1. EachPod
EachPod
Hacking Humans - Podcast

Hacking Humans

Deception, influence, and social engineering in the world of cyber crime.

Technology Tech News News
Update frequency
every 3 days
Average duration
26 minutes
Episodes
696
Years Active
2018 - 2025
Share to:
cybersecurity maturity model certification (CMMC) (noun) [Word Notes]

cybersecurity maturity model certification (CMMC) (noun) [Word Notes]

A supply chain cybersecurity accreditation standard designed for the protection of controlled unclassified information that the U.S. Department of Defense, or DoD, will require for all contract bids …
00:06:57  |   Tue 07 Sep 2021
Don't blindly test your colleagues.

Don't blindly test your colleagues.

Guest Javvad Malik from KnowBe4 shares his thoughts on bad security training with the CyberWire's UK correspondent Carole Theriault, Dave's story is about deepfake technology being used for business …
00:40:03  |   Thu 02 Sep 2021
incident response (noun) [Word Notes]

incident response (noun) [Word Notes]

A collection of people, process, and technology that provides an organization the ability to detect and respond to cyber attacks.
00:07:50  |   Tue 31 Aug 2021
Companies don't want their customers to be victims of fraud.

Companies don't want their customers to be victims of fraud.

Guest Brandon Hoffman from Intel 471 joins Dave to talk about how cybercriminals are going after large retail and hospitality companies, Joe shares some advice for college students to avoid scams and…
00:39:28  |   Thu 26 Aug 2021
script kiddies (noun) [Word Notes]

script kiddies (noun) [Word Notes]

Cybercriminals who lack the expertise to write their own programs use existing scripts, code, or tools authored by other more skilled hackers.
00:05:38  |   Tue 24 Aug 2021
Effective cybersecurity training has to be meaningful to employees.

Effective cybersecurity training has to be meaningful to employees.

Guest Jann Yogman, entertainment industry veteran and writer of Mimecast Awareness Training, joins Dave to share his thoughts on the ransomware epidemic and the cybersecurity awareness training probl…
00:36:32  |   Thu 19 Aug 2021
sandbox (noun) [Word Notes]

sandbox (noun) [Word Notes]

An isolated and controlled set of resources that mimics real world environments and used to safely execute suspicious code without infecting or causing damage to the host machine, operating system, o…
00:06:25  |   Tue 17 Aug 2021
The attackers keep coming every single day.

The attackers keep coming every single day.

Guest Andrew Rubin, CEO and co-founder of Illumio, joins Dave to discuss Zero Trust, Dave and Joe share some follow-up from several listeners including one with a variation on prison pen pals we disc…
00:45:09  |   Thu 12 Aug 2021
security orchestration, automation, and response (SOAR) (noun) [Word Notes]

security orchestration, automation, and response (SOAR) (noun) [Word Notes]

A stack of security software solutions and tools that allow organizations to orchestrate disparate internal and external tools which feed pre-built automation playbooks that respond to events or aler…
00:06:26  |   Tue 10 Aug 2021
Acceleration of our digital lives and impacts on cybercrime.

Acceleration of our digital lives and impacts on cybercrime.

Guest Darren Shou, Chief Technology Officer of NortonLifeLock, shares insight on some of the scams he and his colleagues have been tracking, Joe and Dave share some follow up from listener Robert abo…
00:43:52  |   Thu 05 Aug 2021
personally identifiable information (PII) (noun) [Word Notes]

personally identifiable information (PII) (noun) [Word Notes]

A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data.
00:07:26  |   Tue 03 Aug 2021
What are our devices doing to our compassion?

What are our devices doing to our compassion?

Guest Dr. Charles Chaffin, author of the book "Numb: How the Information Age Dulls Our Senses and How We Can Get them Back," joins Dave this week, we have some listener follow up from John with a tip…
00:46:42  |   Thu 29 Jul 2021
secure access service edge (SASE) (noun) [Word Notes]

secure access service edge (SASE) (noun) [Word Notes]

A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content…
00:08:25  |   Tue 27 Jul 2021
It's ok to be trusting, just be careful.

It's ok to be trusting, just be careful.

Guest Gil Friedrich from Avanan joins Dave to talk about how bad actors are infiltrating organizations using collaboration apps, we have two pieces of listener follow up from Michael and Tobias, Joe …
00:42:12  |   Thu 22 Jul 2021
red teaming (noun) [Word Notes]

red teaming (noun) [Word Notes]

The practice of emulating known adversary behavior against an organization's actual defensive posture.
00:06:26  |   Tue 20 Jul 2021
Threat actors changing ransomware tactics.

Threat actors changing ransomware tactics.

Guest Kurtis Minder from GroupSense joins Dave to discuss divergent ransomware trends, the guys have a listener reminder about it being CompTIA, Joe, Dave has a story about a coupon scam in the Houst…
00:40:41  |   Thu 15 Jul 2021
next generation firewall (noun) [Word Notes]

next generation firewall (noun) [Word Notes]

A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules…
00:07:27  |   Tue 13 Jul 2021
Introducing 8th Layer Insights: Deceptionology 101: Introduction to the Dark Arts

Introducing 8th Layer Insights: Deceptionology 101: Introduction to the Dark Arts

Have you ever noticed how fundamental deception is to the human condition? Deception and forms of social engineering have been with us since the beginning of recorded history. And yet, it seems like …
00:59:27  |   Sun 11 Jul 2021
Collaboration, data portability, and employee mobility fuel insider risk.

Collaboration, data portability, and employee mobility fuel insider risk.

Guest Joe Payne of Code 42 joins Dave to discuss insider risks Joe has a story about Frank Abagnale who's conned everyone one way or another, Dave's story is about a real estate scam conning a single…
00:41:12  |   Thu 08 Jul 2021
fast flux (noun) [Word Notes]

fast flux (noun) [Word Notes]

A network designed to obfuscate the location of a cyber adversary's command and control server by manipulating the domain name system, or DNS, in a way that rotates the associated IP address among la…
00:07:13  |   Tue 06 Jul 2021
Disclaimer: The podcast and artwork embedded on this page are the property of N2K Networks, Inc.. This content is not affiliated with or endorsed by eachpod.com.