Security Unlocked
Inactive
4.0(56)

Security Unlocked

by Microsoft

67 episodesLatest 10 mo agoEN

Security Unlocked presents The BlueHat Podcast

 

From 2020 to 2022, Security Unlocked, hosted by Nic Fillingham and Natalia Godyla, explored the technology and people powering Microsoft's Security solutions.

 

Today, the Security Unlocked feed brings you new episodes from The BlueHat Podcast where hosts Nic Fillingham and Wendy Zenone speak with security researchers, responders, hackers and industry leaders, both inside and outside of Microsoft, working to secure the planet's technology and create a safer world for all.


Hosted on Acast. See acast.com/privacy for more information.

©2024 Microsoft

Recent reviews on Apple Podcasts (5)
  • Interesting content and great hosts

    Super engaging and relevant content for Security professionals of all tenure. Knowledgeable and personable hosts.

    CaitlinMF ·

  • Excellent Security Podcast

    Excellent storytelling told by some of the most informed and passionate security professionals in the industry.

    KikiBooILU ·

  • Very painful to listen to

    Content might be interesting but fire the hosts into the moon

    A concerned ex-user ·

  • Terrible

    Not worth your time. Barely scratch the surface tech content with hosts that are simply hard to listen to.

    simplyhonest1234 ·

  • Great insights

    Each episode is a great blend of depth for the security savvy, and breakdowns of technical concepts that make them accessible to anyone who is just curious about security.

    .-ryan-. ·

View all reviews on Apple Podcasts

Episodes (67)

  1. Hunting Variants: Finding the Bugs Behind the Bug

    Jul 9, 202539m#66

    In this episode of The BlueHat Podcast, host Nic Fillingham is joined by George Hughey from Microsoft who returns to discuss his Blue Hat India talk on variant hunting, explaining how MSRC uses submission data from hacki

  2. Securing Redirections with Mike Macelletti

    Jun 25, 202541m#65

    In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Mike Macelletti from Microsoft’s MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation de

  3. Ignore Ram Shankar Siva Kumar’s Previous Directions

    Jun 11, 202539m#64

    In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens

  4. Protecting AI at the Edge with David Weston

    May 28, 202538m#63

    In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introdu

  5. Hacking at the Weeds with Felix Boulet

    May 14, 202532m#62

    In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Felix Boulet fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to b

  6. Evolutions in Hacking with Marco Ivaldi

    Apr 30, 202548m#61

    In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi , co-founder and technical director of HN Security, a boutique company specializing in offensive security services,

  7. From Facebook-Phished to MVR Top 5 with Dhiral Patel

    Apr 16, 202541m#60

    In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Dhiral Patel , Senior Security Engineer at ZoomInfo and one of MSRC’s Most Valuable Researchers (MVR). Dhiral shares how a hacked

  8. AI & the Hunt for Hidden Vulnerabilities with Tobias Diehl

    Apr 2, 202533m#59

    In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by security researcher Tobias Diehl , a top contributor to the Microsoft Security Research Center (MSRC) leaderboards and a Most Val

  9. Cryptojacking, and Farewell for Now!

    Feb 16, 202235m#58

    The success of crypto inspired dozens of other cryptocurrencies like Ethereum, Tether, and Dogecoin. Today, people worldwide use cryptocurrencies to buy things, sell things, and make investments. One thing is certain; di

  10. A look at Cybercrime in 2021

    Feb 2, 202241m#57

    Ransomware attacks have never been so successful. The returns from these attacks are soaring and only becoming easier to conduct. In chapter two of the Microsoft Digital Defense Report, the growing threat of cybercrime i

  11. What’s a BISO?

    Jan 19, 202239m#56

    Everything is exciting and new when you're a kid, and curiosity inspires many of us to branch out and try new things. For some, that means drawing from our imagination or trying all kinds of sports. And for others it mea

  12. Disinformation in the Enterprise

    Jan 5, 202235m#55

    Disinformation refers to the calculated use of false information to influence others and has been a steadily growing form of information warfare. Unfortunately, disinformation is everywhere these days, often hidden in pl

  13. I am Shroot-less

    Dec 22, 202136m#54

    Microsoft works around the clock to protect their customers, no matter what product they’re using, Microsoft or otherwise. In some instances Microsoft teams up with other companies, creating an all-star cybersecurity tea

  14. Decoding NOBELIUM

    Dec 8, 202148m#53

    In December 2020, Microsoft began sharing information with the cybersecurity industry on a group of Russia-based hackers who gained access to multiple enterprises through vulnerable software code, stolen passwords, compr

  15. Trusting Your Hybrid Workforce

    Nov 24, 202141m#52

    We are back, covering more of the 2021 Microsoft Digital Defense Report, and this time we’re taking a deep dive into chapter five on Hybrid Workforce Security and Zero Trust. Zero Trust means precisely what it sounds lik

  16. When Privacy Meets Security

    Nov 10, 202138m#51

    The way most people operate online these days, what would you even consider private anymore? We are so quick to share details about our job, home, friends, and family without even thinking about how much personal info we

  17. Securing Modern Software

    Oct 27, 202121m#50

    The newfound popularity of the internet in the nineties spurned an obsession with hacking. Unfortunately, most movies believed that it wasn't possible to show real hacking and still be entertaining; hence all the awkward

  18. The 2021 Microsoft Digital Defense Report

    Oct 20, 202139m#49

    Okay, look, we know you plan on reading the entire 2021 MDDR at some point. But you're busy. Life gets in the way. We get it. Who has the time! Well, we've got the time, but that's beside the point, and honestly... fortu

  19. Mobile 4N6 101

    Oct 13, 202134m#48

    What would you say is the most personal possession that you own? Most would say their cell phone... unless you still have a few journals from high school. And if you do, this is your reminder that it might be time to let

  20. Untangling Botnets

    Oct 6, 202137m#47

    You're back home celebrating the holidays with friends and family, sharing stories, catching up, and discussing your plans for the year ahead. Next thing you know, that cousin who wouldn't stop sending you emails about t

  21. What the Fuzz?!

    Sep 29, 202136m#46

    Do you have a data science or engineering background? If so, you're in luck. If not, you're also in luck because today's guest found a way to make a few complex subjects understandable for everyone. The first of many top

  22. The ‘Three E’s’ of Scam Disruption

    Sep 22, 202135m#45

    Juan Hardoy leads an international team of investigators, analysts, and lawyers inside the Digital Crimes Unit who share a joint mission to protect customers and promote trust in Microsoft technologies. Hearing that migh

  23. Entering the Virtual Battlefield

    Sep 15, 202135m#44

    Have you ever thought about a career in threat intelligence or cyber security? Possibly finishing school with a degree in computer programming and feel overwhelmed with what to do next? Don't worry; we've all experienced

  24. Battling BazaCall BuzzKill

    Sep 1, 202135m#43

    It's finally Friday. You successfully made it through another week and the weekend is so close you can taste it. You pour yourself a bowl of your favorite cereal, but before you can get that first bite your phone rings.

  25. Turning to the Purple Side

    Aug 25, 202124m#42

    Picture this: you’re working on a new software that will revolutionize your industry. You’ve got your work cut out for you, from design to programming to integration. But what about security? Keeping your software secure