Barco 公開
[search 0]
もっと

Download the App!

show episodes
 
B
BarCode

1
BarCode

Chris Glanden

Unsubscribe
Unsubscribe
月ごとの+
 
Cybersecurity with 1337% ABV. BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. Due to COVID-19 restrictions, most bars are limited or closed for on-prem service. Therefore, each episode will feature Tony, a virtual bartender who wi ...
 
B
Barcoding

1
Barcoding

Paulien & Arnout

Unsubscribe
Unsubscribe
月ごとの
 
At Barcoding we share our knowledge as software developers. As passionate developers, we sometimes cannot stop talking about it. Especially during Friday night drinks, we tend to discuss a lot about the challenges we faced during the week. We try to capture these talks and to share them. The podcast is made by Paulien van Alst and Arnout Rijpkema.
 
Hello there and welcome to our new service industry podcast BarCode TSI, where we discuss all things service industry related. We interview bartenders, servers, managers, and owners of bars, restaurants, nightclubs, and more. Our purpose is to shed some light on topics we all run into while doing our job. Some are fun, and some are hideous, but all are relevant to what we do on a daily basis. Even when we’re off the clock trying to enjoy our own time being served, we still end up busing our ...
 
Loading …
show series
 
The US government and military have recently confirmed investigations and sightings of UFOs, reigniting the phenomenon of aliens among us. Ironically, an unidentified spaceship descends into BarCode, and official contact is made. Sherri Davidoff is the CEO of LMG Security and the author of “Data Breaches.” She is a recognized expert in cybersecurit…
 
In recent years, there has been significant consumer demand for instant payments through their mobile phones. Unfortunately, the security aspect of mobile NFC payments has been ignored and mobile wallet theft is real threat. Timur Yunusov is a Security Expert in the area of payment security and application security, one of the organizers of Payment…
 
At this moment, more than 70% of us are currently compromised by cybersecurity attacks that we underplay, ignore, or simply aren’t aware of because of their hyper-stealthy and invisible nature. In fact, most individuals and businesses will have been compromised for more than 3 years before they realize what’s happened. It's vital to help other's un…
 
Predicted to be a $20 Billion cybercrime empire by the end of 2021, Ransomware is impacting businesses like never before… resulting in loss of revenue, reputation, and resources for organizations of all types. To put things in perspective, it is reported that an attack hits once every 11 seconds, and as if that stat isn’t hard enough to fathom, it’…
 
Organizations are increasingly adopting a Zero Trust model, which is based on the philosophy that there should be no implicit trust in a corporate network. Rooted in the principle of “Never Trust, Always Verify”, Zero Trust is designed to protect modern digital environments against successful data breaches. While it has existed for over a decade, Z…
 
Engines require three vital elements to generate power: AIR, SPARK, and FUEL. If any of these three elements aren’t present, the engine will struggle to function or even start. Fuel injectors are a vital part of a complex system that delivers the fuel to an engine, so it’s a critical component for ensuring successful ignition. In the startup world,…
 
A former data scientist at Facebook, Sophie Zhang was tasked with investigating “fake engagements” although instead, discovered global political manipulation and opposition harassment in 25 countries. She was fired from Facebook in September 2020, after declining a $64,000 severance package attached to an NDA, restricting her ability to speak publi…
 
A former data scientist at Facebook, Sophie Zhang was tasked with investigating “fake engagements” although instead, discovered global political manipulation and opposition harassment in 25 countries. She was fired from Facebook in September 2020, after declining a $64,000 severance package attached to an NDA, restricting her ability to speak publi…
 
nu·cle·us /n/ : the central and most important part of an object, movement, or group, forming the basis for its activity and growth. Having a nucleus to your Threat and Vulnerability Management Program is critical, as well as having an established TVM program itself. In this episode, I chat with Scott Kuffer, co-founder and COO of Nucleus Security.…
 
Jacob Horne is the Managing Director at DEFCERT where he specializes in DFARS and CMMC level three compliance for manufacturers in the Defense Industrial Base. As a former NSA intelligence analyst and U.S. Navy cryptologic technician, Jacob has over 14 years of experience in offensive and defensive cybersecurity operations. As a civilian he has led…
 
William Lin became an avid technology enthusiast after building his very first computer in elementary school and then began experimenting with the latest venture-backed consumer business models in his spare time. He is now Managing Director and a founding team member at ForgePoint Capital, a VC firm focused on cybersecurity startups. he has worked …
 
Dr. Matthew Canham is the CEO of Beyond Layer 7 (a cybersecurity consulting firm specializing in human security and data analytics), and a Research Professor of Cybersecurity at the Institute of Simulation and Training, University of Central Florida. Previously, as a federal investigator, Dr. Canham investigated cybercrimes, intellectual property t…
 
