The Security Repo
Episodes
OIDC And IAP In Production: Scaling Startup Security For Deepfake Defense - Talia Smiley
18 Mar 2026
Contributed by Lukas
In this episode of the Security Repo Podcast, Dwayne McDaniel talks with Talia Smiley, CTO of Silversight, about why her startup chose workload identi...
The PCI Ultimatum -Thrift Store OSINT, and "Lost Media" with Dwayne Edwards and Mike Radigan
17 Mar 2026
Contributed by Lukas
In this episode of the Security Repo Podcast, we uncover the wild and hilarious true story behind a forgotten piece of cybersecurity media history: “...
From Annual Checkbox To Continuous SDLC Testing: Operationalizing AI Pentests - Andy Dennis of XBow
13 Mar 2026
Contributed by Lukas
In this episode of the Security Repo Podcast, Dwayne catches up with returning guest Andy Dennis (Head of Field Engineering at XBOW) to unpack what it...
Why Compliance Isn’t Governance & How GovOps Rebuilds Trust Boundaries – Mike Schwartz
11 Mar 2026
Contributed by Lukas
Why Compliance Isn’t Governance & How GovOps Rebuilds Trust Boundaries – Mike SchwartzIn this episode of the Security Repo Podcast, Dwayne sit...
Building AI Solutions with a Security-First Mindset: Frameworks and Lessons with Henry Odibi
11 Feb 2026
Contributed by Lukas
In this episode of the Security Repo Podcast, we talk with Henry Odibi, a data engineer who pivoted from chemical engineering into data and AI. Henry ...
Link Safety, Lightweight AI & Operationalizing Threat Modeling - Nathan Koester
04 Feb 2026
Contributed by Lukas
In this episode of the Security Repo Podcast, Nathan Koester shares his path from reverse engineering for the Air Force to building practical security...
Tackling the Root of Incidents: Culture, Credentials, and AWS Insights – Robert Saul
28 Jan 2026
Contributed by Lukas
In this episode of the Security Repo Podcast, we dive into the world of incident response with Robert Saul, General Manager of AWS Security Incident R...
Hacking WebMethods: Legacy Systems, Modern Threats – Ryan Bonner
21 Jan 2026
Contributed by Lukas
In this episode of the Security Repo Podcast, Ryan Bonner dives into his exploration of legacy enterprise integration platform WebMethods, revealing a...
Why Attackers Don’t Care About Your Contracts: A Deep Dive Into Exploit Markets – Evan Dornbush
14 Jan 2026
Contributed by Lukas
In this episode of the Security Repo Podcast, we dive into the world of zero-day exploits, marketplace dynamics for vulnerability research, and the ev...
Untangling Identity: From Active Directory to Entra ID with Eric Woodruff
07 Jan 2026
Contributed by Lukas
In this episode of the Security Repo Podcast, Eric Woodruff dives deep into the complexities of identity and access management (IAM), from the evoluti...
A Special Holiday Message from The Security Repo Podcast
19 Dec 2025
Contributed by Lukas
Hi everyone, It's Dwayne, host of the security repo podcast. The show is taking a 2-week break over the holidays to give you a chance to catch up ...
The CISO Whisperer Approach: Security Leadership, Empathy, and ‘Dad Bod’ Metrics – Douglas Brush
17 Dec 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Douglas Brush, digital forensics expert and self-proclaimed "CISO Whisperer," shares his journ...
Scaling Open Source Observability and Managing Risk in the Software Supply Chain – Avi Press
10 Dec 2025
Contributed by Lukas
Scaling Open Source Observability and Managing Risk in the Software Supply Chain – Avi PressIn this episode of the Security Repo Podcast, Avi Press,...
Decoding Threat Actor Names: Marketing, Confusion & the MITRE Solution – Jeffrey Bell
03 Dec 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Jeffrey Bell, Principal Security Engineer and founder of CatchingPhish.com, discusses the confusion surr...
