The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading

1
#35 Q&A: The Harsh Truth: You NEED to Code for Cybersecurity Mastery
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04If you want to be an expert in cybersecurity, coding isn’t optional—it’s essential. In this Q&A episode of The Hacker’s Cache, I break down why learning to code separates the entry-level professionals from the true experts and how AI is shifting the skills needed in offensive security. I also dive into the different career paths available after lan…
…
continue reading

1
#34 Why Top Pentesters Make More Money (Most Ignore This Skill) ft. Spencer Alessi
43:58
43:58
Play later
Play later
Lists
Like
Liked
43:58Kyser Clark sits down with senior penetration tester Spencer Alessi to discuss a skill that separates top-tier pentesters from the rest—client communication. While technical prowess is essential, Spencer shares how clear, proactive communication can make or break a pentest engagement, impact client trust, and even determine career growth. They also…
…
continue reading

1
#33 Are Cybersecurity Bootcamps a Scam? ft. Keith Coleman
40:04
40:04
Play later
Play later
Lists
Like
Liked
40:04Are cybersecurity bootcamps worth the hefty price tag, or are they just another overhyped shortcut to nowhere? In this episode of The Hacker’s Cache, I sit down with Keith Coleman, a seasoned cybersecurity professional with experience in pentesting, security engineering, DevSecOps, and more. We break down the true value of bootcamps, why many gradu…
…
continue reading

1
#32 From Physical Security to Penetration Testing: Paul Nieto III's Journey
41:22
41:22
Play later
Play later
Lists
Like
Liked
41:22Kyser Clark is joined by Paul Nieto, a seasoned penetration tester with over 22 years of experience spanning physical and cybersecurity. Paul shares his journey from physical security to offensive security, detailing how his curiosity and drive for challenges led to a successful career pivot. They discuss the importance of networking, the debate be…
…
continue reading

1
#31 Q&A: Are Tech Giants Planning to Replace Us with AI?
31:57
31:57
Play later
Play later
Lists
Like
Liked
31:57Kyser Clark dives into the growing role of AI in the tech industry and its potential to replace mid-level professionals. Inspired by comments from tech leaders like Mark Zuckerberg, we explore why companies are investing heavily in AI, how it could reshape the middle-class job market, and what it means for cybersecurity professionals. Kyser shares …
…
continue reading

1
#30 Uncovering a $200M Fraud Ring with David Taxer
43:00
43:00
Play later
Play later
Lists
Like
Liked
43:00David Taxer, a cybersecurity expert with over 12 years of experience, shares the incredible story of uncovering a $200 million fraud ring disguised under a major corporation. Learn how his unique background in SEO and intelligence helped him expose insider threats and fraudulent schemes, as well as the challenges he faced as a whistleblower. This e…
…
continue reading

1
#29 InfoSec Pat’s Journey From Network Engineer to Cyber Mentor:
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Kyser Clark interviews Patrick Gorman, also known as InfoSec Pat, a seasoned cybersecurity professional with over 23 years of experience. They discuss the importance of certifications in the cybersecurity field, the challenges of retaining knowledge, and the journey of creating educational content on YouTube. Pat shares insights on his motivations …
…
continue reading

1
#28 Outwork the Competition: Winning the Cybersecurity Career Game
28:03
28:03
Play later
Play later
Lists
Like
Liked
28:03In this episode, Kyser Clark discusses the competitive landscape of cybersecurity, emphasizing the importance of culture fit, the reality of job openings, and how to stand out in a crowded field. He highlights the necessity of hard work, continuous learning, and the value of soft skills in securing a position. Additionally, he addresses the misconc…
…
continue reading

1
#27 Red Team Reality: Building the Hacker's Edge ft. Mike Ortiz
45:31
45:31
Play later
Play later
Lists
Like
Liked
45:31In this conversation, Mike Ortiz discusses various aspects of cybersecurity, focusing on the importance of curiosity, the dynamics between red and blue teams, and the transition into red teaming. He emphasizes the need for collaboration between teams and the significance of understanding the foundational roles in cybersecurity. Mike also shares his…
…
continue reading

1
#26 Q&A: The Certification Everyone Asks For (Is It Overrated?)
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44In this Q&A episode, Kyser Clark addresses various questions related to cybersecurity certifications, focusing on the relevance of CISSP in 2025, the comparison between CPTS and OSCP, and the role of OSCP as a gatekeeper certification. He also discusses the value of TCM and INE certifications and provides insights on the time investment required fo…
…
continue reading

