Ready to break free from mediocrity and become the warrior you’re called to be? Join Jose Arias, The Growth Coach, as he equips Christian men to face life’s challenges head-on. This isn’t just another podcast on personal growth; it’s a journey that fuses faith with powerful strategies for resilience, purpose, and impact. Dive into deep conversations, real-world insights, and scripture-backed wisdom to fuel your next level. If you’re ready to rise, lead, and conquer with God by your side, thi ...
…
continue reading
All things fantasy, science fiction, anime, gaming and nerd friendly topics to be explored. Come and have fun with me.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
I’ve created a new podcast. This is all about collective healing and liberation. Episode 1 is an introduction. I share the reason I started the podcast, I delve into the ways trauma and oppression have presented challenges and. material barriers to collective liberation, I call in spiritual teachers and all the practitioners of ”Love and Light” who are silent as we live through these most violent times, and I offer humanizing ideas and tangible ways we can put these ideas into practice. I cl ...
…
continue reading
The Poetry Gods are here to show you how to not be wack in 2016 & beyond. Interviews and stories about the people behind the poems. You don't have to love poetry to love the show. Hosted by Aziza Barnes, Jon Sands, and José Olivarez. Artwork by Jess X. Chen. If you dig the show, share the link.
…
continue reading
Coffee Upside Down is a podcast that inspires and educates listeners through candid conversations with coffee professionals and enthusiasts in New Orleans and beyond. Topics touched on are as diverse as our relationship to the beverage we love, but each is grounded by the fundamental ideals of Craft, Understanding, Positivity and Dedication. Join me in a lighthearted, entertaining journey of discovery that will encourage you to flip your perspective and engage in an ongoing process of positi ...
…
continue reading
Send us a text Mistakes—we all make them, and sometimes we wish we could undo them. But what if each stumble wasn’t a failure, but a stepping stone? In this episode, we dive into the power of embracing our mistakes as part of the warrior’s journey. Join Jose Arias as he explores how every misstep is an opportunity for growth, for wisdom, and for ri…
…
continue reading
1
Securing Human Access Through Privileged Access Management and Just In Time Access - Aria Langer
33:58
33:58
나중에 재생
나중에 재생
리스트
좋아요
좋아요
33:58
In this episode of the Security Repo Podcast, we take a look at the concepts around securing human identities in the enterprise. We talk about why passwords alone are not enough, why it is important to use multifactor authentication, and the dream 'golden path' of ephemeral just-in-time account creation and use. As always, we find out the best and …
…
continue reading
1
Embrace the Waiting: God’s Preparation for Your Breakthrough
3:58
3:58
나중에 재생
나중에 재생
리스트
좋아요
좋아요
3:58
Send us a text Ever feel like you’re stuck, just waiting for something to change? In this episode, we dive into the power of the waiting season—a time that feels quiet but is filled with purpose. Discover how God uses these moments to build your strength, deepen your faith, and prepare you for the opportunities ahead. Waiting isn’t wasted; it’s whe…
…
continue reading
1
Dare to Be Different: Embracing the Warrior’s Path to Greatness
3:33
3:33
나중에 재생
나중에 재생
리스트
좋아요
좋아요
3:33
Send us a text In this episode, we’re diving into the warrior’s path—a journey that defies comfort, challenges mediocrity, and calls for courage. If you’ve ever felt the urge to stand out, to push beyond the ordinary, this message is for you. We’ll explore why greatness requires sacrifice, resilience, and a willingness to be different, all rooted i…
…
continue reading
Send us a text Reflect and Rise – A Year in Review As we approach the end of 2024, it’s time to pause and reflect on the journey we’ve taken. In this episode, we’re diving deep into the power of looking back—not just to celebrate the highs but to uncover the lessons in the lows. Join me, Jose Arias, as we explore how God has been at work in every m…
…
continue reading
1
Undocumented Hacking - Applying Pentesting Skills To Navigating Bureaucracy - José Martinez
27:13
27:13
나중에 재생
