What's the next Byte to come out of the Bucket? Bucket Bytes is a light-spirited show with a small group of friends who are excited to bring you into the conversation. Streamed live on Twitch - we showcase a variety of topics and discussions as we pull the Bytes out of the Bucket including games, tech, pop-culture, current events, mental-health, and much more. We also have a variety of guests from different industries such as content creators, business owners, and more! What's going to come ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Get ready to imagine things in a way most are to afraid to even consider. Hosted by the Author of four watershed books, this one-of-a-kind show gets to the bottom of a whole bunch of questions. James R. Brayshaw is a Canadian firefighter who has poured some cold water on Satan and the fire of Hell. Brayshaw heads up the assault on the idea of a supernatural Satan with scads of biblical reasoning. As the author of Imagine There's No Satan, Satan Christianity's Other God, and the much anticipa ...
…
continue reading
1
Improving Your Security by Leveraging AI: The Arcanum Cyber Security Bot - Jason Haddix
46:40
46:40
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
46:40
In this episode of The Security Repo Podcast, we dive deep into how AI is helping the Red, Blue, and Purple teams and how we can leverage ChatGPT to stay ahead of attackers. We are joined once again by Jason Haddix Founder, CEO and Head of Training at Arcanum Information Security. He is also the creator of the Arcanum Cyber Security Bot:https://cha…
…
continue reading
1
DeepCover & DART Academy: Fighting Scammers Through Educating Seniors
31:17
31:17
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:17
In this episode of The Security Repo Podcast, we dive deep into a rather troubling phenomenon: scammers who target senior citizens. We are joined by Anita Nikolich, a speaker and a university-based cybersecurity researcher specializing in network security and cryptocurrency analytics. She joins us as the founder and co-principal Investigator of DAR…
…
continue reading
1
Mining for Vulnerabilities: Hidden Dangers of Open Buckets
42:48
42:48
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
42:48
In this episode of The Security Repo Podcast, we dive deep into a pervasive cybersecurity issue: open data buckets. Joined by Glen Helton, Director of Information Security at a major multinational and founder of the Sky Witness Project, we explore how improperly secured cloud storage—commonly known as "open buckets"—can expose sensitive data to the…
…
continue reading
1
The Frontline of Cybersecurity: Defending Against Supply Chain Intrusions - Jossef Harush Kadouri
44:38
44:38
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
44:38
In this episode of The Security Repo, we sit down with Jossef Harush Kadouri, a pioneer in software supply chain security and founder of Dustico, now part of Checkmarx. Jossef shares his journey from startup to acquisition, detailing the ever-evolving landscape of supply chain attacks. We explore how malicious actors are exploiting open-source ecos…
…
continue reading
1
Enhancing Security Through Community and Innovation - A Conversation with Avi Douglen
41:00
41:00
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
41:00
This episode we are joined by Avi Douglen, Founder and CEO of Bounce Security. Avi, a key figure in the security community and former OWASP chapter chair. The discussion covers the significance of OWASP, its resources, threat modeling and Avi's personal journey within the organization.Listeners will gain insights into the concept of value-driven th…
…
continue reading
1
Behind the Scenes of Offensive Security with Bobby Kuzma
33:56
33:56
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
33:56
Today we sit down with Bobby Kuzma, Director of Offensive Cyber Operations at Pro Circular and adjunct professor at the University of Washington. Bobby shares his unique journey into the world of penetration testing, including how he accidentally acquired his CISSP certification. We delve into the fascinating world of offensive security, discussing…
…
continue reading
1
Frameworks and Relationships: J Wolfgang Goerlich on Security Strategy
36:32
36:32
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
36:32
Today we welcome J Wolfgang Goerlich, an advisory CISO, mentor, and strategist. We delve into the intricacies of security design frameworks and the importance of building and maintaining relationships in the cybersecurity field. Wolfgang shares his expertise on creating effective security programs, fostering trust within teams, and navigating the c…
…
continue reading
1
Nuclear Security & Cyber Resilience: Insights from KPMG's Andrew Elliot
37:02
37:02
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
37:02
Today we dive into the fascinating world of nuclear energy and cybersecurity with Andrew Elliot, a senior manager at KPMG's cybersecurity team. Andrew shares his journey from a nuclear engineer to a cybersecurity expert, providing unique insights into the importance of security culture, the resurgence of nuclear energy, and the critical role of cyb…
…
continue reading
