In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advic...
All content for Cybersecurity Mentors Podcast is the property of Cybersecurity Mentors and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advic...
Land the Job: The 10 Resume Mistakes Holding You Back in Cybersecurity
Cybersecurity Mentors Podcast
51 minutes
2 months ago
Land the Job: The 10 Resume Mistakes Holding You Back in Cybersecurity
Are you applying for cybersecurity jobs but not getting interviews? The problem might be your resume. In this episode of The Cybersecurity Mentors Podcast, we break down the Top 10 Resume Mistakes holding you back from landing your first cybersecurity role—and show you exactly how to fix them. From weak objectives to cluttered skills sections, irrelevant job history, and missing proof of hands-on experience, we’ll cover the resume traps that stop recruiters in their tracks. Whether you’...
Cybersecurity Mentors Podcast
In Part 2, we discuss how a routine firewall rollout at ANU accidentally severed the attackers’ C2, forcing them into noisy, rushed activity that revealed their tradecraft. Suthagar explains the balance between observing for intel and acting to minimize harm, and how transparent, tightly controlled communications—culminating in a readable public breach report—helped rebuild trust. We also unpack why stolen databases without a data dictionary were hard to weaponize, and close with career advic...