Rephonic
Artwork for Exploring Information Security

Exploring Information Security - Exploring Information Security

Timothy De Block
Cybersecurity
Showmecon
Information Security
Multi-Factor Authentication
Incident Response
Phishing
Canary
Showmecon 2024
Mimikatz
Satellite Hacking
Dynamic Application Security Testing
Open Source Intelligence
Networking Opportunities
Cybersecurity Conferences
Security Awareness Training
Automation In Security
Thinkst Canary
Sysmon
Application Security
Community Con

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

PublishesWeeklyEpisodes100Founded10 years ago
Number of ListenersCategory
Technology

Listen to this Podcast

Artwork for Exploring Information Security

Latest Episodes

In this installed episode of the Exploring Information Security podcast, Wes Widner joins me to discuss how Macs get malware.

Wes (@kai5263499) spoke about this topic at BSides Hunstville this year. I was fascinated by it and decided to invite Wes o... more

YouTube

Claire (@ClaireTills) doesn’t have your typical roll in infosec. She sits between the security teams and marketing team. It’s a fascinating roll and something that gives her a lot of insight into multiple parts of the business. What works and what do... more

YouTube

Claire (@ClaireTills) doesn’t have your typical roll in infosec. She sits between the security teams and marketing team at Tenable. It’s a fascinating roll and something that gives her a lot of insight into multiple parts of the business. What works ... more

YouTube

Summary:

Timothy De Block is joined by Keith Hoodlet, Engineering Director at Trail of Bits, for a fascinating, in-depth look at AI red teaming and the security challenges posed by Large Language Models (LLMs). They discuss how prompt injection is e... more

YouTube

Key Facts

Accepts Guests
Accepts Sponsors
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Recent Guests

Claire Tills
Community Researcher with a focus on communication and information security
Tenable
Episode: [RERELEASE] Why communication in infosec is important
Keith Hoodlet
Director of AI and ML and Application Security at Trail of Bits with over 20 years of experience in AI Red teaming and application security.
Trail of Bits
Episode: Exploring AI, APIs, and the Social Engineering of LLMs
Sam Chehab
Head of security and IT at Postman with over 20 years of experience in engineering, application management and cybersecurity.
Postman
Episode: Exploring the Rogue AI Agent Threat with Sam Chehab
Kate Johnson
Director at Dragos, focusing on cybersecurity leadership and management.
Dragos
Episode: Kate Johnson's Winding Path to a Director Role in Cybersecurity
Ben Miller
Founder of BSides St. Louis, cybersecurity expert
BSides St. Louis
Episode: LIVE: Unraveling the SharePoint Zero-Day Exploit (CVE-2025-53770)
Johnny Christmas
Penetration Tester for Redlegg
Redlegg
Episode: [RERELEASE] How to network in information security - part 1
Steve Reagan
Senior staff writer at CSO Online and editor of Salted Hash
CSO Online
Episode: [RERELEASE] What are BEC attacks?
Sean Peterson
Expert in information security and password cracking
Parameter Security
Episode: [RERELEASE] How to crack passwords
Bob Rudis
Co-author of Data Driven Security
Episode: [RERELEASE] What is data driven security?

Host

Timothy De Block
Host with extensive experience in cybersecurity, who facilitates discussions with various experts in the field to explore diverse topics and provide insights into information security practices and career paths.

Reviews

4.7 out of 5 stars from 58 ratings
  • Making our digital world SAFER

    Timothy and his incredibly knowledgeable guests make cybersecurity simple and accessible for everyone! Whether you're a security pro or a software engineer, this is a must-listen. You'll find a wealth of high-quality education and actionable tips you can use right away. Plus, the show is both entertaining and engaging, so you'll be hooked from the first episode. Thanks for creating such a fantastic show—keep up the great work!

    Apple Podcasts
    5
    Linda__Lee_
    Philippinesa year ago
  • Excellent Cybersecurity Security Podcast

    I’ve stumbled upon Tim’s podcast after listening to his presentation at my local Bsides. Just like I feel that his talk was the best of the presentations that day his podcast stands out as one of my favorite security podcasts for staying up to date in the industry.

    Apple Podcasts
    5
    Kgoode517
    United States2 years ago
  • Welcome back!!!!!!!

    It was really great to hear you guys again. I am glad that you have decided to start producing content again. I am looking forward to the next release. The diverse inputs were really wonderful.