나중에 재생
리스트
좋아요
좋아요
27:13
In this week's episode of the Security Repo Podcast, we dive into an unusual topic for the program, navigating the US immigration system and the challenges that many security professionals working in the US face. Join us as we discuss how to apply lessons from the world of pentesting to succeeding in the face of bureaucracy. We are joined by José A…
…
continue reading
In this week's episode of the Security Repo Podcast, we turn our attention to STIR/SHAKEN, a requirement for US cell phone carriers that has been implemented to stop SPAM robocalls. We also look at password policies and research into how to make better passwords. We are joined by Per Thorsheim. Per is the founder and main organizer of PasswordsCon,…
…
continue reading
1
Being a Lifeguard Instead of a Police Officer and Compliance Is NOT Security - David Hawthorne
31:05
31:05
나중에 재생
나중에 재생
리스트
좋아요
좋아요
31:05
In this episode of The Security Repo Podcast, we look at how we satisfy the goals of compliance and security, which might seem like they would be the same thing, yet are not. We are joined by David Hawthorne. David is a technology factotum with 20 years of experience across system administration, data and software architecture, and DevOps. As the D…
…
continue reading
1
From The Theory Of Constraints to Scorecard Patterns for Better Compliance - Justin Reock
44:36
44:36
나중에 재생
나중에 재생
리스트
좋아요
좋아요
44:36
In this episode of The Security Repo Podcast, we broach a wide variety of topics, ranging from The Theory of Constraints, source control horror stories, and using scorecards to drive cross-team success. We are joined by Justin Reock, the Head of Developer Relations for Cortex.io. He is an outspoken speaker, writer, and software practice evangelist.…
…
continue reading
1
Rotating Secrets At Scale, Automatically, and With High Availability - Kenton McDonough
35:29
35:29
나중에 재생
나중에 재생
리스트
좋아요
좋아요
35:29
In this episode of The Security Repo Podcast, we take a look at how to do secrets rotation in a highly available systems reliably. We are joined by Kenton McDonough. Kent got his MS in Computer Science from Virginia Tech in 2021 with a focus on systems and networking. He currently does security automation for Viasat Inc, a global Satellite internet…
…
continue reading
1
Countering Shadow IT Through Nudging Intervention - Garret Gross
28:35
28:35
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:35
In this episode of The Security Repo Podcast, let's talk about the largest IT threat outside of IT, and maybe out of the line of site of Security teams, Shadow IT. We are joined by Garrett Gross, a seasoned cybersecurity professional with over twenty years of experience. Garrett currently holds the position of Head of Product Success at Nudge Secur…
…
continue reading
1
What Does The Future Hold For The Security Repo Podcast? Some Changes & Introducing Our New Co-Host
0:59
0:59
나중에 재생
나중에 재생
리스트
좋아요
좋아요
0:59
We have had so much fun making The Security Repo Podcast, and we hope you have learned as much as we have along the way. The tides of change have finally reached our shore, and we are sad to announce the departure of Mackenzie Jackson, our original founder, producer, and co-host of the podcast, from our regular episodes. We wish him much success in…
…
continue reading
1
Data Loss Prevention and Stopping Breaches Before They Start
36:09
36:09
나중에 재생
나중에 재생
리스트
좋아요
좋아요
36:09
In this episode of The Security Repo Podcast, we explore all things Data Loss Prevention (DLP). We are joined by Daniel Jay, Senior Director of Product Management at GTB Technologies. We start with a quick high-level of the topic of Data Loss Prevention and how we met at the RSA Conference 2024. By the end, we turn the conversation to AI and balanc…
…
continue reading
1
Security Automation And Leveraging AI To Deal With Security At Scale - Huxley Barbee
39:32
39:32
나중에 재생
나중에 재생
리스트
좋아요
좋아요
39:32
In this episode of The Security Repo Podcast, we look at security automation and how we can engineer our way to better security overall. We are joined, once again by Huxley Barbee, who has been a fixture of the security community for over 20 years. Professionally, he was a security consultant working with customers in finance, insurance, manufactur…
…
continue reading
1
Developer Awareness Training and AI Assisted Tooling for Improving Security - Chris Lindsey