1
#25 Beyond Compliance: How Hackers Think and What Companies Miss ft. Albert Corzo
41:12
41:12
Play later
Play later
Lists
Like
Liked
41:12Kyser Clark engages with cybersecurity expert Albert Corzo, who shares his extensive experience in ethical hacking, bug bounty programs, and the importance of certifications in the field. Albert discusses his past experiences, including hacking the U.S. government, and emphasizes the need for understanding cybercrime and threat actors to better pro…
…
continue reading

1
#24 Building a Career Together: Lessons from Clint & Si The Hackers
39:44
39:44
Play later
Play later
Lists
Like
Liked
39:44Kyser Clark is joined by Simon and Clint from the YouTube channel 'Clint & Si The Hackers.' They discuss their journey into cybersecurity, the importance of practical experience over formal education, and the benefits of collaboration in building a successful career. The conversation covers various aspects of penetration testing, the challenges fac…
…
continue reading

1
#23 SOC Analyst Life: Challenges & Secrets from Trent Williams
39:24
39:24
Play later
Play later
Lists
Like
Liked
39:24Kyser Clark and Trent Williams talk about the roles and experiences of a SOC analyst. They discuss the challenges faced in the field, the importance of continuous learning, and the impact of AI on cybersecurity jobs. Trent shares insights from his career journey, the significance of certifications, and the necessity of understanding both offensive …
…
continue reading

1
#22 Q&A: Cybercrime, Certifications, and Sacrifice in Cybersecurity Careers
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58Kyser Clark introduces a new Q&A format where he answers listener questions about cybersecurity, ethical hacking, and career development. He discusses the allure of cyber crime, the importance of networking certifications, and the sacrifices necessary to succeed in the field. Kyser emphasizes that while certifications can enhance career prospects, …
…
continue reading

1
#21 Unpacking AppSec: Lessons and Insights with Jonathon Fuller
38:48
38:48
Play later
Play later
Lists
Like
Liked
38:48Kyser Clark interviews Jonathan Fuller, a seasoned cybersecurity professional with a diverse background in various roles, including penetration testing and application security. Jonathan shares his journey from being a NOC engineer to founding Advict Security, emphasizing the importance of delivering comprehensive information to clients during pene…
…
continue reading

1
#20 What it REALLY Takes to Pass OSCP (and What They Don’t Tell You) ft. Trent Miller
36:40
36:40
Play later
Play later
Lists
Like
Liked
36:40Kyser Clark interviews Trent Miller, a cybersecurity professional with a diverse background in IT and security roles. They discuss Trent's career journey, the challenges of breaking into cybersecurity, the importance of networking, and insights on certifications like OSCP. Trent shares his experiences with the job market, the reality of skill short…
…
continue reading

1
#19 Beating the Odds in Cybersecurity: What It Really Takes ft. James Scott
35:39
35:39
Play later
Play later
Lists
Like
Liked
35:39Kyser Clark interviews James Scott, a cybersecurity professional with a diverse background in the military and digital forensics. They discuss James's journey into penetration testing, the challenges he faced in landing his first role, and the importance of networking and creating personal tools. The conversation also covers the significance of pro…
…
continue reading

1
#18 16 Years in IT, Now a Fortune 100 Pentester: 0xD1CE Shares His Journey
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16Kyser Clark interviews 0xD1CE, a seasoned penetration tester, who shares his extensive journey from IT to cybersecurity. 0xD1CE discusses his various roles, certifications, and the impact of COVID on his career shift. The conversation gets into the differences between consulting and internal roles, the value of certain cybersecurity certifications,…
…
continue reading

1
#17 Unpacking Bug Bounty Strategies with RootSploit: Zero Days, Recon, and Vulnerabilities
37:18
37:18
Play later
Play later
Lists
Like
Liked
37:18Cybersecurity professionals Kyser Clark and Pranit Garud (RootSploit) discuss their experiences in the field. They cover topics such as bug bounty programs, the role of an offensive security engineer, and the differences between consulting and working for a Fortune 500 company. Pranit shares tips for getting started in bug bounty hunting and emphas…
…
continue reading