Why Technical CISOs Matter and How AI Is Shaping Security Ops - David Cross on Leading Security
26 Nov 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, David Cross, CISO at Atlassian and former Microsoft, Google, and Oracle security leader, shares his jour...
Identity Risks in Email: Your Inbox Might Be Lying About You – Amy Devine
19 Nov 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Dwayne McDaniel sits down with Amy Devine, a systems architect who transitioned from embedded wireless s...
From Military Intel to CISO: Navigating Security Leadership in the Age of AI – Darren Desmond
12 Nov 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we sit down with Darren Desmond, a seasoned CISO with a background in UK military intelligence, to unpac...
Mapping the InfoSec Community: Building InfoSecMap & Global Security Events – Martín Villalba
05 Nov 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we sit down with Martín Villalba, founder of InfoSecMap, to explore how his platform is transforming th...
Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx
29 Oct 2025
Contributed by Lukas
Supply Chain Warfare: CI/CD Threats and Open Source Security with François ProulxIn this episode of the Security Repo Podcast, François Proulx, VP o...
Fighting Tool Squatting And Prompt Injection & The Security Gaps In MCP – Srajan Gupta
22 Oct 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we welcome Srajan Gupta, a security engineer exploring the evolving security implications of Model Conte...
Fixing Hiring, Fostering Diversity, and Finding Your Place in Security – Matt Torbin
15 Oct 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we sit down with Matt Torbin to explore his inspiring journey from jazz musician to cybersecurity advoca...
Dev Engagement in Security: From Content Strategy to Community Strategy with Alyssa Miles
08 Oct 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we chat with Alyssa Miles, a product marketing leader at CyberArk, about building authentic developer co...
Beyond Controls: Building Trust and Communication in Security – Featuring AriaDear
01 Oct 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Aria Langer returns to share deep insights from her work in privileged access management and the challen...
Misconfigurations, Legacy Landmines, and Tier Zero Truths – Jake Hildreth on Active Directory
24 Sep 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we chat with Jake Hildreth, Principal Security Consultant at Semperis, about the enduring challenges of ...
Rebuilding OWASP St. Louis & Strengthening Security Growing The Community – Andre Van Klaveren
17 Sep 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Andre Van Klaveren talks about his decades-long journey through IT, software development, and applicatio...
Teaching AppSec With Scratchers: Gamified Learning For Real-World Impact - Jenn Gile
10 Sep 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Jenn Gile shares insights from her hands-on security education at DEF CON's AppSec Village, where sh...
Threat Modeling OpenSSL, Lessons from a Data Breach, and Volunteering with Narayan Ram Narayanan
03 Sep 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Narayan Ram Narayanan shares his journey into cybersecurity, sparked by a personal data breach and fuele...
From Risk Acceptance to Community Building: Inside Security With Sean Juroviesky
27 Aug 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Sean Juroviesky joins us to share their journey through cybersecurity, from finding community in BurbSec...
Tackling Deepfakes - Battling Ai-Generated Faces, Scams, Detection, And Security – Sankalp Kumar
20 Aug 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Dwayne McDaniel and Sankalp Kumar dive into the world of deepfakes, how they are created using transform...
Security Onion - From Classroom To SOC, Open Source and Education - Matt Gracie
13 Aug 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we’re joined by Matt Gracie, a seasoned blue team expert and senior engineer at Security Onion Solutio...
From Code to Crypto: How Learning Fundamentals Empowers Security Pros – Matt Olmsted
06 Aug 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, software engineer and newly minted CISSP Matt Olmsted joins us to explore cryptographic fundamentals and...
Inside BurbSec: From Suburban InfoSec Beers to Global Discord Community – Johnny Xmas
30 Jul 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Johnny Xmas shares the grassroots story and philosophy behind BurbSec, a unique InfoSec meetup network f...
From Car Culture to Cybersecurity: Building Community and Skills with Christian Pinkston
23 Jul 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we meet Christian Pinkston, a cybersecurity student and car culture enthusiast who's become a recogn...