36:14
36:14
나중에 재생
나중에 재생
리스트
좋아요
좋아요
36:14
In this episode of The Security Repo Podcast, we take a look at the role developer training and awareness have in improving security.We are joined by Chris Lindsey, Application Security Evangelist at Mend.io. He is a seasoned speaker who has appeared at conferences, webinars, and private events. Chris draws on expertise from more than 15 years of d…
…
continue reading
1
Improving Your Security by Leveraging AI: The Arcanum Cyber Security Bot - Jason Haddix
46:40
46:40
나중에 재생
나중에 재생
리스트
좋아요
좋아요
46:40
In this episode of The Security Repo Podcast, we dive deep into how AI is helping the Red, Blue, and Purple teams and how we can leverage ChatGPT to stay ahead of attackers. We are joined once again by Jason Haddix Founder, CEO and Head of Training at Arcanum Information Security. He is also the creator of the Arcanum Cyber Security Bot:https://cha…
…
continue reading
1
DeepCover & DART Academy: Fighting Scammers Through Educating Seniors
31:17
31:17
나중에 재생
나중에 재생
리스트
좋아요
좋아요
31:17
In this episode of The Security Repo Podcast, we dive deep into a rather troubling phenomenon: scammers who target senior citizens. We are joined by Anita Nikolich, a speaker and a university-based cybersecurity researcher specializing in network security and cryptocurrency analytics. She joins us as the founder and co-principal Investigator of DAR…
…
continue reading
1
Mining for Vulnerabilities: Hidden Dangers of Open Buckets
42:48
42:48
나중에 재생
나중에 재생
리스트
좋아요
좋아요
42:48
In this episode of The Security Repo Podcast, we dive deep into a pervasive cybersecurity issue: open data buckets. Joined by Glen Helton, Director of Information Security at a major multinational and founder of the Sky Witness Project, we explore how improperly secured cloud storage—commonly known as "open buckets"—can expose sensitive data to the…
…
continue reading
1
The Frontline of Cybersecurity: Defending Against Supply Chain Intrusions - Jossef Harush Kadouri
44:38
44:38
나중에 재생
나중에 재생
리스트
좋아요
좋아요
44:38
In this episode of The Security Repo, we sit down with Jossef Harush Kadouri, a pioneer in software supply chain security and founder of Dustico, now part of Checkmarx. Jossef shares his journey from startup to acquisition, detailing the ever-evolving landscape of supply chain attacks. We explore how malicious actors are exploiting open-source ecos…
…
continue reading
1
Enhancing Security Through Community and Innovation - A Conversation with Avi Douglen
41:00
41:00
나중에 재생
나중에 재생
리스트
좋아요
좋아요
41:00
This episode we are joined by Avi Douglen, Founder and CEO of Bounce Security. Avi, a key figure in the security community and former OWASP chapter chair. The discussion covers the significance of OWASP, its resources, threat modeling and Avi's personal journey within the organization.Listeners will gain insights into the concept of value-driven th…
…
continue reading
1
Behind the Scenes of Offensive Security with Bobby Kuzma
33:56
33:56
나중에 재생
나중에 재생
리스트
좋아요
좋아요
33:56
Today we sit down with Bobby Kuzma, Director of Offensive Cyber Operations at Pro Circular and adjunct professor at the University of Washington. Bobby shares his unique journey into the world of penetration testing, including how he accidentally acquired his CISSP certification. We delve into the fascinating world of offensive security, discussing…
…
continue reading
1
Love Letters 2 Humanity: Episode 1 | Accountability (individually and collectively)
36:16
36:16
나중에 재생
나중에 재생
리스트
좋아요
좋아요
36:16
We're exploring accountability. Individual accountability and collective accountability. In this episode, I get real. I share two stories of harm I'm responsible for and introduce Mia Mingus' work on accountability. I share a bit about how I work toward accountability in my own life AND THEN I connect the conversation to our collective experiences.…
…
continue reading
1
Frameworks and Relationships: J Wolfgang Goerlich on Security Strategy
36:32
36:32
나중에 재생
나중에 재생
리스트
좋아요
좋아요
36:32
Today we welcome J Wolfgang Goerlich, an advisory CISO, mentor, and strategist. We delve into the intricacies of security design frameworks and the importance of building and maintaining relationships in the cybersecurity field. Wolfgang shares his expertise on creating effective security programs, fostering trust within teams, and navigating the c…