1
#16 Why Cybersecurity Is Stressful and How to Succeed with Opeyemi Kolawole (Hacking Insights)
38:56
38:56
Play later
Play later
Lists
Like
Liked
38:56Kyser Clark interviews Opeyemi Kolawole, a full-time red teamer and cybersecurity professional. They discuss Opeyemi's background in biology and his transition into the cybersecurity field. Opeyemi shares his experience and insights on various certifications, including the Cyberwarfare Lab Certified Red Team Analyst (CPTA) and the importance of sta…
…
continue reading

1
#15 From Zero to Hero: How Anyone Can Succeed in Cybersecurity
34:28
34:28
Play later
Play later
Lists
Like
Liked
34:28In this solo episode, Kyser Clark discusses the accessibility of cybersecurity careers, emphasizing that anyone can enter the field regardless of their background. He shares his personal journey from blue-collar jobs to becoming a penetration tester, highlighting the importance of certifications and continuous learning. Kyser provides actionable st…
…
continue reading

1
#14 Social Engineering Unleashed: DEF CON Insights from Jacob Villarreal
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24Kyser Clark interviews Jacob Villarreal, a penetration tester, about his journey into the cybersecurity field, his experiences at DEFCON, and various topics related to cybersecurity. Jacob shares his background, including his education, certifications, and transition from IT roles to penetration testing. The discussion covers the importance of netw…
…
continue reading

1
#13 Hacking Time: Real World Skills They Don't Teach You | Trent Darrow
39:32
39:32
Play later
Play later
Lists
Like
Liked
39:32Kyser Clark interviews Trent Darrow, a senior penetration tester and cyber protection team crew lead. They discuss Trent's background, certifications, and his role in building a red team. They also touch on ethical dilemmas in the industry, the effectiveness of certifications in preparing for real-world pen testing, and the importance of skills lik…
…
continue reading

1
#12 Why OSCP Might Not Be Worth It - A Surprising Take by Evan Isaac
37:52
37:52
Play later
Play later
Lists
Like
Liked
37:52Kyser Clark and Evan Isaac discuss their experiences and insights in cybersecurity. They cover topics such as certifications, content creation on LinkedIn, web hacking resources, job searching advice, and the importance of offensive and defensive cybersecurity skills. Connect with Evan Isaac on LinkedIn: https://www.linkedin.com/in/evan-isaac/ Take…
…
continue reading

1
#11 Stay Creative Together: Insights from Nouha Ben Brahim
34:26
34:26
Play later
Play later
Lists
Like
Liked
34:26Kyser Clark interviews Nouha Ben Brahim, a Python programmer turned bug bounty hunter and founder of No Breach. They discuss Nouha's journey into cybersecurity, the most concerning cyber breach, common web hacking vulnerabilities, becoming a speaker at events, starting a cybersecurity company, and Nouha's podcast, The Hackers Line. Connect with Nou…
…
continue reading

1
#10 Breaking into Cybersecurity: Tips from a Pro ft. Jake Mayhew
39:04
39:04
Play later
Play later
Lists
Like
Liked
39:04In this conversation, Kyser Clark interviews Jake Mayhew, a senior penetration tester, about his background and experiences in cybersecurity. They discuss the importance of internships, the value of creating a home lab, and the benefits of networking at local conferences and meetups. Jake also shares advice for job seekers, including the significan…
…
continue reading

1
#9 Red Teaming & Malware Development ft. Nathan Rice
35:04
35:04
Play later
Play later
Lists
Like
Liked
35:04In this conversation, Kyser Clark interviews Nathan Rice, a senior penetration tester, about his background and experience in cybersecurity. They discuss the differences between penetration testing and red team operations, the importance of starting with penetration testing before moving to red teaming, and the challenges and rewards of obtaining c…
…
continue reading

1
#8 Cybersecurity Is a Beautiful Field: There's People That Don't Like Me ft. Aaron Tran
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14Kyser Clark interviews Aaron Tran, a military veteran who successfully transitioned into a career in cybersecurity. They discuss Aaron's journey from the military to becoming a penetration tester, the challenges he faced, and the steps he took to bridge the gap between non-cyber and cyber roles. They also touch on the importance of having a plan an…
…
continue reading