1
Securing the Future - The Art of Threat Modeling with Paul McCarty
32:50
32:50
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
32:50
In this episode of The Security Repo, we dive deep into the world of threat modelling with Paul McCarty, a veteran in the field of DevSecOps and founder of SecureStack. Paul shares his journey from being a Unix admin to working with high-profile organizations like NASA and GitLab. We explore the essentials of threat modeling, the significance of cl…
…
continue reading
1
Pen Testing in Academia - University Cybersecurity Challenges with JR Johnson
40:19
40:19
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
40:19
In this episode of The Security Repo, we dive into the fascinating world of cybersecurity with JR Johnson, a seasoned information security professional with over 14 years of experience. JR shares his journey from web development to penetration testing and cybersecurity consulting, highlighting the unique challenges faced by higher education institu…
…
continue reading
1
From Desktop Support to Red Team: Brendan Hohenadel Journey in Cybersecurity
40:14
40:14
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
40:14
Join us in this episode of The Security Repo Podcast as we dive into the world of cybersecurity with Brendan Honadle. From his humble beginnings in desktop support to becoming a skilled red teamer, Brendan shares his inspiring journey and fascinating stories from the field. Discover the strategies, tools, and techniques used in offensive security, …
…
continue reading
1
Navigating AI in Cybersecurity: Insights from Sonya Moisset
36:58
36:58
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
36:58
In this episode of The Security Repo, we are thrilled to welcome Sonya Moisset, a Senior Advocate at Snyk and a renowned expert in DevSecOps, cybersecurity, and AI. With a wealth of experience as a public speaker, mentor, and top contributor to the tech community, Sonya shares her deep insights into the evolving landscape of AI in cybersecurity. Jo…
…
continue reading
1
Securing Kubernetes Dashboards: Insights from Tremolo Security's CTO
39:47
39:47
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
39:47
In this episode of The Security Repo, Dwyane McDaniel and Marc Boorshtein delve into the intricacies of Kubernetes dashboard security. Marc, the CTO of Tremolo Security, brings his extensive experience in identity and access management to the table, discussing the challenges and best practices for securing Kubernetes dashboards. The conversation ex…
…
continue reading
1
The Secrets behind GitGuardian: Building a security platform with Eric Fourrier
45:39
45:39
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
45:39
Join us this week as we host Eric Fourrier, co-founder and CEO of GitGuardian. Discover the journey of GitGuardian from a side project to a leading code security platform. Eric shares insights on the startup's growth, the integration of AI in security, and the future of protecting digital assets. Tune in for an engaging discussion on advancing code…
…
continue reading
1
Solving Secret Zero: The Future of Machine Identities & SPIFFE with Mattias Gees
42:02
42:02
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
42:02
Today we dive into the challenges of securing modern IT infrastructures, focusing on "Secret Zero" and its implications for authentication practices. Our guest, Mattias Gees of Venify, discusses the SPIFFE framework and its role in transitioning from traditional security methods to dynamic workload identities. We explore practical strategies for im…
…
continue reading
1
Building secure platforms with Kubernetes: Bridging the DevOps-Security Divide with John Dietz
56:38
56:38
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
56:38
This week, we dive deep into the world of Kubernetes with John Dietz, co-founder of Kubefirst and a seasoned IT professional with over two decades of experience. John shares his extensive insights into the transformative power of Kubernetes and infrastructure as code (IaC) in modern cloud environments. Reflecting on his personal journey from skepti…
…
continue reading
1
Authorization vs. Authentication: Decoding the Layers of Security with Emre Baran
34:25
34:25
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
34:25
In this episode we dive deep into the world of authorization with Emre Baran, CEO and co-founder of Cerbos. As a seasoned entrepreneur and software expert, Emre brings over 20 years of experience to the table, discussing the subtle yet significant distinctions between authorization and authentication, and why these concepts are pivotal in today's c…
…
continue reading
In this episode we are graced with Henry & Brian from DarkFusion Systems and show off their new Milwaukee Made keyboard, the Dark Seraph. Also, we discuss the Midwest Gaming Classic, the new Fallout show, blowing your carthridges, and more! Come hang out. It's a good time! Support the show You can check out where to find Bucket Bytes by visiting ou…
…
continue reading
1
Unpacking ASPM: Trends, Truths, and the Future of Security Tools
28:34
28:34
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:34
