Troy Hunt is an Australian web security consultant known for public education and outreach on security topics. He created Have I Been Pwned?, a data breach search website that allows non-technical users to see if their personal information has been compromised. He has also authored several popular security-related courses on Pluralsight, and regularly presents keynotes and workshops on security topics (Source).He holds the title of Microsoft Regional Director and Microsoft Most Valuable Professional for Developer Security. He doesn’t work for the company but the brand recognises his community contributions through their award programs which he has been a part of since 2011. For fourteen years prior to going fully independent, he worked at Pfizer; the last seven of these years being responsible for application architecture in the Asia Pacific region. Time spent in a large corporate environment gave him huge exposure to all aspects of technology as well as the diverse cultures my role spanned. Many of the things he teaches in post-corporate life are based on these experiences, particularly as a result of working with a large number of outsourcing vendors across the globe. He regularly speaks to the US Congress about the impact of data breaches.
I have been using Windows 10 for years now and I recently took the time to learn how to be more productive with it. There are lots of shortcuts and tools in Windows 10 that help me throughout the day. Do you also want to be more productive with Windows 10? Then check out my new Udemy course called Windows 10 Productivity Booster.Troy Hunt is an Australian Microsoft Regional Director and Microsoft Most Valuable Professional for Developer Security. He doesn't work for Microsoft, but they're kind enough to recognize his community contributions by way of their award programs which he has been a part of since 2011. You'll regularly find him in the press talking about security and even testifying before US Congress on the impact of data breaches.Resources:Visit Troy's website and blogFind Troy on TwitterTroy's Pluralsight coursesHave I been pwned? website
Learn what it's like to be... TROY HUNT! He has had an incredibly interesting career, arguably unlike any other. Follow him on twitter! Thank you to our sponsor Thread Fix! https://threadfix.it/ Buy Tanya's new book on #ApplicationSecurity: Alice and Bob learn Application Security. Don’t forget to check out #WeHackPurple Academy’s NEW courses, #AppSec Foundations taught by Tanya Janca! https://academy.wehackpurple.com/Join our Cyber Security community: https://community.wehackpurple.com/A Safe place to learn and share your knowledge with other professionals in the field. Subscribe to our newsletter! Sponsorship info: email@example.com . #TanyaJanca #SheHacksPurple #DevOps #CyberTraining Find us on Apple Podcast, Overcast + Pod
Lisa speaks with cyber security heavyweight Troy Hunt to find out “who is really to blame for a data breach?” The discussion takes them in some interesting directions and they look at the role “shared responsibility” has in cyber security. Hear about some of the most and least well managed breaches and just how much money you could claim for “feeling sad” after a breach!! A fun and light-hearted discussion of some serious issues with one of the leading breach experts in the world, Troy Hunt. ►►►SUBSCRIBE! ►►► https://www.youtube.com/channel/UCaj1V0ptRrMDucohq41LDmg?sub_confirmation=1 ►►https://www.troyhunt.com/ ►► https://www.linkedin.com/in/troyhunt/ ►► https://twitter.com/troyhunt https://www.facebook.com/troyahunt https://www.youtube.com/user/troyhuntdotcom
I recently caught up with security legend Troy Hunt and got to discuss cyber attack vectors in the COVID era, VPNs, IoT Security and why he decided to opensource HIBP. You don't want to miss this one! The virtual bartender securely transfers a Blue Monday.Support the show (https://paypal.me/thebarcodepodcast)
In this episode of Phoenix Cast, hosts John, Kyle and Rich talk with special guest Troy Hunt, web security expert and the creator of Have I Been Pwned?. Troy takes a fresh look at the best practices for passwords, multi-factor authentication and the future of cybersecurity . Follow Task Force Phoenix on Twitter: @USMC_TFPhoenix Follow Troy Hunt on Twitter: @TroyHunt #CybersecurityAwarenessMonth
Troy Hunt is back for another Random but Memorable! 🎉 Fresh off their mini scooters, Matt and Troy discuss everything from data breaches, to the obscure personal information a cat forum needs to know. We also announce the release of 1Password's latest feature: domain breach report.Plus, Roo takes charge of the penultimate Real or Not Real and we reveal our latest giveaway. Don't say we never spoil you.Watchtower WeeklySony announces its bug bounty programGoogle Will Delete Your Data by Default — in 18 MonthsApple Catches TikTok Secretly Spying On Millions Of iPhone UsersGuest Interview - Troy HuntFollow @troyhunt on TwitterFollow @haveibeenpwned on TwitterVisit troyhunt.comVisit haveibeenpwned.com1Password blog: Guard against external data breaches with domain breach reports#Ask1PasswordAsk us anything! Please use the #Ask1Password hashtag or send us an email at: firstname.lastname@example.org.It's Giveaway Time!Suggest a segment to replace Real or Not Real for the next season of Random but Memorable. Our favourite will win some swag, and the segment could appear on the show. Use the #Ask1Password hashtag or email us at email@example.comGiveaway closes on July 31st. We will announce the winners on the 50th episode. Real or Not Real?Mystery Flavor Dum Dums are made when the factory switches from one flavor production run to another and are the result of combining the end of one flavor’s mix with the start of the next flavor’s mix.Read more here.Follow Us…Visit 1password.comCheck out our blogTweet us @1PasswordFind us on Facebook or InstagramPlease get in touch using #Ask1Password and let us know what you think of the show, you can also leave us a review on iTunes or wherever you listen to podcasts.
