Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/7b/7c/82/7b7c8223-aa9c-7d89-e97e-c7ec2499546a/mza_17325453448474617796.jpg/600x600bb.jpg
SECURITY.COM The Podcast
Daniel Tu Mellinger
8 episodes
2 days ago
In-depth intel. Real talk. Human factor. Join Dan Mellinger, your go-to cybersecurity communicator, and Paul Miller, seasoned threat intelligence and operations leader, as they bridge the gap between cutting-edge security tech and the humans who make it work. Every first and third week each month, they unpack security stories and technical deep dives—from threat hunting to the not-so-secrets of Data Security and SSE others won’t tell you—all rooted in the same high‑quality content and bold thought leadership you’ve come to expect from SECURITY.COM.
Show more...
Technology
RSS
All content for SECURITY.COM The Podcast is the property of Daniel Tu Mellinger and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In-depth intel. Real talk. Human factor. Join Dan Mellinger, your go-to cybersecurity communicator, and Paul Miller, seasoned threat intelligence and operations leader, as they bridge the gap between cutting-edge security tech and the humans who make it work. Every first and third week each month, they unpack security stories and technical deep dives—from threat hunting to the not-so-secrets of Data Security and SSE others won’t tell you—all rooted in the same high‑quality content and bold thought leadership you’ve come to expect from SECURITY.COM.
Show more...
Technology
Episodes (8/8)
SECURITY.COM The Podcast
Authentically Marketing Cybersecurity

Dan sits down with Monica White, the CMO of the Enterprise Security Group at Broadcom (and his boss), to talk about the often winding career paths in marketing, early best practices, and understand how authenticity is the key to build durable brands.

Show more...
2 weeks ago
47 minutes 37 seconds

SECURITY.COM The Podcast
From Cybersecurity Products to Platforms

Dan sits down with his colleague Nate Fitzgerald (head of product management for ESG) to discuss how and why the cybersecurity market has been transitioning from individual Products to (sometimes) integrated Platforms.

Show more...
1 month ago
32 minutes 32 seconds

SECURITY.COM The Podcast
Cybersecurity Testing: Tuned for the Test or Tuned for the Real World?

Simon Edwards, Founder and CEO of SE Labs, and Adam Bromwich, CTO of the Enterprise Security Group at Broadcom join Dan in Las Vegas to dive into the details on cybersecurity testing which has been one of the more consistently dramatic topics in the industry.Definitely check out SE Labs to learn more from the best real world performance testing in the industry: https://selabs.uk

Show more...
1 month ago
35 minutes 22 seconds

SECURITY.COM The Podcast
Diving Deep Into Vulnerability Risk Modeling w/ Empirical Security

Recorded from Hacker Summer Camp in Las Vegas, Dan dives deep into the history and current state of measuring cybersecurity vulnerability risk at scale with the team from Empirical Security. Ed, Michael, and Wade discuss some of the history of vulnerability measurement through the last decade and how they thin the time is now for organizations to start applying highly-specific local vulnerability modeling to their security strategies.There is a ton of amazing information you won't find anywhere else on the Empirical Security Blog: https://www.empiricalsecurity.com

Show more...
2 months ago
58 minutes 36 seconds

SECURITY.COM The Podcast
Cybersecurity Tips For Seniors and Parents w/ Alex East

Dan sits down with author Alex East to discuss cybersecurity tips for Seniors and Parents.

You can find Alex's books on Amazon: https://www.amazon.com/stores/Alex-Ea...

Sorry about the video quality, one of the SSDs on the external recorder was having issues.

Show more...
2 months ago
26 minutes 16 seconds

SECURITY.COM The Podcast
Preventing a Nuclear Apocalypse with Threat Intel

Paul Miller recounts a critical incident involving threat intelligence that potentially prevented a nuclear disaster. They explore the geopolitical context surrounding the incident, the challenges of incident response, and the complexities of attributing cyber attacks to specific threat actors. The conversation highlights the importance of threat intelligence in understanding and mitigating risks, as well as best practices for incident response in the face of evolving cyber threats.Takeaways:- Threat intelligence is crucial for understanding cyber threats.- Geopolitical events can significantly impact cybersecurity.- Incident response requires quick decision-making and analysis.- Attribution of cyber attacks is complex and fraught with challenges.- Cybersecurity incidents can have far-reaching consequences.- Effective communication with government agencies is essential.- Historical data analysis is key to threat hunting.- Most cybersecurity work involves routine tasks, with occasional high-stakes incidents.- The evolution of cyber threats necessitates constant vigilance and adaptation.- Collaboration within the cybersecurity community enhances overall defense strategies.

Show more...
3 months ago
32 minutes 16 seconds

SECURITY.COM The Podcast
Navigating Hacker Summer Camp

In the first episode of SECURITY.COM The Podcast, hosts Dan Mellinger and Paul Miller discuss the upcoming Hacker Summer Camp, which includes major cybersecurity conferences like DEF CON, Black Hat, and B-Sides. They provide an overview of each event, highlighting their unique focuses and the importance of networking and learning. The conversation also covers essential safety tips for attendees, emphasizing the need for encryption and caution in sharing personal information. The episode concludes with a preview of future topics and a reminder to stay curious and human in the cybersecurity field.


Takeaways

  • Hacker Summer Camp includes DEF CON, Black Hat, and B-Sides.
  • Diana Initiative aims to increase diversity in cybersecurity.
  • B-Sides is known for its high-quality talks and community feel.
  • Black Hat focuses on actionable content for corporate security.
  • DEF CON is the largest hacking conference, celebrating all aspects of hacking.
  • Attendees should prioritize safety and use VPNs during conferences.
  • Cash ATMs in casinos are safer than others for withdrawals.
  • Be cautious of oversharing personal information at events.
  • Use encrypted communication tools to protect data.
  • The Wall of Sheep highlights the importance of cybersecurity awareness.


Show more...
3 months ago
38 minutes 57 seconds

SECURITY.COM The Podcast
Welcome To SECURITY.COM The Podcast

Join Dan Mellinger, your go-to cybersecurity communicator, and Paul Miller, seasoned threat intelligence and operations leader, on SECURITY.COM The Podcast, a show that bridges the gap between cutting-edge security tech and the humans who make it work. Delivering enterprise-grade security insights for all.Every first and third week each month, they unpack hard-nosed technical deep dives—from threat hunting and breaking analysis to the not-so-secrets of Data Security and SSE others won’t tell you—all rooted in the same high‑quality content and bold thought leadership you’ve come to expect on SECURITY.COM.

Show more...
3 months ago
1 minute 13 seconds

SECURITY.COM The Podcast
In-depth intel. Real talk. Human factor. Join Dan Mellinger, your go-to cybersecurity communicator, and Paul Miller, seasoned threat intelligence and operations leader, as they bridge the gap between cutting-edge security tech and the humans who make it work. Every first and third week each month, they unpack security stories and technical deep dives—from threat hunting to the not-so-secrets of Data Security and SSE others won’t tell you—all rooted in the same high‑quality content and bold thought leadership you’ve come to expect from SECURITY.COM.