Remove Hacking Remove Information Security Remove InfoSec Remove Penetration Testing
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.

Hacking 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. For bored and smart teenagers, this was the perfect way to learn how to hack. Much like the BBS of yesterday, these social media sites can be used to teach people how to hack. Or share gaming cheats. Massive numbers.

Media 52
article thumbnail

The Hacker Mind: Hacking Social Media

ForAllSecure

With more than 600K followers on YouTube, LiveOverflow is one of infosec’s first social media influencers. For bored and smart teenagers, this was the perfect way to learn how to hack. Much like the BBS of yesterday, these social media sites can be used to teach people how to hack. Or share gaming cheats. Massive numbers.

Media 52
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Security enthusiast and Linux evangelist Binni Shah consistently offers valuable tutorials, guides, and insights for the cybersecurity community. Jason Haddix | @JHaddix.

article thumbnail

Comparing Offensive Security Tooling and Gun Control

Daniel Miessler

Twitter infosec is the top 10%, at best, arguing with each other. What if all this local municipality hacking and ransomware was part of a government resilience exercise? And therefore knowing how your stimuli will affect outcomes. What do you think the stat is for those without CIOs? Probably also zero. Don’t want to patch?

article thumbnail

How to Break Into a Cybersecurity Career – Phillip Wylie

Security Boulevard

From his origins as a professional wrestler who once bravely faced off […] The post How to Break Into a Cybersecurity Career – Phillip Wylie appeared first on Shared Security Podcast. Join us as we discuss Phillip’s unique journey and uncover valuable insights on breaking into the cybersecurity field.