All Episodes

Displaying episodes 31 - 60 of 97 in total

Jason Haddix: A Conversation on AI, Bug Bounty, and Red Teaming

About the Guest: Jason Haddix is a seasoned cybersecurity professional with a wealth of experience spanning over two decades in the field. Recognized for his insightfu...

Bryson Bort: From Red to Purple: The Evolution of Cybersecurity

About the Guest: Bryson Bort is a recognized information security expert, founder, and entrepreneur with extensive experience in the cybersecurity field. Bryson is the...

Unleash Your Personal Brand & Master Professional Networking!

About the Guest: Phillip Wylie is a seasoned professional in the cybersecurity field, recognized for his expertise in offensive security and personal branding. With a ...

Andy Thompson: Journey From It To Offensive Security Research Evangelist

About The Guest: Andy Thompson, also known as Rainmaker, is a cybersecurity professional and a research evangelist at CyberArk. With over 20 years of experience in the...

Reanna Schultz: Tips on Breaking into Cybersecurity and Public Speaking

About The Guest:Reanna Shultz is a cybersecurity professional who currently works in a security operations center. She has a diverse background, having initially pursu...

Cheryl Biswas: From Political Science Major to Cyber Threat Intelligence

About The Guest:Cheryl Biswas is a cybersecurity professional with a background in political science. She currently works in cyber threat intelligence, protecting a bi...

Chris Marks: From Network Technician to Security Management

About The Guest:Chris Marks is a cybersecurity professional with a background in engineering and architecture. He has worked in various roles in the cybersecurity fiel...

Be Fearless Online: Protect Yourself Online with SquareX URL Safety Features

About The Guest: Shourya Pratap Singh is a Principal Engineer at SquareX. He is responsible for building SquareX’s secure and privacy-focused extension, and works on r...

Be Fearless Online: SquareX Introduces Disposable Emails to Combat Spam and Phishing Attacks

About The Guest:Dakshitaa Babu is a Software Engineer at SquareX, where she is engaged in data engineering and analytics. She is also the pen behind the engineering bl...

Justin "Hutch" Hutchens: AI's Impact on Cybersecurity

Summary:In this episode of the Phillip Wylie Show, Phillip interviews Justin "Hutch" Hutchens, an offensive security professional and author of "The Language of Decept...

Be Fearless Online: Safely Deal with Files Online with SquareX

About The Guest: Shourya Pratap Singh is a Principal Engineer at SquareX. He is responsible for building SquareX’s secure and privacy-focused extension, and works on r...

Andy Robbins: The Evolution of Bloodhound

About The Guest:Andy Robbins is the Principal Product Architect at SpecterOps and one of the original 13 founding members of the company. He has a background in pen te...

Jason Downey: Semi-Pro Kickboxer Turned Pentester

About The Guest: Jason Downey is a pen tester at Red Siege, a boutique pen testing firm. He has been in the industry for almost three years and specializes in network ...

Jessie Bolton: Building Your Personal Brand and Networking in Cybersecurity

About The Guest:Jesse Bolton is the founder of Bolt Resources, a cyber staffing and recruiting firm that focuses on workforce development and coaching. She is also inv...

Be Fearless Online: Open emails without being tracked or hacked with SquareX

About The Guest:Jeswin Mathai is the Chief Architect at SquareX. He leads the team responsible for designing and implementing the Infrastructure. Prior to joining Squa...

Diamond Forbes: From Homelessness to Security Engineer

About The Guest:Diamond Forbes is a security engineer at Google with over eight years of experience in the field. He started his career in the Army National Guard as a...

Katie Paxton-Fear: The Importance of Content Creation in Cybersecurity Careers

About The Guest:Katie Paxton-Fear, also known as Insider PhD, is a content creator and educator in the field of cybersecurity. With a background in software engineerin...

Maxie Reynolds: From hacker to underwater data center entrepeneur

About The Guest:Maxie Reynolds is a former offshore oil and gas worker turned entrepreneur. She is the founder and CEO of a company that specializes in placing data ce...

Olivia Gallucci: Offensive Security, Coding, and Content Creation

About The Guest Olivia Gallucci is a junior at the Rochester Institute of Technology and an expert in offensive security and content creation. She has worked in variou...

Jessica Barker: The importance of cybersecurity culture and awareness

About The Guest:Jessica Barker is a cybersecurity expert and co-founder of Cygenta, a company that focuses on the human, technical, and physical aspects of cybersecuri...

Lilly Chalupowski's Journey Into Malware Analysis

About The Guest:Lilly Chalupowski, also known as Cerberus, is a malware reverse engineer specializing in criminal malware. She has extensive experience in analyzing va...

Shenetworks: Leveraging Content Creation to Build a Career in Cybersecurity

About The Guest:Shenetworks is a content creator and cybersecurity professional known for her educational videos on TikTok. She has built a following by sharing techni...

InfoSec Pat: Content Creation and Cybersecurity Careers

About The Guest:Patrick Gorman, also known as Infosec Pat, is a content creator in the cybersecurity community. He started making content on YouTube about four years a...

From NSA to CISO: A Conversation with Ira Winkler

About The Guest:Ira Winkler is a renowned cybersecurity expert with over 30 years of industry experience. He started his career at the National Security Agency (NSA) a...

Importance of Fundamentals and Home Labs with Kevin Apolinario

About The Guest:Kevin Apolinario is a cybersecurity professional with a diverse background in IT support and training. He has over 12 years of experience in the restau...

Web Application Pentesting and the Importance of Specialization with Tib3rius

About The Guest:Tib3rius is a penetration tester with over ten years of experience, specializing in web application security. He is the creator of the popular tool Aut...

Jakoby's Journey

About The Guest:Jakoby is a content creator and hacker with over a decade of experience in the field. He started his journey in hacking at a young age and has since be...

Michael Taggart's Journey in Education and Information Security

About The Guest: Michael Taggart is the founder of the Taggart Institute, an education project that aims to provide affordable and accessible learning resources for in...

A Journey From Offensive Security to Leadership with Tom Eston

About The Guest:Tom Eston is the VP of Consulting and Cosmos Delivery at Bishop Fox, an information security consulting firm. He is also the founder and host of the Sh...

Powerlifting and PowerShell: A Discussion with Jake Hildreth

About The Guest: Jake is a cybersecurity professional with a background in system administration. He has a deep understanding of Active Directory security and is curre...

Free Podcast Website provided by