Exploring Information Security - Exploring Information Security
Episodes
[RERELEASE] What is application security?
23 Dec 2025
Contributed by Lukas
Frank (@en0fmc) has a lot of experience with application security. His current role is the director for web application security and product managemen...
The Final Frontier of Security: The State of Space Security with Tim Fowler
16 Dec 2025
Contributed by Lukas
Summary: Timothy De Block and Tim Fowler, CEO and founder of Ethos Labs LLC, strap in to discuss the critical, rapidly escalating threats in space se...
How to Manage Cybersecurity Awareness Month
09 Dec 2025
Contributed by Lukas
Summary: Timothy De Block hosts a lively discussion with Maeve Mueller on the perennial challenge of Cyber Security Awareness Month (CSAM). They dive...
Exploring the Next Frontier of IAM: Shared Signals and Data Analytics
02 Dec 2025
Contributed by Lukas
Summary: Timothy De Block sits down with Matt Topper of Uber Ether to discuss the critical intersection of Identity and Access Management (IAM) and t...
How to Close the Cybersecurity Skills Gap with a Student Powered SOC
25 Nov 2025
Contributed by Lukas
Summary: Timothy De Block speaks with Bruce Johnson of TekStream about a truly innovative solution to the cybersecurity skills shortage: the Student-...
What is the 2025 State of the API Report From Postman?
18 Nov 2025
Contributed by Lukas
Summary: Timothy De Block is joined by Sam Chehab to unpack the key findings of the 2025 Postman State of the API Report. Sam emphasizes that APIs ar...
How AI Will Transform Society and Affect the Cybersecurity Field
11 Nov 2025
Contributed by Lukas
Summary: Timothy De Block sits down with Ed Gaudet, CEO of Censinet and a fellow podcaster, for a wide-ranging conversation on the rapid, transformat...
[RERELEASE] How Macs get Malware
04 Nov 2025
Contributed by Lukas
Wes (@kai5263499) spoke about this topic at BSides Hunstville this year. I was fascinated by it and decided to invite Wes on. Mac malware is a bit of ...
[RERELEASE] Why communication in infosec is important - Part 2
28 Oct 2025
Contributed by Lukas
Claire (@ClaireTills) doesn’t have your typical roll in infosec. She sits between the security teams and marketing team. It’s a fascinating roll a...
[RERELEASE] Why communication in infosec is important
21 Oct 2025
Contributed by Lukas
Claire (@ClaireTills) doesn’t have your typical roll in infosec. She sits between the security teams and marketing team at Tenable. It’s a fascina...
Exploring AI, APIs, and the Social Engineering of LLMs
14 Oct 2025
Contributed by Lukas
Summary: Timothy De Block is joined by Keith Hoodlet, Engineering Director at Trail of Bits, for a fascinating, in-depth look at AI red teaming and t...
How to Prepare a Presentation for a Cybersecurity Conference
07 Oct 2025
Contributed by Lukas
Summary: Join Timothy De Block for a special, behind-the-scenes episode where he rehearses his presentation, "The Hitchhiker's Guide to Threat Modeli...
Exploring the Rogue AI Agent Threat with Sam Chehab
23 Sep 2025
Contributed by Lukas
Summary: In a unique live recording, Timothy De Block is joined by Sam Chehab from Postman to tackle the intersection of AI and API security. The con...
A conversation with Kyle Andrus on Info Stealers and Supply Chain Attacks
16 Sep 2025
Contributed by Lukas
Summary: In this episode, Timothy De Block sits down with guest Kyle Andrus to dissect the ever-evolving landscape of cyber threats, with a specific ...
The Winding Path to CISO: Rob Fuller's Leadership Journey
09 Sep 2025
Contributed by Lukas
Summary: In this episode, Timothy De Block sits down with Rob Fuller, Vice President of Cybersecurity, for a candid discussion about Rob's journey in...
