Spread the love

Sponsored by our friends at Veeam Software! Make sure to click here and get the latest and greatest data protection platform for everything from containers to your cloud!


Sponsored by the Shift Group - Shift Group is turning athletes into sales professionals. Is your company looking to hire driven, competitive former athletes? Shift Group not only offers a large pool of diverse sales candidates from entry level to leadership – they help early stage companies in developing their hiring strategy, interview process and build strong sales cultures that attract the best talent for early stage companies.


Sponsored by the 4-Step Guide to Delivering Extraordinary Software Demos that Win Deals - Click here and because we had such good response we have opened it up to make the eBook and Audiobook more accessible by offering it all for only 5$


Sponsored by Diabolical Coffee. Devilishly good coffee and diabolically awesome clothing


Does your startup need strategic technical content? The team at GTM Delta delivers SEO-optimized, compelling content that connects your company with technical users to help grow your credibility, and your pipeline.


Ted Harrington is a best-selling auther of a book called HACKABLE: How to Do Application Security Right, and an Executive Partner at Independent Security Evaluators (ISE).

ISE is a company of ethical hackers most commonly known for our work hacking cars, medical devices, web applications, and password managers and they’ve helped hundreds of companies fix tens of thousands of security vulnerabilities, including Google, Amazon, and Netflix.

We discuss the challenges of security in every day tech, enterprise and personal infosec practices we can all embrace easily, and why it’s so easy to slip on security but equally easy to prevent hacking.

Follow Ted at https://tedharrington.com and check out ISE at https://ise.io 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.