BarCode
Episodes
Uncaged
23 Jul 2021
Contributed by Lukas
Brazilian Jiu-Jitsu (BJJ) is extremely difficult to master since it goes against conventional thinking. It is procedural and it is technical. While in...
Full Throttle
16 Jul 2021
Contributed by Lukas
Cyber threats still exist in the sky. Therefore, security controls within the Aviation industry is needed to protect the aircraft vessel, as well as i...
Soundproof
09 Jul 2021
Contributed by Lukas
Paul Asadoorian is a security veteran that has spent time “in the trenches” implementing comprehensive security programs across a wide array of in...
Deep Trust
02 Jul 2021
Contributed by Lukas
John Sileo left hi-tech consulting and became an entrepreneur to reclaim his greatest priority – being present, every day, for his wife Mary and the...
Game Changer
18 Jun 2021
Contributed by Lukas
Videogame studios are under serious attack, partly because they don't need to adhere to the same security requirements and regulatory demands as more ...
Industry Plague
11 Jun 2021
Contributed by Lukas
"AM I NEXT???" That's a question CEOs WORLDWIDE are asking themselves. Recent Ransomware attacks on JBS and the Colonial Pipeline have certainly eleva...
Kingpin
04 Jun 2021
Contributed by Lukas
Joe Grand is an electrical engineer, hardware hacker, product designer and the founder of Grand Idea Studio, Inc. He specializes in creating, explorin...
Cyber Crisis
28 May 2021
Contributed by Lukas
At this moment, more than 70% of us are currently compromised by cybersecurity attacks that we underplay, ignore, or simply aren’t aware of because ...
Checkmate
14 May 2021
Contributed by Lukas
In Cybersecurity, we aim to protect the most valuable assets. In the games of chess, that asset is the king. Developing a successful chess strategy re...
Skeleton Key
07 May 2021
Contributed by Lukas
Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number,...
The Flying Fish Theory
30 Apr 2021
Contributed by Lukas
A Flying Fish will leap out of the water and use its winglike pectoral fins to glide over the surface. Then, once below the surface, it is out of site...
Mindbender
23 Apr 2021
Contributed by Lukas
Social engineering is the art of exploiting human psychology. There is no perimeter defense for this method of infiltration. Known as the “People Ha...
XRay Vision
16 Apr 2021
Contributed by Lukas
Nato Riley takes what others know to be true and is still able to find something hidden below the surface. It’s a mind frame that proves that seeing...
Digital Armor
09 Apr 2021
Contributed by Lukas
The 2020 Xfinity Cyber Health Report cites an estimate that 854 million connected-home devices will be shipped by manufacturers in 2020, with that num...
Manicode
02 Apr 2021
Contributed by Lukas
The major cause of insecurity is the lack of secure software development practices. It’s crucial to understand the importance of security within the...
Vital Signs
26 Mar 2021
Contributed by Lukas
Overseeing security and privacy challenges in COVID era is an extremely difficult task, and it’s even more complicated if you’re a Healthcare CISO...
The Protege Effect
19 Mar 2021
Contributed by Lukas
The great Philosopher Seneca once said "While we teach, we learn”. The Protege Effect states that the best way to learn is to teach someone else. Th...
Data First
12 Mar 2021
Contributed by Lukas
Data is always the main target in an attacker’s scope. Therefore, organization’s should take a “data first” approach to preventing a strike th...
Data Diva
05 Mar 2021
Contributed by Lukas
Debbie Reynolds, AKA “The Data Diva,” is a world-renowned technologist, thought leader and advisor to multinational corporations for handling glob...
Nucleus
26 Feb 2021
Contributed by Lukas
nu·cle·us /n/ : the central and most important part of an object, movement, or group, forming the basis for its activity and growth. Having a nucleu...
Aviator
19 Feb 2021
Contributed by Lukas
An aviator is an expert of the skies and must know how to properly navigate through clouds. Fully understanding cloud formations and their potential d...
Data AWOL
12 Feb 2021
Contributed by Lukas
Often, data goes Absent Without Official Leave. No one within the organization grants it permission to vacate the premises. How do organizations prote...
Hackable Mindset
05 Feb 2021
Contributed by Lukas
To defend against modern day hackers, you must train your mind to think like one. Ted Harrington is the author of "HACKABLE: How To Do Application Sec...
Security Suplex
29 Jan 2021
Contributed by Lukas
A "Suplex" is an offensive move used in wrestling by which an attacker uses his weight to throw a defender. Phillip Wylie’s unusual journey into the...
Rumble
22 Jan 2021
Contributed by Lukas
HD Moore, famed developer of the wildly used Metasploit penetration testing tool spoke with me about his current focus, RUMBLE, in addition to his per...
State of the Nation
15 Jan 2021
Contributed by Lukas
Grayson Milbourne is the Security Intelligence Director for Webroot, Inc., an OpenText company that focuses on endpoint security and threat intelligen...
Intelligence Unfiltered
01 Jan 2021
Contributed by Lukas
Currently the Senior Director for Cyber Intelligence Strategy for Anomali, A.J. Nash is a cyber intelligence strategist and public speaker focused on ...
Dragon Wizard
01 Jan 2021
Contributed by Lukas
A fierce visionary, Ron Gula has redefined the security landscape and continues to do so. From co-creating Tenable, developing Dragon IDS, and now ser...
Full Disclosure
18 Dec 2020
Contributed by Lukas
Internationally renowned security guru, privacy specialist and author, Bruce Schneier, stops by BarCode to discuss the FireEye Hack, Covid-19 Vaccine ...
The Hunting Ground
04 Dec 2020
Contributed by Lukas
Open source intelligence (OSINT) describe the techniques used to gather information online from publicly available sources. This methodology can be us...
Contentyze
23 Nov 2020
Contributed by Lukas
I have the privilege of speaking with an AI trailblazer and a member of Forbes 30 Under 30, Przemek Chojecki. We discuss "Contentyze", a platform he ...
You CAN Stop Stupid
20 Oct 2020
Contributed by Lukas
It's a BarCode NCSAM/ HALLOWEEN special, where I speak with established author and iconic security professional who is no stranger to disguises, decep...
Secure My Files
14 Oct 2020
Contributed by Lukas
I tap into the knowledge of Stan Ivanov, industry expert in Secure Programming, Cryptography and Entrepreneurship. We verbally decipher Cryptocurrency...
Hack3D
09 Oct 2020
Contributed by Lukas
Cybersecurity and 3D Printing unite! Cybersecurity professionals Gabriel Doncel and Scott Darkow meet up with me at the bar to discuss cyber risk invo...
SafeHouse
06 Oct 2020
Contributed by Lukas
Security legend Troy Hunt stops by to discuss cyber attack vectors in the COVID era, VPNs, IoT Security and why he decided to opensource HIBP. SYMLIN...
Pure Strategy
30 Sep 2020
Contributed by Lukas
Joshua Feldman, VP of Security Architecture and Engineering at Radian joins me at the bar to discuss Strategy, APPSEC, and Advice for Cyber-Sales Prof...