1
#7 Think Outside the Box to Land First Pentesting Job ft. Ryan Daub
32:28
32:28
Play later
Play later
Lists
Like
Liked
32:28In this conversation, Kyser Clark interviews Ryan Daub, an Offensive Security Analyst Associate, about his journey in cybersecurity and his current role as an internal penetration tester for healthcare organizations. They discuss topics such as landing a job in cybersecurity, the role of AI in penetration testing, the differences between internal a…
…
continue reading

1
#6 Is AI Going to Cause Bad Stuff? Of Course, Everything Does ft. Mike Finkel
31:33
31:33
Play later
Play later
Lists
Like
Liked
31:33In this conversation, Kyser Clark interviews Mike Finkel, a penetration tester, about his background and experiences in the cybersecurity field. They discuss certifications, the importance of customer service skills in pentesting, and the role of AI in the industry. Mike shares his hot take on AI, expressing his excitement for its potential in pent…
…
continue reading
In this conversation, George Raileanu discusses the importance of mentoring, strategies for finding a mentor, and the benefits of building a strong network in cybersecurity. He also shares advice on continuous learning, dealing with imposter syndrome and burnout, and the value of paying it forward in the industry. Connect with George Raileanu on Li…
…
continue reading

1
#4 A Vulnerability Assessment Isn't a Pentest ft. Kristofer Johnson
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26Kyser Clark and Kristopher Johnson's conversation covers various topics related to offensive security, certifications, career progression, and distinguishing between vulnerability assessments and penetration tests. Kristopher shares his journey into offensive security, his challenges, and the importance of continuous learning and perseverance. The …
…
continue reading

1
#3 Best Way to Learn Active Directory Hacking Skills ft. Robert O’Connor
39:17
39:17
Play later
Play later
Lists
Like
Liked
39:17The conversation between Kyser Clark and Robert O'Connor covers a wide range of topics related to penetration testing, certifications, career progression, and personal experiences in the cybersecurity field. Robert shares insights on his journey from IT intern to senior analyst to penetration tester, discussing certifications, specialization in Act…
…
continue reading

1
#2 Transition From Pentester to Senior Pentester ft. Adolfo (Val) Vask
37:05
37:05
Play later
Play later
Lists
Like
Liked
37:05Adolfo (Val) Vask, a seasoned cybersecurity professional, shares insights on his journey from intelligence analysis to penetration testing and red teaming. He discusses certifications, the MetaSploit Pro Specialist, the relevance of education in cybersecurity, and the transition from penetration tester to senior penetration tester. He also provides…
…
continue reading

1
#1 Do Something Great in the World ft. Joshua Ragland
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57The conversation covers a wide range of topics related to cybersecurity, including the background and career journey of the guest, the importance of offensive security, the cybersecurity skills shortage, strategies for excelling in CTF competitions, and the correlation between cybersecurity and everyday life. The guest also shares insights on preve…
…
continue reading

1
#0 Security Is Not Everybody’s Responsibility
30:23
30:23
Play later
Play later
Lists
Like
Liked
30:23In this episode, I introduce myself, Kyser Clark, and share my background in cybersecurity. I talk about my experience as a client systems technician in the United States Air Force and my transition into penetration testing. I also discuss my certifications and educational background in cybersecurity. I explain the purpose of this podcast, which is…
…
continue reading

1
How to achieve the Defense Department’s CMMC compliance with Frank Smith
32:59
32:59
Play later
Play later
Lists
Like
Liked
32:59Did you know that the Department of Defense (DOD) is mandating that suppliers have Cybersecurity Maturity Model Certification (CMMC) to a prescribed level? In this episode, Frank Smith, Manager of Security and Consulting Practice at Ntiva, shares all you need to know about CMMC. Discover what CMMC is, why you should care, the requirements needed fo…
…
continue reading

1
Developing a Security Test Methodology with Mike Spanbauer
34:42
34:42
Play later
Play later
Lists
Like
Liked
34:42I today’s episode, I’m going to be sharing a session that Mike Spanbauer, Security Evangelist for Juniper, gave at the last Secure Guild online conference on Developing a Security Test Methodology. Discover the four pieces that make up his approach and some essential tips in implementing your own. Listen up!…
…
continue reading