…
continue reading
1
Nuclear Security & Cyber Resilience: Insights from KPMG's Andrew Elliot
37:02
37:02
나중에 재생
나중에 재생
리스트
좋아요
좋아요
37:02
Today we dive into the fascinating world of nuclear energy and cybersecurity with Andrew Elliot, a senior manager at KPMG's cybersecurity team. Andrew shares his journey from a nuclear engineer to a cybersecurity expert, providing unique insights into the importance of security culture, the resurgence of nuclear energy, and the critical role of cyb…
…
continue reading
I've created a new podcast. This is all about collective healing and liberation. Episode 1 is an introduction. I share the reason I started the podcast, I delve into the ways trauma and oppression have presented challenges and. material barriers to collective liberation, I call in spiritual teachers and all the practitioners of "Love and Light" who…
…
continue reading
1
Securing the Future - The Art of Threat Modeling with Paul McCarty
32:50
32:50
나중에 재생
나중에 재생
리스트
좋아요
좋아요
32:50
In this episode of The Security Repo, we dive deep into the world of threat modelling with Paul McCarty, a veteran in the field of DevSecOps and founder of SecureStack. Paul shares his journey from being a Unix admin to working with high-profile organizations like NASA and GitLab. We explore the essentials of threat modeling, the significance of cl…
…
continue reading
1
Pen Testing in Academia - University Cybersecurity Challenges with JR Johnson
40:19
40:19
나중에 재생
나중에 재생
리스트
좋아요
좋아요
40:19
In this episode of The Security Repo, we dive into the fascinating world of cybersecurity with JR Johnson, a seasoned information security professional with over 14 years of experience. JR shares his journey from web development to penetration testing and cybersecurity consulting, highlighting the unique challenges faced by higher education institu…
…
continue reading
1
From Desktop Support to Red Team: Brendan Hohenadel Journey in Cybersecurity
40:14
40:14
나중에 재생
나중에 재생
리스트
좋아요
좋아요
40:14
Join us in this episode of The Security Repo Podcast as we dive into the world of cybersecurity with Brendan Honadle. From his humble beginnings in desktop support to becoming a skilled red teamer, Brendan shares his inspiring journey and fascinating stories from the field. Discover the strategies, tools, and techniques used in offensive security, …
…
continue reading
1
Navigating AI in Cybersecurity: Insights from Sonya Moisset
36:58
36:58
나중에 재생
나중에 재생
리스트
좋아요
좋아요
36:58
In this episode of The Security Repo, we are thrilled to welcome Sonya Moisset, a Senior Advocate at Snyk and a renowned expert in DevSecOps, cybersecurity, and AI. With a wealth of experience as a public speaker, mentor, and top contributor to the tech community, Sonya shares her deep insights into the evolving landscape of AI in cybersecurity. Jo…
…
continue reading
1
Securing Kubernetes Dashboards: Insights from Tremolo Security's CTO
39:47
39:47
나중에 재생
나중에 재생
리스트
좋아요
좋아요
39:47
In this episode of The Security Repo, Dwyane McDaniel and Marc Boorshtein delve into the intricacies of Kubernetes dashboard security. Marc, the CTO of Tremolo Security, brings his extensive experience in identity and access management to the table, discussing the challenges and best practices for securing Kubernetes dashboards. The conversation ex…
…
continue reading
1
The Secrets behind GitGuardian: Building a security platform with Eric Fourrier
45:39
45:39
나중에 재생
나중에 재생
리스트
좋아요
좋아요
45:39
Join us this week as we host Eric Fourrier, co-founder and CEO of GitGuardian. Discover the journey of GitGuardian from a side project to a leading code security platform. Eric shares insights on the startup's growth, the integration of AI in security, and the future of protecting digital assets. Tune in for an engaging discussion on advancing code…
…
continue reading
1
Solving Secret Zero: The Future of Machine Identities & SPIFFE with Mattias Gees
42:02
42:02
나중에 재생
나중에 재생
리스트
좋아요
좋아요
42:02
Today we dive into the challenges of securing modern IT infrastructures, focusing on "Secret Zero" and its implications for authentication practices. Our guest, Mattias Gees of Venify, discusses the SPIFFE framework and its role in transitioning from traditional security methods to dynamic workload identities. We explore practical strategies for im…
…
continue reading
1
Building secure platforms with Kubernetes: Bridging the DevOps-Security Divide with John Dietz
