Go offline with the Player FM app!
Insights into Security Research and Internet Mapping
Manage episode 386044289 series 2871161
Join us on an inspiring adventure through the world of cybersecurity, as we share a cup of digital coffee with our guest, Emily Austin, a seasoned professional in the tech field. Prepare to be enlightened and intrigued by her unlikely journey into the world of cybersecurity, a detour from psychology to tech that not only shows there's no single path into the industry but also demonstrates the value in diversity and unconventional paths.
You'll gain insights into the world of security research, understanding the importance of different perspectives and the value of effective communication. Discover the nuances of internet mapping and security research, and get a glimpse into the day-to-day life of a team handling comprehensive internet scan data. Learn how modern conflicts shake the tech industry, as we unravel the complexities of cyber warfare and the critical role played by the Ukrainian IT army.
Finally, brace yourself as we lay bare the underbelly of tech: the increased attacks on back office software. We'll take you through the potential risks and implications of assaults on file transfer tools and shed light on how these attacks are affecting enterprises and regulated industries. This episode is a thrilling exploration packed with insight and analysis - a must-listen for those curious about the ever-evolving tech field, cybersecurity, IT, and the true essence of a career in technology. Tune in to join the conversation!
LinkedIn: https://www.linkedin.com/in/emilylaustin/
Censys: https://censys.com/
Discover how technology is reshaping our lives and livelihoods.
Listen on: Apple Podcasts Spotify
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Chapters
1. Path to Security Career in Tech (00:00:00)
2. Overcoming Doubts, Taking Initiative (00:10:36)
3. [Ad] Digital Disruption with Geoff Nielson (00:18:52)
4. (Cont.) Overcoming Doubts, Taking Initiative (00:19:31)
5. Effective Communication in Security Research (00:21:26)
6. Internet Mapping and Security Research (00:25:48)
7. Cyber Defense Strategy and Challenges (00:31:00)
8. Security of Back Office Software (00:42:29)
244 episodes
Manage episode 386044289 series 2871161
Join us on an inspiring adventure through the world of cybersecurity, as we share a cup of digital coffee with our guest, Emily Austin, a seasoned professional in the tech field. Prepare to be enlightened and intrigued by her unlikely journey into the world of cybersecurity, a detour from psychology to tech that not only shows there's no single path into the industry but also demonstrates the value in diversity and unconventional paths.
You'll gain insights into the world of security research, understanding the importance of different perspectives and the value of effective communication. Discover the nuances of internet mapping and security research, and get a glimpse into the day-to-day life of a team handling comprehensive internet scan data. Learn how modern conflicts shake the tech industry, as we unravel the complexities of cyber warfare and the critical role played by the Ukrainian IT army.
Finally, brace yourself as we lay bare the underbelly of tech: the increased attacks on back office software. We'll take you through the potential risks and implications of assaults on file transfer tools and shed light on how these attacks are affecting enterprises and regulated industries. This episode is a thrilling exploration packed with insight and analysis - a must-listen for those curious about the ever-evolving tech field, cybersecurity, IT, and the true essence of a career in technology. Tune in to join the conversation!
LinkedIn: https://www.linkedin.com/in/emilylaustin/
Censys: https://censys.com/
Discover how technology is reshaping our lives and livelihoods.
Listen on: Apple Podcasts Spotify
Follow the Podcast on Social Media!
Tesla Referral Code: https://ts.la/joseph675128
YouTube: https://www.youtube.com/@securityunfilteredpodcast
Instagram: https://www.instagram.com/secunfpodcast/
Twitter: https://twitter.com/SecUnfPodcast
Chapters
1. Path to Security Career in Tech (00:00:00)
2. Overcoming Doubts, Taking Initiative (00:10:36)
3. [Ad] Digital Disruption with Geoff Nielson (00:18:52)
4. (Cont.) Overcoming Doubts, Taking Initiative (00:19:31)
5. Effective Communication in Security Research (00:21:26)
6. Internet Mapping and Security Research (00:25:48)
7. Cyber Defense Strategy and Challenges (00:31:00)
8. Security of Back Office Software (00:42:29)
244 episodes
All episodes
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.