Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Jason
Nov 3, 2023
Interesting technical conversations that go deep into each subject.
| Episode | Date |
|---|---|
|
Scaling Open Source Observability and Managing Risk in the Software Supply Chain – Avi Press
|
Dec 10, 2025 |
|
Decoding Threat Actor Names: Marketing, Confusion & the MITRE Solution – Jeffrey Bell
|
Dec 03, 2025 |
|
Why Technical CISOs Matter and How AI Is Shaping Security Ops - David Cross on Leading Security
|
Nov 26, 2025 |
|
Identity Risks in Email: Your Inbox Might Be Lying About You – Amy Devine
|
Nov 19, 2025 |
|
From Military Intel to CISO: Navigating Security Leadership in the Age of AI – Darren Desmond
|
Nov 12, 2025 |
|
Mapping the InfoSec Community: Building InfoSecMap & Global Security Events – Martín Villalba
|
Nov 05, 2025 |
|
Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx
|
Oct 29, 2025 |
|
Fighting Tool Squatting And Prompt Injection & The Security Gaps In MCP – Srajan Gupta
|
Oct 22, 2025 |
|
Fixing Hiring, Fostering Diversity, and Finding Your Place in Security – Matt Torbin
|
Oct 15, 2025 |
|
Dev Engagement in Security: From Content Strategy to Community Strategy with Alyssa Miles
|
Oct 08, 2025 |
|
Beyond Controls: Building Trust and Communication in Security – Featuring AriaDear
|
Oct 01, 2025 |
|
Misconfigurations, Legacy Landmines, and Tier Zero Truths – Jake Hildreth on Active Directory
|
Sep 24, 2025 |
|
Rebuilding OWASP St. Louis & Strengthening Security Growing The Community – Andre Van Klaveren
|
Sep 17, 2025 |
|
Teaching AppSec With Scratchers: Gamified Learning For Real-World Impact - Jenn Gile
|
Sep 10, 2025 |
|
Threat Modeling OpenSSL, Lessons from a Data Breach, and Volunteering with Narayan Ram Narayanan
|
Sep 03, 2025 |
|
From Risk Acceptance to Community Building: Inside Security With Sean Juroviesky
|
Aug 27, 2025 |
|
Tackling Deepfakes - Battling Ai-Generated Faces, Scams, Detection, And Security – Sankalp Kumar
|
Aug 20, 2025 |
|
Security Onion - From Classroom To SOC, Open Source and Education - Matt Gracie
|
Aug 13, 2025 |
|
From Code to Crypto: How Learning Fundamentals Empowers Security Pros – Matt Olmsted
|
Aug 06, 2025 |
|
Inside BurbSec: From Suburban InfoSec Beers to Global Discord Community – Johnny Xmas
|
Jul 30, 2025 |
|
From Car Culture to Cybersecurity: Building Community and Skills with Christian Pinkston
|
Jul 23, 2025 |
|
Keeping Drupal Running With Static Code Analysis & Lessons From Drupalgeddon - Matt Glaman
|
Jul 16, 2025 |
|
From Phishing Scam Response to Cyber Defender: A Journey into Security - Manoj Viswanathan
|
Jun 25, 2025 |
|
AI, Zero Trust, And The Future Of DevSecOps In A Cloud-First World – Nivathan Athiganoor Somasundharam
|
Jun 18, 2025 |
|
Reducing Developer Toil, Shifting Security Left, And Using Caution With AI – Andy Dennis
|
Jun 11, 2025 |
|
Educate, Empower, Prepare: Building Inclusive Cybersecurity With Rebekah Skeete
|
Jun 04, 2025 |
|
Bridging the Gap Between Dev and Sec: Tools, Culture, and Careers - Thomas Jost
|
May 28, 2025 |
|
What Tools Miss and Why Humans Matter in AppSec - Yash Shahani
|
May 21, 2025 |
|
Visualizing Data Poisoning and Rethinking Threat Detection Through Graphs – Maria Khodak
|
May 14, 2025 |
|
Building Human-Centric Security and Hacker Communities in Argentina - Ailin Castellucci
|
Apr 30, 2025 |
|
From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski
|
Apr 23, 2025 |
|
Quarantine Policies and Cloud Security Strategies for AWS – Bleon Proko
|
Apr 16, 2025 |
|
Helping Developers Use Open Source Security Tools & Improving Defense With AI - Mackenzie Jackson
|
Apr 09, 2025 |
|
How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard Johansen
|
Apr 02, 2025 |
|
Navigating And Defining The Evolving Role Of The CISO In Government Security - Josh Kuntz
|
Mar 26, 2025 |
|
The State And Future Of Cybersecurity Training and AIShaping The Role - Zach Hill
|
Mar 19, 2025 |
|
Secrets Management With The OpenPao Project And Open Source Security - Alex Scheel
