In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advic...
All content for Cybersecurity Mentors Podcast is the property of Cybersecurity Mentors and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advic...
Ask Us Anything: Cybersecurity Career Q&A — Season 4 Finale
Cybersecurity Mentors Podcast
1 hour 2 minutes
2 months ago
Ask Us Anything: Cybersecurity Career Q&A — Season 4 Finale
In the Season 4 finale of The Cybersecurity Mentors Podcast, Steve and John wrap up an incredible season with a special listener-driven Q&A. The episode opens with a recap of Episodes 1–7, revisiting key lessons on soft skills, leadership, resume pitfalls, networking strategies, and inspiring career journeys. From there, they dive into your most pressing questions about breaking into cybersecurity — from whether college or certifications matter most, to the projects that truly prove you’r...
Cybersecurity Mentors Podcast
In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advic...