56:38
56:38
나중에 재생
나중에 재생
리스트
좋아요
좋아요
56:38
This week, we dive deep into the world of Kubernetes with John Dietz, co-founder of Kubefirst and a seasoned IT professional with over two decades of experience. John shares his extensive insights into the transformative power of Kubernetes and infrastructure as code (IaC) in modern cloud environments. Reflecting on his personal journey from skepti…
…
continue reading
1
Authorization vs. Authentication: Decoding the Layers of Security with Emre Baran
34:25
34:25
나중에 재생
나중에 재생
리스트
좋아요
좋아요
34:25
In this episode we dive deep into the world of authorization with Emre Baran, CEO and co-founder of Cerbos. As a seasoned entrepreneur and software expert, Emre brings over 20 years of experience to the table, discussing the subtle yet significant distinctions between authorization and authentication, and why these concepts are pivotal in today's c…
…
continue reading
1
Unpacking ASPM: Trends, Truths, and the Future of Security Tools
28:34
28:34
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:34
In this engaging episode of "The Security Repo," host Dwayne McDaniel and esteemed guest Rachel Stephens, delve into the rapidly evolving world of security tooling, with a special focus on the buzz around Application Security Posture Management (ASPM). They tackle the complexities and confusions surrounding the burgeoning category of security solut…
…
continue reading
1
Decoding Security: An Analyst's Perspective on Trends and Tools
31:05
31:05
나중에 재생
나중에 재생
리스트
좋아요
좋아요
31:05
In this episode of The Security Repo podcast, we dive deep into the evolving landscape of security within software development with our guest, Rachel Stephens, a senior analyst at RedMonk. Rachel sheds light on the broader implications of the "shift left" movement, emphasizing the integration of security practices throughout the entire software dev…
…
continue reading
1
Building Conferences and Communities in Cybersecurity with Huxley Barbee
42:40
42:40
나중에 재생
나중에 재생
리스트
좋아요
좋아요
42:40
This week, join us as we sit down with Huxley Barbee, the lead organizer of B-Sides New York City and a security evangelist at RunZero. With over two decades of experience as a software engineer and security consultant, Huxley shares his profound insights and journey through the evolving landscape of cybersecurity.From his early days attending DefC…
…
continue reading
1
The Evolution of DevSecOps: Strategies for Integrating Security into DevOps with Gregory Zagraba
36:37
36:37
나중에 재생
나중에 재생
리스트
좋아요
좋아요
36:37
This episode of The Security Repo Podcast features an insightful discussion with Gregory Zagraba on the challenges and strategies of integrating security practices within the DevOps landscape. Covering the evolution of DevOps, the emergence of DevSecOps, and the importance of a culture shift in large organizations, the conversation delves into prac…
…
continue reading
1
Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas
34:39
34:39
나중에 재생
나중에 재생
리스트
좋아요
좋아요
34:39
In this episode of the Security Repo podcast, listeners will dive into the intriguing world of hacking the hackers with Vangelis Stykas. Stykas, a notable figure in cybersecurity, shares his experiences and methodologies for compromising C2 servers—central nodes used by hackers to control malware-infected computers. He reveals how simple web applic…
…
continue reading
In this episode, we delve into the mind of Erik Cabetas, a renowned figure in offensive security and Defcon CTF winner. Erik shares his unique journey from hacking to offensive security, detailing the critical turning points that shaped his career. Together with Mackenzie and Dwayne, Eric discusses the evolution of security practices, the importanc…
…
continue reading
1
From Bank Heists to Security Insights: The Jayson E. Street Story
55:19
55:19
나중에 재생
나중에 재생
리스트
좋아요
좋아요
55:19
In this episode of The Security Repo, Jayson E. Street delves into his unconventional journey into cybersecurity, emphasizing the essence of hacking as a manifestation of curiosity rather than mere technical skill. He shares anecdotes from his extensive experience in ethical hacking, including bank heists and corporate security breaches, to undersc…
…
continue reading
1
Reducing the noise: Cutting through the data in security Buck Bundhund
40:05
40:05
나중에 재생
