Mission Statement
Intrusions In-Depth provides an analysis of high-profile and novel cyberattacks as well as the threat actors that conduct these operations.
The goal is to educate and entertain audiences whether they are technical or not.
All information from this show is sourced from open-source, publically available information. No controlled information is utilized in the creation of this show.
It is not the intent to shame or make fun of the victims of these attacks. Alternatively, we are not glorifying the attackers either. These events can ruin someone’s life, business, etc, and doing such is illegal.
Host
This show is created by Josh Stepp. The show was created after listening to numerous podcasts across different subjects and feeling like I could add something to the conversation around cyberattacks, threat actors, threat intelligence, and “hacking” in general.
Josh is a veteran of the information security world with extension knowledge and experience from serving as a Cyberwarfare Operator with the United States Air Force and in the private sector as a Principal Security Consultant.
Josh doesn’t discuss missions, operations, engagements, or anything else he has intimate knowledge of concerning the United States government, military, employers, or their customers. Any such questions will be ignored.
You can follow Josh’s personal Substack where he posts about Brazilian Jiu Jitsu, podcasting, fitness, career thoughts, and other ideas worth sharing.
Contact
𝕏 - @intrusionNdepth
✉️ - intrusionindepth@proton.me
^ no “s”
Why subscribe?
Subscribe to get full access to the newsletter and publication archives.
Join the crew
Be part of a community of people who share your interests. Participate in the comments section, or support this work with a subscription.
