show episodes
 
Artwork

1
Bucket Bytes

Ryan Post, Josh Picard, Dominic, Andres Reyes, & Logan Jacob

Unsubscribe
Unsubscribe
En gång i månaden
 
What's the next Byte to come out of the Bucket? Bucket Bytes is a light-spirited show with a small group of friends who are excited to bring you into the conversation. Streamed live on Twitch - we showcase a variety of topics and discussions as we pull the Bytes out of the Bucket including games, tech, pop-culture, current events, mental-health, and much more. We also have a variety of guests from different industries such as content creators, business owners, and more! What's going to come ...
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

Unsubscribe
Unsubscribe
En gång i månaden+
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Artwork

1
The Imagine No Satan Show

James R Brayshaw

Unsubscribe
Unsubscribe
En gång i månaden
 
Get ready to imagine things in a way most are to afraid to even consider. Hosted by the Author of four watershed books, this one-of-a-kind show gets to the bottom of a whole bunch of questions. James R. Brayshaw is a Canadian firefighter who has poured some cold water on Satan and the fire of Hell. Brayshaw heads up the assault on the idea of a supernatural Satan with scads of biblical reasoning. As the author of Imagine There's No Satan, Satan Christianity's Other God, and the much anticipa ...
  continue reading
 
Loading …
show series
 
In this episode of The Security Repo Podcast, we dive deep into how AI is helping the Red, Blue, and Purple teams and how we can leverage ChatGPT to stay ahead of attackers. We are joined once again by Jason Haddix Founder, CEO and Head of Training at Arcanum Information Security. He is also the creator of the Arcanum Cyber Security Bot:https://cha…
  continue reading
 
In this episode of The Security Repo Podcast, we dive deep into a rather troubling phenomenon: scammers who target senior citizens. We are joined by Anita Nikolich, a speaker and a university-based cybersecurity researcher specializing in network security and cryptocurrency analytics. She joins us as the founder and co-principal Investigator of DAR…
  continue reading
 
In this episode of The Security Repo Podcast, we dive deep into a pervasive cybersecurity issue: open data buckets. Joined by Glen Helton, Director of Information Security at a major multinational and founder of the Sky Witness Project, we explore how improperly secured cloud storage—commonly known as "open buckets"—can expose sensitive data to the…
  continue reading
 
In this episode of The Security Repo, we sit down with Jossef Harush Kadouri, a pioneer in software supply chain security and founder of Dustico, now part of Checkmarx. Jossef shares his journey from startup to acquisition, detailing the ever-evolving landscape of supply chain attacks. We explore how malicious actors are exploiting open-source ecos…
  continue reading
 
This episode we are joined by Avi Douglen, Founder and CEO of Bounce Security. Avi, a key figure in the security community and former OWASP chapter chair. The discussion covers the significance of OWASP, its resources, threat modeling and Avi's personal journey within the organization.Listeners will gain insights into the concept of value-driven th…
  continue reading
 
Today we sit down with Bobby Kuzma, Director of Offensive Cyber Operations at Pro Circular and adjunct professor at the University of Washington. Bobby shares his unique journey into the world of penetration testing, including how he accidentally acquired his CISSP certification. We delve into the fascinating world of offensive security, discussing…
  continue reading
 
Today we welcome J Wolfgang Goerlich, an advisory CISO, mentor, and strategist. We delve into the intricacies of security design frameworks and the importance of building and maintaining relationships in the cybersecurity field. Wolfgang shares his expertise on creating effective security programs, fostering trust within teams, and navigating the c…
  continue reading
 
Today we dive into the fascinating world of nuclear energy and cybersecurity with Andrew Elliot, a senior manager at KPMG's cybersecurity team. Andrew shares his journey from a nuclear engineer to a cybersecurity expert, providing unique insights into the importance of security culture, the resurgence of nuclear energy, and the critical role of cyb…
  continue reading
 
In this episode of The Security Repo, we dive deep into the world of threat modelling with Paul McCarty, a veteran in the field of DevSecOps and founder of SecureStack. Paul shares his journey from being a Unix admin to working with high-profile organizations like NASA and GitLab. We explore the essentials of threat modeling, the significance of cl…
  continue reading
 