|
Mar 12, 2025 |
|
Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna Jonssen
|
Mar 05, 2025 |
|
Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John Poulin
|
Feb 26, 2025 |
|
What Does It Mean To Be A Security Lead - A Conversion With Kayssar Daher
|
Feb 19, 2025 |
|
Understanding Security Champions and Making Human Connections - Dustin Lehr
|
Feb 12, 2025 |
|
Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett
|
Feb 05, 2025 |
|
Observability ownership, monitoring apps at scale, and learning DevOps like a language- Josh Lee
|
Jan 29, 2025 |
|
The Freedom Of Information Act, Ethical AI, And NerdCore Music - Stephanie Honore
|
Jan 22, 2025 |
|
Securing Workload Identities And Working On Conjure - Jody Hunt
|
Jan 15, 2025 |
|
The Updated OWASP Top 10 for LLM Applications and the AI landscape - Talesh Seeparsan
|
Jan 08, 2025 |
|
Securing Flight Simulators And Other Operational Technology - Coburn Slay
|
Dec 18, 2024 |
|
Getting Out Of Walled Gardens By Running Your Own Email - Michael Harrison
|
Dec 11, 2024 |
|
Understanding Psychological Safety And Asking Questions To Stay Relevant - Deanna Stanley
|
Dec 04, 2024 |
|
Phone Phreaking, The History Of The Security Community, And Social Engineering - Matt Scheurer
|
Nov 27, 2024 |
|
Getting Started In Offensive Security: A Journey Into Tech - Alexis Diediker
|
Nov 20, 2024 |
|
Securing Human Access Through Privileged Access Management and Just In Time Access - Aria Langer
|
Nov 13, 2024 |
|
Undocumented Hacking - Applying Pentesting Skills To Navigating Bureaucracy - José Martinez
|
Nov 06, 2024 |
|
STIR/SHAKEN and Password Policies- Per Thorsheim
|
Oct 30, 2024 |
|
Being a Lifeguard Instead of a Police Officer and Compliance Is NOT Security - David Hawthorne
|
Oct 23, 2024 |
|
From The Theory Of Constraints to Scorecard Patterns for Better Compliance - Justin Reock
|
Oct 16, 2024 |
|
Rotating Secrets At Scale, Automatically, and With High Availability - Kenton McDonough
|
Oct 09, 2024 |
|
Countering Shadow IT Through Nudging Intervention - Garret Gross
|
Oct 02, 2024 |
|
What Does The Future Hold For The Security Repo Podcast? Some Changes & Introducing Our New Co-Host
|
Sep 26, 2024 |
|
Data Loss Prevention and Stopping Breaches Before They Start
|
Sep 25, 2024 |
|
Security Automation And Leveraging AI To Deal With Security At Scale - Huxley Barbee
|
Sep 18, 2024 |
|
Developer Awareness Training and AI Assisted Tooling for Improving Security - Chris Lindsey
|
Sep 11, 2024 |
|
Improving Your Security by Leveraging AI: The Arcanum Cyber Security Bot - Jason Haddix
|
Sep 04, 2024 |
|
DeepCover & DART Academy: Fighting Scammers Through Educating Seniors
|
Aug 28, 2024 |
|
Mining for Vulnerabilities: Hidden Dangers of Open Buckets
|
Aug 23, 2024 |
|
The Frontline of Cybersecurity: Defending Against Supply Chain Intrusions - Jossef Harush Kadouri
|
Aug 14, 2024 |
|
Enhancing Security Through Community and Innovation - A Conversation with Avi Douglen
|
Aug 07, 2024 |
|
Behind the Scenes of Offensive Security with Bobby Kuzma
|
Jul 31, 2024 |
|
Frameworks and Relationships: J Wolfgang Goerlich on Security Strategy
|
Jul 24, 2024 |
|
Nuclear Security & Cyber Resilience: Insights from KPMG's Andrew Elliot
|
Jul 17, 2024 |
|
Securing the Future - The Art of Threat Modeling with Paul McCarty
|
Jul 12, 2024 |
|
Pen Testing in Academia - University Cybersecurity Challenges with JR Johnson
|
Jun 28, 2024 |
|
From Desktop Support to Red Team: Brendan Hohenadel Journey in Cybersecurity
|
Jun 14, 2024 |
|
Navigating AI in Cybersecurity: Insights from Sonya Moisset
|
Jun 07, 2024 |
|
Securing Kubernetes Dashboards: Insights from Tremolo Security's CTO
|
May 27, 2024 |
|
The Secrets behind GitGuardian: Building a security platform with Eric Fourrier
|
May 15, 2024 |
|
Solving Secret Zero: The Future of Machine Identities & SPIFFE with Mattias Gees
|
May 08, 2024 |
|
Building secure platforms with Kubernetes: Bridging the DevOps-Security Divide with John Dietz
|
Apr 30, 2024 |