Kate Johnson's Winding Path to a Director Role in Cybersecurity
02 Sep 2025
Contributed by Lukas
Summary: Timothy De Block interviews Kate Johnson about her cybersecurity career. Kate shares insights from her journey, emphasizing the importance o...
LIVE: Unraveling the SharePoint Zero-Day Exploit (CVE-2025-53770)
26 Aug 2025
Contributed by Lukas
Summary: Link to the live recording: https://www.youtube.com/live/DHbGpRtDvIw?si=h6tHumVLrl3HOgq0 Join Timothy De Block and special guest Ben Mille...
How to Launch Your Own Cybersecurity Podcast
19 Aug 2025
Contributed by Lukas
Summary: In a special episode recorded live from ShowMeCon, Anushree Vaidya interviews Timothy De Block about the art and science of creating and gro...
How BSides St Louis Can Help Take The Next Step in Cybersecurity
12 Aug 2025
Contributed by Lukas
Summary: Timothy De Block and Ben Miller discuss the upcoming BSides St. Louis conference. Ben shares the mission behind the event: to provide a low-...
[RERELEASE] What it's like in the SECTF sound booth
05 Aug 2025
Contributed by Lukas
Michelle (@MlleLicious) was one of the contestants who competed on Friday in the Social Engineering Capture The Flag (SECTF). This year the SECTF focu...
[RERELEASE] How to network in information security - part 2
29 Jul 2025
Contributed by Lukas
Johnny (@J0hnnyXm4s) is a penetration tester for Redlegg and an accomplished speaker at security conferences around the United States and Iceland. One...
[RERELEASE] How to network in information security - part 1
22 Jul 2025
Contributed by Lukas
Johnny (@J0hnnyXm4s) is a penetration tester for Redlegg and an accomplished speaker at security conferences around the United States and Iceland. One...
[RERELEASE] What are BEC attacks?
15 Jul 2025
Contributed by Lukas
Steve (@SteveD3) has been covering BEC types of attacks for the past year at CSO. These types of attacks are increasing. It may get worse with GDPR re...
[RERELEASE] How to crack passwords
08 Jul 2025
Contributed by Lukas
Sean (@SeanThePeterson), is one of the most passionate infosec people you don't know. He recently did a talk at ShowMeCon on how to crack passwords. I...
[RERELEASE] How to find vulnerabilites
02 Jul 2025
Contributed by Lukas
Samy (@samykamkar) shouldn't need too much of an introduction to most people. He's been in the news for hacking garage doors, credit cards, cars, and ...
[RERELEASE] What is data driven security?
24 Jun 2025
Contributed by Lukas
I recently read Data Driven Security: Analysis, Visualization and Dashboards by Jay Jacobs (@jayjacobs) and Bob Rudis (@hrbrmstr). The book is easy to...
[RERELEASE] What is a CISSP?
17 Jun 2025
Contributed by Lukas
Javvad Malik (@J4vv4d) doesn't need much introduction. He's done a video on the benefits of being a CISSP. He's also done a music video with his Host ...
[RERELEASE] From ShowMeCon 2017: Dave Chronister, Johnny Xmas, April Wright, and Ben Brown talk about Security
10 Jun 2025
Contributed by Lukas
ShowMeCon is one of my favorite security conferences. The organizers are awesome and take care of their speakers like no other conference. The venue i...
How to Perform Incident Response and Forensics on Drones with Wayne Burke
04 Jun 2025
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Timothy De Block sits down with Wayne Burke to discuss the crucial and rapidly evolv...
That Shouldn't Have Worked: A Red Teamer's Confessions with Corey Overstreet
03 Jun 2025
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Timothy De Block speaks with Corey Overstreet, a seasoned pentester from Red Siege. ...
when machines take over the world with Jeff Man
28 May 2025
Contributed by Lukas
Summary: In this engaging episode of Exploring Information Security, host Timothy De Block sits down with cybersecurity expert Jeff Man. They dive in...
How to Disconnect From Cybersecurity
20 May 2025
Contributed by Lukas
In this heartfelt episode of Exploring Information Security, we sit down with Elizabeth Eggert-Guerrant to talk about the importance of disconnecting ...
