All Episodes

Displaying episodes 1 - 30 of 73 in total

Cathy Ullman: The Power of Active Defense

About the Guest: Cathy Ullman, known in the cybersecurity community as Investigator Chick, boasts an impressive 24-year tenure at the University of Buffalo where her e...

Andy Liverman Anderson: Scaling Cybersecurity Functions with AI

About the Guest: Andy Liverman Anderson is a seasoned professional with a diverse background spanning real estate, Wall Street, and cybersecurity. With nearly a decade...

Be Fearless Online: In Browser Malicious File Detection Part 2

About the Guest: Dakshitaa Babu is a Software Engineer at SquareX, where she is engaged in data engineering and analytics. She is also the pen behind the engineering b...

Michael Jenks: Lessons from a Former DoD Professional

About the Guest: Michael Jenks, commonly referred to as "Jenks," is an esteemed figure with an extensive background in the Department of Defense (DoD). With a penchant...

Be Fearless Online: In Browser Malicious File Detection Part 1

About the Guest: Jeswin Mathai is the Chief Architect at SquareX. He leads the team responsible for designing and implementing the Infrastructure. Prior to joining Squ...

Chris Glanden, Kevin Pentecost, & Jason Popillion: Welcome to The Circus

About the Guests: Kevin Pentecost and Jason Papillon are the dynamic duo behind the engaging podcast Cyber Distortion. They share a strong history of creating content ...

Jason Haddix: A Conversation on AI, Bug Bounty, and Red Teaming

About the Guest: Jason Haddix is a seasoned cybersecurity professional with a wealth of experience spanning over two decades in the field. Recognized for his insightfu...

Bryson Bort: From Red to Purple: The Evolution of Cybersecurity

About the Guest: Bryson Bort is a recognized information security expert, founder, and entrepreneur with extensive experience in the cybersecurity field. Bryson is the...

Unleash Your Personal Brand & Master Professional Networking!

About the Guest: Phillip Wylie is a seasoned professional in the cybersecurity field, recognized for his expertise in offensive security and personal branding. With a ...

Andy Thompson: Journey From It To Offensive Security Research Evangelist

About The Guest: Andy Thompson, also known as Rainmaker, is a cybersecurity professional and a research evangelist at CyberArk. With over 20 years of experience in the...

Reanna Schultz: Tips on Breaking into Cybersecurity and Public Speaking

About The Guest:Reanna Shultz is a cybersecurity professional who currently works in a security operations center. She has a diverse background, having initially pursu...

Cheryl Biswas: From Political Science Major to Cyber Threat Intelligence

About The Guest:Cheryl Biswas is a cybersecurity professional with a background in political science. She currently works in cyber threat intelligence, protecting a bi...

Chris Marks: From Network Technician to Security Management

About The Guest:Chris Marks is a cybersecurity professional with a background in engineering and architecture. He has worked in various roles in the cybersecurity fiel...

Be Fearless Online: Protect Yourself Online with SquareX URL Safety Features

About The Guest: Shourya Pratap Singh is a Principal Engineer at SquareX. He is responsible for building SquareX’s secure and privacy-focused extension, and works on r...

Be Fearless Online: SquareX Introduces Disposable Emails to Combat Spam and Phishing Attacks

About The Guest:Dakshitaa Babu is a Software Engineer at SquareX, where she is engaged in data engineering and analytics. She is also the pen behind the engineering bl...

Justin "Hutch" Hutchens: AI's Impact on Cybersecurity

Summary:In this episode of the Phillip Wylie Show, Phillip interviews Justin "Hutch" Hutchens, an offensive security professional and author of "The Language of Decept...

Be Fearless Online: Safely Deal with Files Online with SquareX

About The Guest: Shourya Pratap Singh is a Principal Engineer at SquareX. He is responsible for building SquareX’s secure and privacy-focused extension, and works on r...

Andy Robbins: The Evolution of Bloodhound

About The Guest:Andy Robbins is the Principal Product Architect at SpecterOps and one of the original 13 founding members of the company. He has a background in pen te...

Jason Downey: Semi-Pro Kickboxer Turned Pentester

About The Guest: Jason Downey is a pen tester at Red Siege, a boutique pen testing firm. He has been in the industry for almost three years and specializes in network ...

Jessie Bolton: Building Your Personal Brand and Networking in Cybersecurity

About The Guest:Jesse Bolton is the founder of Bolt Resources, a cyber staffing and recruiting firm that focuses on workforce development and coaching. She is also inv...

Be Fearless Online: Open emails without being tracked or hacked with SquareX

About The Guest:Jeswin Mathai is the Chief Architect at SquareX. He leads the team responsible for designing and implementing the Infrastructure. Prior to joining Squa...

Diamond Forbes: From Homelessness to Security Engineer

About The Guest:Diamond Forbes is a security engineer at Google with over eight years of experience in the field. He started his career in the Army National Guard as a...

Katie Paxton-Fear: The Importance of Content Creation in Cybersecurity Careers

About The Guest:Katie Paxton-Fear, also known as Insider PhD, is a content creator and educator in the field of cybersecurity. With a background in software engineerin...

Maxie Reynolds: From hacker to underwater data center entrepeneur

About The Guest:Maxie Reynolds is a former offshore oil and gas worker turned entrepreneur. She is the founder and CEO of a company that specializes in placing data ce...

Olivia Gallucci: Offensive Security, Coding, and Content Creation

About The Guest Olivia Gallucci is a junior at the Rochester Institute of Technology and an expert in offensive security and content creation. She has worked in variou...

Jessica Barker: The importance of cybersecurity culture and awareness

About The Guest:Jessica Barker is a cybersecurity expert and co-founder of Cygenta, a company that focuses on the human, technical, and physical aspects of cybersecuri...

Lilly Chalupowski's Journey Into Malware Analysis

About The Guest:Lilly Chalupowski, also known as Cerberus, is a malware reverse engineer specializing in criminal malware. She has extensive experience in analyzing va...

Shenetworks: Leveraging Content Creation to Build a Career in Cybersecurity

About The Guest:Shenetworks is a content creator and cybersecurity professional known for her educational videos on TikTok. She has built a following by sharing techni...

InfoSec Pat: Content Creation and Cybersecurity Careers

About The Guest:Patrick Gorman, also known as Infosec Pat, is a content creator in the cybersecurity community. He started making content on YouTube about four years a...

From NSA to CISO: A Conversation with Ira Winkler

About The Guest:Ira Winkler is a renowned cybersecurity expert with over 30 years of industry experience. He started his career at the National Security Agency (NSA) a...

Free Podcast Website provided by