|
Authorization vs. Authentication: Decoding the Layers of Security with Emre Baran
|
Apr 26, 2024 |
|
Unpacking ASPM: Trends, Truths, and the Future of Security Tools
|
Apr 12, 2024 |
|
Decoding Security: An Analyst's Perspective on Trends and Tools
|
Apr 09, 2024 |
|
Building Conferences and Communities in Cybersecurity with Huxley Barbee
|
Mar 14, 2024 |
|
The Evolution of DevSecOps: Strategies for Integrating Security into DevOps with Gregory Zagraba
|
Mar 08, 2024 |
|
Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas
|
Mar 04, 2024 |
|
The Evolution of Offensive Security with Erik Cabetas
|
Feb 24, 2024 |
|
From Bank Heists to Security Insights: The Jayson E. Street Story
|
Feb 16, 2024 |
|
Reducing the noise: Cutting through the data in security Buck Bundhund
|
Feb 08, 2024 |
|
Solving the bottom turtle: Fixing the authentication problem with Ethan Heilman
|
Jan 31, 2024 |
|
The right tool for the job: Finding and evaluating security tools with James Berthoty
|
Jan 24, 2024 |
|
Securing our APIs - Thinking differently about API Security with Isabelle Mauny
|
Jan 17, 2024 |
|
Revolutionizing SAST: Bridging the Gap for Modern Developers with Nipun Gupta
|
Jan 10, 2024 |
|
API Security Unveiled: Safeguarding the Heart of Modern Applications
|
Dec 20, 2023 |
|
Guarding Against Deception: The Art of Detecting and Defending Against Social Engineering
|
Dec 15, 2023 |
|
Contextual Security: Revolutionizing Developer-Focused Cybersecurity with James Wickett
|
Dec 08, 2023 |
|
Mastering Physical Security: Unveiling the Secrets with Brice Self
|
Dec 04, 2023 |
|
Secrets inside packages, scanning Python PyPi for credentials with Tom Forbes
|
Nov 03, 2023 |
|
Artificial intelligence, a friend or foe in cyber security - with Simon Maple from Snyk
|
Oct 19, 2023 |
|
Scaling security and AppSec in fast moving enterprises with Jeevan Singh
|
Oct 11, 2023 |
|
Enterprise Software Distribution - Managing updates and security in enterprise software at scale
|
Oct 09, 2023 |
|
Securing data in a world of AI with Jeremiah Jeschke
|
Sep 17, 2023 |
|
Getting boardroom buy-in for security - CISO conversations with Walt Powell
|
Sep 04, 2023 |
|
Social engineering, phishing and building grass roots communities with Dan and Ken
|
Aug 03, 2023 |
|
Code signing and securing the software supply chain with Billy Lynch
|
Jul 27, 2023 |
|
Getting started in AppSec with Tanya Janca SheHacksPurple
|
Jul 10, 2023 |
|
Securing the remote workforce, the future of cloud development environments
|
Jun 14, 2023 |
|
Understanding digital forensics with Desi - A deep dive post breach investigations
|
May 23, 2023 |
|
The hacker in the board room: The journey from hacker to CISO with Jason Haddix
|
May 09, 2023 |
|
Security landscape in 2023 : Insights from the ground at RSA (Special Edition Episode)
|
May 06, 2023 |
|
Modern ransomware: How hackers are targeting your organization with Adriel Disatel and Noah Tongate
|
May 03, 2023 |
|
Understanding intent based access control with Uri Sarid
|
Apr 24, 2023 |
|
Multi Factor Authentication for APIs with Anusha Iyer
|
Apr 10, 2023 |
|
Offensive security tools with Brendan O'Leary from ProjectDiscovery
|
Apr 06, 2023 |
|
Threat modeling in security with Audrey Long
|
Mar 29, 2023 |
|
Understanding and building the SOC (Security Operations Center) - With Troy Santana
|
Mar 16, 2023 |
|
Staff augmentation in security with Troy Santana
|
Mar 07, 2023 |
|
Episode 6: Securing the development environment with Laurent Balmelli
|
Feb 21, 2023 |
|
Episode 5: Product Lead Growth in Security with Ross Haleliuk
|
Feb 13, 2023 |
|
Episode 4: Understanding confidential computing & web assembly to build secure apps
|
Feb 06, 2023 |
|
Epsiode 3: Implementing a DevSecOps approach to software development with Will Kelly
|
Jan 23, 2023 |
|
Episode 2: An Interview with a Cyborg Hacker - How are body modfications and changing the threat landscape
|
Sep 07, 2022 |
|
Episode 1 - A deep dive into supply chain risk
|
Jul 04, 2022 |