BarCode - podcast cover

BarCode

Chris Glandenwww.barcodesecurity.com

Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. 

Hosted by Chris Glanden.

Download Metacast podcast app
Podcasts are better in Metacast mobile app
Don't just listen to podcasts. Learn from them with transcripts, summaries, and chapters for every episode. Skim, search, and bookmark insights. Learn more

Episodes

Synpuppet Master

Dr. Matthew Canham is the CEO of Beyond Layer 7 (a cybersecurity consulting firm specializing in human security and data analytics), and a Research Professor of Cybersecurity at the Institute of Simulation and Training, University of Central Florida. Previously, as a federal investigator, Dr. Canham investigated cybercrimes, intellectual property theft, and insider threats. He holds a PhD in Cognitive Neuroscience with specialized expertise in human-centered security, data analytics, and beha...

Aug 17, 20211 hr 1 min

Selling Cyber

The quickly growing field of vendors in cybersecurity getting attention of security leaders is becoming more difficult by the day. The fatigue of the continuous vendor attempts to fill up their time is very real. Getting your solution seen and even getting a few minutes with these leaders requires a tactical and strategic approach and proving your value with the time you get is more important than ever. Cybersecurity Sales experts Neil Saltman and Doug Gotay stop by BarCode to di...

Jul 30, 202154 min

Uncaged

Brazilian Jiu-Jitsu (BJJ) is extremely difficult to master since it goes against conventional thinking. It is procedural and it is technical. While in combat, chaos ensues although the fighters must stay laser focused. Just as one needs to apply the proper technique in BJJ, cybersecurity professionals must find ways to creatively apply their techniques in unconventional attack scenarios as well. It’s proven that implementing fundamental BJJ concepts and principles will help strengthen the cor...

Jul 23, 202148 min

Full Throttle

Cyber threats still exist in the sky. Therefore, security controls within the Aviation industry is needed to protect the aircraft vessel, as well as it’s interconnected technology. Past investigations performed by hackers, researchers, and flight authorities have cast doubt on the industry’s perceived culture of safety. The need to address the novel challenges posed by modern-day cyber threats is evident and the importance is often overlooked. Nothing less than pure havoc would occur if compr...

Jul 16, 202147 min

Soundproof

Paul Asadoorian is a security veteran that has spent time “in the trenches” implementing comprehensive security programs across a wide array of industries. A proven cybersecurity leader and innovator, Paul founded “Security Weekly” – a podcast network providing free knowledge for the entire security community to benefit from. As former Product Evangelist for Tenable, Paul built a library of materials on the topic of vulnerability management. He has also spent time as an instructor for The SAN...

Jul 09, 202142 min

Deep Trust

John Sileo left hi-tech consulting and became an entrepreneur to reclaim his greatest priority – being present, every day, for his wife Mary and their dream of starting a family. Six successful years, a $2M business and two precious daughters later, he lost it all to cybercrime. Because the cybercriminal, a company insider, masked the crimes using John’s identity, John was held legally and financially responsible for the felonies committed. The losses destroyed his company, decimated his fina...

Jul 02, 202141 min

Game Changer

Videogame studios are under serious attack, partly because they don't need to adhere to the same security requirements and regulatory demands as more prominent industries. From an attacker's viewpoint, it's very lucrative. Not only are game developers at risk for attack, so are the gamers themselves. Access to one's XBOX LIVE account, or game profile could cause irreversible damage in gameplay as well as personal financial loss. Matt Huysman, Co-Founder and COO of Cyrex, specializes in softwa...

Jun 18, 202147 min

Industry Plague

"AM I NEXT???" That's a question CEOs WORLDWIDE are asking themselves. Recent Ransomware attacks on JBS and the Colonial Pipeline have certainly elevated alert levels, although Ransomware remains an industry plague. With seemingly no end in sight, the attacks continue to cripple businesses while making its perpetrators millionaires. Aviv Grafi is CEO & Founder of Votiro, an award-winning cybersecurity company specializing in neutralizing weaponized files of all kinds through Secure File G...

Jun 11, 202140 min

Kingpin

Joe Grand is an electrical engineer, hardware hacker, product designer and the founder of Grand Idea Studio, Inc. He specializes in creating, exploring, manipulating, and teaching about electronic devices. Also known as Kingpin, Joe was a member of the legendary hacker group L0pht Heavy Industries, where he helped raise awareness of the hacker ethos and the importance of independent security vulnerability research. He also brought engineering to the masses as a co-host of Discovery Channel’s ...

