Chapter

Running exploits in the military
listen on Spotify
01:06 - 09:44 (08:37)

The military runs exploits to see if their computers are vulnerable, monitoring for security events and helping secure the network better, by using tools that gather information about what computers, services, and applications are running on the network.

Clips
DRADA offers cloud compliance software for continuous monitoring and visibility into risk, security controls and audit readiness for various standards.
01:06 - 03:15 (02:09)
listen on Spotify
Cloud Compliance
Summary

DRADA offers cloud compliance software for continuous monitoring and visibility into risk, security controls and audit readiness for various standards. It can automate custom frameworks and controls to meet an organization's security needs.

Chapter
Running exploits in the military
Episode
114: HD
Podcast
Darknet Diaries
The early days of the internet were characterized by inquisitive dial-up connections and the discovery of new machines.
03:16 - 04:57 (01:41)
listen on Spotify
Internet
Summary

The early days of the internet were characterized by inquisitive dial-up connections and the discovery of new machines. Before the internet, one would have to repeatedly dial and try to connect by phone to various machines and explore their functions.

Chapter
Running exploits in the military
Episode
114: HD
Podcast
Darknet Diaries
The speaker discusses their experience as a first-time programmer at a DoD contractor where they were tasked with building hacker tools to test the Air Force's defenses, and how it was a fun job despite being a terrible programmer.
04:57 - 07:47 (02:50)
listen on Spotify
DoD, Hacker Tools, Air Force
Summary

The speaker discusses their experience as a first-time programmer at a DoD contractor where they were tasked with building hacker tools to test the Air Force's defenses, and how it was a fun job despite being a terrible programmer.

Chapter
Running exploits in the military
Episode
114: HD
Podcast
Darknet Diaries
Edith Piazza and Peter T. Leeson started Digital Defense to provide security assessments, including penetration testing for commercial clients.
07:44 - 08:25 (00:40)
listen on Spotify
Cybersecurity
Summary

Edith Piazza and Peter T. Leeson started Digital Defense to provide security assessments, including penetration testing for commercial clients. However, the lack of readily available exploits in the late 90s posed a significant challenge.

Chapter
Running exploits in the military
Episode
114: HD
Podcast
Darknet Diaries
Learn about the process of a typical penetration test and the importance of exploiting a system's vulnerabilities in order to demonstrate the risk to the client.
08:25 - 09:44 (01:19)
listen on Spotify
Penetration Testing
Summary

Learn about the process of a typical penetration test and the importance of exploiting a system's vulnerabilities in order to demonstrate the risk to the client.

Chapter
Running exploits in the military
Episode
114: HD
Podcast
Darknet Diaries