All Episodes
Displaying episodes 31 - 60 of 97 in total
Jason Haddix: A Conversation on AI, Bug Bounty, and Red Teaming
About the Guest: Jason Haddix is a seasoned cybersecurity professional with a wealth of experience spanning over two decades in the field. Recognized for his insightfu...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1706561145718-e7f8711111bea.jpg)
Bryson Bort: From Red to Purple: The Evolution of Cybersecurity
About the Guest: Bryson Bort is a recognized information security expert, founder, and entrepreneur with extensive experience in the cybersecurity field. Bryson is the...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1705422216534-961a5c80285b8.jpg)
Unleash Your Personal Brand & Master Professional Networking!
About the Guest: Phillip Wylie is a seasoned professional in the cybersecurity field, recognized for his expertise in offensive security and personal branding. With a ...
![](https://d3t3ozftmdmh3i.cloudfront.net/production/podcast_uploaded_nologo/37199280/37199280-1681222572995-5976549b158d6.jpg)
Andy Thompson: Journey From It To Offensive Security Research Evangelist
About The Guest: Andy Thompson, also known as Rainmaker, is a cybersecurity professional and a research evangelist at CyberArk. With over 20 years of experience in the...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1705354920621-aaf88d86ca2f3.jpg)
Reanna Schultz: Tips on Breaking into Cybersecurity and Public Speaking
About The Guest:Reanna Shultz is a cybersecurity professional who currently works in a security operations center. She has a diverse background, having initially pursu...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1704313724781-894471e387c11.jpg)
Cheryl Biswas: From Political Science Major to Cyber Threat Intelligence
About The Guest:Cheryl Biswas is a cybersecurity professional with a background in political science. She currently works in cyber threat intelligence, protecting a bi...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1704207330995-2335e805c2f96.jpg)
Chris Marks: From Network Technician to Security Management
About The Guest:Chris Marks is a cybersecurity professional with a background in engineering and architecture. He has worked in various roles in the cybersecurity fiel...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1703475667848-c52de6176b106.jpg)
Be Fearless Online: Protect Yourself Online with SquareX URL Safety Features
About The Guest: Shourya Pratap Singh is a Principal Engineer at SquareX. He is responsible for building SquareX’s secure and privacy-focused extension, and works on r...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1701916063517-299ef8a52e6eb.jpg)
Be Fearless Online: SquareX Introduces Disposable Emails to Combat Spam and Phishing Attacks
About The Guest:Dakshitaa Babu is a Software Engineer at SquareX, where she is engaged in data engineering and analytics. She is also the pen behind the engineering bl...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1702434903407-d509d8af68c05.jpg)
Justin "Hutch" Hutchens: AI's Impact on Cybersecurity
Summary:In this episode of the Phillip Wylie Show, Phillip interviews Justin "Hutch" Hutchens, an offensive security professional and author of "The Language of Decept...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1703040847659-ba8e00032732e.jpg)
Be Fearless Online: Safely Deal with Files Online with SquareX
About The Guest: Shourya Pratap Singh is a Principal Engineer at SquareX. He is responsible for building SquareX’s secure and privacy-focused extension, and works on r...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1703039480761-1ffb0e7bfa3f4.jpg)
Andy Robbins: The Evolution of Bloodhound
About The Guest:Andy Robbins is the Principal Product Architect at SpecterOps and one of the original 13 founding members of the company. He has a background in pen te...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1702959668088-b25ae6212a218.jpg)
Jason Downey: Semi-Pro Kickboxer Turned Pentester
About The Guest: Jason Downey is a pen tester at Red Siege, a boutique pen testing firm. He has been in the industry for almost three years and specializes in network ...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1701917748259-9618255ab196f.jpg)
Jessie Bolton: Building Your Personal Brand and Networking in Cybersecurity
About The Guest:Jesse Bolton is the founder of Bolt Resources, a cyber staffing and recruiting firm that focuses on workforce development and coaching. She is also inv...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1702332326451-d9c0260cbd40a.jpg)
Be Fearless Online: Open emails without being tracked or hacked with SquareX
About The Guest:Jeswin Mathai is the Chief Architect at SquareX. He leads the team responsible for designing and implementing the Infrastructure. Prior to joining Squa...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1701791837483-19d8c3fae7b31.jpg)
