
Sign up to save your podcasts
Or
Memes are goofy. They’re easily recognizable. And they’re often used to make a point. So it’s no wonder that people on both sides of the InfoSec community are not only familiar with memes, but often use them in their endless games of cat and mouse. Consequently, memes are often a sign of a breach of security. Because there’s little as satisfying as leaving a meme as proof of your security prowess.
On this episode of Compiler, we hear from a couple of Red Hatters who rose to an unusual security challenge. And while intentions were good, the memes could have easily been something much more nefarious.
4.7
5656 ratings
Memes are goofy. They’re easily recognizable. And they’re often used to make a point. So it’s no wonder that people on both sides of the InfoSec community are not only familiar with memes, but often use them in their endless games of cat and mouse. Consequently, memes are often a sign of a breach of security. Because there’s little as satisfying as leaving a meme as proof of your security prowess.
On this episode of Compiler, we hear from a couple of Red Hatters who rose to an unusual security challenge. And while intentions were good, the memes could have easily been something much more nefarious.
272 Listeners
283 Listeners
584 Listeners
624 Listeners
181 Listeners
1,016 Listeners
284 Listeners
317 Listeners
407 Listeners
989 Listeners
7,917 Listeners
163 Listeners
311 Listeners
63 Listeners
58 Listeners