In this engaging episode of "The Security Repo," host Dwayne McDaniel and esteemed guest Rachel Stephens, delve into the rapidly evolving world of security tooling, with a special focus on the buzz around Application Security Posture Management (ASPM). They tackle the complexities and confusions surrounding the burgeoning category of security solut…
…
continue reading
1
Decoding Security: An Analyst's Perspective on Trends and Tools
31:05
31:05
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
31:05
In this episode of The Security Repo podcast, we dive deep into the evolving landscape of security within software development with our guest, Rachel Stephens, a senior analyst at RedMonk. Rachel sheds light on the broader implications of the "shift left" movement, emphasizing the integration of security practices throughout the entire software dev…
…
continue reading
What would you do if you were implanted with a brain implant that let you use your computer using your brain?! The impending TikTok ban is tearing us apart! A look at Mullet Mad Jack and a TMZ style look into some gaming/streamer news. Don't miss our talk on glass toilet bowl streamers! Support the show You can check out where to find Bucket Bytes …
…
continue reading
1
Building Conferences and Communities in Cybersecurity with Huxley Barbee
42:40
42:40
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
42:40
This week, join us as we sit down with Huxley Barbee, the lead organizer of B-Sides New York City and a security evangelist at RunZero. With over two decades of experience as a software engineer and security consultant, Huxley shares his profound insights and journey through the evolving landscape of cybersecurity.From his early days attending DefC…
…
continue reading
1
The Evolution of DevSecOps: Strategies for Integrating Security into DevOps with Gregory Zagraba
36:37
36:37
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
36:37
This episode of The Security Repo Podcast features an insightful discussion with Gregory Zagraba on the challenges and strategies of integrating security practices within the DevOps landscape. Covering the evolution of DevOps, the emergence of DevSecOps, and the importance of a culture shift in large organizations, the conversation delves into prac…
…
continue reading
1
Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas
34:39
34:39
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
34:39
In this episode of the Security Repo podcast, listeners will dive into the intriguing world of hacking the hackers with Vangelis Stykas. Stykas, a notable figure in cybersecurity, shares his experiences and methodologies for compromising C2 servers—central nodes used by hackers to control malware-infected computers. He reveals how simple web applic…
…
continue reading
1
The Evolution of Offensive Security with Erik Cabetas
41:41
41:41
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
41:41
In this episode, we delve into the mind of Erik Cabetas, a renowned figure in offensive security and Defcon CTF winner. Erik shares his unique journey from hacking to offensive security, detailing the critical turning points that shaped his career. Together with Mackenzie and Dwayne, Eric discusses the evolution of security practices, the importanc…
…
continue reading
1
From Bank Heists to Security Insights: The Jayson E. Street Story
55:19
55:19
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
55:19
In this episode of The Security Repo, Jayson E. Street delves into his unconventional journey into cybersecurity, emphasizing the essence of hacking as a manifestation of curiosity rather than mere technical skill. He shares anecdotes from his extensive experience in ethical hacking, including bank heists and corporate security breaches, to undersc…
…
continue reading
1
Reducing the noise: Cutting through the data in security Buck Bundhund
40:05
40:05
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
40:05
In this episode of "The Security Repo," hosts Dwayne McDaniel and Mackenzie Jackson delve into the intricate world of cybersecurity with Buck Bundhund, an expert from Centripetal Networks. The conversation kicks off with an exploration of the pervasive issue of data noise – the influx of non-intended data into organizational networks, posing signif…
…
continue reading
1
Solving the bottom turtle: Fixing the authentication problem with Ethan Heilman
34:00
34:00
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
34:00
In security you have likely heard the expression turtles all the way down, the concept the world is held up on the back of a turtle who is standing on the back other another turtle, and so on.. This can be used to describe the current state of security, where everything can dramatically fall over if the bottom turtle fails. In this episode, we disc…
…
continue reading
1
The right tool for the job: Finding and evaluating security tools with James Berthoty
41:44
41:44
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
41:44
In this episode, James Berthoty shares insights into his project, Latio Tech, which provides a comprehensive list of cloud security tools and resources. James highlights the challenges of vendor assessments and the importance of bridging knowledge gaps in cloud security. He also shares trends in the security tooling industry and offers advice for s…
