
Sign up to save your podcasts
Or
Memes are goofy. They’re easily recognizable. And they’re often used to make a point. So it’s no wonder that people on both sides of the InfoSec community are not only familiar with memes, but often use them in their endless games of cat and mouse. Consequently, memes are often a sign of a breach of security. Because there’s little as satisfying as leaving a meme as proof of your security prowess.
On this episode of Compiler, we hear from a couple of Red Hatters who rose to an unusual security challenge. And while intentions were good, the memes could have easily been something much more nefarious.
4.7
5555 ratings
Memes are goofy. They’re easily recognizable. And they’re often used to make a point. So it’s no wonder that people on both sides of the InfoSec community are not only familiar with memes, but often use them in their endless games of cat and mouse. Consequently, memes are often a sign of a breach of security. Because there’s little as satisfying as leaving a meme as proof of your security prowess.
On this episode of Compiler, we hear from a couple of Red Hatters who rose to an unusual security challenge. And while intentions were good, the memes could have easily been something much more nefarious.
1,627 Listeners
896 Listeners
14,011 Listeners
3,656 Listeners
629 Listeners
274 Listeners
154 Listeners
314 Listeners
55,962 Listeners
7,853 Listeners
452 Listeners
180 Listeners
314 Listeners
6,442 Listeners
64 Listeners