Rephonic
Artwork for Exploring Information Security

Exploring Information Security - Exploring Information Security

Timothy De Block
Cybersecurity
Information Security
Showmecon
Incident Response
Penetration Testing
Ransomware
Phishing
Networking
Artificial Intelligence
Application Security
Social Engineering
Cybercrime
AI In Cybersecurity
Security Awareness
Threat Modeling
Web Application Security
Hiring Practices
Offensive Security
Cybersecurity Awareness Month
Hacking

The Exploring Information Security podcast interviews a different professional each week exploring topics, ideas, and disciplines within information security. Prepare to learn, explore, and grow your security mindset.

PublishesWeeklyEpisodes100Founded11 years ago
Number of ListenersCategory
Technology

Listen to this Podcast

Artwork for Exploring Information Security

Latest Episodes

In the second episode of the refreshed edition of the Exploring Information Security (EIS) podcast (wow, that's a mouthful), I talk with Chris Maddalena about the perception of information security.

Chris recently gave a talk on FUD at BSides Detroi... more

In the second episode of the refreshed edition of the Exploring Information Security (EIS) podcast (wow, that's a mouthful), I talk with Chris Maddalena about the perception of information security.

Chris recently gave a talk on FUD at BSides Detroi... more

YouTube

Summary:

In this episode, host Timothy De Block sits down with John Morello to dive into the world of Cryptography Bill of Materials (CBOM) and the looming transition to Post-Quantum Cryptography (PQC). They discuss why tracking cryptographic assets... more

YouTube

Summary:

Timothy De Block sits down with Casey Bleeker from SurePath AI to demystify the Model Context Protocol (MCP). They discuss how this emerging standard allows Large Language Models (LLMs) to interact with external tools and why it represents ... more

YouTube

Key Facts

Accepts Guests
Contact Information
Podcast Host
Number of Listeners
Find out how many people listen to this podcast per episode and each month.

Similar Podcasts

People also subscribe to these shows.

Recent Guests

Chris Madelena
Security professional, speaker, and representative of eSentire
eSentire
Episode: [RERELEASE] What is the perception of information security - part 1
John Morello
CTO and co-founder at Minimus
Minimus
Episode: Exploring the Quantum Horizon: Why We Need CBOMs Today
Casey Bleeker
Casey Bleeker of SurePath AI
SurePath AI
Episode: Exploring the Risks of Model Context Protocol (MCP) with Casey Bleeker
Josh Winter
Former Army soldier, 82nd Airborne; cybersecurity and physical security expert
Former Army; Private security/consulting
Episode: From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Derek Thomas
Senior Information Security Analyst, specializing in Log Management and SIEM
Episode: [RERELEASE] What is a SIEM?
Wolfgang Gorlick
Vice President of Viapoint
Viapoint
Episode: [RERELEASE] What is threat modeling?
Justin Troutman
Security and privacy researcher
Episode: [RERELEASE] What is cryptography?
Rafal Los
Director of Solutions Research at Accuvant, the White Rabbit
Accuvant
Episode: [RERELEASE] What is a Chief Information Security Officer (CISO)
Bob Lord
Seasoned cybersecurity expert and driving force behind the Hacklore Initiative
Hacklore Initiative
Episode: Exploring The Bad Advice Cybersecurity Professionals Provide to the Public

Host

Timothy De Block
Host of the podcast, engaging in detailed discussions on information security with various professionals and industry experts.

Reviews

4.7 out of 5 stars from 58 ratings
  • Making our digital world SAFER

    Timothy and his incredibly knowledgeable guests make cybersecurity simple and accessible for everyone! Whether you're a security pro or a software engineer, this is a must-listen. You'll find a wealth of high-quality education and actionable tips you can use right away. Plus, the show is both entertaining and engaging, so you'll be hooked from the first episode. Thanks for creating such a fantastic show—keep up the great work!

    Apple Podcasts
    5
    Linda__Lee_
    Philippines2 years ago
  • Excellent Cybersecurity Security Podcast

    I’ve stumbled upon Tim’s podcast after listening to his presentation at my local Bsides. Just like I feel that his talk was the best of the presentations that day his podcast stands out as one of my favorite security podcasts for staying up to date in the industry.

    Apple Podcasts
    5
    Kgoode517
    United States2 years ago
  • Welcome back!!!!!!!

    It was really great to hear you guys again. I am glad that you have decided to start producing content again. I am looking forward to the next release. The diverse inputs were really wonderful.

    Since you are meeting in person for December for the Christmas party maybe you could let everyone record their favorite IT security jokes and post them.

    Apple Podcasts
    5
    Smiley_112
    United States2 years ago
  • I just found this and it’s great!

    I am saddened and yet thrilled to finish listening to the other podcasts. I just founds this and it’s great!!!! It says FIN but you never know I can always hope! Ms Laulei De La ROsa on FB

    Apple Podcasts
    5
    MsLaulei
    United States7 years ago
  • Great Info!

    I love this podcast! I’m about to complete my masters in information systems and I am currently working a cyber security internship with the hopes of having a career in infosec. This podcast has provided me with useful info on how to build my infosec skills and obtain the career of my dreams! I highly recommend this podcast to anyone interested in information security. :)

    Apple Podcasts
    5
    Cyber_Mango
    United States8 years ago

Listeners Say

Key themes from listener reviews, highlighting what works and what could be improved about the show.

Listeners appreciate the accessibility of content, finding it educational and engaging for both beginners and seasoned professionals.
Many highlight the host's ability to simplify complex subjects, making cybersecurity more relatable.
The podcast is recognized for its variety of topics, catering to different interests within the tech field.
A strong sense of community is noted, as listeners feel encouraged to participate and reach out with questions or feedback.

