The Security Repo

By Mackenzie Jackson & Dwayne McDaniel

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.


Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast
    

Subscribers: 6
Reviews: 1
Episodes: 101

Jason
 Nov 3, 2023
Interesting technical conversations that go deep into each subject.

Description

The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.

Episode Date
From Car Culture to Cybersecurity: Building Community and Skills with Christian Pinkston
Jul 23, 2025
Keeping Drupal Running With Static Code Analysis & Lessons From Drupalgeddon - Matt Glaman
Jul 16, 2025
From Phishing Scam Response to Cyber Defender: A Journey into Security - Manoj Viswanathan
Jun 25, 2025
AI, Zero Trust, And The Future Of DevSecOps In A Cloud-First World – Nivathan Athiganoor Somasundharam
Jun 18, 2025
Reducing Developer Toil, Shifting Security Left, And Using Caution With AI – Andy Dennis
Jun 11, 2025
Educate, Empower, Prepare: Building Inclusive Cybersecurity With Rebekah Skeete
Jun 04, 2025
Bridging the Gap Between Dev and Sec: Tools, Culture, and Careers - Thomas Jost
May 28, 2025
What Tools Miss and Why Humans Matter in AppSec - Yash Shahani
May 21, 2025
Visualizing Data Poisoning and Rethinking Threat Detection Through Graphs – Maria Khodak
May 14, 2025
Building Human-Centric Security and Hacker Communities in Argentina - Ailin Castellucci
Apr 30, 2025
From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski
Apr 23, 2025
Quarantine Policies and Cloud Security Strategies for AWS – Bleon Proko
Apr 16, 2025
Helping Developers Use Open Source Security Tools & Improving Defense With AI - Mackenzie Jackson
Apr 09, 2025
How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard Johansen
Apr 02, 2025
Navigating And Defining The Evolving Role Of The CISO In Government Security - Josh Kuntz
Mar 26, 2025
The State And Future Of Cybersecurity Training and AIShaping The Role - Zach Hill
Mar 19, 2025
Secrets Management With The OpenPao Project And Open Source Security - Alex Scheel
Mar 12, 2025
Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna Jonssen
Mar 05, 2025
Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John Poulin
Feb 26, 2025
What Does It Mean To Be A Security Lead - A Conversion With Kayssar Daher
Feb 19, 2025
Understanding Security Champions and Making Human Connections - Dustin Lehr
Feb 12, 2025
Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett
Feb 05, 2025
Observability ownership, monitoring apps at scale, and learning DevOps like a language- Josh Lee
Jan 29, 2025
The Freedom Of Information Act, Ethical AI, And NerdCore Music - Stephanie Honore
Jan 22, 2025
Securing Workload Identities And Working On Conjure - Jody Hunt
Jan 15, 2025
The Updated OWASP Top 10 for LLM Applications and the AI landscape - Talesh Seeparsan
Jan 08, 2025
Securing Flight Simulators And Other Operational Technology - Coburn Slay
Dec 18, 2024
Getting Out Of Walled Gardens By Running Your Own Email - Michael Harrison
Dec 11, 2024
Understanding Psychological Safety And Asking Questions To Stay Relevant - Deanna Stanley
Dec 04, 2024
Phone Phreaking, The History Of The Security Community, And Social Engineering - Matt Scheurer
Nov 27, 2024
Getting Started In Offensive Security: A Journey Into Tech - Alexis Diediker
Nov 20, 2024
Securing Human Access Through Privileged Access Management and Just In Time Access - Aria Langer
Nov 13, 2024
Undocumented Hacking - Applying Pentesting Skills To Navigating Bureaucracy - José Martinez
Nov 06, 2024
STIR/SHAKEN and Password Policies- Per Thorsheim
Oct 30, 2024
Being a Lifeguard Instead of a Police Officer and Compliance Is NOT Security - David Hawthorne
Oct 23, 2024
From The Theory Of Constraints to Scorecard Patterns for Better Compliance - Justin Reock
Oct 16, 2024
Rotating Secrets At Scale, Automatically, and With High Availability - Kenton McDonough
Oct 09, 2024
Countering Shadow IT Through Nudging Intervention - Garret Gross
Oct 02, 2024
What Does The Future Hold For The Security Repo Podcast? Some Changes & Introducing Our New Co-Host
Sep 26, 2024
Data Loss Prevention and Stopping Breaches Before They Start
Sep 25, 2024
Security Automation And Leveraging AI To Deal With Security At Scale - Huxley Barbee
Sep 18, 2024
Developer Awareness Training and AI Assisted Tooling for Improving Security - Chris Lindsey
Sep 11, 2024
Improving Your Security by Leveraging AI: The Arcanum Cyber Security Bot - Jason Haddix
Sep 04, 2024
DeepCover & DART Academy: Fighting Scammers Through Educating Seniors
Aug 28, 2024
Mining for Vulnerabilities: Hidden Dangers of Open Buckets
Aug 23, 2024
The Frontline of Cybersecurity: Defending Against Supply Chain Intrusions - Jossef Harush Kadouri
Aug 14, 2024