Keeping Drupal Running With Static Code Analysis & Lessons From Drupalgeddon - Matt Glaman
16 Jul 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we sit down with Matt Glaman, a veteran developer in the Drupal community, to explore the role of static...
From Phishing Scam Response to Cyber Defender: A Journey into Security - Manoj Viswanathan
25 Jun 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Manoj Viswanathan shares his unconventional journey into cybersecurity, from a personal phishing inciden...
AI, Zero Trust, And The Future Of DevSecOps In A Cloud-First World – Nivathan Athiganoor Somasundharam
18 Jun 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we dive deep into the evolving role of DevSecOps with Nivathan Athiganoor Somasundharam, a technical acc...
Reducing Developer Toil, Shifting Security Left, And Using Caution With AI – Andy Dennis
11 Jun 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Andy Dennis, VP at Modus Create, joins Dwayne McDaniel to unpack what "shifting left" really m...
Educate, Empower, Prepare: Building Inclusive Cybersecurity With Rebekah Skeete
04 Jun 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we sit down with Rebekah Skeete, COO of BlackGirlsHack, to explore how her organization is increasing di...
Bridging the Gap Between Dev and Sec: Tools, Culture, and Careers - Thomas Jost
28 May 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Thomas Jost shares his journey from software development to becoming a Senior Application Security Engin...
What Tools Miss and Why Humans Matter in AppSec - Yash Shahani
21 May 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Dwayne McDaniel sits down with Yash Shahani, a seasoned AppSec engineer and vulnerability hunter, to div...
Visualizing Data Poisoning and Rethinking Threat Detection Through Graphs – Maria Khodak
14 May 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Maria Khodak explores how graph theory and data visualization can be used to uncover machine learning vu...
Building Human-Centric Security and Hacker Communities in Argentina - Ailin Castellucci
30 Apr 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Ailin Castellucci shares her inspiring journey from selling shoes to building cybersecurity teams and le...
From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski
23 Apr 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Chris Kulakowski, a seasoned detection engineer from IBM, delves into the complexities of threat detecti...
Quarantine Policies and Cloud Security Strategies for AWS – Bleon Proko
16 Apr 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Bleon Proko dives into the intricacies of AWS security, focusing on the role and impact of quarantine po...
Helping Developers Use Open Source Security Tools & Improving Defense With AI - Mackenzie Jackson
09 Apr 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we welcome back Mackenzie Jackson, security researcher and founder of this very show, to discuss the evo...
How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard Johansen
02 Apr 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we sit down with cybersecurity expert Gerard Johansen to dive deep into identity and access management (...
Navigating And Defining The Evolving Role Of The CISO In Government Security - Josh Kuntz
26 Mar 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we sit down with Josh Kuntz, Chief Information Security Officer (CISO) for the Texas Department of Licen...
The State And Future Of Cybersecurity Training and AIShaping The Role - Zach Hill
19 Mar 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we sit down with Zach Hill from Antisyphon Training to discuss affordable cybersecurity education and th...
Secrets Management With The OpenPao Project And Open Source Security - Alex Scheel
12 Mar 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we sit down with Alex Scheel, staff back-end engineer at GitLab and chair of the OpenBao Technical Steer...
Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna Jonssen
05 Mar 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we sit down with Edna Jonnson, a cybersecurity engineer and SOC analyst, to discuss their journey from w...
Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John Poulin
26 Feb 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we dive into the concept of defense in depth with guest John Poulin, who shares insights on secure code ...
What Does It Mean To Be A Security Lead - A Conversion With Kayssar Daher
19 Feb 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Dwayne and Kayssar dive into Kayssar's role as a security leader at GitGuardian, exploring his respo...
Understanding Security Champions and Making Human Connections - Dustin Lehr
12 Feb 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, Dwayne and Kayssar sit down with Dustin Lehr, co-founder and chief product and tech officer at Katilyst ...
Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett
05 Feb 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we dive into the world of ISACs (Information Sharing Analysis Centers) with Cherie Burgett. Cherie share...
Observability ownership, monitoring apps at scale, and learning DevOps like a language- Josh Lee
29 Jan 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we explore the intersection of observability and security with special guest Josh Lee, a developer advoc...
The Freedom Of Information Act, Ethical AI, And NerdCore Music - Stephanie Honore
22 Jan 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we talk with cybersecurity expert Stephanie Honore, about her journey into security, her work with the F...
Securing Workload Identities And Working On Conjure - Jody Hunt
15 Jan 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, we explore the fascinating and complex world of non-human identities (NHIs) with Jody Hunt from CyberArk...
The Updated OWASP Top 10 for LLM Applications and the AI landscape - Talesh Seeparsan
08 Jan 2025
Contributed by Lukas
In this episode of the Security Repo Podcast, the team dives into the OWASP Top 10 for Large Language Model Applications with special guest Talesh See...
Securing Flight Simulators And Other Operational Technology - Coburn Slay
18 Dec 2024
Contributed by Lukas
In this episode of the Security Repo Podcast, we delve into the intricate world of flight simulators and their unique cybersecurity challenges with gu...
Getting Out Of Walled Gardens By Running Your Own Email - Michael Harrison
11 Dec 2024
Contributed by Lukas
In this week's episode of The Security Repo Podcast, we are joined by Michael Harrison, a tech veteran who discusses the benefits and challenges of ru...
Understanding Psychological Safety And Asking Questions To Stay Relevant - Deanna Stanley
04 Dec 2024
Contributed by Lukas
Got psychological safety? In this episode of the Security Repo Podcast we sit down with Deanna Stanley to learn about psychological safety and the f...
Phone Phreaking, The History Of The Security Community, And Social Engineering - Matt Scheurer
27 Nov 2024
Contributed by Lukas
In this episode of the Security Repo podcast, we are joined by the legendary DFIR Matt to get a history of phone phreaking and how that community of h...
Getting Started In Offensive Security: A Journey Into Tech - Alexis Diediker
20 Nov 2024
Contributed by Lukas
In this week's episode of the Security Repo Podcast, we ask a pentester who is one year into her cybersecurity career how she got started. Along the w...
Securing Human Access Through Privileged Access Management and Just In Time Access - Aria Langer
13 Nov 2024
Contributed by Lukas
In this episode of the Security Repo Podcast, we take a look at the concepts around securing human identities in the enterprise. We talk about why pas...
Undocumented Hacking - Applying Pentesting Skills To Navigating Bureaucracy - José Martinez
06 Nov 2024
Contributed by Lukas
In this week's episode of the Security Repo Podcast, we dive into an unusual topic for the program, navigating the US immigration system and the chall...
STIR/SHAKEN and Password Policies- Per Thorsheim
30 Oct 2024
Contributed by Lukas
In this week's episode of the Security Repo Podcast, we turn our attention to STIR/SHAKEN, a requirement for US cell phone carriers that has been ...
Being a Lifeguard Instead of a Police Officer and Compliance Is NOT Security - David Hawthorne
23 Oct 2024
Contributed by Lukas
In this episode of The Security Repo Podcast, we look at how we satisfy the goals of compliance and security, which might seem like they would be the ...
From The Theory Of Constraints to Scorecard Patterns for Better Compliance - Justin Reock
16 Oct 2024
Contributed by Lukas
In this episode of The Security Repo Podcast, we broach a wide variety of topics, ranging from The Theory of Constraints, source control horror storie...
Rotating Secrets At Scale, Automatically, and With High Availability - Kenton McDonough
09 Oct 2024
Contributed by Lukas
In this episode of The Security Repo Podcast, we take a look at how to do secrets rotation in a highly available systems reliably. We are joined by ...
Countering Shadow IT Through Nudging Intervention - Garret Gross
02 Oct 2024
Contributed by Lukas
In this episode of The Security Repo Podcast, let's talk about the largest IT threat outside of IT, and maybe out of the line of site of Security ...
