Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

The Security Repo

Technology

Episodes

Showing 101-133 of 133
«« ← Prev Page 2 of 2

The right tool for the job: Finding and evaluating security tools with James Berthoty

24 Jan 2024

Contributed by Lukas

In this episode, James Berthoty shares insights into his project, Latio Tech, which provides a comprehensive list of cloud security tools and resource...

Securing our APIs - Thinking differently about API Security with Isabelle Mauny

17 Jan 2024

Contributed by Lukas

In this episode, Mackenzie and Dwayne dive into a discussion on API security with special guest Isabelle Mauny, co-founder and CTO of 42Crunch. We wal...

Revolutionizing SAST: Bridging the Gap for Modern Developers with Nipun Gupta

10 Jan 2024

Contributed by Lukas

In this episode of The Security Repo, Mackenzie Jackson sits down with Nipun Gupta, the Chief Operating Officer of Bearer, a leading security company ...

API Security Unveiled: Safeguarding the Heart of Modern Applications

20 Dec 2023

Contributed by Lukas

In this episode of "The Security Repo," your hosts Mackenzie Jackson and Dwayne McDaniel are joined by a distinguished guest, Dan Barahona, ...

Guarding Against Deception: The Art of Detecting and Defending Against Social Engineering

15 Dec 2023

Contributed by Lukas

In this episode of The Security Repo, your hosts Mackenzie Jackson and Dwyane McDaniel are joined by the brilliant Reanna Schultz, a seasoned expert i...

Contextual Security: Revolutionizing Developer-Focused Cybersecurity with James Wickett

08 Dec 2023

Contributed by Lukas

In this eye-opening episode of The Security Repo, we welcome James Wickett, the CEO and co-founder of DryRun Security, a visionary in the realm of cyb...

Mastering Physical Security: Unveiling the Secrets with Brice Self

04 Dec 2023

Contributed by Lukas

In this captivating episode of The Secuerity Repo, we delve into the world of physical security with our esteemed guest, Brice Self. With over a decad...

Secrets inside packages, scanning Python PyPi for credentials with Tom Forbes

03 Nov 2023

Contributed by Lukas

In this episode, we sit down with Tom Forbes to discuss his 'side project gone wrong' and how he found live AWS credentials inside many Python...

Artificial intelligence, a friend or foe in cyber security - with Simon Maple from Snyk

19 Oct 2023

Contributed by Lukas

With the rapid development of AI we are often left wondering if AI is our friend or foe in security. In this episode, I sit down with Simon Maple from...

Scaling security and AppSec in fast moving enterprises with Jeevan Singh

11 Oct 2023

Contributed by Lukas

Application security can be a difficult task at all levels of a company. But as a start-up grows into an enterprise, or existing companies evolve. How...

Enterprise Software Distribution - Managing updates and security in enterprise software at scale

09 Oct 2023

Contributed by Lukas

One of the many advantages of the cloud revolution is that SaaS products are continuously updated, security issues are patched quickly, and it's s...

Securing data in a world of AI with Jeremiah Jeschke

17 Sep 2023

Contributed by Lukas

Many companies are banning AI systems like ChatGPT to prevent data from being leaked, but is that a viable solution? We sit down with Jeremiah Jeschke...

Getting boardroom buy-in for security - CISO conversations with Walt Powell

04 Sep 2023

Contributed by Lukas

Getting funding to build effective security programs is challenging and often it fails because security leaders are not telling the boardroom the righ...

Social engineering, phishing and building grass roots communities with Dan and Ken

03 Aug 2023

Contributed by Lukas

In this episode, we sit down with Daniel Niefeld and Kenneth Nevers to talk about their journey into security, creating security conferences and build...

Code signing and securing the software supply chain with Billy Lynch

27 Jul 2023

Contributed by Lukas

In this episode, we go on a deep dive with Billy Lynch from Chainguard into application and code signing and how it can be used to ensure the supply c...

Getting started in AppSec with Tanya Janca SheHacksPurple

10 Jul 2023

Contributed by Lukas

In this episode, we sit down with Tnaya Janca and discuss her journey from being a developer for government agencies to becoming one of the most recog...