Has your information ever been compromised in a data breach? There are security measures you can implement to lessen the effects. Troy Hunt shares about the frequency and increasing size of data breaches of personal information. Don’t miss the end where we share lots of strategies you can put in place today to better protect your information. Troy Hunt is an Australian Microsoft Regional Director and Microsoft Most Valuable Professional for Developer Security. He doesn’t work for Microsoft, but they're kind enough to recognize his community contributions by way of their award programs which he’s been a part of since 2011. You'll regularly find him in the press talking about security and even testifying before the US Congress on the impact of data breaches. Troy is a Pluralsight author of many top-rating courses on web security and other technologies with more than 30 courses published to date. There's no better way to get up to speed on a topic quickly than through professional training that you can take at your own pace. As both an author and a student, Troy has nothing but positive things to say about the breadth and quality of Pluralsight courses. One of the key projects Troy is involved in today is Have I Been Pwned (HIBP), a free service that aggregates data breaches and helps people establish if they've been impacted by malicious activity on the web. As well as being a useful service for the community, HIBP has given him an avenue to ship code that runs at scale on Microsoft's Azure cloud platform, one of the best ways we have of standing up services on the web today. Troy regularly speaks around the world and runs developer-focused security workshops. You'll regularly find him at major technology events.
What developers should know about security with Troy Hunt
Software Engineering Unlocked
Subscribe on iTunes, Spotify, Google, Deezer, or via RSS. Have a look at Michaela's Code Review WorkshopsLinks:Troy’s WebsiteHave I been pwnedTalk: Hack your careerShaming for bad security OWASP Top 10 Web Application Security RisksShow notesWe start by talking about data breaches, and Troy tells me that he gets information about data breaches several times a day. More data on breaches than he can actually handle. When I asked him if people somehow got a data breach fatigue, he said, well, companies are nowadays more judged on how they handle the data breach than on whether they have one or not. So, it’s important that companies handle those well. Not like the negative examples from Uber and Equifax. Troy explains to me that from his experience he sees that often lawyers give the guidance to not react or publicly share information about a data breach. But that’s not a good strategy, Troy says. Because the ones that break into the website, they feel anonymous, so they will not keep it a secrete. They do not fear the consequences. But the companies will, so they should proactively manage data breaches. Then we talk about data privacy and Troy’s approach to sharing his personal data online. I have seen Troy in front of the camera with his son, for example, so I wonder if he has any restrictions on what he shares. Which things does he keep private?Troy says, data privacy is very personal and that there is no right or wrong answer. Everybody should do what feels right to them, and also evaluate on a case per case basis.After discussing this, we hop over to good security practices. I’m in particular interested in what Troy thinks software engineers should know about security, data privacy, etc. He tells me that the best thing is to start with the OWASP Top 10 web application security risks. But then, I tell Troy that, sometimes in my code review workshops, software engineers tell me that they do not need to look for security vulnerabilities or risks, because, that’s handled by others. By experts. So, I ask Troy if he encounters similar mindsets in his workshops, and how he handles such pushbacks. Troy tells me that he made a whole career out of this attitude and that he encounters this quite often. He thinks it has to do with complacency. He says that security is something that we all have to stay on top of and that’s relevant for everybody. Also, implementing good practices, like making code resilient to SQL injections does not take any more effort. Contrary, practices that help you make your code more resilient can save you time and money in the long run. Another area I ask Troy about is what he advises organizations to do to make sure they implement security throughout the whole development lifecycle. How can organizations get the new DevSecOps lifecycle right?Troy also tells me that education, for example in form of workshops, such as his security workshops or also my code review workshop, is an excellent way to make sure developers are aware of best practices, and follow good and proven strategies. Another thing is automated analysis. After talking a bit about regulations and their effects – or non-effects- to enforce data privacy, we switch gears and I talk with Troy about how he started his career as a security expert and thought leaders.I want to know, what started all, and did he foresee his success back then. Well, turns out Troy started writing his blog over four years before he made the move to self-employment. He says it took a lot of effort and time to build his online identity, but he knew that this gives him freedom and peace of mind in many cases.He thought about, what if he does not like his job anymore, or the employer wants to get rid of him.So he started blogging and building an online portfolio. And, four years later, it happened. Troy wasn’t happy anymore at his current job, and the company made a few roles redundant. So, he took the chance to start his own business and never looked back.It was really inspiring to talk to Troy. I hope you enjoy this episode as much as I did.Best,McKayla.
Security legend Troy Hunt joins us to discuss the Jeff Bezos phone hack, election threats, Huawei, Have I Been Pwned and much more. Whether you’re a certified ethical hacker or just trying to improve your own security hygiene, this episode’s a can’t miss. Have I Been Pwned Troy's blog post on getting started in security Ethical Hacking Fundamentals on Pluralsight *** If you enjoy this episode, please consider leaving a review on Apple Podcasts or wherever you listen. Please send any questions or comments to firstname.lastname@example.org