
Click for a pay bump?
In this special episode of Hacking Humans, while Joe and Maria take a well-earned summer break, we’re joined by a special guest host: Rob Allen, Chief Product Officer at ThreatLocker. Rob dives into t...
31 Juli 202530min
![Shields Up (noun) [Word Notes]](https://cdn.podme.com/podcast-images/2A54D1F3036E3729F094750E9BE8E53C_small.jpg)
Shields Up (noun) [Word Notes]
Please enjoy this encore of Word Notes. A condition announced by the US Cybersecurity and Infrastructure Security Agency (CISA) to draw attention to a temporary period of high alert, associated with...
29 Juli 20257min

The delusional side of AI therapy.
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are...
24 Juli 202551min
![Software Assurance Maturity Model (SAMM) (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
Software Assurance Maturity Model (SAMM) (noun) [Word Notes]
Please enjoy this encore of Word Notes. A prescriptive open source software security maturity model designed to guide strategies tailored to an organization’s specific risks. Audio reference link: "...
22 Juli 20255min

It’s all glitter, no gold.
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back shar...
17 Juli 202547min
![Universal 2nd Factor (U2F) (noun) [Word Notes]](https://cdn.podme.com/podcast-images/2A54D1F3036E3729F094750E9BE8E53C_small.jpg)
Universal 2nd Factor (U2F) (noun) [Word Notes]
Please enjoy this encore of Word Notes. An open standard for hardware authentication tokens that use the universal serial bus, or USB, near-field communications, or NFCs, or Bluetooth to communicate...
15 Juli 20257min

Convinced, compromised, and confirmed.
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the la...
10 Juli 202551min
![adversary group naming (noun) [Word Notes]](https://cdn.podme.com/podcast-images/FE31AF8E61FA2AC9C69A5A9CA9E612D2_small.jpg)
adversary group naming (noun) [Word Notes]
Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain.
8 Juli 202510min



