Securing the remote workforce, the future of cloud development environments

14 Jun 2023

Contributed by Lukas

In this episode, we sit down with Vedran Jukic, co-founder and CTO of Code Anywhere and Tomma Pulljak Senior Developer at Code Anywhere to talk about ...

Understanding digital forensics with Desi - A deep dive post breach investigations

23 May 2023

Contributed by Lukas

In this episode we sit down with Desi who is an expert in digital forensics. We explore exactly what digital forensics is, how it can be used to catch...

The hacker in the board room: The journey from hacker to CISO with Jason Haddix

09 May 2023

Contributed by Lukas

Have you ever wanted to know how to hack a bank? If so this is the episode for you (disclaimer, please don't hack banks). Jason Haddix is someon...

Security landscape in 2023 : Insights from the ground at RSA (Special Edition Episode)

06 May 2023

Contributed by Lukas

In this special edition episode, we tracked down a few of the key thought leaders in cyber security around the RSA conference to ask them what they th...

Modern ransomware: How hackers are targeting your organization with Adriel Disatel and Noah Tongate

03 May 2023

Contributed by Lukas

In this episode we sit down with legendary pen tester Adriel Disatel and Noah Tongate to discuss how modern cyber criminals are operating to deploy mo...

Understanding intent based access control with Uri Sarid

24 Apr 2023

Contributed by Lukas

In this episode of the Security Repo we dive into intent-based access control. This is the concept of limiting access to just what is intended, it sou...

Multi Factor Authentication for APIs with Anusha Iyer

10 Apr 2023

Contributed by Lukas

APIs are what run the internet today, modern applications are no long monoliths, they are built upon hundreds of microservices and APIs are the glue t...

Offensive security tools with Brendan O'Leary from ProjectDiscovery

06 Apr 2023

Contributed by Lukas

In this episode we are joined by Brendan O'Leary from ProjectDiscover we learn about the tools that hackers, bug bounty hunters, and red teams use...

Threat modeling in security with Audrey Long

29 Mar 2023

Contributed by Lukas

Have you ever wanted to threat model the death star from Star Wars? Well this is one of the many topics we discuss in the latest episode of the Securi...

Understanding and building the SOC (Security Operations Center) - With Troy Santana

16 Mar 2023

Contributed by Lukas

In this episode of The Security Repo we are joined again by Troy Santana from Critical Start to discuss how organizations can set up a Security Operat...

Staff augmentation in security with Troy Santana

07 Mar 2023

Contributed by Lukas

Staff augmentation is the idea of augmenting your internal staff with consultants and tools to give you the collective knowledge of security experts f...

Episode 6: Securing the development environment with Laurent Balmelli

21 Feb 2023

Contributed by Lukas

In this episode, we sit down with Laurent Balmelli, the CEO of Strong Network, to discuss why development environments are vulnerable to malicious act...

Episode 5: Product Lead Growth in Security with Ross Haleliuk

13 Feb 2023

Contributed by Lukas

Ross Haleliuk is a champion for Product Lead Growth (PLG) and in this episode sits down with Mackenzie Jackson to discuss how this concept has changed...

Episode 4: Understanding confidential computing & web assembly to build secure apps

06 Feb 2023

Contributed by Lukas

Nathaniel McCallum is the former CTO and co-founder of Profian and an expert in web assembly and confidential computing. This week on the security rep...

Epsiode 3: Implementing a DevSecOps approach to software development with Will Kelly

23 Jan 2023

Contributed by Lukas

In this episode, we invite Will Kelly to join Mackenzie and Dwyane in a conversation about implementing DevSecOps in software organizations. We tackle...

Episode 2: An Interview with a Cyborg Hacker - How are body modfications and changing the threat landscape

07 Sep 2022

Contributed by Lukas

Len Noe is both a white hack hacker and a pioneer in the transhuman movement. Current Len has 8 implants which he uses to enhance his offensive securi...

Episode 1 - A deep dive into supply chain risk

04 Jul 2022

Contributed by Lukas

This episode takes a deep dive into the issues all companies face with the software supply chain including open-source dependencies and the credential...

«« ← Prev Page 2 of 2