1
Prioritize Your Open Source Findings with James Rabon
22:10
22:10
Play later
Play later
Lists
Like
Liked
22:10Does your team struggle with prioritizing your security open-source findings? In this episode, James Rabon, Director of Product Management at Micro Focus, will share an approach that can help. Discover how James’ team co-developed “susceptibility analysis,” which allows developers and application security engineers determine whether a publicly-disc…
…
continue reading
Cybersecurity concepts are fundamental pieces of knowledge necessary for a career in security testing. In this episode, Joe Abraham, author of numerous Pluralsight courses, will share some insights into many security aspects. Listen in to learn about security onion, threat intelligence, cyber threat hunting tips and more.…
…
continue reading

1
TrustedSec Sysmon Community Guide with Carlos Perez
29:38
29:38
Play later
Play later
Lists
Like
Liked
29:38Are you struggling to find information on how to use Sysmon for your security efforts? In this episode, Carlos Perez, a Research Team lead at TrustedSec, shares all about the TrustedSec Sysmon Community Guide. Discover why Carlos created this guide and how it helps empower defenders with the information they need to leverage this great tool. Also, …
…
continue reading

1
Cybersecurity Tools and Frameworks with Aaron Rosenmund
31:34
31:34
Play later
Play later
Lists
Like
Liked
31:34Aaron Rosenmund, a cybersecurity researcher at Pluralsight, shares a wealth of knowledge around security testing in this episode. Discover blue team tools to protect, detect, and respond against targeted threat actor techniques in an enterprise environment. Listen in to also learn security frameworks to help you with your threat hunting efforts…
…
continue reading

1
Information Gathering in Penetration Testing with Malek Mohammad
21:35
21:35
Play later
Play later
Lists
Like
Liked
21:35How can you prevent attacks if you don't know your enemy? In this episode, Malek Mohammad, author of the Pluralsight course: Web Application Penetration Testing: Information Gathering, discusses how to know how your enemies target you. Discover fingerprinting web applications, enumerating applications, understanding their entry points, and tooling …
…
continue reading
Happy New Year! We will be away for a few weeks but will be back with more security testing awesomeness in 2021. Also, don't forget to register for AutomationGuild.
…
continue reading
Need to secure your AWS environments? In this episode, Jonathan Helmus, author of the new book AWS Penetration Testing, will share some tips on AWS penetration testing and security best practices. Discover some of the commonly exploited vulnerabilities in AWS and how to prevent them. Listen in to learn more about cloud penetration testing tips, and…
…
continue reading

1
Discover Network Vulnerabilities using Infection Monkey with Maril Vernon
30:44
30:44
Play later
Play later
Lists
Like
Liked
30:44Are you using Infection Monkey? In this episode, Pluralsight author and security expert Maril Vernon will share some insights from her Infection Monkey course. Discover uses of Infection Monkey to test for later movement and network segments against known MITRE tactics. Listen up to learn how this amazing tool can identify your company’s vulnerable…
…
continue reading

1
OWASP Broken Authentication Breakdown with Prasad Salvi
23:23
23:23
Play later
Play later
Lists
Like
Liked
23:23Prepare to learn all about the OWASP Top 10 Web Application Security Risks—Broken Authentication. This is the second monthly episode in which security expert Prasad Salvi will join us to break down each OWASP risk one by one. Today we’ll discuss the second security risk listed—broken authentication. Discover what a broken authentication risk is, th…
…
continue reading

1
API Security Testing In DevOps with Oli Moradov
46:05
46:05
Play later
Play later
Lists
Like
Liked
46:05How do you integrate API security testing into the development process? In this episode, Oli Moradov, VP of Dev and Strategic Alliances at NeuraLegio, shares ways that you can achieve API security testing automation directly into your DevOps or CI/CD pipelines. Discover how you can test every build without causing development drag. Listen up!…
…
continue reading

1
Covid-19 Security and OWASP with Adiran Thirmal
34:03
34:03
Play later
Play later
Lists
Like
Liked
34:03Has COVID-19 impacted your security testing efforts? In this episode, security expert Adhiran Thirmal shares his thoughts on security testing, Covid-19, OWASP, and more. Listen up and find out more about changes to OWASP for 2020 and beyond and how you can help.
…
continue reading

1
SQL Injection OWASP Top 10 with Prasad Salvi
25:23
25:23
Play later
Play later
Lists
Like
Liked
25:23Are you familiar with the OWASP Top 10 Web Application Security Risks? This is the first monthly episode where security expert Prasad Salvi joins us to break down each risk one by one. Today we talk all about the first security risk listed -- injection flaws. Discover what an injection flaw is, different ways this attack can occur, and how to preve…
…
continue reading