
Josh Marpet
Security professional with experience in SIM swapping and account recovery, providing practical advice on authentication, backups, and recovery after phone loss.
Top 3 podcasts with Josh Marpet
Ranked by the Snipd community

8 snips
Nov 28, 2025 • 42min
Dealing with loss, phone loss with Aaran, Doug, and Josh. - SWN #533
Aaron Leland, a security practitioner, and Josh Marpet, an expert in SIM swapping, delve into the crucial topic of mobile device security and strategies for handling phone loss. They share personal theft stories, highlighting the urgency of being prepared while traveling. The duo discusses immediate response tactics, from bricking phones to utilizing Find My iPhone. Practical advice includes using strong passcodes, protecting critical apps with biometrics, and having a disaster plan in place. Tune in for expert insights on safeguarding your digital life!

Mar 4, 2025 • 36min
Tastovision, Trufflepig, Cisco, Windows, VSCode, OT, SQL Server, Android, Josh Marpet - SWN #456
In this discussion, cybersecurity specialist Josh Marpet tackles the talent shortage myth in the industry, shedding light on the realities of hiring automation and the prevalence of 'ghost jobs'. He also humorously navigates the latest security vulnerabilities in Cisco and Windows systems. Alongside this, Marpet reflects on inventive yet absurd technologies, such as remote flavor tasting, questioning their real-world necessity. His insights mix critical industry observations with entertaining anecdotes, creating a captivating conversation for listeners.

Sep 19, 2024 • 2h 54min
Exploding Pagers - Tod Beardsley - PSW #843
Tod Beardsley, Vulnerability Analysis Lead at CISA, offers deep insights into the Known Exploited Vulnerabilities catalog. He explains its creation and practical usage in enhancing cybersecurity. The conversation also touches on the resurgence of pagers for secure communications, the implications of Android TV malware, and the complexity of supply chain vulnerabilities. Additionally, the group humorously explores the quirks of cryptography and the evolution of network security tools, blending technical analysis with engaging anecdotes.


