Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

BarCode

Technology

Activity Overview

Episode publication activity over the past year

Episodes

Showing 101-136 of 136
«« ← Prev Page 2 of 2

Uncaged

23 Jul 2021

Contributed by Lukas

Brazilian Jiu-Jitsu (BJJ) is extremely difficult to master since it goes against conventional thinking. It is procedural and it is technical. While in...

Full Throttle

16 Jul 2021

Contributed by Lukas

Cyber threats still exist in the sky. Therefore, security controls within the Aviation industry is needed to protect the aircraft vessel, as well as i...

Soundproof

09 Jul 2021

Contributed by Lukas

Paul Asadoorian is a security veteran that has spent time “in the trenches” implementing comprehensive security programs across a wide array of in...

Deep Trust

02 Jul 2021

Contributed by Lukas

John Sileo left hi-tech consulting and became an entrepreneur to reclaim his greatest priority – being present, every day, for his wife Mary and the...

Game Changer

18 Jun 2021

Contributed by Lukas

Videogame studios are under serious attack, partly because they don't need to adhere to the same security requirements and regulatory demands as more ...

Industry Plague

11 Jun 2021

Contributed by Lukas

"AM I NEXT???" That's a question CEOs WORLDWIDE are asking themselves. Recent Ransomware attacks on JBS and the Colonial Pipeline have certainly eleva...

Kingpin

04 Jun 2021

Contributed by Lukas

Joe Grand is an electrical engineer, hardware hacker, product designer and the founder of Grand Idea Studio, Inc. He specializes in creating, explorin...

Cyber Crisis

28 May 2021

Contributed by Lukas

At this moment, more than 70% of us are currently compromised by cybersecurity attacks that we underplay, ignore, or simply aren’t aware of because ...

Checkmate

14 May 2021

Contributed by Lukas

In Cybersecurity, we aim to protect the most valuable assets. In the games of chess, that asset is the king. Developing a successful chess strategy re...

Skeleton Key

07 May 2021

Contributed by Lukas

Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number,...

The Flying Fish Theory

30 Apr 2021

Contributed by Lukas

A Flying Fish will leap out of the water and use its winglike pectoral fins to glide over the surface. Then, once below the surface, it is out of site...

Mindbender

23 Apr 2021

Contributed by Lukas

Social engineering is the art of exploiting human psychology. There is no perimeter defense for this method of infiltration. Known as the “People Ha...

XRay Vision

16 Apr 2021

Contributed by Lukas

Nato Riley takes what others know to be true and is still able to find something hidden below the surface. It’s a mind frame that proves that seeing...

Digital Armor

09 Apr 2021

Contributed by Lukas

The 2020 Xfinity Cyber Health Report cites an estimate that 854 million connected-home devices will be shipped by manufacturers in 2020, with that num...

Manicode

02 Apr 2021

Contributed by Lukas

The major cause of insecurity is the lack of secure software development practices. It’s crucial to understand the importance of security within the...

Vital Signs

26 Mar 2021

Contributed by Lukas

Overseeing security and privacy challenges in COVID era is an extremely difficult task, and it’s even more complicated if you’re a Healthcare CISO...

The Protege Effect

19 Mar 2021

Contributed by Lukas

The great Philosopher Seneca once said "While we teach, we learn”. The Protege Effect states that the best way to learn is to teach someone else. Th...

Data First

12 Mar 2021

Contributed by Lukas

Data is always the main target in an attacker’s scope. Therefore, organization’s should take a “data first” approach to preventing a strike th...

Data Diva

05 Mar 2021

Contributed by Lukas

Debbie Reynolds, AKA “The Data Diva,” is a world-renowned technologist, thought leader and advisor to multinational corporations for handling glob...

Nucleus

26 Feb 2021

Contributed by Lukas

nu·cle·us /n/ : the central and most important part of an object, movement, or group, forming the basis for its activity and growth. Having a nucleu...

Aviator

19 Feb 2021

Contributed by Lukas

An aviator is an expert of the skies and must know how to properly navigate through clouds. Fully understanding cloud formations and their potential d...

Data AWOL

12 Feb 2021

Contributed by Lukas

Often, data goes Absent Without Official Leave. No one within the organization grants it permission to vacate the premises. How do organizations prote...

Hackable Mindset

05 Feb 2021

Contributed by Lukas

To defend against modern day hackers, you must train your mind to think like one. Ted Harrington is the author of "HACKABLE: How To Do Application Sec...

Security Suplex

29 Jan 2021

Contributed by Lukas

A "Suplex" is an offensive move used in wrestling by which an attacker uses his weight to throw a defender. Phillip Wylie’s unusual journey into the...

Rumble

22 Jan 2021

Contributed by Lukas

HD Moore, famed developer of the wildly used Metasploit penetration testing tool spoke with me about his current focus, RUMBLE, in addition to his per...

State of the Nation

15 Jan 2021

Contributed by Lukas

Grayson Milbourne is the Security Intelligence Director for Webroot, Inc., an OpenText company that focuses on endpoint security and threat intelligen...

Intelligence Unfiltered

01 Jan 2021

Contributed by Lukas

Currently the Senior Director for Cyber Intelligence Strategy for Anomali, A.J. Nash is a cyber intelligence strategist and public speaker focused on ...

Dragon Wizard

01 Jan 2021

Contributed by Lukas

A fierce visionary, Ron Gula has redefined the security landscape and continues to do so. From co-creating Tenable, developing Dragon IDS, and now ser...

Full Disclosure

18 Dec 2020

Contributed by Lukas

Internationally renowned security guru, privacy specialist and author, Bruce Schneier, stops by BarCode to discuss the FireEye Hack, Covid-19 Vaccine ...

The Hunting Ground

04 Dec 2020

Contributed by Lukas

Open source intelligence (OSINT) describe the techniques used to gather information online from publicly available sources. This methodology can be us...

Contentyze

23 Nov 2020

Contributed by Lukas

I have the privilege of speaking with an AI trailblazer and a member of Forbes 30 Under 30, Przemek Chojecki. We discuss "Contentyze", a platform he ...

You CAN Stop Stupid

20 Oct 2020

Contributed by Lukas

It's a BarCode NCSAM/ HALLOWEEN special, where I speak with established author and iconic security professional who is no stranger to disguises, decep...

Secure My Files

14 Oct 2020

Contributed by Lukas

I tap into the knowledge of Stan Ivanov, industry expert in Secure Programming, Cryptography and Entrepreneurship. We verbally decipher Cryptocurrency...

Hack3D

09 Oct 2020

Contributed by Lukas

Cybersecurity and 3D Printing unite! Cybersecurity professionals Gabriel Doncel and Scott Darkow meet up with me at the bar to discuss cyber risk invo...

SafeHouse

06 Oct 2020

Contributed by Lukas

Security legend Troy Hunt stops by to discuss cyber attack vectors in the COVID era, VPNs, IoT Security and why he decided to opensource HIBP. SYMLIN...

Pure Strategy

30 Sep 2020

Contributed by Lukas

Joshua Feldman, VP of Security Architecture and Engineering at Radian joins me at the bar to discuss Strategy, APPSEC, and Advice for Cyber-Sales Prof...

«« ← Prev Page 2 of 2