Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing

Jerod

๐Ÿ‘ค Speaker
2134 total appearances

Appearances Over Time

Podcast Appearances

Okay, friends, go to socket.dev. Security dependencies. Socket is on the front lines of securing the open source ecosystem. They're a developer-first security platform that protects your code from both vulnerable and malicious dependencies. Install the GitHub app or book a demo. Again, socket.dev. That's S-O-C-K-E-T dot dev. What is on your mind?

Okay, friends, go to socket.dev. Security dependencies. Socket is on the front lines of securing the open source ecosystem. They're a developer-first security platform that protects your code from both vulnerable and malicious dependencies. Install the GitHub app or book a demo. Again, socket.dev. That's S-O-C-K-E-T dot dev. What is on your mind?

What is it that's got your attention in terms of technical prowess, exploratory? Are you playing with hardware still yet? I did not catch your conversation with Quincy yet, but I'm understanding that you're now a white hat hacker and the NSA sent you a fidget spinner? Yeah. Without sharing the whole entire podcast. Now that's cool. Hold on. Yeah. Let's stop right there and talk about that.

What is it that's got your attention in terms of technical prowess, exploratory? Are you playing with hardware still yet? I did not catch your conversation with Quincy yet, but I'm understanding that you're now a white hat hacker and the NSA sent you a fidget spinner? Yeah. Without sharing the whole entire podcast. Now that's cool. Hold on. Yeah. Let's stop right there and talk about that.

Well, without sharing, I mean, you can go probably listen to the conversation with Quincy, but like without like literally copying what was there, what are you into?

Well, without sharing, I mean, you can go probably listen to the conversation with Quincy, but like without like literally copying what was there, what are you into?

Exactly. How do you cybersecurity? Like what exactly is cybersecurity? If it's so broad, I'm also sort of mesmerized and also enamored by the, you know, the idea of hacking things were being aware there's a box over there and there's some sort of vulnerability. I've got to find it. And there is a way in. But it's up to me to find the 10 or 15 or hundreds of ways you could get in.

Exactly. How do you cybersecurity? Like what exactly is cybersecurity? If it's so broad, I'm also sort of mesmerized and also enamored by the, you know, the idea of hacking things were being aware there's a box over there and there's some sort of vulnerability. I've got to find it. And there is a way in. But it's up to me to find the 10 or 15 or hundreds of ways you could get in.

That to me is interesting. I'm not pursuing a person, but it's it's very there's a lure there for me.

That to me is interesting. I'm not pursuing a person, but it's it's very there's a lure there for me.

Kali Linux, right? Spin up a VM of Kali Linux or install that.

Kali Linux, right? Spin up a VM of Kali Linux or install that.

Did you enjoy the movie escape room?

Did you enjoy the movie escape room?

I've not seen Escape Room either. It might get you. What about Mr. Robot?

I've not seen Escape Room either. It might get you. What about Mr. Robot?

I can concur with that. From what I understand of how do you cyber security, it was a joke to ask you how do you cyber security. It was not meant to be a perfect sentence.

I can concur with that. From what I understand of how do you cyber security, it was a joke to ask you how do you cyber security. It was not meant to be a perfect sentence.