mastodon.uno è uno dei tanti server Mastodon indipendenti che puoi usare per partecipare al fediverso.
Mastodon.Uno è la principale comunità mastodon italiana. Con 77.000 iscritti è il più grande nodo Mastodon italiano: anima ambientalista a supporto della privacy e del mondo Open Source.

Statistiche del server:

6,2K
utenti attivi

#personalbranding

5 post4 partecipanti0 post oggi
Spotify for CreatorsNicholas DiCola: Micro-Segmentation: A Game Changer in Network Security di Phillip Wylie ShowSummaryIn this episode of the Philip Wylie Show, host Phillip Wylie interviews Nicholas DiCola from Zero Networks, exploring his background in cybersecurity, the importance of foundational IT skills, and the innovative solutions offered by Zero Networks in the realm of micro-segmentation and zero trust networks. The conversation delves into the challenges of traditional security measures, the efficiency of Zero Networks' approach, and valuable career advice for those looking to enter the cybersecurity field.Takeaways• Nicholas DiCola emphasizes the importance of foundational IT skills for a successful career in cybersecurity.• Micro-segmentation is a critical component of a zero trust security model.• Zero Networks automates the micro-segmentation process, saving significant time for organizations.• Many micro-segmentation projects fail to complete within the tenure of a CISO due to complexity.• Certifications can validate basic skills and show initiative in the cybersecurity field.• Hands-on experience through internships is crucial for aspiring cybersecurity professionals.• Understanding the entire network stack is essential for effective security practices.• Zero Networks' solutions are scalable for organizations of all sizes.• The simplicity of Zero Networks' product allows for easy management and implementation.• Exploring different areas within cybersecurity can help individuals find their true interests. Sound Bites• "I think it's really good that people explore other areas."• "We save them a ton of time."• "Most micro-segmentation projects outlive the tenure of the CISO."• "Micro-segmentation is at the end of the journey."• "It's not your legacy micro-segmentation that you think of."• "I always love to share and talk to people about what I've done."Chapters00:00 Introduction to Nicholas DiCola and Zero Trust Networks02:20 Nicholas DiCola's Background and Career Journey06:06 The Importance of Foundational IT Skills10:25 Navigating Certifications and Career Paths in Cybersecurity12:40 Understanding the Role of Micro-Segmentation19:44 Zero Networks: Solutions and Innovations23:19 Time Savings and Efficiency with Zero Networks28:03 Final Thoughts on Micro-Segmentation and Security PostureResourceshttps://www.linkedin.com/in/ndicola/https://www.linkedin.com/company/zeronetworks/90% of security pros say Zero Trust is critical, yet only 5% use microsegmentation. Why? Network segmentation project are notoriously complex, expensive, with extensive downtime. No longer! Zero Networks makes it easy—fast deployment, no manual work, no headaches.Get the report: https://zeronetworks.com/resource-center/white-papers/network-segmentation-zero-trust-architectures-survey-of-it-security-professionals?utm_medium=social&utm_source=linkedin&utm_campaign=pwpodcast&utm_content=vibresearch&cid=701Uc00000SpVUhIAN
Spotify for CreatorsMike Lisi: Mike Hacks Things di Phillip Wylie ShowSummaryIn this episode of the Phillip Wylie Show, Phillip Wylie and Michael Lisi discuss their backgrounds in hacking and penetration testing, the importance of diverse experiences in the tech field, and the value of certifications like OSCP. They also explore pathways into offensive security, the mission of the Red Team Village, and the role of Capture The Flag (CTF) competitions in learning. The conversation emphasizes the significance of networking and community involvement in the cybersecurity industry.Takeaways• Michael Lisi shares his journey into hacking, starting from building computers as a teenager.• The importance of sharing origin stories to motivate others in the cybersecurity field.• Diverse experiences in IT roles can enhance skills in penetration testing.• The OSCP certification provides valuable hands-on experience, but the landscape of certifications is evolving.• Networking and community involvement are crucial for career advancement in cybersecurity.• The Red Team Village aims to raise awareness and provide skill development in offensive security.