In this episode of The Security Repo, we dive into the fascinating world of cybersecurity with JR Johnson, a seasoned information security professional with over 14 years of experience. JR shares his journey from web development to penetration testing and cybersecurity consulting, highlighting the unique challenges faced by higher education institu…
  continue reading
 
Join us in this episode of The Security Repo Podcast as we dive into the world of cybersecurity with Brendan Honadle. From his humble beginnings in desktop support to becoming a skilled red teamer, Brendan shares his inspiring journey and fascinating stories from the field. Discover the strategies, tools, and techniques used in offensive security, …
  continue reading
 
In this episode of The Security Repo, we are thrilled to welcome Sonya Moisset, a Senior Advocate at Snyk and a renowned expert in DevSecOps, cybersecurity, and AI. With a wealth of experience as a public speaker, mentor, and top contributor to the tech community, Sonya shares her deep insights into the evolving landscape of AI in cybersecurity. Jo…
  continue reading
 
In this episode of The Security Repo, Dwyane McDaniel and Marc Boorshtein delve into the intricacies of Kubernetes dashboard security. Marc, the CTO of Tremolo Security, brings his extensive experience in identity and access management to the table, discussing the challenges and best practices for securing Kubernetes dashboards. The conversation ex…
  continue reading
 
Join us this week as we host Eric Fourrier, co-founder and CEO of GitGuardian. Discover the journey of GitGuardian from a side project to a leading code security platform. Eric shares insights on the startup's growth, the integration of AI in security, and the future of protecting digital assets. Tune in for an engaging discussion on advancing code…
  continue reading
 
Today we dive into the challenges of securing modern IT infrastructures, focusing on "Secret Zero" and its implications for authentication practices. Our guest, Mattias Gees of Venify, discusses the SPIFFE framework and its role in transitioning from traditional security methods to dynamic workload identities. We explore practical strategies for im…
  continue reading
 
This week, we dive deep into the world of Kubernetes with John Dietz, co-founder of Kubefirst and a seasoned IT professional with over two decades of experience. John shares his extensive insights into the transformative power of Kubernetes and infrastructure as code (IaC) in modern cloud environments. Reflecting on his personal journey from skepti…
  continue reading
 
In this episode we dive deep into the world of authorization with Emre Baran, CEO and co-founder of Cerbos. As a seasoned entrepreneur and software expert, Emre brings over 20 years of experience to the table, discussing the subtle yet significant distinctions between authorization and authentication, and why these concepts are pivotal in today's c…
  continue reading
 
In this episode we are graced with Henry & Brian from DarkFusion Systems and show off their new Milwaukee Made keyboard, the Dark Seraph. Also, we discuss the Midwest Gaming Classic, the new Fallout show, blowing your carthridges, and more! Come hang out. It's a good time! Support the show You can check out where to find Bucket Bytes by visiting ou…
  continue reading
 
In this engaging episode of "The Security Repo," host Dwayne McDaniel and esteemed guest Rachel Stephens, delve into the rapidly evolving world of security tooling, with a special focus on the buzz around Application Security Posture Management (ASPM). They tackle the complexities and confusions surrounding the burgeoning category of security solut…
  continue reading
 
In this episode of The Security Repo podcast, we dive deep into the evolving landscape of security within software development with our guest, Rachel Stephens, a senior analyst at RedMonk. Rachel sheds light on the broader implications of the "shift left" movement, emphasizing the integration of security practices throughout the entire software dev…
  continue reading
 
What would you do if you were implanted with a brain implant that let you use your computer using your brain?! The impending TikTok ban is tearing us apart! A look at Mullet Mad Jack and a TMZ style look into some gaming/streamer news. Don't miss our talk on glass toilet bowl streamers! Support the show You can check out where to find Bucket Bytes …
  continue reading
 
This week, join us as we sit down with Huxley Barbee, the lead organizer of B-Sides New York City and a security evangelist at RunZero. With over two decades of experience as a software engineer and security consultant, Huxley shares his profound insights and journey through the evolving landscape of cybersecurity.From his early days attending DefC…
  continue reading
 
This episode of The Security Repo Podcast features an insightful discussion with Gregory Zagraba on the challenges and strategies of integrating security practices within the DevOps landscape. Covering the evolution of DevOps, the emergence of DevSecOps, and the importance of a culture shift in large organizations, the conversation delves into prac…
  continue reading
 
