Archives

An introduction to Ethical Hacking and Penetration Testing with Kim Crawley Thank you for watching! Welcome back to the show, my guest today is Kim Crawley, cybersecurity expert and the co-author of the new book The Pentester Blueprint with Phillip Wylie. I asked Kim here to talk to us about what is pentesting and how it is used. As Nico Sell founder of the Wickr Foundation said in a talk a few… Read More

Cyber Security Threats and Attacks with Kim Crawley In this video, I sit down with IT & Cyber Security expert Kim Crawley as we discuss IT, Cyber Security threats and attacks, Information Security (InfoSec) and Operational Security (OpSec), Malware, Cyber Attacks, and how they intersect with Cryptocurrency and protecting ourselves online. Visit these sites for more Kim Crawley Content: AT&T Cyber Security Tripwire BlackBerry ThreatVector Blog Hackernoon.com Kim is also the co-author… Read More

The Importance of Cybersecurity and Password Managers with Kim Crawley Thank you for watching, in our first episode, I chat with cybersecurity expert and writer Kim Crawley. Kim is co-author with Phillip Wylie of the upcoming book “The Pentester BluePrint,” which is available to pre-order on Amazon.com. Help support Kim’s work and the channel by using our Amazon link: https://amzn.to/2Gf51DP Timestamp 0:00 – 3:56 Kim’s background in tech 4:00 – 6:00 Malware,… Read More

Let’s Talk Privacy, Surveillance and Edward Snowden with Naomi Brockwell In this episode, Naomi Brockwell returns to discuss privacy, surveillance, Edward Snowden, having her videos used in the classroom, and Crypto conferences that don’t pay in Crypto. Naomi Brockwell has been a strong advocate for Bitcoin and Cryptocurrency for nearly as long as Bitcoin and Cryptocurrency have been in existence. Naomi produces a variety on content that focuses on Bitcoin, Cryptocurrency and… Read More

Cyber Security in an Age of Social Media & IOT with Kim Crawley In this episode, I chat again with Cyber Security Expert Kim Crawley. We discuss the recent hack of the Amazon Ring cameras. Lawsuits against TikTok for privacy violations. We also discuss end-to-end encryption, burner email addresses. Visit these sites for more Kim Crawley Content: https://www.alienvault.com/blogs/ https://www.peerlyst.com/ https://www.tripwire.com/ https://threatvector.cylance.com/ https://hackernoon.com/ Kim can be found on Twitter @kim_crawley For more content… Read More

In this video, I sit down with IT & Cyber Security expert Kim Crawley as we discuss IT, Cyber Security, Information Security (InfoSec) and Operational Security (OpSec), Malware, Cyber Attacks and how they intersect with Cryptocurrency and protecting ourselves online. Visit these sites for more Kim Crawley Content: https://www.alienvault.com/blogs/auth… https://www.peerlyst.com/users/kimber… https://www.tripwire.com/state-of-sec… https://threatvector.cylance.com/en_u… https://hackernoon.com/@kim_crawley For the work of author Mark Russinovich: http://www.trojanhorsethebook.com/