• CTFs are beneficial for learning but should not be the sole focus of skill development.• Exploring different roles can help individuals find their true interests in cybersecurity.• The importance of understanding business operations for effective penetration testing.• Volunteering and participating in events can lead to valuable connections and opportunities.Sound Bites• "I didn't have a plan to be a hacker."• "Don't shy away from some of those other roles."• "You want to be as efficient as possible."Resourceshttps://www.linkedin.com/in/mikelisi/https://x.com/MikeHacksThingshttps://malteksolutions.com/https://redteamvillage.io/Chapters00:00 Introduction and Background02:27 Hacker Origin Story06:48 The Importance of Diverse Backgrounds12:59 The Role of OSCP in Career Development16:47 Pathways into Offensive Security19:14 Overview of the Red Team Village22:19 The Value of CTFs in Cybersecurity
Spotify for CreatorsBdubzz: Building Connections in Cybersecurity di Phillip Wylie ShowSummaryIn this episode of the Phillip Wylie Show, Phillip Wylie interviews Bdubzz, a member of the cybersecurity community who shares his journey from a curious child to a professional in application security. Bdubzz discusses the importance of networking, community engagement, and personal branding in the cybersecurity field. He emphasizes the value of volunteering, public speaking, and content creation as ways to grow and connect with others in the industry. The conversation highlights the significance of having a hacker mindset and the opportunities available in Governance, Risk, and Compliance (GRC).Takeaways• Bdubzz has always had a hacker mindset, starting from childhood.• Networking is crucial for job opportunities in cybersecurity.• Volunteering at local events can accelerate community connections.• Public speaking is a skill that improves with practice.• Personal branding is important for visibility in the industry.• Blogging is a foundational step in content creation.• Newcomers to the industry have valuable insights to share.• GRC offers a comprehensive view of cybersecurity practices.• Building friendships in the community can lead to job opportunities.• Being open-minded is essential for learning and mentoring.Sound Bites"Your name is in that person's head.""We all have that one thing in common.""Be consistent in all of that."Chapters00:00 Introduction to the Cybersecurity Community01:01 Bdubzz's Hacker Origin Story03:06 Current Role in Application Security04:43 Networking and Building Relationships11:42 Conferences and Community Involvement14:21 Public Speaking and Personal Growth18:37 Personal Branding and Content Creation27:02 The Importance of GRC in Cybersecurity28:07 Closing Thoughts and Future AspirationsResourceshttps://www.linkedin.com/in/bbrittwhite/https://brittwhite.io/
Spotify for CreatorsLesley Carhart: ICS DFIR Expert di Phillip Wylie ShowSummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie speaks with cybersecurity expert Lesley Carhart about her journey into the field, the importance of community and mentorship, and the unique challenges of working in industrial control systems (ICS) forensics. Leslie shares her hacker origin story, discusses the complexities of ICS security, and recounts a fascinating case study involving a mysterious incident at a power plant. The conversation emphasizes the need for diversity in tech and the vital role of community support in navigating cybersecurity careers.Takeaways• Lesley Carhart's journey into cybersecurity began at a young age with a passion for computers.• The importance of mentorship in the cybersecurity community cannot be overstated.• Industrial Control Systems (ICS) present unique challenges in cybersecurity due to their critical nature.• Understanding processes is key to succeeding in ICS cybersecurity.• Diversity in the tech field has improved over the years, allowing for more varied backgrounds in cybersecurity.• Real-world investigations in ICS can lead to unexpected and humorous outcomes, like the moth story.• Community involvement is crucial for career advancement in cybersecurity.• Self-study and networking are essential for breaking into the cybersecurity field.• The job market for junior cybersecurity professionals is competitive, making community connections vital.• Lesley encourages senior professionals to mentor newcomers to the field. Sound Bites• "I hope we don't end up back there."• "It's been a grand adventure."• "Mentorship can be so, so valuable."Chapters00:00 Introduction to Cybersecurity Community Connections01:43 Lesley Carhart's Hacker Origin Story06:57 Diving into ICS and OT Forensics09:47 Challenges in Industrial Cybersecurity Training13:25 The Complexity of Digital Forensics in ICS15:45 The Moth Story: A Case Study in ICS25:34 The Importance of Community in Cybersecurity30:37 Closing Thoughts and Social Media ConnectionsResourceshttps://www.linkedin.com/in/lcarhart/https://bsky.app/profile/hacks4pancakes.comhttps://infosec.exchange/@hacks4pancakes
