
Cyber Humanity
Technology Podcasts
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social...
Location:
United Kingdom
Genres:
Technology Podcasts
Description:
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two main flavors. We’re either ranting about themes close to the heart of us security types, or we’re discussing threats and vulnerabilities that have hit headlines – or slipped under the radar – in recent weeks. Join Camille Mallon (tech advocate and keeper of the coloring pencils), Kev Breen (pro blue teamer, also known as 'Mr Nothing to CVE here...'), Emma Walker (), and other special guests as they wend their way through the murky world of Cyber Humanity.
Twitter:
@immersivelabsuk
Language:
English
Contact:
07901 558 175
47: Drone Strikes and Cyber Heists
Duration:00:37:22
46: New Threats On The Block?
Duration:00:49:53
45: Tales from the Crypto
Duration:00:47:58
44: Rotten Apples or Privacy Nuts?
Duration:00:45:16
43: Pegasus Project: Winged Horses for Spyware Courses
Duration:00:36:10
42: Hey Ya Kaseya: MSPs as unwitting attackers
Duration:00:46:34
41: Cyber Wars: Revenge of the Printers
Duration:00:43:08
40: Slack, Track and...Hack?
Duration:00:55:41
39: The Crime That Pays: Ransomware Special
Duration:00:47:35
38: Ransom Laundering: Can We Ban Crypto?
Duration:00:40:08
37: Imperfect People, Vulnerable Applications
Duration:00:52:31
36: Hack Pipe: The Rise of DarkSide
Duration:00:45:03
35: Exchange Hack: We don’t need no attribution
Duration:00:35:41
34: So you want to hack a car...
Duration:00:48:04
33: Parler’s proper privacy palaver
Duration:00:49:06
32: Breaches, Damned Breaches, and Statistics
Duration:00:53:25
31: Sunburst: Too Cozy To Bear
Duration:00:48:26
30: Cold Chain Hype Train.
Duration:00:32:58
29: A Cyber State of Mind
Duration:00:46:06
28: So you want to hack an election...
Duration:00:46:15