How to Implement a Content Security Policy (CSP)
13 May 2025
Contributed by Lukas
Summary: In this episode of the Exploring Information Security podcast, host Timothy De Block sits down with Jason Gillam, long-time developer turned...
how to monitor the inner workings of a cybercriminal organization
06 May 2025
Contributed by Lukas
Summary: What does it take to monitor the inner workings of ransomware gangs? In this episode, Matthew Maynard shares his firsthand experience infilt...
Gamifying Your Incident Response Playbook with Anushree Vaidya
29 Apr 2025
Contributed by Lukas
Summary: In this episode, Tim speaks with Anushree Vaidya about her upcoming presentation at ShowMeCon: Ransomware Rampage: Gamifying Your Incident R...
What is the Human Behavior Conference (HUBE)?
22 Apr 2025
Contributed by Lukas
Summary: Chris Hadnagy returns to the podcast to discuss the upcoming Human Behavior Conference (HUBE CON), a unique event blending psychology, neuro...
[RERELEASE] How to deal with the "experience required" paradox
15 Apr 2025
Contributed by Lukas
Jerry recently had a blog post on his site (malicious link) titled, "Dealing With The Experience Required Paradox For Those Entering Information Secur...
[RERELEASE] How to ZAP your websites
08 Apr 2025
Contributed by Lukas
Simon is the project lead for ZAP an OWASP Open Web Application Security Project. He has a developer background and originally built the tool to help ...
How Do Ransomware Gangs Work?
01 Apr 2025
Contributed by Lukas
Summary: In this episode of Exploring Information Security, we dive deep into the dark, complex world of ransomware gangs with returning guest Kyle A...
Offensive Tools for Pentesters with Chris Traynor
25 Mar 2025
Contributed by Lukas
Summary: In this episode of Exploring Information Security, Tim chats with Chris Traynor of Black Hills Information Security (BHIS) and Ridgeback Inf...
Hands-On Hacking with James Gillkey
18 Mar 2025
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Tim De Block sits down with James Gillkey to discuss hands-on hacking training at Sh...
Breaking Bad Code with Kevin Johnson
11 Mar 2025
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Timothy De Block welcomes Kevin Johnson, founder of Secure Ideas, to discuss web app...
ShowMeCon and Security Perspectives with Amanda Berlin
04 Mar 2025
Contributed by Lukas
Summary: Use the promo code “ExploringSec” to get $50 off your registration In this episode of Exploring Information Security, host Timothy De B...
How to Participate in a CTF
25 Feb 2025
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Timothy De Block sits down with James Pope, Vince Stoffer, and Blake Cahen from Core...
Real World Windows Forensics and Incident Response with JC at ShowMeCon 2025
18 Feb 2025
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Timothy De Block sits down with JC, President at Snowfensive, to discuss Windows for...
ShowMeCon: A Must-Attend Conference for Cybersecurity Pros
12 Feb 2025
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Timothy De Block sits down with Dave Chronister and Brooke Deneen to discuss ShowMeC...
Enhancing Online Privacy with Anonyome Labs
04 Feb 2025
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Timothy De Block sits down with Dr. Paul Ashley, privacy expert and leader at Anonyo...
Navigating the Cybersecurity Job Market in 2025
28 Jan 2025
Contributed by Lukas
Episode Summary:In this episode of Exploring Information Security, host Timothy De Block welcomes Erin Barry, a recruiter with nearly a decade of expe...
Brian Dye on Network Detection and Response (NDR) with Corelight
21 Jan 2025
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Timothy De Block sits down with Brian Dye from Corelight to discuss the evolution of...
Solving Compliance Complexity with risk3sixty
14 Jan 2025
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Timothy De Block is joined by Christian Hyatt, CEO of risk3sixty, a company that spe...
