The Security Repo
Episodes
The right tool for the job: Finding and evaluating security tools with James Berthoty
24 Jan 2024
Contributed by Lukas
In this episode, James Berthoty shares insights into his project, Latio Tech, which provides a comprehensive list of cloud security tools and resource...
Securing our APIs - Thinking differently about API Security with Isabelle Mauny
17 Jan 2024
Contributed by Lukas
In this episode, Mackenzie and Dwayne dive into a discussion on API security with special guest Isabelle Mauny, co-founder and CTO of 42Crunch. We wal...
Revolutionizing SAST: Bridging the Gap for Modern Developers with Nipun Gupta
10 Jan 2024
Contributed by Lukas
In this episode of The Security Repo, Mackenzie Jackson sits down with Nipun Gupta, the Chief Operating Officer of Bearer, a leading security company ...
API Security Unveiled: Safeguarding the Heart of Modern Applications
20 Dec 2023
Contributed by Lukas
In this episode of "The Security Repo," your hosts Mackenzie Jackson and Dwayne McDaniel are joined by a distinguished guest, Dan Barahona, ...
Guarding Against Deception: The Art of Detecting and Defending Against Social Engineering
15 Dec 2023
Contributed by Lukas
In this episode of The Security Repo, your hosts Mackenzie Jackson and Dwyane McDaniel are joined by the brilliant Reanna Schultz, a seasoned expert i...
Contextual Security: Revolutionizing Developer-Focused Cybersecurity with James Wickett
08 Dec 2023
Contributed by Lukas
In this eye-opening episode of The Security Repo, we welcome James Wickett, the CEO and co-founder of DryRun Security, a visionary in the realm of cyb...
Mastering Physical Security: Unveiling the Secrets with Brice Self
04 Dec 2023
Contributed by Lukas
In this captivating episode of The Secuerity Repo, we delve into the world of physical security with our esteemed guest, Brice Self. With over a decad...
Secrets inside packages, scanning Python PyPi for credentials with Tom Forbes
03 Nov 2023
Contributed by Lukas
In this episode, we sit down with Tom Forbes to discuss his 'side project gone wrong' and how he found live AWS credentials inside many Python...
Artificial intelligence, a friend or foe in cyber security - with Simon Maple from Snyk
19 Oct 2023
Contributed by Lukas
With the rapid development of AI we are often left wondering if AI is our friend or foe in security. In this episode, I sit down with Simon Maple from...
Scaling security and AppSec in fast moving enterprises with Jeevan Singh
11 Oct 2023
Contributed by Lukas
Application security can be a difficult task at all levels of a company. But as a start-up grows into an enterprise, or existing companies evolve. How...
Enterprise Software Distribution - Managing updates and security in enterprise software at scale
09 Oct 2023
Contributed by Lukas
One of the many advantages of the cloud revolution is that SaaS products are continuously updated, security issues are patched quickly, and it's s...
Securing data in a world of AI with Jeremiah Jeschke
17 Sep 2023
Contributed by Lukas
Many companies are banning AI systems like ChatGPT to prevent data from being leaked, but is that a viable solution? We sit down with Jeremiah Jeschke...
Getting boardroom buy-in for security - CISO conversations with Walt Powell
04 Sep 2023
Contributed by Lukas
Getting funding to build effective security programs is challenging and often it fails because security leaders are not telling the boardroom the righ...
Social engineering, phishing and building grass roots communities with Dan and Ken
03 Aug 2023
Contributed by Lukas
In this episode, we sit down with Daniel Niefeld and Kenneth Nevers to talk about their journey into security, creating security conferences and build...
Code signing and securing the software supply chain with Billy Lynch
27 Jul 2023
Contributed by Lukas
In this episode, we go on a deep dive with Billy Lynch from Chainguard into application and code signing and how it can be used to ensure the supply c...
Getting started in AppSec with Tanya Janca SheHacksPurple
10 Jul 2023
Contributed by Lukas
In this episode, we sit down with Tnaya Janca and discuss her journey from being a developer for government agencies to becoming one of the most recog...