Chart Rankings

How this podcast ranks in the Apple Podcasts, Spotify and YouTube charts.

Apple Podcasts
#134
Denmark/Technology

Talking Points

Recent interactions between the hosts and their guests.

Exploring the Quantum Horizon: Why We Need CBOMs Today
Q: Who should own the CBOM data creation and maintenance?
Ideally, the teams closest to the application and infrastructure, such as DevOps and development teams, should create and maintain CBOM data, while security teams consume and leverage that data to assess exposure and guide mitigation.
Exploring the Quantum Horizon: Why We Need CBOMs Today
Q: What is CBOM and how does it relate to SBOM?
CBOM is a structured, machine-readable extension focused on cryptographic components and their configurations, designed to be incorporated into SBOMs to describe cryptographic artifacts within software, making it easier to inventory, assess risk, and plan migrations to post-quantum cryptography.
From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Q: Is physical security overlapping with cybersecurity, and how should organizations manage that relationship?
There is significant overlap; as physical security becomes more tech-enabled, it must adhere to cybersecurity standards and frameworks to prevent vulnerabilities from network-connected devices, while maintaining appropriate separation where needed.
From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Q: What are some of the initial indicators you look for when assessing a building?
Look for propped doors, tailgating, unsecured spaces, and access pathways that are left open or improperly monitored; assess the overall culture and complacency.
From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Q: What is physical security at its core?
Physical security is the collection of tools and practices that keep people safe by keeping unauthorized individuals out of places they shouldn't be.

Audience Metrics

Listeners, social reach, demographics and more for this podcast.

Listeners per Episode
Gender Skew
Location
Interests
Professions
Age Range
Household Income
Social Media Reach

Frequently Asked Questions About Exploring Information Security

What is Exploring Information Security about and what kind of topics does it cover?

The podcast features in-depth conversations with various professionals, focusing on key topics and disciplines within the field of information security. Episodes cover a wide range of themes, including emerging cybersecurity threats, practical advice for professionals, and the implications of new technologies like AI in security. Unique to this series is its emphasis on making complex security concepts accessible to both experts and novices, allowing listeners to enhance their understanding of current challenges and best practices in the industry. The format fosters a dynamic learning environment through expert insights and real-world applications, catering well to those looking to enhance their security knowledge and skills.

Where can I find podcast stats for Exploring Information Security?

Rephonic provides a wide range of podcast stats for Exploring Information Security. We scanned the web and collated all of the information that we could find in our comprehensive podcast database. See how many people listen to Exploring Information Security and access YouTube viewership numbers, download stats, audience demographics, chart rankings, ratings, reviews and more.

How many listeners does Exploring Information Security get?

Rephonic provides a full set of podcast information for three million podcasts, including the number of listeners. View further listenership figures for Exploring Information Security, including podcast download numbers and subscriber numbers, so you can make better decisions about which podcasts to sponsor or be a guest on. You will need to upgrade your account to access this premium data.

What are the audience demographics for Exploring Information Security?

Rephonic provides comprehensive predictive audience data for Exploring Information Security, including gender skew, age, country, political leaning, income, professions, education level, and interests. You can access these listener demographics by upgrading your account.

How many subscribers and views does Exploring Information Security have?

To see how many followers or subscribers Exploring Information Security has on Spotify and other platforms such as Castbox and Podcast Addict, simply upgrade your account. You'll also find viewership figures for their YouTube channel if they have one.

Which podcasts are similar to Exploring Information Security?

These podcasts share a similar audience with Exploring Information Security:

1. Down the Security Rabbithole Podcast (DtSR)
2. CyberWire Daily
3. Cybersecurity Headlines
4. Smashing Security
5. Adversary Universe Podcast

How many episodes of Exploring Information Security are there?

Exploring Information Security launched 11 years ago and published 100 episodes to date. You can find more information about this podcast including rankings, audience demographics and engagement in our podcast database.

How do I contact Exploring Information Security?

Our systems regularly scour the web to find email addresses and social media links for this podcast. We scanned the web and collated all of the contact information that we could find in our podcast database. But in the unlikely event that you can't find what you're looking for, our concierge service lets you request our research team to source better contacts for you.

Where can I see ratings and reviews for Exploring Information Security?

Rephonic pulls ratings and reviews for Exploring Information Security from multiple sources, including Spotify, Apple Podcasts, Castbox, and Podcast Addict.

View all the reviews in one place instead of visiting each platform individually and use this information to decide if a show is worth pitching or not.

How do I access podcast episode transcripts for Exploring Information Security?

Rephonic provides full transcripts for episodes of Exploring Information Security. Search within each transcript for your keywords, whether they be topics, brands or people, and figure out if it's worth pitching as a guest or sponsor. You can even set-up alerts to get notified when your keywords are mentioned.

What guests have appeared on Exploring Information Security?

Recent guests on Exploring Information Security include:

1. Chris Madelena
2. John Morello
3. Casey Bleeker
4. Josh Winter
5. Derek Thomas
6. Wolfgang Gorlick
7. Justin Troutman
8. Rafal Los

To view more recent guests and their details, simply upgrade your Rephonic account. You'll also get access to a typical guest profile to help you decide if the show is worth pitching.

Find and pitch the right podcasts

We help savvy brands, marketers and PR professionals to find the right podcasts for any topic or niche. Get the data and contacts you need to pitch podcasts at scale and turn listeners into customers.
Try it free for 7 days