Hacking Space Systems: Inside Tempest with Tim Fowler
07 Jan 2025
Contributed by Lukas
Summary: In this episode, host Timothy De Block sits down with Tim Fowler, the creator of Tempest, a hands-on educational project focused on space cy...
2024 in Review and What's Next in 2025
01 Jan 2025
Contributed by Lukas
Summary: In this solo episode, Timothy De Block takes a step back to reflect on the journey of Exploring Information Security in 2024 and look ahead ...
[RERELEASE] How to get into information security
24 Dec 2024
Contributed by Lukas
An interview with VioPoint consultant and roundhouse master Jimmy Vo. We covered how he got into information security and also talked about some of th...
David Mytton on Developer-Centric Security with ArcJet
17 Dec 2024
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Timothy De Block talks with David Mytton, founder of ArcJet, about enabling develope...
[RERELEASE] What is MS08-067?
10 Dec 2024
Contributed by Lukas
Mubix (@mubix), available at room362 and Hak5, joins me to discuss one of his favorite exploits: MS08-067. I invited Mubix on to talk about MS08-067 b...
Exploring the Defensive Security Handbook with Amanda Berlin
03 Dec 2024
Contributed by Lukas
Summary:In this episode of Exploring Information Security, host Timothy De Block sits down with Amanda Berlin, co-author of the Defensive Security Han...
How to Create User-Centric Security with Javvad Malik
26 Nov 2024
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Timothy De Block and guest Javvad Malik, security awareness advocate and writer for ...
How to Pick a Whiskey Barrel With The Innocent Lives Foundation Charity
14 Nov 2024
Contributed by Lukas
Summary: Timothy De Block is joined by Shane McCombs and John McCombs of the Innocent Lives Foundation (ILF), Josh Huff and Rev3Dood who volunteer th...
Exploring Legal Landmines in Incident Response with Thomas Ritter
12 Nov 2024
Contributed by Lukas
Summary: In this episode of Exploring Information Security, host Timothy De Block sits down with Thomas Ritter, a seasoned attorney specializing in c...
[RERELEASE] What is the SANS Holiday Hack Challenge
05 Nov 2024
Contributed by Lukas
Around this time each year the SANS Holiday Hack Challenge releases under the direction of Ed (@edskoudis) and instructor with the SANS institute. Thi...
[RERELEASE] ShowMeCon: What does Jayson E. Street, Dave Chronister, Johnny Xmas, April Wright, and Ben Brown think about security?
29 Oct 2024
Contributed by Lukas
ShowMeCon is one of my favorite security conferences. The organizers are awesome and take care of their speakers like no other conference. The venue i...
[RERELEASE] What is security awareness?
22 Oct 2024
Contributed by Lukas
Amanda was charged with setting up a security awareness program for her company from scratch. Setting up a security awareness program is hard work, ma...
How to get a penetration test (pentest)
15 Oct 2024
Contributed by Lukas
Summary: In this episode, Dave Chronister, founder of Parameter Security and ShowMeCon, shares valuable insights into the world of penetration testin...
How to Avoid Election Scams
08 Oct 2024
Contributed by Lukas
Summary: In this timely episode of Exploring Information Security, host Timothy De Block is joined by Pieter Arntz from Malwarebytes to discuss the g...
What is sober in cyber?
01 Oct 2024
Contributed by Lukas
Summary: In this episode, Jennifer VanAntwerp shares her journey of sobriety and how it inspired her to create the Sober in Cyber community. They dis...
How Disinformation Will Impact The 2024 Election with Renee DiResta
24 Sep 2024
Contributed by Lukas
Summary: In this episode, Timothy De Block chats with Renee DiResta about the role of disinformation in elections, particularly as we approach the 20...
How to Hack an Enterprise
17 Sep 2024
Contributed by Lukas
In this episode, Timothy De Block and Jonathan Singer dive into the challenges of modern enterprise security. The conversation covers how organization...
Ben Burkert of Anchor.Dev on the challenges of Internal Certificate Management
10 Sep 2024
Contributed by Lukas
In this episode, Timothy De Block chats with Ben Burkert about the challenges of managing internal certificate authorities (CAs) and certificates. Ben...