Re-running this great chat with Ron Gula from the early days! A fierce visionary, Ron Gula has redefined the security landscape and continues to do so. From co-creating Tenable, developing Dragon IDS, and now serving as President of Gula Tech Adventures, his incredible story is far from over. He joins me at the bar to discuss the conception of Tena…
 
The quickly growing field of vendors in cybersecurity getting attention of security leaders is becoming more difficult by the day. The fatigue of the continuous vendor attempts to fill up their time is very real. Getting your solution seen and even getting a few minutes with these leaders requires a tactical and strategic approach and proving your …
 
Brazilian Jiu-Jitsu (BJJ) is extremely difficult to master since it goes against conventional thinking. It is procedural and it is technical. While in combat, chaos ensues although the fighters must stay laser focused. Just as one needs to apply the proper technique in BJJ, cybersecurity professionals must find ways to creatively apply their techni…
 
Cyber threats still exist in the sky. Therefore, security controls within the Aviation industry is needed to protect the aircraft vessel, as well as it’s interconnected technology. Past investigations performed by hackers, researchers, and flight authorities have cast doubt on the industry’s perceived culture of safety. The need to address the nove…
 
Paul Asadoorian is a security veteran that has spent time “in the trenches” implementing comprehensive security programs across a wide array of industries. A proven cybersecurity leader and innovator, Paul founded “Security Weekly” – a podcast network providing free knowledge for the entire security community to benefit from. As former Product Evan…
 
John Sileo left hi-tech consulting and became an entrepreneur to reclaim his greatest priority – being present, every day, for his wife Mary and their dream of starting a family. Six successful years, a $2M business and two precious daughters later, he lost it all to cybercrime. Because the cybercriminal, a company insider, masked the crimes using …
 
Videogame studios are under serious attack, partly because they don't need to adhere to the same security requirements and regulatory demands as more prominent industries. From an attacker's viewpoint, it's very lucrative. Not only are game developers at risk for attack, so are the gamers themselves. Access to one's XBOX LIVE account, or game profi…
 
"AM I NEXT???" That's a question CEOs WORLDWIDE are asking themselves. Recent Ransomware attacks on JBS and the Colonial Pipeline have certainly elevated alert levels, although Ransomware remains an industry plague. With seemingly no end in sight, the attacks continue to cripple businesses while making its perpetrators millionaires. Aviv Grafi is C…
 
Joe Grand is an electrical engineer, hardware hacker, product designer and the founder of Grand Idea Studio, Inc. He specializes in creating, exploring, manipulating, and teaching about electronic devices. Also known as Kingpin, Joe was a member of the legendary hacker group L0pht Heavy Industries, where he helped raise awareness of the hacker etho…
 
At this moment, more than 70% of us are currently compromised by cybersecurity attacks that we underplay, ignore, or simply aren’t aware of because of their hyper-stealthy and invisible nature. In fact, most individuals and businesses will have been compromised for more than 3 years before they realize what’s happened. It's vital to help other's un…
 
Daniel Stenberg started working on curl (HttpGet back then) in the late 1990s and made it to the widely used tool which it is now. In this episode, Arnout and Paulien ask him about how he set up this opensource project, what he encountered during his journey and much more!
 
In Cybersecurity, we aim to protect the most valuable assets. In the games of chess, that asset is the king. Developing a successful chess strategy requires time, effort, and patience. There is also no universal strategy, and every move a player makes is crucial. In this episode, the iconic Security Blogger and co-host of the popular Smashing Secur…
 
Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. At one point in time, the Social Security number was described as the skeleton key needed to unlock theft of your assets, your identity, and…
 
A Flying Fish will leap out of the water and use its winglike pectoral fins to glide over the surface. Then, once below the surface, it is out of site and flows amongst the others in different directions until it appears above water again. Rohan Light is an expert on governance, strategy and risk capability throughout the data, evidence and decisio…
 
Social engineering is the art of exploiting human psychology. There is no perimeter defense for this method of infiltration. Known as the “People Hacker”, Jenny Radcliffe has spent a lifetime learning how to use the human element to gain access to the buildings, data and information, and the things we would wish to keep private. Her main objective …
 
Nato Riley takes what others know to be true and is still able to find something hidden below the surface. It’s a mind frame that proves that seeing the invisible is not impossible. Equipped with true XRAY Vision, Nato joins me at the bar to discuss DevSecOps beyond the SDLC, Security Maturity, his homegrown "Olympiad" SIEM, Man VS Machines, and th…
 
