Getting started and moving up in IT and security
George McPherson, host of the “Blak Cyber” podcast, has an impressive background in IT and...
32:12
Protecting sensitive information: Growing data, regulations and risks
The amount of data organizations hold has exploded — along with the risk it poses. Today’s guest...
35:21
Red teamers arrested conducting a penetration test
The story of today's guests is ripped straight from the headlines. Gary DeMercurio and Justin...
50:21
Starting a cybersecurity business and building a diverse workforce
Despite being told she was “too young, too inexperienced, and too naïve” to contribute anything...
45:58
Cloud security best practices and career tips
What exactly is the cloud? And how do you secure infrastructure that is not your own? On today’s...
45:58
Job hunting tips for cybersecurity professionals
Learn all about cybersecurity job hunting with Eric Jeffery, senior managing consultant and...
53:56
Get started in computer forensics: Entry-level tips, skills and career paths
This week we're excited to have back one of the major figures in digital forensics, Paraben CEO...
47:02
Getting into security architecture: Careers, skills and ransomware
Get a peek behind the curtain of security architecture careers from Pranshu Bajpai, a security...
41:35
Data privacy careers: GDPR, CCPA and the right to be forgotten
Whose responsibility is privacy, and what skills do you need to effectively implement and carry...
38:03
Computer forensics careers: Taking down a $1.2 billion Ponzi scheme
Few people know what it's like to help take down a $1.2 billion dollar Ponzi scheme, but that's...
39:38
Threat modeling: Breaking the design with pen, paper and creativity
Go deep into the weeds of Threat Modeling with Infosec Skills author Geoffrey Hill. He shares his...
43:53
NICE Cybersecurity Workforce Framework: Close your skills gap with role-based training
The demand for skilled cybersecurity professionals continues to grow, and effectively closing...
01:03:20
API security, vulnerability research and LGBTQ+ representation
Alissa Knight returns as the first ever three-peat Cyber Work guest, and the topic this week is —...
58:09
LGBTQ+ representation in cybersecurity
Alissa Knight returns as the first ever three-peat Cyber Work guest, and the topic this week is —...
58:09
From network engineer to pentester: Tips for moving into cybersecurity
Today we're discussing a common career path, moving from networking to cybersecurity. Brad...
49:28
Inside a purple team: Pentesting, vulnerabilities and other key skills
We love red teaming here at Cyber Work, and this week we're excited to explore a topic just few...
42:47
How to become a malware analyst
Uncover the dark, sticky details of malware, ransomware and other nasties that reside one...
40:59
Preparing the next generation of cybersecurity professionals
Students high school age and younger are getting fast-tracked into cybersecurity. Some are even...
48:35
Cyber threat intelligence: Learn to become a cybersecurity tactician
Take a deep dive into the world cyber threat intelligence with today's guest, Charles DeBeck of...
42:17
Offensive or defensive security: Which career is for you?
When it comes to your career, should you go red team, blue team or both? Today's guest is QuoLab...
44:43