Rephonic
Artwork for Exploring Information Security

Exploring Information Security - Exploring Information Security

Timothy De Block
Cybersecurity
Information Security
Showmecon
Incident Response
Penetration Testing
Ransomware
Phishing
Networking
Artificial Intelligence
Application Security
Social Engineering
Cybercrime
AI In Cybersecurity
Security Awareness
Threat Modeling
Web Application Security
Hiring Practices
Offensive Security
Cybersecurity Awareness Month
Hacking

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

PublishesWeeklyEpisodes100Founded11 years ago
Number of ListenersCategory
Technology

Listen to this Podcast

Artwork for Exploring Information Security

Latest Episodes

Summary:

In this episode, host Timothy De Block sits down with John Morello to dive into the world of Cryptography Bill of Materials (CBOM) and the looming transition to Post-Quantum Cryptography (PQC). They discuss why tracking cryptographic assets... more

YouTube

Summary:

Timothy De Block sits down with Casey Bleeker from SurePath AI to demystify the Model Context Protocol (MCP). They discuss how this emerging standard allows Large Language Models (LLMs) to interact with external tools and why it represents ... more

YouTube

Summary:

In this episode, host Timothy De Block dives into the often overlooked but critically important world of physical security with Josh Winter. Josh shares his unique journey from serving in combat infantry with the 82nd Airborne Division to r... more

YouTube

In this most excellent edition of the Exploring Information Security podcast, I talk with Derek Thomas a senior information security analyst specializing in log management and SIEM on the topic of: "What is a SIEM?"

Derek (@dth0m) has a lot of exper... more

YouTube

Key Facts

Accepts Guests
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

CyberWire Daily
CyberWire DailyN2K Networks
Hacking Humans
Hacking HumansN2K Networks
Smashing Security
Smashing SecurityGraham Cluley
Darknet Diaries
Darknet DiariesJack Rhysider

Recent Guests

Casey Bleeker
Casey Bleeker of SurePath AI
SurePath AI
Episode: Exploring the Risks of Model Context Protocol (MCP) with Casey Bleeker
Josh Winter
Former Army soldier, 82nd Airborne; cybersecurity and physical security expert
Former Army; Private security/consulting
Episode: From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Derek Thomas
Senior Information Security Analyst, specializing in Log Management and SIEM
Episode: [RERELEASE] What is a SIEM?
Wolfgang Gorlick
Vice President of Viapoint
Viapoint
Episode: [RERELEASE] What is threat modeling?
Justin Troutman
Security and privacy researcher
Episode: [RERELEASE] What is cryptography?
Rafal Los
Director of Solutions Research at Accuvant, the White Rabbit
Accuvant
Episode: [RERELEASE] What is a Chief Information Security Officer (CISO)
Bob Lord
Seasoned cybersecurity expert and driving force behind the Hacklore Initiative
Hacklore Initiative
Episode: Exploring The Bad Advice Cybersecurity Professionals Provide to the Public
Scott Augenbaum
Former FBI agent focusing on cybercrime prevention and author.
Author of The Secret of Cybersecurity
Episode: Inside Cambodia's Scam Compounds: Pig Butchering, Organized Crime, and Protecting Your Life Savings
Chris Medellena
Professional with a focus on information security and home lab setups
EastSentire
Episode: [RERELEASE] How to build a home lab

Host

Timothy De Block
Host of the podcast, engaging in detailed discussions on information security with various professionals and industry experts.

Reviews

4.7 out of 5 stars from 58 ratings
  • Making our digital world SAFER

    Timothy and his incredibly knowledgeable guests make cybersecurity simple and accessible for everyone! Whether you're a security pro or a software engineer, this is a must-listen. You'll find a wealth of high-quality education and actionable tips you can use right away. Plus, the show is both entertaining and engaging, so you'll be hooked from the first episode. Thanks for creating such a fantastic show—keep up the great work!

    Apple Podcasts
    5
    Linda__Lee_
    Philippines2 years ago
  • Excellent Cybersecurity Security Podcast

    I’ve stumbled upon Tim’s podcast after listening to his presentation at my local Bsides. Just like I feel that his talk was the best of the presentations that day his podcast stands out as one of my favorite security podcasts for staying up to date in the industry.

    Apple Podcasts
    5
    Kgoode517
    United States2 years ago
  • Welcome back!!!!!!!

