How CTF Culture Gamifies Your Way to Unbreakable Security Teams

How CTF Culture Gamifies Your Way to Unbreakable Security Teams

Can you spot the difference between real cybersecurity talent and someone using ChatGPT to fake their way through interviews? In this episode of The Audit, Thomas Rogers from Meta CTF reveals how Capture the Flag competitions are becoming the ultimate litmus test for authentic cyber skills—and why traditional hiring methods are failing in the AI era. Whether you're a CISO looking to revolutionize your hiring process, a security professional wanting to level up your skills, or just curio...

Tämä jakso on lisätty Podme-palveluun avoimen RSS-syötteen kautta eikä se ole Podmen omaa tuotantoa. Siksi jakso saattaa sisältää mainontaa.

Jaksot(92)

Security in the News: Architects, APIs, and Alaska

Security in the News: Architects, APIs, and Alaska

Digital security breaches continue to dominate headlines, with T-Mobile's recent API vulnerability exposing personal data from 37 million customer accounts marking their eighth major security incident...

6 Maalis 202352min

It’s a Pwnagotchi Party!

It’s a Pwnagotchi Party!

Join the IT Audit Labs crew to talk about Pwnagotchi’s! We will review how a pwnagotchi collects keys/wpa/wpa2 information from 4-way wifi handshakes, and how to crack those keys/how the key exchange ...

20 Helmi 202350min

Wireless Attack Kill Chain for n00bs with Dennis Pelton

Wireless Attack Kill Chain for n00bs with Dennis Pelton

Did you know that your Wi-fi is even vulnerable to attacks? Tune in to hear our guest, Dennis, talk about kill chain, DOS attacks, Wi-Fi reconnaissance, and more. For more information about relevant a...

6 Helmi 202345min

Tales from the Cybersecurity Trenches: Breaches, Badges and Backdoors

Tales from the Cybersecurity Trenches: Breaches, Badges and Backdoors

Breaches, phishing, attacker programming, and more, in this week of The Audit. Tales from the Trenches will talk about several scenarios our hosts have experienced with fraudulent situations, as well ...

23 Tammi 202336min

DC30 Vishing Competition Black Badge winners Team Spilt Beans

DC30 Vishing Competition Black Badge winners Team Spilt Beans

Vishing is happening constantly. Understanding what vishing is and being able to spot these tactics will help protect your information. The Audit presents three guests that won the DEFCON30 Vishing bl...

9 Tammi 202335min

Phishing, Smishing and Other Cybersecurity Threats

Phishing, Smishing and Other Cybersecurity Threats

Every click matters in the digital world, especially when cybercriminals are crafting increasingly sophisticated traps. Our latest deep dive into the murky waters of phishing, smishing, and digital de...

27 Joulu 202227min

Unquoted Service Paths: A Windows Vulnerability

Unquoted Service Paths: A Windows Vulnerability

Missing quotation marks might seem trivial, but in Windows service paths, they create serious security vulnerabilities that hackers actively exploit. This episode takes you through the mechanics of un...

12 Joulu 202235min

Personal Information Security Protection in a Modern Era, Part IV

Personal Information Security Protection in a Modern Era, Part IV

Digital threats lurk around every corner, but your strongest defense might be simpler than you think. We dive into the critical strategies for protecting your personal information in an age where data...

28 Marras 202235min