The Hacker's Cache

Written by: Kyser Clark - Cybersecurity
  • Summary

  • The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.

    © 2024 The Hacker's Cache
    Show More Show Less
Episodes
  • #27 Red Team Reality: Building the Hacker's Edge ft. Mike Ortiz
    Dec 25 2024

    In this conversation, Mike Ortiz discusses various aspects of cybersecurity, focusing on the importance of curiosity, the dynamics between red and blue teams, and the transition into red teaming. He emphasizes the need for collaboration between teams and the significance of understanding the foundational roles in cybersecurity. Mike also shares his personal journey into the field and offers valuable advice for aspiring cybersecurity professionals.

    Takeaways

    Privacy is a trade-off for convenience in the digital age.
    Curiosity drives persistence in problem-solving for hackers.
    Red teaming involves prolonged engagement and understanding of systems.
    The relationship between red and blue teams should be collaborative.
    Effective communication is crucial in delivering red team findings.
    Entry-level cybersecurity roles provide valuable foundational experience.
    Understanding the history of cybersecurity helps in grasping its current state.
    Hands-on experience is essential for developing cybersecurity skills.
    The OSCP certification is a rigorous but rewarding challenge.
    Help desk roles are critical for building soft skills and technical knowledge.

    Connect
    ---------------------------------------------------
    https://www.KyserClark.com
    https://www.KyserClark.com/Newsletter
    https://youtube.com/KyserClark
    https://www.linkedin.com/in/KyserClark
    https://www.twitter.com/KyserClark
    https://www.instagram/KyserClark
    https://facebook.com/CyberKyser
    https://twitch.tv/KyserClark_Cybersecurity
    https://www.tiktok.com/@kyserclark
    https://discord.gg/ZPQYdBV9YY


    Music by Karl Casey @ White Bat Audio

    Attention viewers/Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

    The postings on this site are my own and may not represent the positions of ...

    Show More Show Less
    46 mins
  • #26 The Certification Everyone Asks For (Is It Overrated?): Q&A
    Dec 18 2024

    In this Q&A episode, Kyser Clark addresses various questions related to cybersecurity certifications, focusing on the relevance of CISSP in 2025, the comparison between CPTS and OSCP, and the role of OSCP as a gatekeeper certification. He also discusses the value of TCM and INE certifications and provides insights on the time investment required for the eJPT certification. The conversation emphasizes the importance of experience and practical knowledge in the cybersecurity field.

    Takeaways

    • CISSP remains the most in-demand certification in cybersecurity.
    • Experience is crucial for obtaining CISSP certification.
    • CISSP covers a broad range of cybersecurity topics.
    • CPTS is considered harder than OSCP but less recognized.
    • OSCP is still the most sought-after certification for pentesters.
    • TCM certifications do not expire, unlike INE certifications.
    • Hands-on experience is vital for success in cybersecurity roles.
    • The time to complete certifications varies based on individual study habits.
    • Employers may not require OSCP for all pentesting positions.
    • Certifications should align with career goals and job requirements.

    Connect
    ---------------------------------------------------
    https://www.KyserClark.com
    https://www.KyserClark.com/Newsletter
    https://youtube.com/KyserClark
    https://www.linkedin.com/in/KyserClark
    https://www.twitter.com/KyserClark
    https://www.instagram/KyserClark
    https://facebook.com/CyberKyser
    https://twitch.tv/KyserClark_Cybersecurity
    https://www.tiktok.com/@kyserclark
    https://discord.gg/ZPQYdBV9YY


    Music by Karl Casey @ White Bat Audio

    Attention viewers/Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

    The postings on this site are my own and may not represent the positions of ...

    Show More Show Less
    28 mins
  • #25 Beyond Compliance: How Hackers Think and What Companies Miss ft. Albert Corzo
    Dec 11 2024

    Kyser Clark engages with cybersecurity expert Albert Corzo, who shares his extensive experience in ethical hacking, bug bounty programs, and the importance of certifications in the field. Albert discusses his past experiences, including hacking the U.S. government, and emphasizes the need for understanding cybercrime and threat actors to better protect organizations. The conversation also covers the differences between compliance and security, the challenges of bug bounty hunting, and the significance of mentorship in cybersecurity careers.

    Bug bounty programs can serve as a practical playground for ethical hackers.

    Understanding how cybercriminals operate is crucial for effective security measures.

    Compliance does not equate to security; companies must prioritize actual data protection.

    Phishing remains a significant threat, accounting for 70% of attacks.

    Real-world experience is invaluable in cybersecurity, beyond just certifications.

    Adversary simulations can help organizations prepare for potential attacks.

    Networking and mentorship are key components for success in cybersecurity careers.

    Connect with Albert on LinkedIn: https://www.linkedin.com/in/alberto-corzo-gonzalez/

    Check out the Coffee&&Pizza Podcast: https://youtu.be/hcLMYEb8yA4?si=UmoHImLAUTNOxce4

    Connect
    ---------------------------------------------------
    https://www.KyserClark.com
    https://www.KyserClark.com/Newsletter
    https://youtube.com/KyserClark
    https://www.linkedin.com/in/KyserClark
    https://www.twitter.com/KyserClark
    https://www.instagram/KyserClark
    https://facebook.com/CyberKyser
    https://twitch.tv/KyserClark_Cybersecurity
    https://www.tiktok.com/@kyserclark
    https://discord.gg/ZPQYdBV9YY


    Music by Karl Casey @ White Bat Audio

    Attention viewers/Listeners: This content is strictly for educational purposes, emphasizing ETHICAL and LEGAL hacking only. I do not, and will NEVER, condone the act of illegally hacking into computer systems and networks for any reason. My goal is to foster cybersecurity awareness and responsible digital behavior. Please behave responsibly and adhere to legal and ethical standards in your use of this information.

    The postings on this site are my own and may not represent the positions of ...

    Show More Show Less
    41 mins

What listeners say about The Hacker's Cache

Average Customer Ratings

Reviews - Please select the tabs below to change the source of reviews.