Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/79/14/33/791433c7-52da-f3b6-a453-bbf992946ecd/mza_10604889840378575100.jpg/600x600bb.jpg
You Deserve to be Hacked
CovertSwarm
39 episodes
2 weeks ago
AI is changing how we work and how we get hacked. Every day, employees rely on large language models to draft emails, summarize data, and solve problems. But the same conversational power that makes them useful also makes them vulnerable. The words we use can shape, persuade, or even exploit the systems we trust. In this episode, we speak with Elle Neal, AI and data scientist at Databutton and associate at AI4C, and Ibai Castells, Senior Hive Member at CovertSwarm, about how communication, ps...
Show more...
Technology
Business,
News,
Tech News
RSS
All content for You Deserve to be Hacked is the property of CovertSwarm and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
AI is changing how we work and how we get hacked. Every day, employees rely on large language models to draft emails, summarize data, and solve problems. But the same conversational power that makes them useful also makes them vulnerable. The words we use can shape, persuade, or even exploit the systems we trust. In this episode, we speak with Elle Neal, AI and data scientist at Databutton and associate at AI4C, and Ibai Castells, Senior Hive Member at CovertSwarm, about how communication, ps...
Show more...
Technology
Business,
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/79/14/33/791433c7-52da-f3b6-a453-bbf992946ecd/mza_10604889840378575100.jpg/600x600bb.jpg
Episode 21 - Transitioning from Bug Bounty to Constant Cyber Attack
You Deserve to be Hacked
36 minutes
1 year ago
Episode 21 - Transitioning from Bug Bounty to Constant Cyber Attack
Bug Bounty programmes can form an effective component of an organization's security strategy. However, they are prone to testing blindspots, variable quality, and uncertainty around tester skillsets and backgrounds. Join CovertSwarm COO, Luke Potter, as he interviews Ignacio Garrido on his move from working with popular Bug Bounty vendors over to joining our Swarm of ethical hackers full-time. Hear how his work delivering our Constant Cyber Attack service has changed his career and ab...
You Deserve to be Hacked
AI is changing how we work and how we get hacked. Every day, employees rely on large language models to draft emails, summarize data, and solve problems. But the same conversational power that makes them useful also makes them vulnerable. The words we use can shape, persuade, or even exploit the systems we trust. In this episode, we speak with Elle Neal, AI and data scientist at Databutton and associate at AI4C, and Ibai Castells, Senior Hive Member at CovertSwarm, about how communication, ps...