Certified Vulnerable: How Certificates Can Be Exploited
A discussion with ITAL members Eric Brown and Scott Rysdahl with Micah Kryzer. Micah is a pentester by day but also works alongside the ITAL team. In this episode the crew overviews certificates, a big topic that transcends any one vendor or environment. Certificates are like an electronic passport meant to uniquely identify a person, […]
So, you wanna be a CISO?
An in-depth conversation with former CISO (Chief Information Security Officer) of the Minnesota Judicial and Metropolitan Council, Gretchen White. ITAL’s own Eric Brown and Gretchen discuss topics including the day-to-day grind of advocating for funding and implementing security protocols, how to prioritize security needs and access risk on a budget, reporting structure, and how to […]
Hacking Hardware Hobbies with Dennis Pelton
This week, we are speaking with Dennis Pelton about his expertise in hardware. He makes badges for all the major security conferences and loves to share his knowledge in this space. #security #hacking #wifi #rubberducky #hardware #defcon #schmoo #defcon #bsides
Security in the News: Cloud Policies and Data Breach Prevention
Continue the conversation with guest, Matt Starland, as we dive further into security in the news. How do these breaches happen and how can they be prevented? Find out today on The Audit. #Breaches #ThreatActors #CyberSecurity #TheAudit
Cyber Safe Travel: Tips for Secure Adventures
Traveling for Spring Break, vacation, or work? Join The Audit and guest ethical hacker, Matthew Wold, to hear best practices for keeping your journey cyber-secure.
So, You Want to Be in Cybersecurity?
In this episode, The Audit discusses day-to-day operations in the industry with cybersecurity expert, Nate Ristine. From creating and hunting down phishing emails, to the emotional aspect of social engineering, find out what tools Nate uses to make it all happen.
What is the Dark Web?
Hardware hacking transforms from mysterious craft to accessible art form in this captivating conversation with Dennis Pelton, whose electronic creations blend security education with playful innovation. At the center of our discussion is Dennis's remarkable business card—a seemingly ordinary rectangle concealing a microchip with his encrypted resume, challenging potential employers to demonstrate their technical prowess […]
Security in the News: Architects, APIs, and Alaska
Digital security breaches continue to dominate headlines, with T-Mobile's recent API vulnerability exposing personal data from 37 million customer accounts marking their eighth major security incident in just five years. What's behind this alarming pattern, and what does it tell us about the state of cybersecurity today? In this thought-provoking discussion, we're joined by cybersecurity […]
It’s a Pwnagotchi Party!
Join the IT Audit Labs crew to talk about Pwnagotchi’s! We will review how a pwnagotchi collects keys/wpa/wpa2 information from 4-way wifi handshakes, and how to crack those keys/how the key exchange functions. It’s a pwnagotchi party!
Wireless Attack Kill Chain for n00bs with Dennis Pelton
Did you know that your Wi-fi is even vulnerable to attacks? Tune in to hear our guest, Dennis, talk about kill chain, DOS attacks, Wi-Fi reconnaissance, and more. For more information about relevant attacks and ways to protect your network, listen to The Audit today! #wifi #cybersecurity #itauditlabs #theaudit Follow our guest Dennis Pelton on […]