Archives

An introduction to Ethical Hacking and Penetration Testing with Kim Crawley Thank you for watching! Welcome back to the show, my guest today is Kim Crawley, cybersecurity expert and the co-author of the new book The Pentester Blueprint with Phillip Wylie. I asked Kim here to talk to us about what is pentesting and how it is used. As Nico Sell founder of the Wickr Foundation said in a talk a few… Read More

Cyber Security Threats and Attacks with Kim Crawley In this video, I sit down with IT & Cyber Security expert Kim Crawley as we discuss IT, Cyber Security threats and attacks, Information Security (InfoSec) and Operational Security (OpSec), Malware, Cyber Attacks, and how they intersect with Cryptocurrency and protecting ourselves online. Visit these sites for more Kim Crawley Content: AT&T Cyber Security Tripwire BlackBerry ThreatVector Blog Hackernoon.com Kim is also the co-author… Read More

The Importance of Cybersecurity and Password Managers with Kim Crawley Thank you for watching, in our first episode, I chat with cybersecurity expert and writer Kim Crawley. Kim is co-author with Phillip Wylie of the upcoming book “The Pentester BluePrint,” which is available to pre-order on Amazon.com. Help support Kim’s work and the channel by using our Amazon link: https://amzn.to/2Gf51DP Timestamp 0:00 – 3:56 Kim’s background in tech 4:00 – 6:00 Malware,… Read More

Let’s Talk Privacy, Surveillance and Edward Snowden with Naomi Brockwell In this episode, Naomi Brockwell returns to discuss privacy, surveillance, Edward Snowden, having her videos used in the classroom, and Crypto conferences that don’t pay in Crypto. Naomi Brockwell has been a strong advocate for Bitcoin and Cryptocurrency for nearly as long as Bitcoin and Cryptocurrency have been in existence. Naomi produces a variety on content that focuses on Bitcoin, Cryptocurrency and… Read More

Cyber Security in an Age of Social Media & IOT with Kim Crawley In this episode, I chat again with Cyber Security Expert Kim Crawley. We discuss the recent hack of the Amazon Ring cameras. Lawsuits against TikTok for privacy violations. We also discuss end-to-end encryption, burner email addresses. Visit these sites for more Kim Crawley Content: https://www.alienvault.com/blogs/ https://www.peerlyst.com/ https://www.tripwire.com/ https://threatvector.cylance.com/ https://hackernoon.com/ Kim can be found on Twitter @kim_crawley For more content… Read More

In a previous article, In Defense of Privacy, I wrote that we should not fetishize privacy, we should demand privacy. While I stand by that, we run into the issue that most of our privacy is degraded and put at risk because we willingly and nonchalantly provide our data. I’m as guilty of this as anyone else so what can we do? Is it possible to get our data back? The short answer…no…. Read More

In this episode I chat with Pariss Athena creator of #BlackTechTwitter and founder of the Black Tech Pipeline. We discuss the need for diversity and inclusion in tech and how we can bring more women and people of color into the space. #womenintech #diversityintech #blacktechtwitter You can find Pariss on Twitter: @ParissAthena where you can follow the hashtag #blacktechtwitter You can find the Black Tech Pipleline on Twitter: @BTPipeline and on the… Read More

In this video, I sit down with IT & Cyber Security expert Kim Crawley as we discuss IT, Cyber Security, Information Security (InfoSec) and Operational Security (OpSec), Malware, Cyber Attacks and how they intersect with Cryptocurrency and protecting ourselves online. Visit these sites for more Kim Crawley Content: https://www.alienvault.com/blogs/auth… https://www.peerlyst.com/users/kimber… https://www.tripwire.com/state-of-sec… https://threatvector.cylance.com/en_u… https://hackernoon.com/@kim_crawley For the work of author Mark Russinovich: http://www.trojanhorsethebook.com/

We live in a time where we pass through hundreds if not thousands of websites every year, many of which we have accounts on to either tailor our experience, purchase goods and services or conduct business through. For most of us, trying to remember the login/passwords for all of these sites is next to impossible. This is where password managers come in. Password managers allow users to store all of their passwords… Read More