Cybersecurity Industry Interviews with Entrepreneurs and Researchers
The security industry is growing quickly and it’s easy to get all caught up in the technical aspects of our jobs. This often comes at the price of forgetting one crucial part of “People, Processes and Technology”, and that is the people — the humans who make this industry what it is. To complement our usual technical content, we began talking to people in the industry, the movers and shakers behind it.
We wanted to share how they made their way into security, what mindset is needed to create and grow a product, and everything that can shed a light on how to get into and succeed in cybersecurity.
Our interview series is now almost two years old, and during that time we’ve had the chance to talk to over 15 security experts, entrepreneurs and researchers. Each interview has a different focus, and shares a story from each guest’s individual perspective and their unique lessons and tips. The objective of these interviews is not only to talk about their jobs, products and experiences, but also to get to know them as people. We wish to share a glimpse into their everyday lives, and even learn what they like to do for fun.
After some time conducting our interview series, we added another format: ProTips. Here, we get a security expert to share their quick power tips on different aspects of security. We’ve featured tips for subdomain takeovers with Patrik Hudak, bug bounty hunting with Random Robbie, and we silenced the internet with none other than Andrew Morris. While still in its early days, ProTips is expected to grow and you can expect more expert tips from your industry favorites.

Building a Career in Incident Response With Cybersec Meg
Cybersecurity is one of the fastest-growing industries, while cybersecurity professionals are some of the most valuable workers of any organization, regardless of the industry. There is some talk of a cybersecurity skills gap that claims a shortage of professionals, but is that true? Or is gatekeeping dictating unrealistic expectations for entry-level positions, making it harder for newcomers to break into the industry?

Making Cybersecurity Accessible with Scott Helme
Global connectivity benefits our world in numerous ways, however, that same connectivity also poses a potential cyberthreat that is often overlooked. There is no easy solution for combating the rising threats in our hyperconnected world. Now more than ever, cybersecurity is imperative for both businesses, governments and educational institutions, and individuals and families. For cybersecurity to effectively slow down the rising cyber threats and attacks, everyone needs to be part of the solution.

Residential Evil: Addressing the Role of Anonymization Infrastructure in Cybercrime with Tom Kilmer from Spur
In recent years, more emphasis is put on privacy concerns and data security while online. The shields at the forefront of this battle for privacy and secure internet access are VPNs and proxies, and more notably residential IP proxies. While claiming to offer anonymization to users, residential proxies also account for some security issues.

#ProTips: Understanding a Leaky Internet with Gregory Boddin
Over the past few years, data breaches involving millions of leaked records have become the norm. A common offender we’re seeing more of is the presence of poorly secured and misconfigured databases connected to the Internet.

Reblazing Web Security, Announcing a New Product, and Listening to Records with Tzury Bar Yochay from Reblaze
Web applications contain sensitive data like user information, financial data, and intellectual property. That data is valuable and alluring to malicious attackers. Cyber attackers looking for vulnerabilities and weak spots to gain unauthorized access for stealing data keep web applications under constant threat.

Cats, Board Games, and Analyst-Centric Threat Intelligence: Speaking with Pulsedive Co-founders Dan Sherry and Grace Chi
Two heads are better than one, and the same rings true when starting a company. You can have the idea, the entire business plan set out, the drive and desire needed, but there might be something missing. This is where most founders turn their focus to the search for a perfect co-founder. A co-founder that complements their skills, helps them turn their ideas into reality, brings a fresh perspective, and is there to support them.

Builders vs Breakers: Bridging the gap Between Software Development and InfoSec with Tanya Janca
Application security testing and assessment commonly occurs toward the end of the standard software development life cycle (SDLC). During this time, code reviews and penetration tests are done to ensure no security flaws or bugs are found in the application before it moves on to production. As much...

From heroes to deviants: Discussing the cultures of hacking with Gabriella Biella Coleman
When talking about hacker cultures, the media often blurs the lines between the act of hacking and criminality, inadventaly propping up stereotypes that plague the figure of the hacker. In reality, hackers feed into a socially and politically significant subculture with unique social and behaviora...

SecurityTrails Year in Review 2019
Now’s the time when we can take a thoughtful step back and reminisce about the events that have unfolded over the year. Please join us as we take a look at the many milestones, developments and innovations SecurityTrails has seen during the past twelve months.

#ProTips: Silence the noise with Andrew Morris
The Internet is a noisy place; those listening to it know that all too well. SOC teams keep busy with numerous threat protection products that generate countless security alerts, many uncontextualized, some downright pointless. And figuring out who’s behind those alerts is not easy.