IT Pro Podcast

The IT Pro Podcast: The secret life of hackers

What it’s really like to be a professional penetration tester

Hacking is one of the glitzier parts of IT, and Hollywood frequently bombards us with images of black-clad hackers hunched malevolently over glowing screens. Sadly, real-world hacking isn’t quite as glamorous as it’s often made out to be - but that doesn’t mean it’s not a fascinating and lively career.

In this week’s episode, we sit down with professional pen-tester and Cyberis director Gemma Moore to find out what the life of a hacker for hire is really like, the common security holes that intruders exploit, and why laziness is a hacker’s greatest weapon.

Elsewhere, we discuss the Twitterpocalypse which saw verified users barred from tweeting, and the landmark decision by the government to remove Huawei from the UK’s 5G networks, as well as what it could mean for UK businesses.

Footnotes

News

Twitter

Huawei

In-depth

Subscribe

Featured Resources

Four cyber security essentials that your board of directors wants to know

The insights to help you deliver what they need

Download now

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

Recommended

Phishing attacks surge ahead of Black Friday and Cyber Monday
Security

Phishing attacks surge ahead of Black Friday and Cyber Monday

17 Nov 2020
Wisconsin Republican Party allegedly loses $2.3 million to hackers
hacking

Wisconsin Republican Party allegedly loses $2.3 million to hackers

30 Oct 2020
What is hacktivism?
hacking

What is hacktivism?

13 Oct 2020
Microsoft: Iranian hackers are exploiting ZeroLogon flaw
Security

Microsoft: Iranian hackers are exploiting ZeroLogon flaw

6 Oct 2020

Most Popular

80% of cyber professionals say the Computer Misuse Act is working against them
Security

80% of cyber professionals say the Computer Misuse Act is working against them

20 Nov 2020
Cisco acquires container security startup Banzai Cloud
Security

Cisco acquires container security startup Banzai Cloud

18 Nov 2020
46 million Animal Jam accounts leaked after comms software breach
Security

46 million Animal Jam accounts leaked after comms software breach

13 Nov 2020