“The Keyboard Doesn’t Lie”: A Conversation with Army Veteran Hacker, and Entrepreneur: Tyrone E. Wilson
From securing military networks as a soldier in the US Army, to building his own cybersecurity company, Tyrone E. Wilson recently joined us on the podcast to chat about his InfoSec journey. In this conversation, we explore a number of topics, including a formula for discovering your ‘dream job’, the skills veterans bring to the security industry, and how to combat the perception of ‘what a hacker should look like’. Tyrone also shares a free resource you can use to build your own Security Operations Center (SOC) and brush up on skills, such as threat hunting, intrusion detection, network security monitoring, and more – for free.
Listen to the full episode here.
This first of its kind Cybersecurity Training Ecosystem Map, published by AccessCyber, identifies and highlights key organizations preparing professionals for careers in security.
"This looks good... but you're not actually going to teach them how to hack, are you?" The head of the Computer Science department asks, almost in a whisper, as if she had said a 'bad' word. I had just pitched a cybersecurity course to a major university. They liked it, mostly... except for the title: Ethical Hacking.
These cybersecurity Discord servers provide a safe space to actively connect with the information security community.
Shaped by their experiences in traditional warfare, military veterans are uniquely positioned to leverage their skills in the battle against cyber crime.
Check out these Black Friday and Cyber Monday (2023) deals on your favorite cybersecurity / infosec gear and training, including: AppSecEngineer, Coursera, Hak5, edX, Protonmail, and many more.
Students and professionals have long turned to popular video site, YouTube, for entertaining and educational content — including cybersecurity & hacking tutorials.
This week, we're chatting about what happens when hacking tools become accessible to the masses. We've also got a fantastic guest on the show: Hacker, educator, entrepreneur, and author, Vivek Ramachandran.
In our fast-paced digital era, staying informed about the latest cybersecurity trends, news, and findings is more crucial than ever. It's the key to effectively safeguarding our digital lives and ensuring the security of our interconnected world.
In this scenario, the US Coast Guard discovers an unidentified signal near US waters. You play the role of an NSA employee providing technical assistance to the USCG to identify and investigate the unknown object producing the signal.
How do Palo Alto Networks SOC Analysts spend their work day? Find out.
If you’ve ever wanted to learn how to code, start here: this brief guide from Amos Wegner (@fasterthanlime) provides a quick, yet detailed guide for learning Rust — a programming language developed by Mozilla with an emphasis on safety and performance.
The recent release of VX-Underground’s Black Mass Volume II is the perfect mix of coloring book meets hacker manual — including human-generated artwork, a rarity in today’s AI-obsessed world.
What if you could achieve Splunk-like functionality without the hefty price tag? This open-source python script is intended to do just that.
On Episode 5 of the 2Factor Podcast: This week, we're chatting about how security practitioners are fighting FUD with FUN, what happens when Millennials lead your security organization, and the challenges of being a parody global CISO.
In a transformative departure from traditional hiring practices, an increasing number of companies are eliminating the requirement for college degrees as a condition of employment in cybersecurity roles.
Hundreds of cybersecurity leaders gathered at the Westin Times Square Hotel in New York City recently to attend SHIELD 2023.
Presentations from Zoho team members, Harish Sekar and Vivin Sathyan emphasized the link between IAM and Zero Trust as a formidable defense strategy against modern cyber threats. Discussion topics ranged from IAM implementation in cloud ecosystems to the pivotal role of adaptive authentication. Among other key takeaways, attendees learned about actionable steps they can take to gain visibility into their multi-cloud and hybrid environments, ensure their compliance with regulatory mandates, explore the benefits of MFA-powered SSO, and best practices for preventing privilege creep by implementing zero trust using role-based access control.
At BrainStation’s NYC Campus, a diverse panel of distinguished technology leaders recently shared their experiences and insights on what it takes to start and grow a successful career in various areas of technology — including software engineering, data science, and cybersecurity.