Enhancing Security Through Community and Innovation - A Conversation with Avi Douglen
Aug 07, 2024
Behind the Scenes of Offensive Security with Bobby Kuzma
Jul 31, 2024
Frameworks and Relationships: J Wolfgang Goerlich on Security Strategy
Jul 24, 2024
Nuclear Security & Cyber Resilience: Insights from KPMG's Andrew Elliot
Jul 17, 2024
Securing the Future - The Art of Threat Modeling with Paul McCarty
Jul 12, 2024
Pen Testing in Academia - University Cybersecurity Challenges with JR Johnson
Jun 28, 2024
From Desktop Support to Red Team: Brendan Hohenadel Journey in Cybersecurity
Jun 14, 2024
Navigating AI in Cybersecurity: Insights from Sonya Moisset
Jun 07, 2024
Securing Kubernetes Dashboards: Insights from Tremolo Security's CTO
May 27, 2024
The Secrets behind GitGuardian: Building a security platform with Eric Fourrier
May 15, 2024
Solving Secret Zero: The Future of Machine Identities & SPIFFE with Mattias Gees
May 08, 2024
Building secure platforms with Kubernetes: Bridging the DevOps-Security Divide with John Dietz
Apr 30, 2024
Authorization vs. Authentication: Decoding the Layers of Security with Emre Baran
Apr 26, 2024
Unpacking ASPM: Trends, Truths, and the Future of Security Tools
Apr 12, 2024
Decoding Security: An Analyst's Perspective on Trends and Tools
Apr 09, 2024
Building Conferences and Communities in Cybersecurity with Huxley Barbee
Mar 14, 2024
The Evolution of DevSecOps: Strategies for Integrating Security into DevOps with Gregory Zagraba
Mar 08, 2024
Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas
Mar 04, 2024
The Evolution of Offensive Security with Erik Cabetas
Feb 24, 2024
From Bank Heists to Security Insights: The Jayson E. Street Story
Feb 16, 2024
Reducing the noise: Cutting through the data in security Buck Bundhund
Feb 08, 2024
Solving the bottom turtle: Fixing the authentication problem with Ethan Heilman
Jan 31, 2024
The right tool for the job: Finding and evaluating security tools with James Berthoty
Jan 24, 2024
Securing our APIs - Thinking differently about API Security with Isabelle Mauny
Jan 17, 2024
Revolutionizing SAST: Bridging the Gap for Modern Developers with Nipun Gupta
Jan 10, 2024
API Security Unveiled: Safeguarding the Heart of Modern Applications
Dec 20, 2023
Guarding Against Deception: The Art of Detecting and Defending Against Social Engineering
Dec 15, 2023
Contextual Security: Revolutionizing Developer-Focused Cybersecurity with James Wickett
Dec 08, 2023
Mastering Physical Security: Unveiling the Secrets with Brice Self
Dec 04, 2023
Secrets inside packages, scanning Python PyPi for credentials with Tom Forbes
Nov 03, 2023
Artificial intelligence, a friend or foe in cyber security - with Simon Maple from Snyk
Oct 19, 2023
Scaling security and AppSec in fast moving enterprises with Jeevan Singh
Oct 11, 2023
Enterprise Software Distribution - Managing updates and security in enterprise software at scale
Oct 09, 2023
Securing data in a world of AI with Jeremiah Jeschke
Sep 17, 2023
Getting boardroom buy-in for security - CISO conversations with Walt Powell
Sep 04, 2023
Social engineering, phishing and building grass roots communities with Dan and Ken
Aug 03, 2023
Code signing and securing the software supply chain with Billy Lynch
Jul 27, 2023
Getting started in AppSec with Tanya Janca SheHacksPurple
Jul 10, 2023
Securing the remote workforce, the future of cloud development environments
Jun 14, 2023
Understanding digital forensics with Desi - A deep dive post breach investigations
May 23, 2023
The hacker in the board room: The journey from hacker to CISO with Jason Haddix
May 09, 2023
Security landscape in 2023 : Insights from the ground at RSA (Special Edition Episode)
May 06, 2023
Modern ransomware: How hackers are targeting your organization with Adriel Disatel and Noah Tongate
May 03, 2023
Understanding intent based access control with Uri Sarid
Apr 24, 2023
Multi Factor Authentication for APIs with Anusha Iyer
Apr 10, 2023
Offensive security tools with Brendan O'Leary from ProjectDiscovery
Apr 06, 2023
Threat modeling in security with Audrey Long
Mar 29, 2023
Understanding and building the SOC (Security Operations Center) - With Troy Santana
Mar 16, 2023
Staff augmentation in security with Troy Santana
Mar 07, 2023
Episode 6: Securing the development environment with Laurent Balmelli
Feb 21, 2023
Episode 5: Product Lead Growth in Security with Ross Haleliuk
Feb 13, 2023
Episode 4: Understanding confidential computing & web assembly to build secure apps
Feb 06, 2023
Epsiode 3: Implementing a DevSecOps approach to software development with Will Kelly
Jan 23, 2023
Episode 2: An Interview with a Cyborg Hacker - How are body modfications and changing the threat landscape
Sep 07, 2022
Episode 1 - A deep dive into supply chain risk
Jul 04, 2022