Exploring Information Security - Timothy De Block

Exploring Information Security - Timothy De Block
By Timothy De Block
About this podcast
The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.
In this podcast

Podcasts like "Exploring Information Security - Timothy De Block"   · View all

By Bloomberg News
By Blayne Smith
By WAMU 88.5
Latest episodes
Feb. 12, 2018
In this social episode of the Exploring Information Security podcast, Chris Hadnagy joins me to discuss how to become a social engineer.Chris (@humanhacker) is the Chief Human Hacker at Social-Engineer, Inc. He's the author of several social engineer books. He also has his own podcast. This past summer he announced the Innocent Lives Foundation, which has the objective of unmasking anonymous online child predators through OSINT and relationships with law enforcement. He is a social engineering Hulk in the field of information security.In this episode we discuss:What is social engineeringWhat skills are needed to become a social engineerHow much of social engineering is experienceWhat tools are used for social engineering [RSS Feed] [iTunes]
Feb. 5, 2018
In this fruity episode of the Exploring Information Security podcast, Wes Widner joins me to discuss how to hack iOS.Wes (@kai5263499) is a cloud engineer, who loves to dig into Apple product security. Last year (and on a previous episode) he discuss how Macs get malware. He's back again this year to discuss how to hack iOS. He will be speaking at BSides Hunstville February 3, 2018. If you have a chance to go, be sure to check out his talk. Also, check out is OSX security awesome list on GitHub. It's a really useful set of links on This dude is really smart.In this episode we discuss:Are we talking NSA level hacking?What tools are available for hacking iOSWhat resources are available for hacking iOSMore resources:Lib mobile deviceCydia [RSS Feed] [iTunes]
Jan. 29, 2018
In this fruity episode of the Exploring Information Security podcast, Wes Widner joins me to discuss how to hack iOS.Wes (@kai5263499) is a cloud engineer, who loves to dig into Apple product security. Last year (and on a previous episode) he discuss how Macs get malware. He's back again this year to discuss how to hack iOS. He will be speaking at BSides Hunstville February 3, 2018. If you have a chance to go, be sure to check out his talk. Also, check out is OSX security awesome list on GitHub. It's a really useful set of links on This dude is really smart.In this episode we discuss:What is his talk about?What's the difference between application and device hackingWhat skills are needed to hack iOSHow Apple works with law enforcementMore resources:Lib mobile deviceCydia [RSS Feed] [iTunes]
Jan. 22, 2018
In this Motor City edition of the Exploring Information Security podcast, Ryan Harp, Kyle Andrus, and Kate Vajda join me to discuss the conferences Converge and BSides Detroit.Ryan (@th3b00st), Kyle (@chaoticflaws), and Kate (@vajkat) help put on one of the best conferences. Last year was my first year at the conference. I was not disappointed. They had a workshop on application security; a room set aside to get resume feedback; Ham radio exams; and much more. They also had three days of wonderful talks with some really great speakers. At lunch there are multiple treks to go grab a coney dog.The call for papers is currently open. They're looking for speakers and to add more workshops this year. Tickets are also available now. Make sure to grab yours and I'll see you at Converge and BSides Detroit May 10-12.In this episode we discuss:How the conference got started.Where the conference is at and what's new this year for the layout.What's unique about the conference.Coney dogs. [RSS Feed] [iTunes]
Jan. 15, 2018
In this foundational episode of the Exploring Information Security podcast, Matt Tesauro and Aaron Weaver join me to discuss the AppSec Pipeline.Matt (@matt_tesauro) and Aaron (@weavera) are the project leads for the OWASP AppSec Pipeline. The project provides resources and guidance for building out your own appsec pipeline within a development team. Building a pipeline is important in helping get security embedded within software.In this episode we discuss:What is the OWASP AppSec PipelineHow did it get startedWho should use the AppSec PipelineHow to implement the AppSec Pipeline [RSS Feed] [iTunes]
Jan. 8, 2018
In this reflection edition of the Exploring Information Security podcast, I look back at 2017 and also look ahead to 2018 for the podcast.2017 was a great year for the podcast. I saw increased listernership. We had a new episode format that involved talking to several security professionals at various conferences. I've also seen an increase in companies and public relation firms reaching out to me to pitch guests. In 2018 I'd like to explore some new formats. There may be a conference panel in the future. I also expect to look at advertising and sponsorship for the podcasts. I also need to work on an archive feed for older episodes.If you have feedback on any of this or ideas for where I should take the show, I would love to hear them. You can hit me up on Twitter (@TimothyDeBlock), email: timothy.deblock[@]gmail[dot]com, or by leaving a comment below. Thanks for such a great year and I look forward to a fantastic 2018. [RSS Feed] [iTunes]
Jan. 1, 2018
In this fake episode of the Exploring Information Security podcast, Micah Hoffman joins me to discuss imposter syndrome.Micah (@WebBreacher), this past year, spoke on imposter syndrome and how to overcome it. It's something we all deal with (even several years into our careers). It's useful, but also dangerous for those of us in the information security community. We need to try and compare ourselves to others less and speak more positively internally.In this episode we discuss:What is imposter syndrome?Why people get imposter syndrome.How to overcome imposer syndrome.Stick around until the end to hear some real imposter syndrome. [RSS Feed] [iTunes]
Dec. 24, 2017
Chris (@chrissanders88) grew up at a disadvantage. He wasn't rich or handed a great educations. He speaks of being part of the free lunch kids at school. He's managed to turn himself into a successful information security professional, with his own company and non-profit. A lot of that is due to his teachers and mentors encouraging his interest in computers. The Rural Technology Fund is a way for him to give back and give other kids an opportunity to see if they have a spark for technology.
Dec. 18, 2017
In this bird feeding episode of the Exploring Information Security podcast, Chris Maddalena joins me to discuss how to build your own tools.Chris (@cmaddalena) gave a talk at DerbyCon this past year on writing Win32 Shellcode. We've talked before on a previous podcast around why building your own tools is important. Chris has also written several tools for his day job and for public consumption. His most recent tool is ODIN, a passive recon tool for penetration testers.In this episode we discuss:Why should someone build their own toolWhat tool should people build?How to get started building toolsWhat resources are available for building tools [RSS Feed] [iTunes]
Dec. 11, 2017
In this bird feeding episode of the Exploring Information Security podcast, Chris Maddalena joins me to discuss how to build your own tools.Chris (@cmaddalena) gave a talk at DerbyCon this past year on writing Win32 Shellcode. We've talked before on a previous podcast around why building your own tools is important. Chris has also written several tools for his day job and for public consumption. His most recent tool is ODIN, a passive recon tool for penetration testers.In this episode we discuss:Why should someone build their own toolWhat tool should people build?How to get started building toolsWhat resources are available for building tools [RSS Feed] [iTunes]