In this episode of the Security Repo podcast, listeners will dive into the intriguing world of hacking the hackers with Vangelis Stykas. Stykas, a notable figure in cybersecurity, shares his experiences and methodologies for compromising C2 servers—central nodes used by hackers to control malware-infected computers. He reveals how simple web applic…
  continue reading
 
In this episode, we delve into the mind of Erik Cabetas, a renowned figure in offensive security and Defcon CTF winner. Erik shares his unique journey from hacking to offensive security, detailing the critical turning points that shaped his career. Together with Mackenzie and Dwayne, Eric discusses the evolution of security practices, the importanc…
  continue reading
 
In this episode of The Security Repo, Jayson E. Street delves into his unconventional journey into cybersecurity, emphasizing the essence of hacking as a manifestation of curiosity rather than mere technical skill. He shares anecdotes from his extensive experience in ethical hacking, including bank heists and corporate security breaches, to undersc…
  continue reading
 
In this episode of "The Security Repo," hosts Dwayne McDaniel and Mackenzie Jackson delve into the intricate world of cybersecurity with Buck Bundhund, an expert from Centripetal Networks. The conversation kicks off with an exploration of the pervasive issue of data noise – the influx of non-intended data into organizational networks, posing signif…
  continue reading
 
In security you have likely heard the expression turtles all the way down, the concept the world is held up on the back of a turtle who is standing on the back other another turtle, and so on.. This can be used to describe the current state of security, where everything can dramatically fall over if the bottom turtle fails. In this episode, we disc…
  continue reading
 
In this episode, James Berthoty shares insights into his project, Latio Tech, which provides a comprehensive list of cloud security tools and resources. James highlights the challenges of vendor assessments and the importance of bridging knowledge gaps in cloud security. He also shares trends in the security tooling industry and offers advice for s…
  continue reading
 
A shiba inu is a better gamer than you! In this episode we welcome guest Ryan from RSVR, a VR arcade here in Milwaukee to talk about the ins and outs of what happs in the VR Bar! Also - do you remember jumping your rail cart avoiding enemies in Donkey Kong? Well, pretty soon you can risk your life and do that IRL in Japan. Pokemon with guns, Until …
  continue reading
 
In this episode, Mackenzie and Dwayne dive into a discussion on API security with special guest Isabelle Mauny, co-founder and CTO of 42Crunch. We walk through the differences API security has compared with traditional application security, and its growing importance in today's technology landscape. We also have a discussion about the challenges an…
  continue reading
 
Snowstorms, aliens, conspiracies and one night stands. This episode has a bit for all of you. We also have Henry from DarkFusion System to talk about his new boutique custom keyboard, the Dark Seraph - a bent galvanized steel TKL keyboard that's MOSTLY build right here in Milwaukee. Support the show You can check out where to find Bucket Bytes by v…
  continue reading
 
In this episode of The Security Repo, Mackenzie Jackson sits down with Nipun Gupta, the Chief Operating Officer of Bearer, a leading security company at the forefront of innovation in the cybersecurity landscape. Join us as we delve deep into the world of Static Application Security Testing (SAST) and explore why traditional SAST tools are struggli…
  continue reading
 
We start 2024 off on the right foot talking with Milton from Checkpoint Bar in Kenosha, a bit about his "gamer/nerd" bar. Diving deep in to see what inspired his unique bartop and also settling the debate on if he should put some new school systems on his bar, or keep them a little "retro". Dominic puts together his first trivia game byte, and how …
  continue reading
 
In our final episode of 2023, we talk a bit about the holidays, the terrors of a vasectomy gone mildly wrong. Logan eats his suit, and the boys chat about our first ever end of year game awards for awards given to Best Free Game, Best Pirate Puzzle Game, Biggest Suprise Moment in Gaming, Floppy Fish Award, Best NPC, Most Broken Game, Worst Game, & …
  continue reading
 
In this episode of "The Security Repo," your hosts Mackenzie Jackson and Dwayne McDaniel are joined by a distinguished guest, Dan Barahona, as they embark on an eye-opening exploration of API security. As the digital landscape evolves at breakneck speed, APIs (Application Programming Interfaces) have become the backbone of modern applications, maki…
  continue reading
 