What Does The Future Hold For The Security Repo Podcast? Some Changes & Introducing Our New Co-Host
26 Sep 2024
Contributed by Lukas
We have had so much fun making The Security Repo Podcast, and we hope you have learned as much as we have along the way. The tides of change have fi...
Data Loss Prevention and Stopping Breaches Before They Start
25 Sep 2024
Contributed by Lukas
In this episode of The Security Repo Podcast, we explore all things Data Loss Prevention (DLP). We are joined by Daniel Jay, Senior Director of Produ...
Security Automation And Leveraging AI To Deal With Security At Scale - Huxley Barbee
18 Sep 2024
Contributed by Lukas
In this episode of The Security Repo Podcast, we look at security automation and how we can engineer our way to better security overall. We are joine...
Developer Awareness Training and AI Assisted Tooling for Improving Security - Chris Lindsey
11 Sep 2024
Contributed by Lukas
In this episode of The Security Repo Podcast, we take a look at the role developer training and awareness have in improving security. We are joined b...
Improving Your Security by Leveraging AI: The Arcanum Cyber Security Bot - Jason Haddix
04 Sep 2024
Contributed by Lukas
In this episode of The Security Repo Podcast, we dive deep into how AI is helping the Red, Blue, and Purple teams and how we can leverage ChatGPT to s...
DeepCover & DART Academy: Fighting Scammers Through Educating Seniors
28 Aug 2024
Contributed by Lukas
In this episode of The Security Repo Podcast, we dive deep into a rather troubling phenomenon: scammers who target senior citizens. We are joined by...
Mining for Vulnerabilities: Hidden Dangers of Open Buckets
23 Aug 2024
Contributed by Lukas
In this episode of The Security Repo Podcast, we dive deep into a pervasive cybersecurity issue: open data buckets. Joined by Glen Helton, Director of...
The Frontline of Cybersecurity: Defending Against Supply Chain Intrusions - Jossef Harush Kadouri
14 Aug 2024
Contributed by Lukas
In this episode of The Security Repo, we sit down with Jossef Harush Kadouri, a pioneer in software supply chain security and founder of Dustico, now ...
Enhancing Security Through Community and Innovation - A Conversation with Avi Douglen
07 Aug 2024
Contributed by Lukas
This episode we are joined by Avi Douglen, Founder and CEO of Bounce Security. Avi, a key figure in the security community and former OWASP chapter ch...
Behind the Scenes of Offensive Security with Bobby Kuzma
31 Jul 2024
Contributed by Lukas
Today we sit down with Bobby Kuzma, Director of Offensive Cyber Operations at Pro Circular and adjunct professor at the University of Washington. Bobb...
Frameworks and Relationships: J Wolfgang Goerlich on Security Strategy
24 Jul 2024
Contributed by Lukas
Today we welcome J Wolfgang Goerlich, an advisory CISO, mentor, and strategist. We delve into the intricacies of security design frameworks and the im...
Nuclear Security & Cyber Resilience: Insights from KPMG's Andrew Elliot
17 Jul 2024
Contributed by Lukas
Today we dive into the fascinating world of nuclear energy and cybersecurity with Andrew Elliot, a senior manager at KPMG's cybersecurity team. An...
Securing the Future - The Art of Threat Modeling with Paul McCarty
12 Jul 2024
Contributed by Lukas
In this episode of The Security Repo, we dive deep into the world of threat modelling with Paul McCarty, a veteran in the field of DevSecOps and found...
Pen Testing in Academia - University Cybersecurity Challenges with JR Johnson
28 Jun 2024
Contributed by Lukas
In this episode of The Security Repo, we dive into the fascinating world of cybersecurity with JR Johnson, a seasoned information security professiona...
From Desktop Support to Red Team: Brendan Hohenadel Journey in Cybersecurity
14 Jun 2024
Contributed by Lukas
Join us in this episode of The Security Repo Podcast as we dive into the world of cybersecurity with Brendan Honadle. From his humble beginnings in de...
