‘Being Fearless Online’ With SquareX Founder: Vivek Ramachandran
This week, we're chatting about what happens when hacking tools become accessible to the masses. We've also got a fantastic guest on the show: Hacker, educator, entrepreneur, and author, Vivek Ramachandran.
The Sound of Security: 50 Cybersecurity Podcasts Worth Listening To
In our fast-paced digital era, staying informed about the latest cybersecurity trends, news, and findings is more crucial than ever. It's the key to effectively safeguarding our digital lives and ensuring the security of our interconnected world.
Will the NSA Hire You if You Solve This Challenge?
In this scenario, the US Coast Guard discovers an unidentified signal near US waters. You play the role of an NSA employee providing technical assistance to the USCG to identify and investigate the unknown object producing the signal.
Day in the Life of a Palo Alto Networks SOC Analyst
How do Palo Alto Networks SOC Analysts spend their work day? Find out.
Turns Out You Can Learn A Programming Language in 30 Minutes
If you’ve ever wanted to learn how to code, start here: this brief guide from Amos Wegner (@fasterthanlime) provides a quick, yet detailed guide for learning Rust — a programming language developed by Mozilla with an emphasis on safety and performance.
Out Now: Black Mass Volume II From VX-Underground
The recent release of VX-Underground’s Black Mass Volume II is the perfect mix of coloring book meets hacker manual — including human-generated artwork, a rarity in today’s AI-obsessed world.
Can this Open Source Python Script Actually Replace Splunk?
What if you could achieve Splunk-like functionality without the hefty price tag? This open-source python script is intended to do just that.
Episode 5: Help! My CISO is a Millennial…
On Episode 5 of the 2Factor Podcast: This week, we're chatting about how security practitioners are fighting FUD with FUN, what happens when Millennials lead your security organization, and the challenges of being a parody global CISO.
No Degree? No Problem: 9 Companies Embracing Non-Traditional Paths to Cybersecurity Hiring
In a transformative departure from traditional hiring practices, an increasing number of companies are eliminating the requirement for college degrees as a condition of employment in cybersecurity roles.
SHIELD 2023: An IAM and Cybersecurity Seminar
Hundreds of cybersecurity leaders gathered at the Westin Times Square Hotel in New York City recently to attend SHIELD 2023.
Presentations from Zoho team members, Harish Sekar and Vivin Sathyan emphasized the link between IAM and Zero Trust as a formidable defense strategy against modern cyber threats. Discussion topics ranged from IAM implementation in cloud ecosystems to the pivotal role of adaptive authentication. Among other key takeaways, attendees learned about actionable steps they can take to gain visibility into their multi-cloud and hybrid environments, ensure their compliance with regulatory mandates, explore the benefits of MFA-powered SSO, and best practices for preventing privilege creep by implementing zero trust using role-based access control.
Technology Career Event Inspires Aspiring Professionals in New York City
At BrainStation’s NYC Campus, a diverse panel of distinguished technology leaders recently shared their experiences and insights on what it takes to start and grow a successful career in various areas of technology — including software engineering, data science, and cybersecurity.
Security…X? A New CompTIA Cybersecurity Certification
Coming 2024: The XPERT Series from CompTIA.
Free: Become a Splunk Certified Cybersecurity Defense Analyst
Splunk shows up on 68% of entry-level cybersecurity jobs ads. Now, you can take the beta Splunk Certified Cybersecurity Defense Analyst exam for free, and add a credential from a well-known cybersecurity organization to your resume. Learn more and sign up here.
Here's How to Host Your Own Encrypted Video Conferencing Solution
Updates to Zoom’s privacy policy — namely the suggested use of user data to train LLMs — have many folks scrambling for viable alternatives. One possible solution? Host your own private, encrypted video conference room.
Here's How to Leverage AI to Land Your Next Cybersecurity Job
Finding work can be hard work — particularly in cybersecurity, where it seems that one needs years of experience to qualify even for entry-level roles. Many of the steps in the job search process can be tedious, time consuming, and even anxiety-inducing. Enter Artificial Intelligence (AI).
Pete Strouse + Gotham Sharma on Solving Cybersecurity Training, Hiring, and Education Challenges
Pete Strouse, Founder and CEO of InfosecConnect interviews Gotham Sharma, Executive Director of Cybersecurity Education and Training at AccessCyber, about all things cybersecurity hiring, training, and education, as well as the challenges around what it means to actually be “in cybersecurity”.
Episode 3: Touring the Malware Museum and a Dark Web Exodus
On Episode 3 of the 2Factor Podcast: Our tribute to Kevin Mitnick - a hacker in the truest sense of the word. This week, we tour the Malware Museum, courtesy of the Internet Archive, and speculate about cybercrime's mass exodus from the Dark Web.
Also mentioned in the episode: TrustedSec, Binary Defense, Dave Kennedy, vx-underground, Amazon Alexa, Siri, Google Home, Telegram, OpenAI, ChatGPT, BleepingComputer
I Started Playing the Password Game — Six Hours ago
Neal Agarwal’s Password Game manages to poke interactive fun at the oftentimes cumbersome security requirements that plague us all — the seemingly minor, yet daily bane of our digital existence: passwords.
Episode 2: Aluminum Alloy Passwords, Malware.RIP, and Weaponizing AI
This week, we’re chatting about using aluminum alloy to secure your passwords, a useful resource called Malware.RIP, and how ChatGPT filters are being bypassed with creative prompting.
OpenAI Wants to Give You $1M For Your AI-Powered Cybersecurity Idea
The grant seeks to fund innovative defensive solutions that provide an advantage to cybersecurity professionals in the ongoing battle against cybercrime.