Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.
Jason
Nov 3, 2023
Interesting technical conversations that go deep into each subject.
Episode | Date |
---|---|
From Car Culture to Cybersecurity: Building Community and Skills with Christian Pinkston
|
Jul 23, 2025 |
Keeping Drupal Running With Static Code Analysis & Lessons From Drupalgeddon - Matt Glaman
|
Jul 16, 2025 |
From Phishing Scam Response to Cyber Defender: A Journey into Security - Manoj Viswanathan
|
Jun 25, 2025 |
AI, Zero Trust, And The Future Of DevSecOps In A Cloud-First World – Nivathan Athiganoor Somasundharam
|
Jun 18, 2025 |
Reducing Developer Toil, Shifting Security Left, And Using Caution With AI – Andy Dennis
|
Jun 11, 2025 |
Educate, Empower, Prepare: Building Inclusive Cybersecurity With Rebekah Skeete
|
Jun 04, 2025 |
Bridging the Gap Between Dev and Sec: Tools, Culture, and Careers - Thomas Jost
|
May 28, 2025 |
What Tools Miss and Why Humans Matter in AppSec - Yash Shahani
|
May 21, 2025 |
Visualizing Data Poisoning and Rethinking Threat Detection Through Graphs – Maria Khodak
|
May 14, 2025 |
Building Human-Centric Security and Hacker Communities in Argentina - Ailin Castellucci
|
Apr 30, 2025 |
From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski
|
Apr 23, 2025 |
Quarantine Policies and Cloud Security Strategies for AWS – Bleon Proko
|
Apr 16, 2025 |
Helping Developers Use Open Source Security Tools & Improving Defense With AI - Mackenzie Jackson
|
Apr 09, 2025 |
How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard Johansen
|
Apr 02, 2025 |
Navigating And Defining The Evolving Role Of The CISO In Government Security - Josh Kuntz
|
Mar 26, 2025 |
The State And Future Of Cybersecurity Training and AIShaping The Role - Zach Hill
|
Mar 19, 2025 |
Secrets Management With The OpenPao Project And Open Source Security - Alex Scheel
|
Mar 12, 2025 |
Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna Jonssen
|
Mar 05, 2025 |
Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John Poulin
|
Feb 26, 2025 |
What Does It Mean To Be A Security Lead - A Conversion With Kayssar Daher
|
Feb 19, 2025 |
Understanding Security Champions and Making Human Connections - Dustin Lehr
|
Feb 12, 2025 |
Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett
|
Feb 05, 2025 |
Observability ownership, monitoring apps at scale, and learning DevOps like a language- Josh Lee
|
Jan 29, 2025 |
The Freedom Of Information Act, Ethical AI, And NerdCore Music - Stephanie Honore
|
Jan 22, 2025 |
Securing Workload Identities And Working On Conjure - Jody Hunt
|
Jan 15, 2025 |
The Updated OWASP Top 10 for LLM Applications and the AI landscape - Talesh Seeparsan
|
Jan 08, 2025 |
Securing Flight Simulators And Other Operational Technology - Coburn Slay
|
Dec 18, 2024 |
Getting Out Of Walled Gardens By Running Your Own Email - Michael Harrison
|
Dec 11, 2024 |
Understanding Psychological Safety And Asking Questions To Stay Relevant - Deanna Stanley
|
Dec 04, 2024 |
Phone Phreaking, The History Of The Security Community, And Social Engineering - Matt Scheurer
|
Nov 27, 2024 |
Getting Started In Offensive Security: A Journey Into Tech - Alexis Diediker
|
Nov 20, 2024 |
Securing Human Access Through Privileged Access Management and Just In Time Access - Aria Langer
|
Nov 13, 2024 |
Undocumented Hacking - Applying Pentesting Skills To Navigating Bureaucracy - José Martinez
|
Nov 06, 2024 |
STIR/SHAKEN and Password Policies- Per Thorsheim
|
Oct 30, 2024 |
Being a Lifeguard Instead of a Police Officer and Compliance Is NOT Security - David Hawthorne
|
Oct 23, 2024 |
From The Theory Of Constraints to Scorecard Patterns for Better Compliance - Justin Reock
|
Oct 16, 2024 |
Rotating Secrets At Scale, Automatically, and With High Availability - Kenton McDonough
|
Oct 09, 2024 |
Countering Shadow IT Through Nudging Intervention - Garret Gross
|
Oct 02, 2024 |
What Does The Future Hold For The Security Repo Podcast? Some Changes & Introducing Our New Co-Host
|
Sep 26, 2024 |
Data Loss Prevention and Stopping Breaches Before They Start
|
Sep 25, 2024 |
Security Automation And Leveraging AI To Deal With Security At Scale - Huxley Barbee
|
Sep 18, 2024 |
Developer Awareness Training and AI Assisted Tooling for Improving Security - Chris Lindsey
|
Sep 11, 2024 |
Improving Your Security by Leveraging AI: The Arcanum Cyber Security Bot - Jason Haddix
|
Sep 04, 2024 |
DeepCover & DART Academy: Fighting Scammers Through Educating Seniors
|
Aug 28, 2024 |
Mining for Vulnerabilities: Hidden Dangers of Open Buckets
|
Aug 23, 2024 |
The Frontline of Cybersecurity: Defending Against Supply Chain Intrusions - Jossef Harush Kadouri
|
Aug 14, 2024 |
Enhancing Security Through Community and Innovation - A Conversation with Avi Douglen
|
Aug 07, 2024 |
Behind the Scenes of Offensive Security with Bobby Kuzma
|
