Sprocket Security | AoB Podcast

AoB Podcast Resources

AoB Podcast

Latest AoB Podcast Resources

Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor
Apr 22, 2025 6 min read

Ahead of the Breach - Ayyappan Rajesh, Offensive Security Engineer at Block Harbor

Ayyappan Rajesh, Offensive Security Engineer at Block Harbor Cybersecurity, takes Casey deep into the technical underbelly of wireless security testing in this illuminating episode of Ahead of the Breach.
READ MORE
Ahead of the Breach - Eyal Paz, VP of Research at OX Security
Apr 09, 2025 6 min read

Ahead of the Breach - Eyal Paz, VP of Research at OX Security

Introducing security into development pipelines is walking a tightrope — one false step can turn developers against your security program.
READ MORE
Ahead of the Breach - Joshua Brown, Founder of Digital Defense Consulting
Mar 25, 2025 7 min read

Ahead of the Breach - Joshua Brown, Founder of Digital Defense Consulting

Dive deep into why security leaders must abandon technical jargon for financial impact metrics when speaking to executives.
READ MORE
Ahead of the Breach - Danika Mirdita, Security Researcher at Fraunhofer Institute for Secure Information Technology
Mar 12, 2025 5 min read

Ahead of the Breach - Danika Mirdita, Security Researcher at Fraunhofer Institute for Secure Information Technology

Explore how fixed query patterns and short manifest lifecycles combine to undermine Internet routing security.
READ MORE
Ahead of the Breach - DK Koran, BISO at NerdWallet
Feb 25, 2025 5 min read

Ahead of the Breach - DK Koran, BISO at NerdWallet

DK Koran, BISO at NerdWallet, brings this episode of Ahead of the Breach unique insights from his extensive background testing critical infrastructure to his role leading application security.
READ MORE
Ahead of the Breach - Nir Rothenberg, CISO/CIO, Rapyd
Feb 13, 2025 4 min read

Ahead of the Breach - Nir Rothenberg, CISO/CIO, Rapyd

Nir Rothenberg, CISO/CIO at Rapyd, takes us behind the scenes of Pegasus, one of the most discussed cyber tools in recent history.
READ MORE
1 2 3 4 »