Securing the remote workforce, the future of cloud development environments
14 Jun 2023
Contributed by Lukas
In this episode, we sit down with Vedran Jukic, co-founder and CTO of Code Anywhere and Tomma Pulljak Senior Developer at Code Anywhere to talk about ...
Understanding digital forensics with Desi - A deep dive post breach investigations
23 May 2023
Contributed by Lukas
In this episode we sit down with Desi who is an expert in digital forensics. We explore exactly what digital forensics is, how it can be used to catch...
The hacker in the board room: The journey from hacker to CISO with Jason Haddix
09 May 2023
Contributed by Lukas
Have you ever wanted to know how to hack a bank? If so this is the episode for you (disclaimer, please don't hack banks). Jason Haddix is someon...
Security landscape in 2023 : Insights from the ground at RSA (Special Edition Episode)
06 May 2023
Contributed by Lukas
In this special edition episode, we tracked down a few of the key thought leaders in cyber security around the RSA conference to ask them what they th...
Modern ransomware: How hackers are targeting your organization with Adriel Disatel and Noah Tongate
03 May 2023
Contributed by Lukas
In this episode we sit down with legendary pen tester Adriel Disatel and Noah Tongate to discuss how modern cyber criminals are operating to deploy mo...
Understanding intent based access control with Uri Sarid
24 Apr 2023
Contributed by Lukas
In this episode of the Security Repo we dive into intent-based access control. This is the concept of limiting access to just what is intended, it sou...
Multi Factor Authentication for APIs with Anusha Iyer
10 Apr 2023
Contributed by Lukas
APIs are what run the internet today, modern applications are no long monoliths, they are built upon hundreds of microservices and APIs are the glue t...
Offensive security tools with Brendan O'Leary from ProjectDiscovery
06 Apr 2023
Contributed by Lukas
In this episode we are joined by Brendan O'Leary from ProjectDiscover we learn about the tools that hackers, bug bounty hunters, and red teams use...
Threat modeling in security with Audrey Long
29 Mar 2023
Contributed by Lukas
Have you ever wanted to threat model the death star from Star Wars? Well this is one of the many topics we discuss in the latest episode of the Securi...
Understanding and building the SOC (Security Operations Center) - With Troy Santana
16 Mar 2023
Contributed by Lukas
In this episode of The Security Repo we are joined again by Troy Santana from Critical Start to discuss how organizations can set up a Security Operat...
Staff augmentation in security with Troy Santana
07 Mar 2023
Contributed by Lukas
Staff augmentation is the idea of augmenting your internal staff with consultants and tools to give you the collective knowledge of security experts f...
Episode 6: Securing the development environment with Laurent Balmelli
21 Feb 2023
Contributed by Lukas
In this episode, we sit down with Laurent Balmelli, the CEO of Strong Network, to discuss why development environments are vulnerable to malicious act...
Episode 5: Product Lead Growth in Security with Ross Haleliuk
13 Feb 2023
Contributed by Lukas
Ross Haleliuk is a champion for Product Lead Growth (PLG) and in this episode sits down with Mackenzie Jackson to discuss how this concept has changed...
Episode 4: Understanding confidential computing & web assembly to build secure apps
06 Feb 2023
Contributed by Lukas
Nathaniel McCallum is the former CTO and co-founder of Profian and an expert in web assembly and confidential computing. This week on the security rep...
Epsiode 3: Implementing a DevSecOps approach to software development with Will Kelly
23 Jan 2023
Contributed by Lukas
In this episode, we invite Will Kelly to join Mackenzie and Dwyane in a conversation about implementing DevSecOps in software organizations. We tackle...
Episode 2: An Interview with a Cyborg Hacker - How are body modfications and changing the threat landscape
07 Sep 2022
Contributed by Lukas
Len Noe is both a white hack hacker and a pioneer in the transhuman movement. Current Len has 8 implants which he uses to enhance his offensive securi...
Episode 1 - A deep dive into supply chain risk
04 Jul 2022
Contributed by Lukas
This episode takes a deep dive into the issues all companies face with the software supply chain including open-source dependencies and the credential...