The 2020 Xfinity Cyber Health Report cites an estimate that 854 million connected-home devices will be shipped by manufacturers in 2020, with that number is projected to grow to nearly 1.4 billion by 2024. Most of the consumers of these products don’t realize is that once a smart devices goes online, it poses serious security risks. Tony Reinert ma…
 
The major cause of insecurity is the lack of secure software development practices. It’s crucial to understand the importance of security within the SDLC. Jim Manico is the founder of MANICODE Security where he trains software developers on secure coding and security engineering. He stops by BarCode to help us define “DevSecOps”, building an Effect…
 
Overseeing security and privacy challenges in COVID era is an extremely difficult task—and it’s even more complicated if you’re a Healthcare CISO. You must monitor the vital signs of your security program while keeping the pulse on threat vectors and adversaries. Anahi Santiago meets with me at the bar to discuss being a CISO during the pandemic, m…
 
The great Philosopher Seneca once said "While we teach, we learn”. The Protege Effect states that the best way to learn is to teach someone else. This powerful theory is further explained by cybersecurity leader and mentor, Naomi Buckwalter during her stop at Barcode. We also get into topics such as cybersecurity mentoring, privacy post-pandemic, c…
 
Data is always the main target in an attacker’s scope. Therefore, organization’s should take a “data first” approach to preventing a strike that could cripple them with one shot. I catch up with Purandar Das, Founder and CEO of Sotero, to discuss his data protection strategy. Purandar started Sotero with the conviction that today’s data protection …
 
In this episode, Arnout and Paulien are talking with Julien Ponge, author of "Vert.x in Action" published by Manning Publications, about reactive programming in the real world. What are the dos and don'ts? Should we be afraid of programming with reactive frameworks? Julien is reassuring and explaining to us how useful reactive programming can be! M…
 
Debbie Reynolds, AKA “The Data Diva,” is a world-renowned technologist, thought leader and advisor to multinational corporations for handling global data privacy, cyber data breach response, and complex cross-functional data-driven projects. She's also an internationally published author, highly sought-after speaker, and top media presence for glob…
 
nu·cle·us /n/ : the central and most important part of an object, movement, or group, forming the basis for its activity and growth. Having a nucleus to your Threat and Vulnerability Management Program is critical, as well as having an established TVM program itself. In this episode, I chat with Scott Kuffer, co-founder and COO of Nucleus Security.…
 
An aviator is an expert of the skies and must know how to properly navigate through clouds. Fully understanding cloud formations and their potential dangers when flying is a vital part their profession. Flying through clouds is just like driving through fog – little visibility can represent extreme danger for those unaware of the circumstance. To h…
 
Often, data goes Absent Without Official Leave. No one within the organization grants it permission to vacate the premises. How do organizations protect and secure their data and stay ahead of the bad actors? A data breach is the intentional or unintentional release of private/confidential information to an untrusted environment. It's extremely cru…
 
Continuous Integration and Continuous Delivery are seen as the highway to production. Both are most often employed together and seen as the best way to go fast to production. What are they and what are the benefits and risks? Paulien and Arnout discuss their experiences and views on this DevOps best practice.…
 
To defend against modern day hackers, you must train your mind to think like one. Ted Harrington is the author of "HACKABLE: How To Do Application Security Right", which is an Amazon BEST SELLER in 9 Categories. He is also Executive Partner at Independent Security Evaluators (ISE), the security organization famous for hacking everything from cars t…
 
A "Suplex" is an offensive move used in wrestling by which an attacker uses his weight to throw a defender. Phillip Wylie’s unusual journey into the field of cybersecurity is preceded by his career as a powerlifter and pro wrestler for the WCW. He has since taken full control in the industry as an offensive security professional. He is an establish…
 
HD Moore, famed developer of the wildly used Metasploit penetration testing tool spoke with me about his current focus, RUMBLE, in addition to his perspective on bug bounty programs, advice for aspiring pentesters and more. Of course, we also discussed the happening bar scene in Austin TX and how the city has become known as Silicon Hills. Tony the…
 
Communication is a difficult skill to master. As software engineers communication is important, but so often underestimated. In this episode Paulien and Arnout invite Annyce Davis to share her tips and tricks about getting to know your remote colleagues, reviewing pull requests and much more.
 
Grayson Milbourne is the Security Intelligence Director for Webroot, Inc., an OpenText company that focuses on endpoint security and threat intelligence. He joins me at the bar to discuss new and emerging threats, securing our homes during the COVID era, IoT security and cybersecurity trends we should expect to develop in 2021 and beyond. Deepfake …
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login