Jul 31, 2024 |
Frameworks and Relationships: J Wolfgang Goerlich on Security Strategy
|
Jul 24, 2024 |
Nuclear Security & Cyber Resilience: Insights from KPMG's Andrew Elliot
|
Jul 17, 2024 |
Securing the Future - The Art of Threat Modeling with Paul McCarty
|
Jul 12, 2024 |
Pen Testing in Academia - University Cybersecurity Challenges with JR Johnson
|
Jun 28, 2024 |
From Desktop Support to Red Team: Brendan Hohenadel Journey in Cybersecurity
|
Jun 14, 2024 |
Navigating AI in Cybersecurity: Insights from Sonya Moisset
|
Jun 07, 2024 |
Securing Kubernetes Dashboards: Insights from Tremolo Security's CTO
|
May 27, 2024 |
The Secrets behind GitGuardian: Building a security platform with Eric Fourrier
|
May 15, 2024 |
Solving Secret Zero: The Future of Machine Identities & SPIFFE with Mattias Gees
|
May 08, 2024 |
Building secure platforms with Kubernetes: Bridging the DevOps-Security Divide with John Dietz
|
Apr 30, 2024 |
Authorization vs. Authentication: Decoding the Layers of Security with Emre Baran
|
Apr 26, 2024 |
Unpacking ASPM: Trends, Truths, and the Future of Security Tools
|
Apr 12, 2024 |
Decoding Security: An Analyst's Perspective on Trends and Tools
|
Apr 09, 2024 |
Building Conferences and Communities in Cybersecurity with Huxley Barbee
|
Mar 14, 2024 |
The Evolution of DevSecOps: Strategies for Integrating Security into DevOps with Gregory Zagraba
|
Mar 08, 2024 |
Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas
|
Mar 04, 2024 |
The Evolution of Offensive Security with Erik Cabetas
|
Feb 24, 2024 |
From Bank Heists to Security Insights: The Jayson E. Street Story
|
Feb 16, 2024 |
Reducing the noise: Cutting through the data in security Buck Bundhund
|
Feb 08, 2024 |
Solving the bottom turtle: Fixing the authentication problem with Ethan Heilman
|
Jan 31, 2024 |
The right tool for the job: Finding and evaluating security tools with James Berthoty
|
Jan 24, 2024 |
Securing our APIs - Thinking differently about API Security with Isabelle Mauny
|
Jan 17, 2024 |
Revolutionizing SAST: Bridging the Gap for Modern Developers with Nipun Gupta
|
Jan 10, 2024 |
API Security Unveiled: Safeguarding the Heart of Modern Applications
|
Dec 20, 2023 |
Guarding Against Deception: The Art of Detecting and Defending Against Social Engineering
|
Dec 15, 2023 |
Contextual Security: Revolutionizing Developer-Focused Cybersecurity with James Wickett
|
Dec 08, 2023 |
Mastering Physical Security: Unveiling the Secrets with Brice Self
|
Dec 04, 2023 |
Secrets inside packages, scanning Python PyPi for credentials with Tom Forbes
|
Nov 03, 2023 |
Artificial intelligence, a friend or foe in cyber security - with Simon Maple from Snyk
|
Oct 19, 2023 |
Scaling security and AppSec in fast moving enterprises with Jeevan Singh
|
Oct 11, 2023 |
Enterprise Software Distribution - Managing updates and security in enterprise software at scale
|
Oct 09, 2023 |
Securing data in a world of AI with Jeremiah Jeschke
|
Sep 17, 2023 |
Getting boardroom buy-in for security - CISO conversations with Walt Powell
|
Sep 04, 2023 |
Social engineering, phishing and building grass roots communities with Dan and Ken
|
Aug 03, 2023 |
Code signing and securing the software supply chain with Billy Lynch
|
Jul 27, 2023 |
Getting started in AppSec with Tanya Janca SheHacksPurple
|
Jul 10, 2023 |
Securing the remote workforce, the future of cloud development environments
|
Jun 14, 2023 |
Understanding digital forensics with Desi - A deep dive post breach investigations
|
May 23, 2023 |
The hacker in the board room: The journey from hacker to CISO with Jason Haddix
|
May 09, 2023 |
Security landscape in 2023 : Insights from the ground at RSA (Special Edition Episode)
|
May 06, 2023 |
Modern ransomware: How hackers are targeting your organization with Adriel Disatel and Noah Tongate
|
May 03, 2023 |
Understanding intent based access control with Uri Sarid
|
Apr 24, 2023 |
Multi Factor Authentication for APIs with Anusha Iyer
|
Apr 10, 2023 |
Offensive security tools with Brendan O'Leary from ProjectDiscovery
|
Apr 06, 2023 |
Threat modeling in security with Audrey Long
|
Mar 29, 2023 |
Understanding and building the SOC (Security Operations Center) - With Troy Santana
|
Mar 16, 2023 |
Staff augmentation in security with Troy Santana
|
Mar 07, 2023 |
Episode 6: Securing the development environment with Laurent Balmelli
|
Feb 21, 2023 |
Episode 5: Product Lead Growth in Security with Ross Haleliuk
|
Feb 13, 2023 |
Episode 4: Understanding confidential computing & web assembly to build secure apps
|
Feb 06, 2023 |
Epsiode 3: Implementing a DevSecOps approach to software development with Will Kelly
|
Jan 23, 2023 |
Episode 2: An Interview with a Cyborg Hacker - How are body modfications and changing the threat landscape
|
Sep 07, 2022 |
Episode 1 - A deep dive into supply chain risk
|
Jul 04, 2022 |