Spotify for CreatorsNahamSec: Hacker, Content Creator, Pentester, Trainer di Phillip Wylie ShowSummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie interviews Ben Sadeghipour, known as NahamSec, a prominent figure in the bug bounty community. They discuss NahamSec's journey into hacking, his achievements in bug bounties, and the importance of personal branding and content creation in the cybersecurity field. NahamSec shares insights on transitioning from part-time to full-time bug bounty hunting, the role of automation and AI in the industry, and offers advice for newcomers looking to break into bug bounties. The conversation emphasizes the value of creativity, curiosity, and continuous learning in becoming a successful hacker.Takeaways• NahamSec's journey into hacking began unintentionally as a child.• He achieved the milestone of earning over a million dollars in bug bounties.• Transitioning from part-time to full-time bug bounty hunting requires dedication and understanding of the ecosystem.• Diverse ventures in cybersecurity can enhance skills and knowledge.• Understanding web applications is crucial for bug bounty hunters.• Automation should come after mastering manual exploitation techniques.• AI tools can assist in bug bounty hunting but should not replace manual skills.• Personal branding is essential for career growth in cybersecurity.• Content creation can take many forms, including writing and blogging.• Continuous learning is vital in the ever-evolving field of cybersecurity.Sound Bites• "I have a company called Hacking Hub."• "You need to understand how web apps work."• "Writing is content creation."Resourceshttps://x.com/NahamSechttps://www.linkedin.com/in/nahamsec/https://www.instagram.com/nahamsechttps://www.nahamsec.com/https://www.youtube.com/nahamsecHands-On Web Exploitation Course (NahamSec's Bug Bounty Course)https://app.hackinghub.io/hubs/nahamsec-bug-bounty-course?v=nahamsecdotcom&_trk=09934e30d001cfb67886dca52660e548
Spotify for CreatorsFletus Poston III: Navigating The Ever Changing Career Landscape Of Cybersecurity di Phillip Wylie ShowSummary In this episode of the Phillip Wylie Show, Phillip Wylie interviews Fletus Poston, discussing his journey in cybersecurity, the evolution of email security, and the shift to cloud technology. Fletus shares valuable advice for those looking to break into the field, emphasizing the importance of networking, mentorship, and soft skills. He also provides insights from his experience as a hiring manager, discusses career paths in cybersecurity, and highlights the significance of work-life balance. The conversation concludes with Fletus encouraging listeners to engage with their community and prioritize their well-being. Takeaways • Networking and mentorship are crucial for career growth. • Soft skills are as important as technical skills in cybersecurity. • Your resume should highlight your most relevant experiences at the top. • Participating in community events can lead to job opportunities. • It's okay to transition out of cybersecurity if it's not fulfilling. • Understanding the evolution of technology is key to staying relevant. • Cloud technology has transformed disaster recovery and business continuity. • Engaging with peers can provide valuable insights and support. • Career paths in cybersecurity can vary widely; explore different roles. • Work-life balance is essential for long-term success and happiness. Sound Bites • "It's okay to try this field and not stay." • "You can transition out of the field." • "Are you regretting Monday morning?" Chapters 00:00 Introduction and New Year Reflections 04:51 The Shift to Cloud Solutions 12:02 Networking and Online Platforms 20:13 The Importance of Soft Skills 29:57 Maintaining Work-Life Balance Resources https://www.linkedin.com/in/fletusposton/ https://x.com/fletusposton