    Since you are meeting in person for December for the Christmas party maybe you could let everyone record their favorite IT security jokes and post them.

    Apple Podcasts
    5
    Smiley_112
    United States2 years ago
  • I just found this and it’s great!

    I am saddened and yet thrilled to finish listening to the other podcasts. I just founds this and it’s great!!!! It says FIN but you never know I can always hope! Ms Laulei De La ROsa on FB

    Apple Podcasts
    5
    MsLaulei
    United States7 years ago
  • Great Info!

    I love this podcast! I’m about to complete my masters in information systems and I am currently working a cyber security internship with the hopes of having a career in infosec. This podcast has provided me with useful info on how to build my infosec skills and obtain the career of my dreams! I highly recommend this podcast to anyone interested in information security. :)

    Apple Podcasts
    5
    Cyber_Mango
    United States7 years ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Many appreciate the variety of expert guests and the practical advice shared throughout the episodes.
Listeners praise the informative nature of the content, noting it's accessible and enjoyable, regardless of their background in cybersecurity.
The show engages audiences with relatable content, especially beneficial for newcomers seeking to establish a foundation in cybersecurity.
The concise format and focused discussions are often highlighted as strengths, making it easy for listeners to follow and absorb information quickly.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#78
Poland/Technology

Talking Points

Recent interactions between the hosts and their guests.

[RERELEASE] How Macs get Malware
Q: What got you into Mac Malware?
Wes Weidner explains he specialized in Mac malware after running a malware pipeline and wanting to explore what it looks like, especially since he has children using Macs.
[RERELEASE] How Macs get Malware
Q: What can people do to protect themselves against malware on Macs?
Weidner suggests using tools like Little Snitch for monitoring outgoing traffic and security utilities such as Knock Knock and Block Block from Patrick Wardle to maintain oversight of persistent applications and modifications to system settings.
How to Prepare a Presentation for a Cybersecurity Conference
Q: What is your process for getting accepted as a speaker?
It depends on the topic and the conference. Some conferences prefer established speakers, while others welcome new ones. A compelling abstract is crucial.
LIVE: Unraveling the SharePoint Zero-Day Exploit (CVE-2025-53770)
Q: Did you go to that blog, post it in chat?
Yes, please post that in chat. We'll grab that, put it in the show notes.
How to Launch Your Own Cybersecurity Podcast
Q: Is it okay to change the duration or format of episodes?
Yes, although shorter formats may engage listeners better, ultimately it depends on the podcast's topic and audience preferences.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Exploring Information Security

What is Exploring Information Security about and what kind of topics does it cover?

This podcast features insightful interviews with professionals from various spheres within information security, making it particularly valuable for both newcomers and seasoned veterans in the field. The discussions cover a wide array of subjects such as leadership in cybersecurity, the importance of community engagement, and practical advice for those looking to enter or progress in the industry. Notable content includes explorations of specific cybersecurity threats, the complexities of network security, the significance of soft skills, and real-world experiences shared by guests from diverse backgrounds in technology and security sectors. With its focus on actionable insights and fostering a security mindset, the podcast is ideal for any... more

Where can I find podcast stats for Exploring Information Security?

Rephonic provides a wide range of podcast stats for Exploring Information Security. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Exploring Information Security and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Exploring Information Security get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Exploring Information Security, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Exploring Information Security?

Rephonic provides comprehensive predictive audience data for Exploring Information Security, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Exploring Information Security have?

To see how many followers or subscribers Exploring Information Security has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Exploring Information Security?

These podcasts share a similar audience with Exploring Information Security:

1. Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
2. CyberWire Daily
3. Risky Business
4. Behind the Money
5. Hacking Humans

How many episodes of Exploring Information Security are there?

Exploring Information Security launched 10 years ago and published 100 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Exploring Information Security?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Exploring Information Security?

Rephonic pulls ratings and reviews for Exploring Information Security from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Exploring Information Security?

Rephonic provides full transcripts for episodes of Exploring Information Security. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Exploring Information Security?

Recent guests on Exploring Information Security include:

1. Claire Tills
2. Keith Hoodlet
3. Sam Chehab
4. Kate Johnson
5. Ben Miller
6. Johnny Christmas
7. Steve Reagan
8. Sean Peterson

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days