Cyber Security Sauna
Latest Episodes
035| Threat Hunting & Why It's All About People
Threat hunting has become a buzzword in the industry of late. But what is it all about? Why should companies consider using threat hunting as a part of their security strategy? Connor Morley, threat hunter with F-Secure, stops by to discuss how his...
034| Balancing AI: Privacy, Misuse, Ethics and the Future
While AI and machine learning are enabling definite advances in the digital world, these technologies are also raising privacy and ethical concerns. What does AI mean for personal privacy, and is it being exploited unethically? Are these concerns...
033| Cyber Security Education from Student and Teacher Perspectives
Cyber security has never been a hotter field to get into, but how do you gain the skills needed for landing a job? There are various paths to a cyber security career, from a formal university education to being a self-taught hacker. In this episode we...
032| How California's New Privacy Law Strikes Where the Pain Is
Following in the footsteps of GDPR, the US is seeing more progressive data privacy laws coming down, with the new California Consumer Privacy Act leading the charge. What does the CCPA mean for consumers and for companies? What can the US learn from...
031| Filtered & Fragmented: Is True Internet Freedom a Thing of the Past?
The internet seems to be changing from being a relatively unrestricted space into something more regulated. More countries are implementing policies that restrict or filter the way their citizens experience the online world. Is the internet we know...
030| Talking Infosec to Non-Infosec Folks
Cyber security is relevant for everyone. Not everyone realizes it though, and not everyone understands what those in the infosec industry take for granted. How should security-minded individuals communicate with friends, relatives, colleagues and the...
029| Ask a Hacker: Red Teamer Answers Listener Questions
In this episode, veteran hacker and red teamer answers questions from our listeners. Tom covers the ethics of ethical hacking, how to prioritize solving the myriad of security issues companies face, why he includes a banana in his hacking kit, the...
028| When the Well is Poisoned: The Devastation of Supply Chain Attacks
Supply chain attacks are on the increase, with attackers abusing the trust we place in vendors and software. Why are these attacks growing, and what can companies do about them? , senior security consultant at F-Secure, joins the show to share his...
027| The Connected Home Meets the IoT Tire Fire
The modern home is continually getting more connected. But as much as we love our virtual assistants, smart thermostats and cloud-enabled security cameras, are we really aware of the risks they invite into our homes? And how can we enjoy the latest...
026| Safe Browsing & Secure Web Development
"Don't go to shady websites" was the advice people were given back in the day. But now it's not always possible to tell when you're in danger, as even reputable websites can be compromised. So how can you know if a website is legitimate and...