Spotify for CreatorsEva Benn: The Power of Resilience in Cybersecurity di Phillip Wylie ShowSummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie interviews Eva Benn, a leader in the cybersecurity field. Eva shares her inspiring journey from a disadvantaged background in Bulgaria to leading the Microsoft Red Team. She discusses the importance of resilience, the role of gaming in developing cybersecurity skills, and offers valuable advice for aspiring professionals in the field. The conversation also covers personal branding, networking authentically, and the significance of continuous learning and growth in one's career.Takeaways• Eva Benn's journey from Bulgaria to leading the Microsoft Red Team is inspiring.• Resilience and determination are key to overcoming challenges.• Gaming can develop strategic thinking skills beneficial for cybersecurity.• Participating in CTFs is crucial for building skills and credibility.• Networking should be genuine and not forced.• Personal branding involves sharing valuable insights and experiences.• Continuous learning is essential in the ever-evolving field of cybersecurity.• Diverse backgrounds can provide unique advantages in cybersecurity roles.• It's important to understand the entire cybersecurity landscape before specializing.• Building meaningful connections takes time and authenticity. Sound Bites• "You have to do what you need to do."• "Be genuine, take it slow."• "You have what it takes."Chapters00:00 Introduction and Background01:12 Eva's Hacker Origin Story04:50 Overcoming Challenges and Embracing Opportunities10:19 The Importance of Hands-On Experience14:05 Advice for Aspiring Pen Testers17:22 Tips for Job Seekers in Cybersecurity21:57 Building a Personal Brand24:51 Networking Naturally30:01 Final Words of WisdomResourceshttps://www.linkedin.com/in/evabenn/https://www.evabenn.com/
Spotify for CreatorsPatrick Laverty: Layer 8 di Phillip Wylie ShowSummaryIn this episode of the Phillip Wylie Show, Patrick Laverty shares his unique journey into the cybersecurity field, emphasizing the diverse backgrounds of professionals in the industry. He discusses the importance of foundational skills, networking, and certifications for those looking to break into penetration testing. The conversation also highlights the significance of social engineering and communication skills, as well as the upcoming Layer 8 Conference focused on OSINT and social engineering. Patrick reflects on the value of podcasting as a means to connect with experts and build a personal brand in the cybersecurity community.Takeaways• Many cybersecurity professionals come from non-IT backgrounds.• Building foundational skills is essential before specializing in penetration testing.• Soft skills, such as communication and report writing, are crucial in cybersecurity roles.• Networking can significantly enhance job prospects in the cybersecurity field.• Certifications can help get past HR but proving skills is more important.• Starting a blog can showcase your learning and skills to potential employers.• Coding is helpful for penetration testing but not mandatory.• Social engineering relies heavily on effective communication skills.• The Layer 8 Conference focuses on OSINT and social engineering topics.• Podcasting can be a valuable tool for networking and learning in cybersecurity.Sound Bites"Networking is key to getting hired.""Coding is helpful, but not a requirement.""Always have something to share with others."Chapters00:00 Introduction to Cybersecurity Journeys04:53 Diverse Paths into Cybersecurity09:36 Foundations for Offensive Security13:10 The Role of Certifications in Cybersecurity17:05 Social Engineering Skills and Training18:54 Layer 8 Conference Overview21:52 The Benefits of Podcasting in Cybersecurity NetworkingResourceshttps://www.linkedin.com/in/plaverty9/https://x.com/plaverty9https://layer8conference.com/
Spotify for CreatorsJoe Vest: OG Red Teamer di Phillip Wylie ShowSummaryIn this episode of the Phillip Wylie Show, Joe Vest shares his extensive journey in the cybersecurity field, from his early days in IT to becoming a prominent figure in red teaming. He discusses the evolution of red teaming, the differences between red teaming and penetration testing, and the importance of understanding technology fundamentals for aspiring security professionals. Joe also reflects on his transition from offensive to defensive security, the challenges of writing a book on red teaming, and offers valuable career advice for those looking to break into the field.Takeaways• Joe Vest emphasizes the importance of community in cybersecurity.• His hacker origin story began in IT, not knowing hacking was a thing.• Red teaming was not common outside of government when he started.