
Sign up to save your podcasts
Or


Memes are goofy. They’re easily recognizable. And they’re often used to make a point. So it’s no wonder that people on both sides of the InfoSec community are not only familiar with memes, but often use them in their endless games of cat and mouse. Consequently, memes are often a sign of a breach of security. Because there’s little as satisfying as leaving a meme as proof of your security prowess.
On this episode of Compiler, we hear from a couple of Red Hatters who rose to an unusual security challenge. And while intentions were good, the memes could have easily been something much more nefarious.
By Red Hat4.7
5858 ratings
Memes are goofy. They’re easily recognizable. And they’re often used to make a point. So it’s no wonder that people on both sides of the InfoSec community are not only familiar with memes, but often use them in their endless games of cat and mouse. Consequently, memes are often a sign of a breach of security. Because there’s little as satisfying as leaving a meme as proof of your security prowess.
On this episode of Compiler, we hear from a couple of Red Hatters who rose to an unusual security challenge. And while intentions were good, the memes could have easily been something much more nefarious.

187 Listeners

1,705 Listeners

288 Listeners

2,011 Listeners

555 Listeners

2,143 Listeners

1,391 Listeners

626 Listeners

583 Listeners

1,028 Listeners

418 Listeners

985 Listeners

8,077 Listeners

175 Listeners

139 Listeners