBI prior to doing this??
Let's (potentially) find out in today's episode!
Vulnerability Research
Security Explained
06/09/21 • 60 min
It’s one of the more controversial topics within the information security realm - vulnerability research. It’s the practice of pulling software and services apart and finding how they were put together incorrectly. What you do with that research, whether it be submitting to a bug bounty, responsibly disclosing, or selling the information on an exploit broker, can seriously impact individuals and corporations. It’s an interesting topic with compelling arguments on most sides, and we’re going to dig into the details here today.
Social Engineering Gotchas
Security Explained
12/22/22 • 49 min
Join us as we walk through new and exciting developments in social engineering!
FTX/SBF deepfake link below - don't go to ftxcompensation.com
https://twitter.com/jason_koebler/status/1594720003923722240
Bonus content: Twilio is put on blast and we lament our AI laden future
Happy Holidays everybody!
Worms and Antivirus
Security Explained
10/27/21 • 58 min
With the spectacular new Dune movie just having been released, it's only appropriate to talk about one of the most devious of Internet malware denizens - worms!! While certainly technologically interesting, worms are some of the most destructive instances of malware to ever be created. What's more is that these days, worming technology is so ubiquitous that it's not something that even distinguishes malware from the pack!
Join us in this conversation about the trickiest of Internet beasts and the tool that is meant to (if unsuccessfully) protect against them!
Hacker Culture v. II - Security Conferences
Security Explained
08/04/21 • 56 min
With DEFCON about to start, we wanted to give folks a peek inside of what one should expect during a hacking conference as well as list some of our favorite conferences. From everyday tips and tricks for surviving the con to how to make the most of it, join us as we talk about hacker summer camp and more.
Security Consulting
Security Explained
05/26/21 • 52 min
Whether you're on the enterprise side looking to hire some short-term expertise, or on the consulting side looking to cut your teeth and learn some security chops, security consulting is an industry that receives a bit of well-deserved attention. That doesn't come without its drawbacks, though, and in this episode we discuss at length the pros and cons of security consulting and how it might benefit you. If you've ever thought about going down the road of being a security consultant, this episode is for you!
Bots Suck
Security Explained
11/04/22 • 48 min
Telling the difference between a user that's a program and a user that's a real human is a hard problem. It's also a problem that is growing in importance as more and more of our lives are subject to what happens online. We've seen incredibly successful PSYOPS campaigns, service outages, anti-competitive litigation, and myriad other harmful events occur as a direct result of automated abuse.
So what is a bot and how can you successfully deal with them? We share some of our best secrets for effectively dealing with these bad internet denizens in today's episode.
Show more best episodes
Show more best episodes
FAQ
How many episodes does Security Explained have?
Security Explained currently has 49 episodes available.
What topics does Security Explained cover?
The podcast is about Information Security, Security, Hacking, Podcasts, Technology, Cyber Security, Hacker and Government.
What is the most popular episode on Security Explained?
The episode title 'Bots Suck' is the most popular.
What is the average episode length on Security Explained?
The average episode length on Security Explained is 54 minutes.
How often are episodes of Security Explained released?
Episodes of Security Explained are typically released every 14 days.
When was the first episode of Security Explained?
The first episode of Security Explained was released on Aug 31, 2020.
Show more FAQ
Show more FAQ