• He prefers to define security tests based on goals rather than labels.• The core principles of red teaming have remained unchanged over the years.• Joe has shifted focus to defensive security and detection engineering.• Understanding technology fundamentals is crucial for aspiring security professionals.• He encourages building home labs and practical experience in security.• Writing a book on red teaming was a significant achievement for Joe.• He advises that not everyone will take action on security findings, and that's okay.Chapters00:00 Introduction to Joe Vest and Cybersecurity Community01:59 Joe Vest's Hacker Origin Story09:24 Understanding Red Teaming vs. Pen Testing18:50 Evolution of Red Teaming and Current Trends21:51 Transitioning from Offensive to Defensive Security28:15 Career Changes and Personal Growth in Cybersecurity33:59 The Importance of Foundational Knowledge in Security39:15 Lessons Learned and Advice for Aspiring Security ProfessionalsResourceshttps://www.linkedin.com/in/joe-vest/https://x.com/joevesthttps://redteam.guide/
Spotify for CreatorsJorge Reyes: From Atmospheric Sciences to Cybersecurity di Phillip Wylie ShowSummaryIn this episode of the Phillip Wylie Show, Jorge Reyes shares his journey into cybersecurity, discussing his background in atmospheric sciences, the importance of mentorship, and the value of teaching. He emphasizes the significance of hands-on experience, the necessity of understanding different domains within cybersecurity, and the importance of networking. Jorge also provides practical advice for aspiring cybersecurity professionals, highlighting the need for continuous learning and proactive career management.Takeaways• Sharing experiences can save others time in learning.• Mistakes are essential for growth and learning.• Internships provide valuable hands-on experience.• Teaching helps reinforce knowledge and communication skills.• Understanding different domains in cybersecurity is crucial.• Networking is key to finding opportunities.• Proactive career management leads to better outcomes.• Continuous learning is necessary in the tech field.• Hands-on experience is vital for skill development.• Being open to diverse projects enhances career growth.Sound Bites• "Teaching is very fulfilling."• "You have to continuously learn."• "Be open to not get siloed."Resourceshttps://www.linkedin.com/in/jrsec/https://jrsec.github.io/2022-09-29-cybersecurity-entry-level-plan/https://www.amazon.com/Extreme-Ownership-U-S-Navy-SEALs/dp/1250067057
Spotify for CreatorsJeff Caruso: Inside Cyber Warfare di Phillip Wylie ShowSummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie interviews Jeff Caruso, an expert in cyber warfare and author of a book on the subject. They discuss Jeff's unique background, including his experience in the Coast Guard and his transition into the world of cybersecurity. The conversation delves into the evolution of cyber warfare, the integration of information warfare, and the challenges posed by misinformation. Jeff emphasizes the importance of resilience in cybersecurity and the need for individuals and organizations to prepare for future threats, including the implications of artificial intelligence in this landscape.Takeaways• Jeff Caruso shares his unique hacker origin story.• Cyber warfare has evolved significantly since 2008.• Information warfare is now a critical component of conflict.• Misinformation can easily manipulate public perception.• The importance of resilience in cybersecurity cannot be overstated.• Future threats require proactive preparation and awareness.• AI presents both opportunities and challenges in cybersecurity.• Understanding the threat landscape is essential for defense.• The integration of cyber and physical operations is a new norm.• Individuals should apply common sense to their personal security. Sound Bites• "You can put up the fact, right?"• "We lost an educated population."Chapters00:00 Introduction to Jeff Caruso00:56 Jeff's Hacker Origin Story06:10 Evolution of Cyber Warfare13:02 The Role of Information Warfare19:23 The Impact of Misinformation24:53 Cybersecurity Challenges and Resilience30:53 Preparing for Future Threats33:18 AI and Cybersecurity ThreatsResourceshttps://www.linkedin.com/in/jeffreycaruso/Inside Cyber Warfare, 3rd Edition https://www.oreilly.com/library/view/inside-cyber-warfare/9781098138509/
