In this conversation, David discusses the intricacies of interviews in the cybersecurity field, particularly focusing on the balance between providing necessary information and safeguarding sensitive details. Drawing from his experience recruiting for MI5, he highlights the unique challenges faced in cyber interviews, where the stakes are high due to the potential for information to be exploited by malicious actors. David emphasizes the need for companies to rethink their approach to sharing ...
All content for The Entropy Podcast is the property of Francis Gorman and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this conversation, David discusses the intricacies of interviews in the cybersecurity field, particularly focusing on the balance between providing necessary information and safeguarding sensitive details. Drawing from his experience recruiting for MI5, he highlights the unique challenges faced in cyber interviews, where the stakes are high due to the potential for information to be exploited by malicious actors. David emphasizes the need for companies to rethink their approach to sharing ...
In this episode of the Entropy podcast, host Francis Gorman speaks with Dr. Nicola Fox Hamilton, a cyber psychologist, about the complexities of online dating, the impact of technology on communication, and the darker aspects of digital interactions, including sextortion and misinformation. They explore the psychological implications of smartphone use, the role of AI in modern communication, and the rise of extremist ideologies in the digital age. Dr. Fox Hamilton emphasizes the need for furt...
The Entropy Podcast
In this conversation, David discusses the intricacies of interviews in the cybersecurity field, particularly focusing on the balance between providing necessary information and safeguarding sensitive details. Drawing from his experience recruiting for MI5, he highlights the unique challenges faced in cyber interviews, where the stakes are high due to the potential for information to be exploited by malicious actors. David emphasizes the need for companies to rethink their approach to sharing ...