I'm a Teir 1 Security Analyst at Scinary Cybersecurity. My name is Joseph, but you can call me Joe. I have found that I possess an insatiable drive for information. I invite you all to join me and my cohost in our journey to learn all we can about anything and everything Cybersecurity and Tech related. With all of the industries complexities and constant evolution I'm sure we'll find no end of things to explore.
Joseph Hamilton has hosted 25 Episodes.
-
Episode 28: Nightmare on AWS Street: Halloween Special
October 31st, 2025 | Season 2 | 53 mins 59 secs
In this Halloween special, the team discusses the massive AWS outage that recently brought large swaths of the internet to a halt. They break down the technical "race condition" that caused the DNS failure, explore the comical real-world consequences like smart beds getting stuck, and analyze why even competitors like Microsoft were affected. The conversation broadens into a critical look at the tech industry's single points of failure (AWS, AT&T), the dangerous trade-off between efficiency and resiliency, and whether our critical infrastructure is too reliant on a few monopolies. Additionally, they provide an update on the Salesforce breach, revealing that data belonging to personnel in major US government departments (DOD, DHS, ICE) was compromised by the threat group "Scattered Lapsus$ Hunters"
-
Episode 26: A Tech Director's Perspective on School Cyber Threats
October 17th, 2025 | Season 2 | 1 hr 18 mins
The Scinary team, along with special guest Greg Babbitt, Technology Director at Palmer ISD, tackles a massive week in cybersecurity news. They dissect the colossal Salesforce breach allegedly carried out by the "Scattered Lapsis Hunters," breaking down the OAuth attack vector, the $1 billion ransom, and the major companies affected like Disney and Home Depot. The discussion then pivots to the unique and often overlooked cybersecurity challenges within K-12 education. Greg provides a frontline perspective on the constant battle against the "human element," the difficulties of managing third-party vendor risk with limited leverage, and the hidden costs and security gaps in "free" educational tools like Google Workspace.
-
Episode 25: Your TV is Watching You: ATSC 3 / NextGen Broadcast
October 10th, 2025 | Season 2 | 59 mins 21 secs
This week, the team is joined by broadcast television veteran Daniel Hamilton to explore two major technological shifts with significant cybersecurity and privacy implications. First, they dive into ATSC 3.0 (NextGen TV), the new standard that will transform free over-the-air television into an interactive, IP-based platform. The discussion unpacks how this technology will enable hyper-targeted advertising by collecting and correlating viewer data—much like Google and Meta do—and raises questions about the new security vulnerabilities and privacy trade-offs for consumers.
The conversation then pivots to the impending government ban on Chinese-made drones (like those from DJI). Daniel, who administers a national drone program, details the operational and financial chaos this legislation is causing. The team critically examines the policy, labeling it "political theater" that targets consumer tech while ignoring the widespread use of Chinese components in America's critical infrastructure, and highlights the lack of viable, cost-effective American alternatives.
-
Episode 24: Phishing 3.0: AI Threats Beyond Email (ft. Ironscales CEO)
October 3rd, 2025 | Season 2 | 1 hr 4 mins
The team sits down with Eyal Benishti, the CEO of our partner Ironscales, for a deep dive into the evolution of email security. Eyal shares the origin story of Ironscales and explains why traditional Secure Email Gateways (SEGs) are no longer sufficient to stop modern, sophisticated "Phishing 2.0" attacks like Business Email Compromise. The core of the discussion explores the emerging frontier of "Phishing 3.0," a new threat landscape driven by generative AI, deepfakes, and multi-channel attacks that weaponize platforms like Teams and Slack. Eyal explains how the defense must shift towards adaptive, agentic AI to protect all forms of communication and rebuild trust in a world where you can't always believe what you see or hear.
-
Episode 21: Cybersecurity Tools of the Trade: Our Top Picks
September 12th, 2025 | Season 2 | 44 mins 47 secs
This week, the team cracks open a few beers and pulls back the curtain on the cybersecurity tools they can't live without.
-
Episode 19: Why Your Cybersecurity Bill Is a Ripoff
August 26th, 2025 | Season 2 | 1 hr 18 mins
This week, we're going full medieval with mead and Viking helmets while exposing the most predatory pricing schemes in cybersecurity.
-
Episode 18: Incident Response War Stories: How We Stop Real-World Cyberattacks
August 19th, 2025 | Season 2 | 1 hr 7 mins
The team shares real-world stories from the cybersecurity front lines, breaking down the attacks that are hitting organizations right now and the playbook for how to fight back.
-
Episode 17: Revenge Hacking: Justice or Just Illegal?
August 11th, 2025 | Season 2 | 59 mins 36 secs
This week, the team tackles a controversial and ethically murky corner of the cyber world: Offensive Security and the temptation to "hack back". When an attacker breaches your network, is fighting back a righteous act of justice or a dangerous form of vigilantism?
-
Episode 16: The Dark Side of Venture Capital
August 8th, 2025 | Season 2 | 1 hr 2 mins
cybersecurity, finance, technology, techstartups, venturecapital, waco
Join CEO Richard Martin, SOC Managers Mario Ortiz and Joseph Hamilton, and Director of Strategic Initiatives Brazos Wortham as we dissect the high-stakes world of VC funding.
Is the tech industry built on a foundation of responsible innovation or just a high-stakes casino game played with other people's money? Join the discussion.
-
Episode 15: Recall, Copilot and Your Data Security
July 25th, 2025 | Season 2 | 58 mins 10 secs
-
Episode 14: TikTok, TikTok
July 18th, 2025 | Season 2 | 51 mins 24 secs
In this episode we discuss the absurdity of politicians fascination with TikTok
-
Episode 13: Is it a Pen Test or a Pen Test?
July 11th, 2025 | Season 2 | 1 hr 1 min
We discuss the varying definitions of penetration testing and what to look for in a pen test.