エピソード

  • From Cybersecurity Products to Platforms
    2025/10/01

    Dan sits down with his colleague Nate Fitzgerald (head of product management for ESG) to discuss how and why the cybersecurity market has been transitioning from individual Products to (sometimes) integrated Platforms.

    続きを読む 一部表示
    33 分
  • Cybersecurity Testing: Tuned for the Test or Tuned for the Real World?
    2025/09/17

    Simon Edwards, Founder and CEO of SE Labs, and Adam Bromwich, CTO of the Enterprise Security Group at Broadcom join Dan in Las Vegas to dive into the details on cybersecurity testing which has been one of the more consistently dramatic topics in the industry.Definitely check out SE Labs to learn more from the best real world performance testing in the industry: https://selabs.uk

    続きを読む 一部表示
    35 分
  • Diving Deep Into Vulnerability Risk Modeling w/ Empirical Security
    2025/09/03

    Recorded from Hacker Summer Camp in Las Vegas, Dan dives. deep into the history and current state of measuring cybersecurity vulnerability risk at scale with the team from Empirical Security. Ed, Michael, and Wade discuss some of the history of vulnerability measurement through the last decade and how they thin the time is now for organizations to start applying highly-specific local vulnerability modeling to their security strategies.There is a ton of amazing information you won't find anywhere else on the Empirical Security Blog: https://www.empiricalsecurity.com

    続きを読む 一部表示
    59 分
  • Cybersecurity Tips For Seniors and Parents w/ Alex East
    2025/08/25

    Dan sits down with author Alex East to discuss cybersecurity tips for Seniors and Parents.

    You can find Alex's books on Amazon: https://www.amazon.com/stores/Alex-Ea...

    Sorry about the video quality, one of the SSDs on the external recorder was having issues.

    続きを読む 一部表示
    26 分
  • Preventing a Nuclear Apocalypse with Threat Intel
    2025/08/06

    Paul Miller recounts a critical incident involving threat intelligence that potentially prevented a nuclear disaster. They explore the geopolitical context surrounding the incident, the challenges of incident response, and the complexities of attributing cyber attacks to specific threat actors. The conversation highlights the importance of threat intelligence in understanding and mitigating risks, as well as best practices for incident response in the face of evolving cyber threats.Takeaways:- Threat intelligence is crucial for understanding cyber threats.- Geopolitical events can significantly impact cybersecurity.- Incident response requires quick decision-making and analysis.- Attribution of cyber attacks is complex and fraught with challenges.- Cybersecurity incidents can have far-reaching consequences.- Effective communication with government agencies is essential.- Historical data analysis is key to threat hunting.- Most cybersecurity work involves routine tasks, with occasional high-stakes incidents.- The evolution of cyber threats necessitates constant vigilance and adaptation.- Collaboration within the cybersecurity community enhances overall defense strategies.

    続きを読む 一部表示
    32 分
  • Navigating Hacker Summer Camp
    2025/07/30

    In the first episode of SECURITY.COM The Podcast, hosts Dan Mellinger and Paul Miller discuss the upcoming Hacker Summer Camp, which includes major cybersecurity conferences like DEF CON, Black Hat, and B-Sides. They provide an overview of each event, highlighting their unique focuses and the importance of networking and learning. The conversation also covers essential safety tips for attendees, emphasizing the need for encryption and caution in sharing personal information. The episode concludes with a preview of future topics and a reminder to stay curious and human in the cybersecurity field.


    Takeaways

    • Hacker Summer Camp includes DEF CON, Black Hat, and B-Sides.
    • Diana Initiative aims to increase diversity in cybersecurity.
    • B-Sides is known for its high-quality talks and community feel.
    • Black Hat focuses on actionable content for corporate security.
    • DEF CON is the largest hacking conference, celebrating all aspects of hacking.
    • Attendees should prioritize safety and use VPNs during conferences.
    • Cash ATMs in casinos are safer than others for withdrawals.
    • Be cautious of oversharing personal information at events.
    • Use encrypted communication tools to protect data.
    • The Wall of Sheep highlights the importance of cybersecurity awareness.


    続きを読む 一部表示
    39 分
  • Welcome To SECURITY.COM The Podcast
    2025/07/28

    Join Dan Mellinger, your go-to cybersecurity communicator, and Paul Miller, seasoned threat intelligence and operations leader, on SECURITY.COM The Podcast, a show that bridges the gap between cutting-edge security tech and the humans who make it work. Delivering enterprise-grade security insights for all.Every first and third week each month, they unpack hard-nosed technical deep dives—from threat hunting and breaking analysis to the not-so-secrets of Data Security and SSE others won’t tell you—all rooted in the same high‑quality content and bold thought leadership you’ve come to expect on SECURITY.COM.

    続きを読む 一部表示
    1 分