Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
History
Music
About Us
Contact Us
Copyright
© 2024 PodJoint
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/79/14/33/791433c7-52da-f3b6-a453-bbf992946ecd/mza_10604889840378575100.jpg/600x600bb.jpg
You Deserve to be Hacked
CovertSwarm
40 episodes
1 month ago
Artificial intelligence is rapidly becoming an active partner in offensive cybersecurity. In this episode, Jim Clover, founder of Varadius Ltd and former UK Government cyber operations lead, joins Luke Potter, COO at CovertSwarm, to explore how AI is changing the way real attacks are planned and executed. Jim brings a grounded perspective shaped by years of experience and a deep understanding of AI model safety. Luke provides insight from the front line of offensive operations, where AI...
Show more...
Technology
Business,
News,
Tech News
RSS
All content for You Deserve to be Hacked is the property of CovertSwarm and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Artificial intelligence is rapidly becoming an active partner in offensive cybersecurity. In this episode, Jim Clover, founder of Varadius Ltd and former UK Government cyber operations lead, joins Luke Potter, COO at CovertSwarm, to explore how AI is changing the way real attacks are planned and executed. Jim brings a grounded perspective shaped by years of experience and a deep understanding of AI model safety. Luke provides insight from the front line of offensive operations, where AI...
Show more...
Technology
Business,
News,
Tech News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts211/v4/79/14/33/791433c7-52da-f3b6-a453-bbf992946ecd/mza_10604889840378575100.jpg/600x600bb.jpg
Episode 21 - Transitioning from Bug Bounty to Constant Cyber Attack
You Deserve to be Hacked
36 minutes
2 years ago
Episode 21 - Transitioning from Bug Bounty to Constant Cyber Attack
Bug Bounty programmes can form an effective component of an organization's security strategy. However, they are prone to testing blindspots, variable quality, and uncertainty around tester skillsets and backgrounds. Join CovertSwarm COO, Luke Potter, as he interviews Ignacio Garrido on his move from working with popular Bug Bounty vendors over to joining our Swarm of ethical hackers full-time. Hear how his work delivering our Constant Cyber Attack service has changed his career and ab...
You Deserve to be Hacked
Artificial intelligence is rapidly becoming an active partner in offensive cybersecurity. In this episode, Jim Clover, founder of Varadius Ltd and former UK Government cyber operations lead, joins Luke Potter, COO at CovertSwarm, to explore how AI is changing the way real attacks are planned and executed. Jim brings a grounded perspective shaped by years of experience and a deep understanding of AI model safety. Luke provides insight from the front line of offensive operations, where AI...