Spotify for CreatorsSyntax976: From Curiosity to Cybersecurity di Phillip Wylie ShowSummaryIn this episode of the Phillip Wylie Show, host Phillip Wylie engages in a conversation with Syntax, a prominent figure in the hacker community. They discuss their connection through social media, the vibrant hacker culture, and Syntax's personal journey into hacking, which began at a young age. The conversation explores the evolution of the hacker community, emphasizing inclusivity and diversity, and offers valuable advice for aspiring cybersecurity professionals. Syntax shares insights on the importance of curiosity and networking within the community, making this episode a rich resource for anyone interested in cybersecurity.Takeaways• Syntax's journey into hacking began at age 10.• The hacker community values knowledge over appearance.• Inclusivity in cybersecurity has improved over the years.• Conferences like DEF CON foster a sense of family.• Curiosity is essential for success in cybersecurity.• Networking is crucial for professional growth.• The hacker culture is built on sharing and collaboration.• Diversity in the community enhances innovation.• Engaging with others at conferences can lead to opportunities.• Continuous learning is vital in the tech field.Sound Bites• "I was super shy and quiet."• "Teach yourself to be curious."• "Talk to everyone."Chapters00:00 Introduction and Connection03:24 Syntax's Hacker Origin Story11:13 The Evolution of the Hacker Community18:00 Diversity and Inclusion in Cybersecurity25:24 Advice for Aspiring Cybersecurity Professionals30:23 Closing Thoughts and Conference RecommendationsResourceshttps://x.com/syntax976https://www.linkedin.com/in/brandon-prince-27a0ab51/
Spotify for CreatorsNicholas DiCola: Micro-Segmentation: A Game Changer in Network Security di Phillip Wylie ShowSummaryIn this episode of the Philip Wylie Show, host Phillip Wylie interviews Nicholas DiCola from Zero Networks, exploring his background in cybersecurity, the importance of foundational IT skills, and the innovative solutions offered by Zero Networks in the realm of micro-segmentation and zero trust networks. The conversation delves into the challenges of traditional security measures, the efficiency of Zero Networks' approach, and valuable career advice for those looking to enter the cybersecurity field.Takeaways• Nicholas DiCola emphasizes the importance of foundational IT skills for a successful career in cybersecurity.• Micro-segmentation is a critical component of a zero trust security model.• Zero Networks automates the micro-segmentation process, saving significant time for organizations.• Many micro-segmentation projects fail to complete within the tenure of a CISO due to complexity.• Certifications can validate basic skills and show initiative in the cybersecurity field.• Hands-on experience through internships is crucial for aspiring cybersecurity professionals.• Understanding the entire network stack is essential for effective security practices.• Zero Networks' solutions are scalable for organizations of all sizes.• The simplicity of Zero Networks' product allows for easy management and implementation.• Exploring different areas within cybersecurity can help individuals find their true interests. Sound Bites• "I think it's really good that people explore other areas."• "We save them a ton of time."• "Most micro-segmentation projects outlive the tenure of the CISO."• "Micro-segmentation is at the end of the journey."• "It's not your legacy micro-segmentation that you think of."• "I always love to share and talk to people about what I've done."Chapters00:00 Introduction to Nicholas DiCola and Zero Trust Networks02:20 Nicholas DiCola's Background and Career Journey06:06 The Importance of Foundational IT Skills10:25 Navigating Certifications and Career Paths in Cybersecurity12:40 Understanding the Role of Micro-Segmentation19:44 Zero Networks: Solutions and Innovations23:19 Time Savings and Efficiency with Zero Networks28:03 Final Thoughts on Micro-Segmentation and Security PostureResourceshttps://www.linkedin.com/in/ndicola/https://www.linkedin.com/company/zeronetworks/90% of security pros say Zero Trust is critical, yet only 5% use microsegmentation. Why? Network segmentation project are notoriously complex, expensive, with extensive downtime. No longer! Zero Networks makes it easy—fast deployment, no manual work, no headaches.Get the report: https://zeronetworks.com/resource-center/white-papers/network-segmentation-zero-trust-architectures-survey-of-it-security-professionals?utm_medium=social&utm_source=linkedin&utm_campaign=pwpodcast&utm_content=vibresearch&cid=701Uc00000SpVUhIAN