    It was really great to hear you guys again. I am glad that you have decided to start producing content again. I am looking forward to the next release. The diverse inputs were really wonderful.

    Since you are meeting in person for December for the Christmas party maybe you could let everyone record their favorite IT security jokes and post them.

    Apple Podcasts
    5
    Smiley_112
    United States2 years ago
  • I just found this and it’s great!

    I am saddened and yet thrilled to finish listening to the other podcasts. I just founds this and it’s great!!!! It says FIN but you never know I can always hope! Ms Laulei De La ROsa on FB

    Apple Podcasts
    5
    MsLaulei
    United States7 years ago
  • Great Info!

    I love this podcast! I’m about to complete my masters in information systems and I am currently working a cyber security internship with the hopes of having a career in infosec. This podcast has provided me with useful info on how to build my infosec skills and obtain the career of my dreams! I highly recommend this podcast to anyone interested in information security. :)

    Apple Podcasts
    5
    Cyber_Mango
    United States8 years ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners appreciate the accessibility of content, finding it educational and engaging for both beginners and seasoned professionals.
Many highlight the host's ability to simplify complex subjects, making cybersecurity more relatable.
The podcast is recognized for its variety of topics, catering to different interests within the tech field.
A strong sense of community is noted, as listeners feel encouraged to participate and reach out with questions or feedback.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#149
Saudi Arabia/Technology

Talking Points

Recent interactions between the hosts and their guests.

From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Q: Is physical security overlapping with cybersecurity, and how should organizations manage that relationship?
There is significant overlap; as physical security becomes more tech-enabled, it must adhere to cybersecurity standards and frameworks to prevent vulnerabilities from network-connected devices, while maintaining appropriate separation where needed.
From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Q: What are some of the initial indicators you look for when assessing a building?
Look for propped doors, tailgating, unsecured spaces, and access pathways that are left open or improperly monitored; assess the overall culture and complacency.
From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Q: What is physical security at its core?
Physical security is the collection of tools and practices that keep people safe by keeping unauthorized individuals out of places they shouldn't be.
[RERELEASE] What is threat modeling?
Q: How often should threat modeling be performed?
It should be frequent for new systems, and many teams do monthly reviews with quarterly or biannual drills to rehearse response and verify controls.
[RERELEASE] What is threat modeling?
Q: Who should perform this threat modeling?
It can be owned or led by different groups—SOC as part of incident management, the CISO as part of risk management, or secure DevOps teams integrating it into testing and ongoing changes.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Exploring Information Security

What is Exploring Information Security about and what kind of topics does it cover?

The podcast features in-depth conversations with various professionals, focusing on key topics and disciplines within the field of information security. Episodes cover a wide range of themes, including emerging cybersecurity threats, practical advice for professionals, and the implications of new technologies like AI in security. Unique to this series is its emphasis on making complex security concepts accessible to both experts and novices, allowing listeners to enhance their understanding of current challenges and best practices in the industry. The format fosters a dynamic learning environment through expert insights and real-world applications, catering well to those looking to enhance their security knowledge and skills.

Where can I find podcast stats for Exploring Information Security?

Rephonic provides a wide range of podcast stats for Exploring Information Security. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Exploring Information Security and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Exploring Information Security get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Exploring Information Security, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Exploring Information Security?

Rephonic provides comprehensive predictive audience data for Exploring Information Security, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Exploring Information Security have?

To see how many followers or subscribers Exploring Information Security has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Exploring Information Security?

These podcasts share a similar audience with Exploring Information Security:

1. CyberWire Daily
2. Hacking Humans
3. Smashing Security
4. Cybersecurity Today
5. Darknet Diaries

How many episodes of Exploring Information Security are there?

Exploring Information Security launched 11 years ago and published 100 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Exploring Information Security?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Exploring Information Security?

Rephonic pulls ratings and reviews for Exploring Information Security from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Exploring Information Security?

Rephonic provides full transcripts for episodes of Exploring Information Security. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Exploring Information Security?

Recent guests on Exploring Information Security include:

1. Casey Bleeker
2. Josh Winter
3. Derek Thomas
4. Wolfgang Gorlick
5. Justin Troutman
6. Rafal Los
7. Bob Lord
8. Scott Augenbaum

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days