Diamond Forbes: From Homelessness to Security Engineer
About The Guest:Diamond Forbes is a security engineer at Google with over eight years of experience in the field. He started his career in the Army National Guard as a...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1701729007628-80e3a1730c9ea.jpg)
Katie Paxton-Fear: The Importance of Content Creation in Cybersecurity Careers
About The Guest:Katie Paxton-Fear, also known as Insider PhD, is a content creator and educator in the field of cybersecurity. With a background in software engineerin...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1701102447247-39ac6ff138019.jpg)
Maxie Reynolds: From hacker to underwater data center entrepeneur
About The Guest:Maxie Reynolds is a former offshore oil and gas worker turned entrepreneur. She is the founder and CEO of a company that specializes in placing data ce...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1700587819415-1865a16d1049d.jpg)
Olivia Gallucci: Offensive Security, Coding, and Content Creation
About The Guest Olivia Gallucci is a junior at the Rochester Institute of Technology and an expert in offensive security and content creation. She has worked in variou...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1699663274960-5fff948cf5d49.jpg)
Jessica Barker: The importance of cybersecurity culture and awareness
About The Guest:Jessica Barker is a cybersecurity expert and co-founder of Cygenta, a company that focuses on the human, technical, and physical aspects of cybersecuri...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1699323071885-0fd659c866daa.jpg)
Lilly Chalupowski's Journey Into Malware Analysis
About The Guest:Lilly Chalupowski, also known as Cerberus, is a malware reverse engineer specializing in criminal malware. She has extensive experience in analyzing va...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1698635245900-3a071b4642785.jpg)
Shenetworks: Leveraging Content Creation to Build a Career in Cybersecurity
About The Guest:Shenetworks is a content creator and cybersecurity professional known for her educational videos on TikTok. She has built a following by sharing techni...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1698118572136-3572b19dd7c94.jpg)
InfoSec Pat: Content Creation and Cybersecurity Careers
About The Guest:Patrick Gorman, also known as Infosec Pat, is a content creator in the cybersecurity community. He started making content on YouTube about four years a...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1698089278370-1d4c6cc0033a.jpg)
From NSA to CISO: A Conversation with Ira Winkler
About The Guest:Ira Winkler is a renowned cybersecurity expert with over 30 years of industry experience. He started his career at the National Security Agency (NSA) a...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1697573374559-97717203f7424.jpg)
Importance of Fundamentals and Home Labs with Kevin Apolinario
About The Guest:Kevin Apolinario is a cybersecurity professional with a diverse background in IT support and training. He has over 12 years of experience in the restau...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1696298524761-5b09f3f0da4.jpg)
Web Application Pentesting and the Importance of Specialization with Tib3rius
About The Guest:Tib3rius is a penetration tester with over ten years of experience, specializing in web application security. He is the creator of the popular tool Aut...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1696298244429-a066007dff0dc.jpg)
Jakoby's Journey
About The Guest:Jakoby is a content creator and hacker with over a decade of experience in the field. He started his journey in hacking at a young age and has since be...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1695562433413-35526bb455788.jpg)
Michael Taggart's Journey in Education and Information Security
About The Guest: Michael Taggart is the founder of the Taggart Institute, an education project that aims to provide affordable and accessible learning resources for in...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1694909333174-ba111b56b64d3.jpg)
A Journey From Offensive Security to Leadership with Tom Eston
About The Guest:Tom Eston is the VP of Consulting and Cosmos Delivery at Bishop Fox, an information security consulting firm. He is also the founder and host of the Sh...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1694482926625-33f0dac24fd8f.jpg)
Powerlifting and PowerShell: A Discussion with Jake Hildreth
About The Guest: Jake is a cybersecurity professional with a background in system administration. He has a deep understanding of Active Directory security and is curre...
![](https://d3t3ozftmdmh3i.cloudfront.net/staging/podcast_uploaded_episode/37199280/37199280-1694102616024-3f770fbddb017.jpg)