Navigating AI in Cybersecurity: Insights from Sonya Moisset
07 Jun 2024
Contributed by Lukas
In this episode of The Security Repo, we are thrilled to welcome Sonya Moisset, a Senior Advocate at Snyk and a renowned expert in DevSecOps, cybersec...
Securing Kubernetes Dashboards: Insights from Tremolo Security's CTO
27 May 2024
Contributed by Lukas
In this episode of The Security Repo, Dwyane McDaniel and Marc Boorshtein delve into the intricacies of Kubernetes dashboard security. Marc, the CTO o...
The Secrets behind GitGuardian: Building a security platform with Eric Fourrier
15 May 2024
Contributed by Lukas
Join us this week as we host Eric Fourrier, co-founder and CEO of GitGuardian. Discover the journey of GitGuardian from a side project to a leading co...
Solving Secret Zero: The Future of Machine Identities & SPIFFE with Mattias Gees
08 May 2024
Contributed by Lukas
Today we dive into the challenges of securing modern IT infrastructures, focusing on "Secret Zero" and its implications for authentication p...
Building secure platforms with Kubernetes: Bridging the DevOps-Security Divide with John Dietz
30 Apr 2024
Contributed by Lukas
This week, we dive deep into the world of Kubernetes with John Dietz, co-founder of Kubefirst and a seasoned IT professional with over two decades of ...
Authorization vs. Authentication: Decoding the Layers of Security with Emre Baran
26 Apr 2024
Contributed by Lukas
In this episode we dive deep into the world of authorization with Emre Baran, CEO and co-founder of Cerbos. As a seasoned entrepreneur and software ex...
Unpacking ASPM: Trends, Truths, and the Future of Security Tools
12 Apr 2024
Contributed by Lukas
In this engaging episode of "The Security Repo," host Dwayne McDaniel and esteemed guest Rachel Stephens, delve into the rapidly evolving wo...
Decoding Security: An Analyst's Perspective on Trends and Tools
09 Apr 2024
Contributed by Lukas
In this episode of The Security Repo podcast, we dive deep into the evolving landscape of security within software development with our guest, Rachel ...
Building Conferences and Communities in Cybersecurity with Huxley Barbee
14 Mar 2024
Contributed by Lukas
This week, join us as we sit down with Huxley Barbee, the lead organizer of B-Sides New York City and a security evangelist at RunZero. With over two ...
The Evolution of DevSecOps: Strategies for Integrating Security into DevOps with Gregory Zagraba
08 Mar 2024
Contributed by Lukas
This episode of The Security Repo Podcast features an insightful discussion with Gregory Zagraba on the challenges and strategies of integrating secur...
Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas
04 Mar 2024
Contributed by Lukas
In this episode of the Security Repo podcast, listeners will dive into the intriguing world of hacking the hackers with Vangelis Stykas. Stykas, a not...
The Evolution of Offensive Security with Erik Cabetas
24 Feb 2024
Contributed by Lukas
In this episode, we delve into the mind of Erik Cabetas, a renowned figure in offensive security and Defcon CTF winner. Erik shares his unique journey...
From Bank Heists to Security Insights: The Jayson E. Street Story
16 Feb 2024
Contributed by Lukas
In this episode of The Security Repo, Jayson E. Street delves into his unconventional journey into cybersecurity, emphasizing the essence of hacking a...
Reducing the noise: Cutting through the data in security Buck Bundhund
08 Feb 2024
Contributed by Lukas
In this episode of "The Security Repo," hosts Dwayne McDaniel and Mackenzie Jackson delve into the intricate world of cybersecurity with Buc...
Solving the bottom turtle: Fixing the authentication problem with Ethan Heilman
31 Jan 2024
Contributed by Lukas
In security you have likely heard the expression turtles all the way down, the concept the world is held up on the back of a turtle who is standing on...