108. IASME: IOT Security Compliance
Following audience responses to Pod 107 with Jason Blake, Secarma Jen Williams has circled back to do a deeper dive into the PSTI legislatio...
Radio and PodcastLive Radio & PodcastsOpening Radio and Podcast...

Radio and PodcastLive Radio & PodcastsFetching podcast shows and categories...
Radio and PodcastLive Radio & PodcastsFetching podcast episodes...

Hacked Off demystifies the world of cybersecurity. Hosted by ethical hacker, Paul Mason, it features weekly interviews delving beneath the headlines of the latest hacks, breaches and vulnera...
Following audience responses to Pod 107 with Jason Blake, Secarma Jen Williams has circled back to do a deeper dive into the PSTI legislatio...
Secarma Head of Testing, Simon Chapman, takes over the hosting duties as the Hacked Off podcast returns. Episode 107 focuses on IoT and the...
In this episode of Hacked Off, Holly interviews Simon McNamee - Secure Impact's Security Technology Lead. This week, they discuss what issue...
For some organisations, using Security Operation Centre services is a great way to minimise the impact of a possible cyberattack. Moving qui...
In the cybersecurity world, the digital forensics dept acts as the Crime Scene Investigation team for a business that has fallen foul of a c...
Valuing your SME as ‘too small to get hacked’ can leave you complacent and open to attacks, with little to no defences in place. For those w...
The medium of cyber-attacks is code, but the mastermind that drives them is always human intelligence. Systems are created by people, and au...
In a time of record unemployment due to the pandemic, it’s strange that cybersecurity job openings receive so little applicants and take 20%...
To celebrate Hacked Off's 100th episode, we spoke with Jai Aenugu – founder of TechForce Cyber - a highly regarded cybersecurity resilience...

Workplace security training can be hit or miss; to keep your business safe, your awareness training needs to be memorable, but a conventiona...

Security awareness training is a common requirement in most businesses, but oftentimes it can be difficult to effectively teach employees ho...

Studies in recent years have revealed how little diversity there is within the cybersecurity industry, with women making up only 8% of the c...

Over the past year and a half, the event industry have had to adapt like never before, and this led to many events going online via webinars...

This week, Holly is joined by Clean.io's Kathleen Booth to talk about how the very methods that marketing teams use to bring in customers ma...

This week, Holly speaks with Patricia Keating, founder of Tech Manchester - a start-up hub designed to upskill Manchester-based entrepreneur...

This week, Holly delves deeper into the topic of security higher education and training with Dr Dan Prince - Senior Lecturer in Security and...

Recently, the University of Salford announced their partnership with Tanium, to help the education institution improve their security agains...

Although our specialty is penetration testing, there's a wide variety of interesting roles available within the security industry. In this e...

In last week's episode we talked about how security professionals can leverage their skills to get into cyber, but how do you obtain those s...

In this episode, Holly interviews Jay Jay Davey - SOC Analyst at CyberClan and founder of NoxCyber - a one stop page of career advice for as...

In this episode, Holly sits down with Shauni - our Marketing Manager - to discuss how she promotes technical services to a non-technical aud...

In this episode, Holly and Michael have an in-depth discussion - okay, maybe it's a little bit of a rant - about security policies. Many org...

In this episode, Holly and Thomas discuss the MITRE ATT&CK framework and the multi-layered security strategies that organisations need to de...

What are the benefits of gaining skills that are a little more broad to the niche that you do? In this episode, we have a discussion around...

The Hacked Off podcast is back! In this episode, we sit down with Sarah and Sian from the NCSC's CyberFirst initiative to talk about the Cyb...
It's the last podcast of the year, so Holly is revisiting some of our key guest interviews from 2020. We also couldn't do a 'A Year in Revie...
Generally when you think of eCommerce attacks you probably think of theft of personal information and payment cards, when in fact there are...
Application Program Interfaces have increasingly become a target for hackers. With 6 of the OWASP Top 10 vulnerabilities being API related,...
Is your online store ready for Black Friday and Christmas shopping? Have you considered how automated bots, fake reviews, plugins and a data...
This month there has been a lot going on in the world of cybersecurity. With major IT firm Sopra Steria getting hit by a cyberattack, Apple...

Threat modelling is broader than just security, and DevSecOps is more than just secure code. Application Security Advocate, Alyssa Miller ta...
Mobile Device Management increases security, reduces risk and plays an important role in Government certified assurance models. Holly Grace...

We speak to fellow co-worker and Senior Security Consultant at Secarma, Joe Thorpe, who specialises in app testing. He gives us the low down...

In September's Month in Review, Holly Grace is delighted to announce that this month's hacks aren't just all about ransomware! From politica...

There's more to firewalls than simply installing them and leaving them to it! WatchGuard's Senior Sales Engineer Martin Lethbridge, joins Ho...

Although perimeter breaking vulnerabilities are quite rare they're certainly not unheard of - Firewalls aren't perfect systems and they can...

Our latest 'Intro' podcast takes a look at Firewall Security. Holly discusses different types of firewalls, the importance of network segmen...

From bribery to bug bounties! In August's Month in Review podcast, Holly Grace discusses the failed social engineering attack on a Tesla emp...

Whilst Secarma perform Penetration Testing which is in-depth approach to security testing, organisations can get additional assurance throug...

The OWASP Top 10 is a list of the 10 most common web application vulnerabilities. This podcast provides an introduction to this awareness do...

This podcast provides an excellent introduction to vulnerability scanning, covering how it works and what it tests. It discusses the benefit...

In July it was revealed that travel company CWT paid $4.5 million in ransom to cyber criminals. Whilst shocking, ransomware is unfortunately...
After a brief break, the Hacked Off Podcast is back! If you missed our MD’s Trusted Tech Talks webinar last week, Holly Grace Williams summa...
In today's episode we talk about penetration testing realism versus efficiency, and why sometimes aiming for a security test that exactly ma...

Privacy is a right and it is important to protect that right, but operational security it hard. Mike Jones joins us again to talk all things...
In today's episode we talk about incentivising your Security Team and making sure that the defensive team are getting praise for a job well...

Adam Louca joins us today to talk about how to get the most out of security products, and how to cut through the marketing to find out what...

Kevin Fielder joins us today discussing building security and building security teams. We talk risk appetite, balancing likelihood and impac...
Today we have a Marc Avery, Kevin Fielder, and Sean Atkinson discussing how to build a business security strategy. We talk about cyber insur...

Mike Jones is a former member of anonymous, a former confidential informant, and is here to talk about building better security. We talk abo...