나중에 재생
리스트
좋아요
좋아요
40:05
In this episode of "The Security Repo," hosts Dwayne McDaniel and Mackenzie Jackson delve into the intricate world of cybersecurity with Buck Bundhund, an expert from Centripetal Networks. The conversation kicks off with an exploration of the pervasive issue of data noise – the influx of non-intended data into organizational networks, posing signif…
…
continue reading
1
Solving the bottom turtle: Fixing the authentication problem with Ethan Heilman
34:00
34:00
나중에 재생
나중에 재생
리스트
좋아요
좋아요
34:00
In security you have likely heard the expression turtles all the way down, the concept the world is held up on the back of a turtle who is standing on the back other another turtle, and so on.. This can be used to describe the current state of security, where everything can dramatically fall over if the bottom turtle fails. In this episode, we disc…
…
continue reading
1
The right tool for the job: Finding and evaluating security tools with James Berthoty
41:44
41:44
나중에 재생
나중에 재생
리스트
좋아요
좋아요
41:44
In this episode, James Berthoty shares insights into his project, Latio Tech, which provides a comprehensive list of cloud security tools and resources. James highlights the challenges of vendor assessments and the importance of bridging knowledge gaps in cloud security. He also shares trends in the security tooling industry and offers advice for s…
…
continue reading
1
Securing our APIs - Thinking differently about API Security with Isabelle Mauny
43:52
43:52
나중에 재생
나중에 재생
리스트
좋아요
좋아요
43:52
In this episode, Mackenzie and Dwayne dive into a discussion on API security with special guest Isabelle Mauny, co-founder and CTO of 42Crunch. We walk through the differences API security has compared with traditional application security, and its growing importance in today's technology landscape. We also have a discussion about the challenges an…
…
continue reading
1
Revolutionizing SAST: Bridging the Gap for Modern Developers with Nipun Gupta
28:43
28:43
나중에 재생
나중에 재생
리스트
좋아요
좋아요
28:43
In this episode of The Security Repo, Mackenzie Jackson sits down with Nipun Gupta, the Chief Operating Officer of Bearer, a leading security company at the forefront of innovation in the cybersecurity landscape. Join us as we delve deep into the world of Static Application Security Testing (SAST) and explore why traditional SAST tools are struggli…
…
continue reading
1
API Security Unveiled: Safeguarding the Heart of Modern Applications
30:33
30:33
나중에 재생
나중에 재생
리스트
좋아요
좋아요
30:33
In this episode of "The Security Repo," your hosts Mackenzie Jackson and Dwayne McDaniel are joined by a distinguished guest, Dan Barahona, as they embark on an eye-opening exploration of API security. As the digital landscape evolves at breakneck speed, APIs (Application Programming Interfaces) have become the backbone of modern applications, maki…
…
continue reading
1
Guarding Against Deception: The Art of Detecting and Defending Against Social Engineering
32:48
32:48
나중에 재생
나중에 재생
리스트
좋아요
좋아요
32:48
In this episode of The Security Repo, your hosts Mackenzie Jackson and Dwyane McDaniel are joined by the brilliant Reanna Schultz, a seasoned expert in the field of cybersecurity. Together, they delve deep into the world of social engineering, exploring what it is, how to detect it, and crucially, how to arm your staff against its deceptive tactics…
…
continue reading
1
Contextual Security: Revolutionizing Developer-Focused Cybersecurity with James Wickett
33:28
33:28
나중에 재생
나중에 재생
리스트
좋아요
좋아요
33:28
In this eye-opening episode of The Security Repo, we welcome James Wickett, the CEO and co-founder of DryRun Security, a visionary in the realm of cybersecurity. James unveils a groundbreaking concept known as "Contextual Security," a game-changer that empowers developers with unprecedented security insights while they write code.As our hosts and c…
…
continue reading
1
Mastering Physical Security: Unveiling the Secrets with Brice Self
35:13
35:13
나중에 재생
나중에 재생
리스트
좋아요
좋아요
35:13
In this captivating episode of The Secuerity Repo, we delve into the world of physical security with our esteemed guest, Brice Self. With over a decade of experience in the field, Brice brings a wealth of knowledge and real-world insights to the table.This episode takes a deep dive into the intricate aspects of physical security, particularly in hi…
…
continue reading