![Hustling the hustlers. [Hacking Humans Goes to the Movies]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
Hustling the hustlers. [Hacking Humans Goes to the Movies]
Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joi...
20 Helmi 202221min

Vulnerabilities will be found.
Guest Deral Heiland from Rapid7 talks with our UK Correspondent Carole Theriault about the state of IOT, Joe shares a personal story about bank checks and a debit card received at his home that were i...
17 Helmi 202247min
![OWASP security logging and monitoring failures (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
OWASP security logging and monitoring failures (noun) [Word Notes]
The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system.
15 Helmi 20226min

If you wish for peace, prepare for cyberwar.
Guest Nick Shevelyov, Chief Security Officer for Silicon Valley Bank. joins Dave sharing some personal history around security, and discussing his book "Cyber War… and Peace," Dave and Joe have some f...
10 Helmi 202249min
![OWASP identification and authentication failures (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
OWASP identification and authentication failures (noun) [Word Notes]
Ineffectual confirmation of a user's identity or authentication in session management.
8 Helmi 20225min
![How to talk your way in anywhere. [Hacking Humans Goes to the Movies]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
How to talk your way in anywhere. [Hacking Humans Goes to the Movies]
Thanks for joining us for the latest episode of our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joi...
6 Helmi 202222min

The ransomware game has evolved.
Guest Allan Liska from Recorded Future joins Dave to discuss the evolution of ransomware and his new book "Ransomware: Understand. Prevent. Recover," Joe shares a question from listener Joan about an ...
3 Helmi 202252min
![OWASP broken access control (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
OWASP broken access control (noun) [Word Notes]
Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.
1 Helmi 20227min





