[RERELEASE] What is Practical Web Applicaiton Penetration Testing?
04 Sep 2024
Contributed by Lukas
Tim (@LaNMaSteR53) is one of the leading names within the application security field. A former instructor for many organizations, he wanted to do more...
[RERELEASE] How to find vulnerabilites
27 Aug 2024
Contributed by Lukas
Samy (@samykamkar) shouldn't need too much of an introduction to most people. He's been in the news for hacking garage doors, credit cards, cars, and ...
The Origins of Risky Business with Patrick Gray
20 Aug 2024
Contributed by Lukas
Episode Summary: Patrick Gray, the host of the Risky Business podcast, shares how he transitioned from a tech journalist to a leading voice in cybers...
How to Navigate a Career in Cybersecurity
13 Aug 2024
Contributed by Lukas
Summary: In this episode, Timothy De Block sits down with Ralph Collum, a cybersecurity educator with over a decade of experience in the field. They ...
SIM Swapping: How Worrying is it in 2024?
06 Aug 2024
Contributed by Lukas
Episode Summary: In this exchanged episode, Timothy De Block chats with Mubix about the intricacies of SIM swapping, an attack vector that has seen si...
How Artificial Intelligence is impacting Cybersecurity with Steve Orrin
30 Jul 2024
Contributed by Lukas
In this engaging episode, Timothy De Block speaks with Steve Orrin about the intersection of artificial intelligence and cybersecurity. The conversati...
How to Automate Information Security with Python
23 Jul 2024
Contributed by Lukas
In this automatic episode of Exploring Information Security, Timothy De Block talks with Mark Baggett about automating information security tasks usin...
HallwayCon from the floor of ShowMeCon 2024
16 Jul 2024
Contributed by Lukas
In this off-the-cuff episode, Timothy De Block brings a mic to the floor of ShowMeCon for the first-ever HallwayCon podcast episode. He walks around w...
What is Rapid Threat Model Prototyping?
09 Jul 2024
Contributed by Lukas
In this episode, we sit down with Geoff Hill from Tutamantic_Sec to explore the innovative approach of Rapid Threat Model Prototyping (RTMP). Geoff sh...
What is the Ransomware Defense Initiative (RDI)?
02 Jul 2024
Contributed by Lukas
In this episode, Timothy De Block sits down with Ed Rojas to discuss the origins and development of the Ransomware Defense Initiative (RDI). They expl...
What's Happening at ShowMeCon 2024?
25 Jun 2024
Contributed by Lukas
Summary: In this dynamic episode, host Timothy De Block engages in a lively conversation with Joey Smith, Tim McLaren, and Ben Miller live from the f...
What is FAIR (Factor Analysis of Information Risk)?
18 Jun 2024
Contributed by Lukas
Summary: In this insightful episode, Timothy De Block sits down with Jack Jones, the creator of the Factor Analysis of Information Risk (FAIR) model....
What is the Innocent Lives Foundation?
11 Jun 2024
Contributed by Lukas
Summary: In this episode of Exploring Information Security, Chris Hadnagy and Shane McCombs join the podcast to discuss the Innocent Lives Foundation...
What is Session Hijacking?
04 Jun 2024
Contributed by Lukas
Summary: In this informative episode, Timothy De Block discusses session hijacking with Web Application Security Engineer and PractiSec Founder Tim T...
How to Get Into Control Systems Security
28 May 2024
Contributed by Lukas
In this episode, Mike Holcomb discusses the intricacies of Industrial Control Systems (ICS) and Operational Technology (OT) security. Michael provides...
Catching up with Mental Health Hackers Founder Amanda Berlin at ShowMeCon
21 May 2024
Contributed by Lukas
Summary: In this relaxed and engaging episode recorded from air loungers at Show Me Con, Timothy De Block catches up with Amanda Berlin from Mental ...
What is Have I Been Pwned?
