Couverture de Hack Dissection

Hack Dissection

Hack Dissection

De : Click Stream Studios
Écouter gratuitement

3 mois pour 0,99 €/mois

Après 3 mois, 9.95 €/mois. Offre soumise à conditions.

À propos de ce contenu audio

🔍 Welcome to Hack Dissection, where we pull back the curtain on cybersecurity, ethical hacking, and the digital threats shaping our world. Hosted by Mike Lisi, founder of Maltek Solutions and an expert in Hacking For Good, this podcast takes you behind the scenes of real-world cyber attacks, penetration testing, and security strategies that keep businesses and individuals safe. 💻 What You’ll Get in Every Episode: ✅ Deep dives into ethical hacking and cybersecurity trends ✅ Breakdowns of real cyber threats—how they happen & how to stop them ✅ Insider stories from security professionals, red teamers, and industry experts ✅ Practical tips to strengthen your security and protect your data 📢 Subscribe & Stay Ahead of Cyber Threats! If you're a business owner, IT professional, or just someone who wants to understand cybersecurity without the jargon, you’re in the right place.

Click Stream Studios
Les membres Amazon Prime bénéficient automatiquement de 2 livres audio offerts chez Audible.

Vous êtes membre Amazon Prime ?

Bénéficiez automatiquement de 2 livres audio offerts.
Bonne écoute !
    Épisodes
    • Episode 0x9
      Dec 8 2025

      In Episode 0x9 of Hack Dissection, host Mike Lisi flips the perspective from offense to defense with guest Cody Spooner, Principal Sales Engineer at Corelight.

      While Mike spends his days breaking into networks, Cody helps organizations defend them. Together they unpack how visibility, monitoring, and mindset intersect in modern cybersecurity — from the SOC Triad (SIEM, EDR, NDR) to the realities of MDR services, threat hunting, and alert fatigue.

      They dig into:

      • Why companies think they’re protected but still miss every alert
      • How to turn red-team findings into real defensive improvements
      • What threat hunting actually means (and why it’s not just a buzzword)
      • Lessons from ransomware incidents and tabletop exercises
      • How small businesses can build effective defenses without enterprise budgets

      If you’ve ever wondered what happens after the pen testers pack up, this conversation connects the offensive and defensive sides of the same fight — and shows how better collaboration can close the gap.

      Afficher plus Afficher moins
      1 h et 2 min
    • Episode 0x8
      Oct 31 2025

      In this episode of Hack Dissection, host Mike Lisi welcomes back Graham O’Donnell, Penetration Tester at Maltek Solutions, to pull back the curtain on what really happens during external and internal network assessments.

      From OSINT and subdomain enumeration to Nmap quirks and the chaos of inconsistent vulnerability data, Graham shares his raw, unfiltered process for finding weaknesses in the wild — plus the unexpected human side of hacking when tests get a little too real.

      Mike and Graham also discuss:

      • Automating and optimizing pen testing workflows
      • Credential reuse and why third-party breaches still matter
      • The ethics of exploring live environments
      • What it feels like to uncover personal data during an engagement

      Whether you’re a cybersecurity pro or just curious how ethical hackers think, this conversation offers a rare, behind-the-scenes look at the craft, the chaos, and the conscience of penetration testing.

      Afficher plus Afficher moins
      54 min
    • Episode 0x7: Invisible Architectures
      Sep 29 2025

      In this episode of Hack Dissection, host Mike Lisi sits down with Brandon Finton, MS, CISSP, CISM, President of Orion Secure, to unpack the evolving landscape of cybersecurity for businesses. From the early days of Cyber Defense Institute to the launch of Orion Secure, Brandon shares his journey and the shift from training to professional services. Together, Mike and Brandon dive into: 🔒 Why Written Information Security Policies (WISP) are the foundation of any program 💡 The difference between compliance reviews and real risk assessments 👩‍⚕️ Why no one—not even doctors, lawyers, or CEOs—should get a pass on MFA 📑 Governance, risk, and compliance (GRC) as living documents 🤖 How AI and chatbots are reshaping security—and the risks of giving them too much authority ⚠️ Real-world stories from penetration tests, ransomware cases, and phishing assessments Whether you’re a small business owner, IT leader, or simply curious about the state of cybersecurity, this episode sheds light on the challenges organizations face—and the practical steps they can take to strengthen their defenses.

      Afficher plus Afficher moins
      1 h et 2 min
    Aucun commentaire pour le moment