Are you a passionate gamer or budding streamer? If so, you'll be intrigued by our special guest BikeMan, a popular Twitch streamer, who joins us as our special guest this week. Bike man shares insights on the importance of game selection for streamers, highlighting the delicate balance between playing games that attract viewers and those that the s…
  continue reading
 
In this episode of The Security Repo, your hosts Mackenzie Jackson and Dwyane McDaniel are joined by the brilliant Reanna Schultz, a seasoned expert in the field of cybersecurity. Together, they delve deep into the world of social engineering, exploring what it is, how to detect it, and crucially, how to arm your staff against its deceptive tactics…
  continue reading
 
In this eye-opening episode of The Security Repo, we welcome James Wickett, the CEO and co-founder of DryRun Security, a visionary in the realm of cybersecurity. James unveils a groundbreaking concept known as "Contextual Security," a game-changer that empowers developers with unprecedented security insights while they write code.As our hosts and c…
  continue reading
 
In this captivating episode of The Secuerity Repo, we delve into the world of physical security with our esteemed guest, Brice Self. With over a decade of experience in the field, Brice brings a wealth of knowledge and real-world insights to the table.This episode takes a deep dive into the intricate aspects of physical security, particularly in hi…
  continue reading
 
What does it take for an artist to bare his soul and translate his struggles with mental health into a humorous narrative? Join us as we navigate the creative abyss with Jerome DK, an artist, filmmaker, and author who chose to wrestle with his depression and anxiety through his book Every Day is a Nightmare. But the journey with Jerome doesn't end …
  continue reading
 
In this episode, we sit down with Tom Forbes to discuss his 'side project gone wrong' and how he found live AWS credentials inside many Python packages hosted on PyPi. Tom didn't expect to find sensitive information inside public Python packages, but was surprised when he was contacted about removing data from his GitHub project. After some researc…
  continue reading
 
With the rapid development of AI we are often left wondering if AI is our friend or foe in security. In this episode, I sit down with Simon Maple from Snyk to discuss just that. We explore the different applications of AI in security and where the future is going. It's an interesting discussion so you don't want to miss it!Show Links: Snyk.io Blog:…
  continue reading
 
Ever been caught in an unexpectedly disgusting situation or found a hidden gem in a pile of trash? Well, we've got some sidesplitting stories to share of our own - from the time we had to scrub off poop at Kmart to the unbelievable treasures we’ve unearthed while garbage picking. Or have you ever wondered what makes a portable PC stand out in a fie…
  continue reading
 
Application security can be a difficult task at all levels of a company. But as a start-up grows into an enterprise, or existing companies evolve. How do you effectively scale your security program? We have an amazing guest, Jeevan Sinhg who is the director of product security at Twilio and he is here to talk about how to scale an application secur…
  continue reading
 
One of the many advantages of the cloud revolution is that SaaS products are continuously updated, security issues are patched quickly, and it's something the consumers are less concerned about. But what about enterprise products, how do you get that same level of update efficiency and security on large on-premise products. This is one of the topic…
  continue reading
 
Check out Donovan & Studio Moonfall @ https://studiomoonfall.com/ Ever wonder how it feels to create an out-of-this-world universe from scratch? That's exactly what Donovan Sharer, a self-published author, illustrator, and bookstore owner, did. His varied entrepreneurial journey has spanned from organizing comic conventions and concerts to launchin…
  continue reading
 
Ever wondered how travel time could be scaled realistically in a game, or the secrets behind the modding process of Starfield? Align your gaze to our latest podcast episode where we traverse galaxies, explore gaming hardware, and swap some classic banter about Starfield, Lenovo's new handheld, the Nintendo Switch, and much more. We're not just gami…
  continue reading
 
Many companies are banning AI systems like ChatGPT to prevent data from being leaked, but is that a viable solution? We sit down with Jeremiah Jeschke, the CEO at OfficeAutomata, to discuss the future of security in a world of ChatGPT and other AI systems. Links: Office Automata: https://officeautomata.com/ Linkedin https://www.linkedin.com/in/jere…
  continue reading
 
Getting funding to build effective security programs is challenging and often it fails because security leaders are not telling the boardroom the right 'story'. In this episode with Walt Powell we discuss exactly how to overcome these challenges by understanding how to effectively communicate with the board by expressing security challenges into a …
  continue reading
 
Loading …

Snabbguide