14 May 2024
Contributed by Lukas
In this insightful episode of Exploring Information Security, Troy Hunt, the creator of the widely recognized website, Have I Been Pwned (HIBP) talks ...
How to Harness the Power of pfSense for Network Security
07 May 2024
Contributed by Lukas
In this episode of Exploring Information Security, Security Engineer Kyle Goode takes a deep dive into the versatile world of pfSense, a robust open-s...
What are Deepfakes with Dr. Donnie Wendt
30 Apr 2024
Contributed by Lukas
In this enlightening episode of the Exploring Information Security podcast, we dive deep into the world of deepfakes with Dr. Donnie Wendt. With a bac...
The Crucial Gap in Control Systems Security: A Deep Dive with Joe Weiss
23 Apr 2024
Contributed by Lukas
In this compelling episode of the Exploring Information Security podcast, we sit down with Joe Weiss, a seasoned expert in control systems security, t...
ShowMeCon: Talking PCI 4.0 change with Jeff Man
16 Apr 2024
Contributed by Lukas
Welcome to a special edition of the Exploring Information Security podcast, where we dive into the intricacies of cybersecurity with industry veteran ...
ShowMeCon: How AI will impact Cybersecurity Enhancements and Threats with Jayson E. Street
09 Apr 2024
Contributed by Lukas
In this engaging episode Jayson E. Street, a renowned cybersecurity expert, joins me to discuss the return of ShowMeCon, the impact of AI in cybersecu...
ShowMeCon: Azure Vulnerabilities with Scott Miller
04 Apr 2024
Contributed by Lukas
Scott Miller, a fresh voice in the cybersecurity arena, joins me to discuss the intricacies of hacking Azure services. Scott shares his journey from a...
ShowMeCon: Unraveling the Cybersecurity Fabric of Space and SCADA Networks with Paul Coggin
02 Apr 2024
Contributed by Lukas
In this captivating episode of the "Exploring Information Security" podcast, cybersecurity expert Paul Coggin discusses the intricate world of threat ...
ShowMeCon: Talking with the Iceland Viking Arnar
26 Mar 2024
Contributed by Lukas
Arnar is not a speaker this year at ShowMeCon but he will be in attendance. He doesn’t work in the security field but he’s doing some really advan...
ShowMeCon: Talking Sysmon with Amanda Berlin
19 Mar 2024
Contributed by Lukas
Amanda Berlin is Lead Incident Detection Engineer at Blumira, where she leads the development of new detections for the Blumira platform, based on thr...
ShowMeCon: Couch to Compromise with Johnny Xmas
12 Mar 2024
Contributed by Lukas
Veteran conference speaker Johnny Xmas joins me to discuss ShowMeCon and his talk Couch to Compromise the 2024 edition. His talk is an update from pre...
ShowMeCon: Bypassing MFA with Shameer Amir
07 Mar 2024
Contributed by Lukas
Shameer Amir AKA Titan joins me to discuss his upcoming talk on his research into bypassing multifactor authentication (MFA) at the upcoming ShowMeCon...
Navigating the Currents of Open Source Intelligence: Insights from the Field
05 Mar 2024
Contributed by Lukas
Micah Hoffman and Griffin Glynn from My OSINT Training join me to talk about the current state of OSINT. Both bring a wealth of knowledge and first me...
What cybersecurity tools every organization should have
27 Feb 2024
Contributed by Lukas
Rob Fuller AKA Mubix joins me to talk about security tooling every organization should have. This was a result of a discussion Rob and I were having a...
ShowMeCon: Bypassing MFA with Brandon Potter
22 Feb 2024
Contributed by Lukas
Brandon Potter joins me to discuss the different ways he’s seeing MFA bypassed as part of his companies work. Attackers are using old and new techni...
What is a Canary?
20 Feb 2024
Contributed by Lukas
Tyron Kemp Presales Engineer at Thinkst Canary joined me to discuss what is a canary. More specifically Thinkst Canaries which is one of the most usef...