
Sign up to save your podcasts
Or


"Hacking" is a word that evokes awe from the public, laughter from developers, and pure fear from technology leaders. But what really is hacking? What does trust really mean and how do we acquire and keep trust on the Internet? It turns out that, while hacking is associated with computers, the methods behind it have been around since the dawn of time. Today we have Ted Harrington from ISE to dive deep into hacking, all the way from the medieval times to today.
00:00:15 Intro
00:01:25 Introducing Ted Harrington
00:07:10 Ethical Hackers, Non-Ethical Hackers, and Productivity
00:11:58 Starting out in Ethical Hacking/Security
00:14:40 Imposter Syndrome
00:19:34 What is Hacking?
00:30:48 Is Hacking like magic?
00:38:14 Defense in Depth
00:42:04 Earning trust and The Departed movie (Spoiler alert)
00:59:52 DEF CON® Hacking Conference
01:02:46 Tips on how not to get hacked
01:10:08 ISE.io culture and opportunities
01:24:13 Farewells
Resources mentioned in this episode:
Companies:
ISE (Independent Security Evaluators)
o Website: https://www.ise.io/
o LinkedIn: https://www.linkedin.com/company/independent-security-evaluators
o Twitter: https://twitter.com/ISEsecurity
o Facebook: https://facebook.com/ISE.infosec
People:
Ted Harrington
o Website: https://www.tedharrington.com/
o LinkedIn: https://www.linkedin.com/in/securityted/
o Twitter: https://twitter.com/SecurityTed
o Book: https://www.amazon.com/Hackable-How-Application-Security-Right/dp/154451767X
Sponsor:
MParticle
o Website: https://www.mparticle.com/
If you’ve enjoyed this episode, you can listen to more on Programming Throwdown’s website: https://www.programmingthrowdown.com/
Reach out to us via email: [email protected]
You can also follow Programming Throwdown on
Facebook | Apple Podcasts | Spotify | Player.FM
Join the discussion on our Discord
Help support Programming Throwdown through our Patreon
By Patrick Wheeler and Jason Gauci4.6
552552 ratings
"Hacking" is a word that evokes awe from the public, laughter from developers, and pure fear from technology leaders. But what really is hacking? What does trust really mean and how do we acquire and keep trust on the Internet? It turns out that, while hacking is associated with computers, the methods behind it have been around since the dawn of time. Today we have Ted Harrington from ISE to dive deep into hacking, all the way from the medieval times to today.
00:00:15 Intro
00:01:25 Introducing Ted Harrington
00:07:10 Ethical Hackers, Non-Ethical Hackers, and Productivity
00:11:58 Starting out in Ethical Hacking/Security
00:14:40 Imposter Syndrome
00:19:34 What is Hacking?
00:30:48 Is Hacking like magic?
00:38:14 Defense in Depth
00:42:04 Earning trust and The Departed movie (Spoiler alert)
00:59:52 DEF CON® Hacking Conference
01:02:46 Tips on how not to get hacked
01:10:08 ISE.io culture and opportunities
01:24:13 Farewells
Resources mentioned in this episode:
Companies:
ISE (Independent Security Evaluators)
o Website: https://www.ise.io/
o LinkedIn: https://www.linkedin.com/company/independent-security-evaluators
o Twitter: https://twitter.com/ISEsecurity
o Facebook: https://facebook.com/ISE.infosec
People:
Ted Harrington
o Website: https://www.tedharrington.com/
o LinkedIn: https://www.linkedin.com/in/securityted/
o Twitter: https://twitter.com/SecurityTed
o Book: https://www.amazon.com/Hackable-How-Application-Security-Right/dp/154451767X
Sponsor:
MParticle
o Website: https://www.mparticle.com/
If you’ve enjoyed this episode, you can listen to more on Programming Throwdown’s website: https://www.programmingthrowdown.com/
Reach out to us via email: [email protected]
You can also follow Programming Throwdown on
Facebook | Apple Podcasts | Spotify | Player.FM
Join the discussion on our Discord
Help support Programming Throwdown through our Patreon

271 Listeners

383 Listeners

289 Listeners

626 Listeners

268 Listeners

585 Listeners

288 Listeners

987 Listeners

486 Listeners

190 Listeners

245 Listeners

64 Listeners

142 Listeners

62 Listeners

64 Listeners