Displaying 41 - 60 of 87 in total

Why You Need to Re-invent Yourself Every 3 Years With Faisal Bhutto of Calian

Why You Need to Re-invent Yourself Every 3 Years With Faisal Bhutto of Calian

Key to a successful tech career? Re-inventing yourself every three years, says Faisal Bhutto, SVP of Cloud and Cybersecurity at Calian. Don’t go into tech if you’re no...

My First 2 Years in Cybersecurity After the Military With Corey Nenno of Cargill

My First 2 Years in Cybersecurity After the Military With Corey Nenno of Cargill

Corey Nenno (aka That Cyber Guy) just transitioned out of the military and into the cybersecurity industry in 2021 – so this is an ideal episode for those currently in...

From the Front Lines in Iraq to the Boardroom With Alfredo Hickman of Obsidian Security

From the Front Lines in Iraq to the Boardroom With Alfredo Hickman of Obsidian Security

Alfredo Hickman fought the war on terror in the early 2000s in the Marine Corps infantry in Iraq. He shares some intense stories from his military experiences overseas...

Using Social Media to Your Advantage With David Cross of Oracle

Using Social Media to Your Advantage With David Cross of Oracle

David Cross’ advice for breaking into cybersecurity? Strategic use of gift cards. Get details on his networking through social media ideas in this episode. David trans...

The Power of Advocating for Yourself With Parham Eftekhari of CyberRisk Alliance

The Power of Advocating for Yourself With Parham Eftekhari of CyberRisk Alliance

Key to career success according to Parham Eftekhari? Advocate for yourself, even if it doesn’t come naturally. He’s got great advice for those who feel uncomfortable w...

Debunking Myths About Cybersecurity Careers With Rick Doten of Centene

Debunking Myths About Cybersecurity Careers With Rick Doten of Centene

Cybersecurity has become unnecessarily intimidating, says Rick Doten in his podcast episode with Gene. He breaks down what it’s really like to work in cyber, and the s...

The Truth About Cybersecurity Marketing With Carol Meyers of Glasswing Ventures

The Truth About Cybersecurity Marketing With Carol Meyers of Glasswing Ventures

Thinking about cybersecurity marketing? Former Rapid7 CMO Carol Meyers debunks some myths surrounding that career choice in her eXecutive Security podcast episode. Car...

RSA Attendee Question: What's the No. 1 piece of advice you'd offer to someone trying to break into security?

RSA Attendee Question: What's the No. 1 piece of advice you'd offer to someone trying to break into security?

At the recent RSA Conference in San Francisco, we decided to take advantage of all the cybersecurity professionals gathered in one place to get some advice for those l...

Finding Opportunity in an Economic Downturn With Alyssa Robinson of HubSpot

Finding Opportunity in an Economic Downturn With Alyssa Robinson of HubSpot

It’s rough to start your career in an economic downturn, as many of our listeners are now finding out. Alyssa Robinson started her career in a down economy, but she fo...

Tips and Techniques: Lessons Learned From ThreatX Hiring

Tips and Techniques: Lessons Learned From ThreatX Hiring

We recently received more than 4,000 resumes for a job listing for an entry-level security position. How does this number make sense considering the cybersecurity skil...

Building a Personal Brand With Etan Basseri of Microsoft

Building a Personal Brand With Etan Basseri of Microsoft

Etan Basseri made a dramatic pivot mid-career from lawyer to high-tech professional. In this episode, he talks to Gene about his lessons learned from that journey. The...

Tips and Techniques: RSA

Tips and Techniques: RSA

New to RSA? Gene offers a few quick tips and some advice on navigating this massive cybersecurity conference for the first time.

How to Stand Out as an Entry Level Candidate With Neil Weitzel of ThreatX

How to Stand Out as an Entry Level Candidate With Neil Weitzel of ThreatX

What are hiring managers looking for in entry level cybersecurity candidates? Get it straight from a hiring manager in this episode. Gene recently sat down with his co...

Keys to Thriving as a Cybersecurity Executive With Ed Amoroso

Keys to Thriving as a Cybersecurity Executive With Ed Amoroso

As the former CISO of AT&T, the founder and CEO of Tag InfoSphere, and a cybersecurity university professor, Ed Amoroso has a lot of insights and advice for our listen...

Increasing the Awareness of Cybersecurity Careers With Julian Waits

Increasing the Awareness of Cybersecurity Careers With Julian Waits

Julian Waits never imagined he’d be a leader in the cybersecurity industry; in fact, he trained to become a professional jazz musician. Listen to his podcast episode t...

Preparing for the Executive Level With David Craigen of TK Elevator

Preparing for the Executive Level With David Craigen of TK Elevator

David Craigen worked his way up to the executive level and feels strongly that he needs to prepare and train those who work for him now to have his job later. He and G...

How Hacking Benefits the Rich and Powerful With Bruce Schneier

How Hacking Benefits the Rich and Powerful With Bruce Schneier

Hacking itself isn’t good or bad, but the intent behind it is. In his new book, internationally renowned security technologist Bruce Schneier takes hacking out of the ...

Tips and Techniques: Goal Setting

Tips and Techniques: Goal Setting

Having clear goals and a way to keep yourself accountable is often the key to success. Gene Fay has developed a system to keep himself focused on his yearly goals, and...

Strengthening the Cybersecurity Industry With Connie Matthews Reynolds of ReynCon

Strengthening the Cybersecurity Industry With Connie Matthews Reynolds of ReynCon

Connie Matthews Reynolds is dedicated to making cybersecurity a stronger and more diverse industry and is an extremely valuable resource for those new in or looking to...

Tips and Techniques: Avoid This Phone Scam

Tips and Techniques: Avoid This Phone Scam

Criminals often use social engineering as a pre-cursor to exploiting cybersecurity vulnerabilities. But a recent popular criminal tactic is to use social engineering a...

Sign up for exclusive API protection tips!

Get the latest and greatest content from ThreatX delivered directly to your inbox.

checkmark Got it. You're on the list!