…
continue reading
A shiba inu is a better gamer than you! In this episode we welcome guest Ryan from RSVR, a VR arcade here in Milwaukee to talk about the ins and outs of what happs in the VR Bar! Also - do you remember jumping your rail cart avoiding enemies in Donkey Kong? Well, pretty soon you can risk your life and do that IRL in Japan. Pokemon with guns, Until …
…
continue reading
1
Securing our APIs - Thinking differently about API Security with Isabelle Mauny
43:52
43:52
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
43:52
In this episode, Mackenzie and Dwayne dive into a discussion on API security with special guest Isabelle Mauny, co-founder and CTO of 42Crunch. We walk through the differences API security has compared with traditional application security, and its growing importance in today's technology landscape. We also have a discussion about the challenges an…
…
continue reading
Snowstorms, aliens, conspiracies and one night stands. This episode has a bit for all of you. We also have Henry from DarkFusion System to talk about his new boutique custom keyboard, the Dark Seraph - a bent galvanized steel TKL keyboard that's MOSTLY build right here in Milwaukee. Support the show You can check out where to find Bucket Bytes by v…
…
continue reading
1
Revolutionizing SAST: Bridging the Gap for Modern Developers with Nipun Gupta
28:43
28:43
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
28:43
In this episode of The Security Repo, Mackenzie Jackson sits down with Nipun Gupta, the Chief Operating Officer of Bearer, a leading security company at the forefront of innovation in the cybersecurity landscape. Join us as we delve deep into the world of Static Application Security Testing (SAST) and explore why traditional SAST tools are struggli…
…
continue reading
We start 2024 off on the right foot talking with Milton from Checkpoint Bar in Kenosha, a bit about his "gamer/nerd" bar. Diving deep in to see what inspired his unique bartop and also settling the debate on if he should put some new school systems on his bar, or keep them a little "retro". Dominic puts together his first trivia game byte, and how …
…
continue reading
In our final episode of 2023, we talk a bit about the holidays, the terrors of a vasectomy gone mildly wrong. Logan eats his suit, and the boys chat about our first ever end of year game awards for awards given to Best Free Game, Best Pirate Puzzle Game, Biggest Suprise Moment in Gaming, Floppy Fish Award, Best NPC, Most Broken Game, Worst Game, & …
…
continue reading
1
API Security Unveiled: Safeguarding the Heart of Modern Applications
30:33
30:33
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
30:33
In this episode of "The Security Repo," your hosts Mackenzie Jackson and Dwayne McDaniel are joined by a distinguished guest, Dan Barahona, as they embark on an eye-opening exploration of API security. As the digital landscape evolves at breakneck speed, APIs (Application Programming Interfaces) have become the backbone of modern applications, maki…
…
continue reading
1
Who Bikes w/ the BikeMan? feat. special Guest BikeMan
2:06:31
2:06:31
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:06:31
Are you a passionate gamer or budding streamer? If so, you'll be intrigued by our special guest BikeMan, a popular Twitch streamer, who joins us as our special guest this week. Bike man shares insights on the importance of game selection for streamers, highlighting the delicate balance between playing games that attract viewers and those that the s…
…
continue reading
1
Guarding Against Deception: The Art of Detecting and Defending Against Social Engineering
32:48
32:48
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
32:48
In this episode of The Security Repo, your hosts Mackenzie Jackson and Dwyane McDaniel are joined by the brilliant Reanna Schultz, a seasoned expert in the field of cybersecurity. Together, they delve deep into the world of social engineering, exploring what it is, how to detect it, and crucially, how to arm your staff against its deceptive tactics…
…
continue reading
1
Contextual Security: Revolutionizing Developer-Focused Cybersecurity with James Wickett
33:28
33:28
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
33:28
In this eye-opening episode of The Security Repo, we welcome James Wickett, the CEO and co-founder of DryRun Security, a visionary in the realm of cybersecurity. James unveils a groundbreaking concept known as "Contextual Security," a game-changer that empowers developers with unprecedented security insights while they write code.As our hosts and c…
…
continue reading
1
Mastering Physical Security: Unveiling the Secrets with Brice Self
35:13
35:13
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
35:13
In this captivating episode of The Secuerity Repo, we delve into the world of physical security with our esteemed guest, Brice Self. With over a decade of experience in the field, Brice brings a wealth of knowledge and real-world insights to the table.This episode takes a deep dive into the intricate aspects of physical security, particularly in hi…
