1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
A return to office means a return to email scams.

A return to office means a return to email scams.

Romain Basset, Director of Customer Service, at Vade joins Dave to discuss the threat of initial contact spearphishing emails now that many employees are returning to the office. Dave and Joe share s…
00:47:52  |   Thu 28 Jul 2022
Extortion scams and the LGBTQ+ community.

Extortion scams and the LGBTQ+ community.

This week, Carole Theriault sits down to talk with Paul Ducklin from Sophos on extortion scams targeting LGBTQ+ communities. Joe and Dave share multiple pieces of listener follow up, the first from M…
00:48:16  |   Thu 21 Jul 2022
Web 3.0 (noun)

Web 3.0 (noun)

The potential next evolution of the worldwide web that decentralizes interaction between users and content away from the big silicon valley social media platforms like Twitter, Facebook, and YouTube,…
00:07:00  |   Tue 19 Jul 2022
Behavioral science in the world of InfoSec.

Behavioral science in the world of InfoSec.

Kelly Shortridge, a Senior Principal from Fastly, joins Dave to discuss her talk at RSAC on why behavioral science and behavioral economics matters for InfoSec. Joe's story shares an old scam with a …
00:48:07  |   Thu 14 Jul 2022
Identity access management (IAM) (noun) [Word Notes]

Identity access management (IAM) (noun) [Word Notes]

A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio referen…
00:11:55  |   Tue 12 Jul 2022
Human errors and why they're made.

Human errors and why they're made.

Josh Yavor, CISO at Tessian, joins Dave to discuss a new report they released on cyber mistakes and why employees make them. Joe and Dave share a listener follow-up from Jon, who writes in about ment…
00:50:15  |   Thu 07 Jul 2022
Abstraction layer (noun) [Word Notes]

Abstraction layer (noun) [Word Notes]

A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link…
00:05:36  |   Tue 05 Jul 2022
The top 10 brand names most likely used in a phishing scheme.

The top 10 brand names most likely used in a phishing scheme.

Omer Dembinsky, a Data Research Manager from Check Point Research, joins Dave to discuss their Brand Phishing Report for Q1 2022 and how DHL, Maersk, and AliExpress were all in the top 10 list. Joe a…
00:44:09  |   Thu 30 Jun 2022
Identity Fabric (noun) [Word Notes]

Identity Fabric (noun) [Word Notes]

A set of services for managing identity and access management, or IAM across all of an organization's data islands. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-fabric Audio re…
00:06:45  |   Tue 28 Jun 2022
North Korea and a global cyber war.

North Korea and a global cyber war.

Carole Theriault interviews author and journalist Geoff White on his upcoming book, "The Lazarus Heist: From Hollywood to High Finance: Inside North Korea's Global Cyber War." Joe and Dave share some…
00:38:13  |   Thu 23 Jun 2022
Intrusion Kill Chain (noun) [Word Notes]

Intrusion Kill Chain (noun) [Word Notes]

A cybersecurity first principle strategy focused on disrupting known adversary activity at one of several phases of an attack sequence. CyberWire Glossary link: https://thecyberwire.com/glossary/intr…
00:07:46  |   Tue 21 Jun 2022
The great resignation and data exposure challenges.

The great resignation and data exposure challenges.

Abhik Mitra, Head of Portfolio Strategy at Code42, shares the findings on Code 42's 2022 Data Exposure Report (DER). Joe breaks down a story that follows a couple in Westlake, where the woman was cal…
00:51:53  |   Thu 16 Jun 2022
Identity Orchestration (noun) [Word Notes]

Identity Orchestration (noun) [Word Notes]

A subset of security orchestration, the management of identities across an organization's set of digital islands.  CyberWire Glossary link: https://thecyberwire.com/glossary/identity-orchestration
00:06:16  |   Tue 14 Jun 2022
What to look out for with scan-and-exploit cyber attacks.

What to look out for with scan-and-exploit cyber attacks.

Andrew Morris, founder and CEO of GreyNoise Intelligence, joins Dave to discuss the explosive increase in opportunistic scan-and-exploit cyber attacks, and what security analysts can do to combat it.…
00:47:21  |   Thu 09 Jun 2022
Diamond Model (noun) [Word Notes]

Diamond Model (noun) [Word Notes]

A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the a…
00:07:47  |   Tue 07 Jun 2022
Is ransomware getting too fast?

Is ransomware getting too fast?

Ryan Kovar, distinguished security strategist at Splunk and leader of SURGe, discusses the speed of ransomware, as well as the first-of-its-kind research the SURGe team is releasing on how quickly th…
00:48:50  |   Thu 02 Jun 2022
MITRE ATT&CK (noun) [Word Notes]

MITRE ATT&CK (noun) [Word Notes]

A knowledge base of adversary tactics, techniques, and procedures established and maintained by the MITRE Corporation.  CyberWire Glossary link: https://thecyberwire.com/glossary/mitre-attck Audio re…
00:07:43  |   Tue 31 May 2022
Combating social engineering.

Combating social engineering.

Ann Johnson, Security Executive at Microsoft and host of the afternoon cyber tea podcast, joins Dave to discuss social engineering and ways to help prevent it, as well as the different types of socia…
00:47:44  |   Thu 26 May 2022
DevOps (noun) [Word Notes]

DevOps (noun) [Word Notes]

The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: Audio reference link: "10+ Deploys…
00:07:30  |   Tue 24 May 2022
Voice authentication taking hold.

Voice authentication taking hold.

Mark Horne, Chief Marketing Officer at Pindrop, joins Dave to discuss voice authentication, Dave and Joe have some follow up about business phishing (BECs) from listeners Nick and Michael, Joe's stor…
00:48:02  |   Thu 19 May 2022
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.