…
continue reading
1
Turning Nightmares into Narratives featuring Jerome DK
2:16:13
2:16:13
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:16:13
What does it take for an artist to bare his soul and translate his struggles with mental health into a humorous narrative? Join us as we navigate the creative abyss with Jerome DK, an artist, filmmaker, and author who chose to wrestle with his depression and anxiety through his book Every Day is a Nightmare. But the journey with Jerome doesn't end …
…
continue reading
1
Secrets inside packages, scanning Python PyPi for credentials with Tom Forbes
35:44
35:44
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
35:44
In this episode, we sit down with Tom Forbes to discuss his 'side project gone wrong' and how he found live AWS credentials inside many Python packages hosted on PyPi. Tom didn't expect to find sensitive information inside public Python packages, but was surprised when he was contacted about removing data from his GitHub project. After some researc…
…
continue reading
1
Artificial intelligence, a friend or foe in cyber security - with Simon Maple from Snyk
38:03
38:03
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
38:03
With the rapid development of AI we are often left wondering if AI is our friend or foe in security. In this episode, I sit down with Simon Maple from Snyk to discuss just that. We explore the different applications of AI in security and where the future is going. It's an interesting discussion so you don't want to miss it!Show Links: Snyk.io Blog:…
…
continue reading
1
The Grand POObah - Unique Dumpster Dives & Tech Talk
1:46:25
1:46:25
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:46:25
Ever been caught in an unexpectedly disgusting situation or found a hidden gem in a pile of trash? Well, we've got some sidesplitting stories to share of our own - from the time we had to scrub off poop at Kmart to the unbelievable treasures we’ve unearthed while garbage picking. Or have you ever wondered what makes a portable PC stand out in a fie…
…
continue reading
1
Scaling security and AppSec in fast moving enterprises with Jeevan Singh
38:12
38:12
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
38:12
Application security can be a difficult task at all levels of a company. But as a start-up grows into an enterprise, or existing companies evolve. How do you effectively scale your security program? We have an amazing guest, Jeevan Sinhg who is the director of product security at Twilio and he is here to talk about how to scale an application secur…
…
continue reading
1
Enterprise Software Distribution - Managing updates and security in enterprise software at scale
37:53
37:53
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
37:53
One of the many advantages of the cloud revolution is that SaaS products are continuously updated, security issues are patched quickly, and it's something the consumers are less concerned about. But what about enterprise products, how do you get that same level of update efficiency and security on large on-premise products. This is one of the topic…
…
continue reading
1
Exploring the Creative Universe of Donovan Scherer from Studio Moonfall
1:57:12
1:57:12
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
1:57:12
Check out Donovan & Studio Moonfall @ https://studiomoonfall.com/ Ever wonder how it feels to create an out-of-this-world universe from scratch? That's exactly what Donovan Sharer, a self-published author, illustrator, and bookstore owner, did. His varied entrepreneurial journey has spanned from organizing comic conventions and concerts to launchin…
…
continue reading
1
Exploring Starfield and Gaming's Future: A Comprehensive Discussion
2:06:27
2:06:27
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
2:06:27
Ever wondered how travel time could be scaled realistically in a game, or the secrets behind the modding process of Starfield? Align your gaze to our latest podcast episode where we traverse galaxies, explore gaming hardware, and swap some classic banter about Starfield, Lenovo's new handheld, the Nintendo Switch, and much more. We're not just gami…
…
continue reading
1
Securing data in a world of AI with Jeremiah Jeschke
29:43
29:43
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
29:43
Many companies are banning AI systems like ChatGPT to prevent data from being leaked, but is that a viable solution? We sit down with Jeremiah Jeschke, the CEO at OfficeAutomata, to discuss the future of security in a world of ChatGPT and other AI systems. Links: Office Automata: https://officeautomata.com/ Linkedin https://www.linkedin.com/in/jere…
…
continue reading
1
Getting boardroom buy-in for security - CISO conversations with Walt Powell
37:16
37:16
Putar nanti
Putar nanti
Daftar
Suka
Menyukai
37:16
Getting funding to build effective security programs is challenging and often it fails because security leaders are not telling the boardroom the right 'story'. In this episode with Walt Powell we discuss exactly how to overcome these challenges by understanding how to effectively communicate with the board by expressing security challenges into a …
…
continue reading