Jun 04, 202153 min

Cyber Crisis

At this moment, more than 70% of us are currently compromised by cybersecurity attacks that we underplay, ignore, or simply aren’t aware of because of their hyper-stealthy and invisible nature. In fact, most individuals and businesses will have been compromised for more than 3 years before they realize what’s happened. It's vital to help other's understand the genuine threat of cybersecurity attacks while delivering steps they can take to quickly and easily develop a proactive plan to mitigat...

May 28, 202157 min

Checkmate

In Cybersecurity, we aim to protect the most valuable assets. In the games of chess, that asset is the king. Developing a successful chess strategy requires time, effort, and patience. There is also no universal strategy, and every move a player makes is crucial. In this episode, the iconic Security Blogger and co-host of the popular Smashing Security podcast, Graham Cluley visits Barcode. We talk about his influencers, Cybersecurity's biggest challenge currently, Buzzword buzzkill, NFTs, th...

May 14, 202137 min

Skeleton Key

Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. At one point in time, the Social Security number was described as the skeleton key needed to unlock theft of your assets, your identity, and your life. Although that's since changed, and the skeleton key now is much more accessible... and it's ease of obtainability may surprise you. Ada...

May 07, 202154 min

The Flying Fish Theory

A Flying Fish will leap out of the water and use its winglike pectoral fins to glide over the surface. Then, once below the surface, it is out of site and flows amongst the others in different directions until it appears above water again. Rohan Light is an expert on governance, strategy and risk capability throughout the data, evidence and decision management value chain. He is also well versed in Artificial Intelligence, trusted data use and platform governance. He, along with special co-h...

Apr 30, 202147 min

Mindbender

Social engineering is the art of exploiting human psychology. There is no perimeter defense for this method of infiltration. Known as the “People Hacker”, Jenny Radcliffe has spent a lifetime learning how to use the human element to gain access to the buildings, data and information, and the things we would wish to keep private. Her main objective is to smash security measures, using psychology, con-artistry, subliminal linguistics, cunning and guile. She’s an international keynote speaker, T...

Apr 23, 202155 min

XRay Vision

Nato Riley takes what others know to be true and is still able to find something hidden below the surface. It’s a mind frame that proves that seeing the invisible is not impossible. Equipped with true XRAY Vision, Nato joins me at the bar to discuss DevSecOps beyond the SDLC, Security Maturity, his homegrown "Olympiad" SIEM, Man VS Machines, and the potential of technology takeover. SYMLINKS LinkedIn YouTube – NATO AS CODE Cloud Underground Blumira The Tavern (Colorado) DRINK INSTRUCTION C...

Apr 16, 202155 min

Digital Armor

The 2020 Xfinity Cyber Health Report cites an estimate that 854 million connected-home devices will be shipped by manufacturers in 2020, with that number is projected to grow to nearly 1.4 billion by 2024. Most of the consumers of these products don’t realize is that once a smart devices goes online, it poses serious security risks. Tony Reinert manages the DevSecOps Transformation program for Comcast, the largest cable TV company and largest home Internet service provider in the United Stat...

Apr 09, 202156 min

Manicode

The major cause of insecurity is the lack of secure software development practices. It’s crucial to understand the importance of security within the SDLC. Jim Manico is the founder of MANICODE Security where he trains software developers on secure coding and security engineering. He stops by BarCode to help us define “DevSecOps”, building an Effective CI/CD Pipeline, the differences between SAST/SCA/RASP/DAST and IAST, Security Team/ Development Team Cohesion, what most organizations GET WRO...

Apr 02, 202133 min

Vital Signs

Overseeing security and privacy challenges in COVID era is an extremely difficult task, and it’s even more complicated if you’re a Healthcare CISO. You must monitor the vital signs of your security program while keeping the pulse on threat vectors and adversaries. Anahi Santiago meets with me at the bar to discuss being a CISO during the pandemic, medical device security, Ransomware, advice for aspiring healthcare security professionals and more. SYMLINKS Linkedin HIMSS ChristianaCare DRIN...

Mar 26, 202148 min

The Protege Effect

The great Philosopher Seneca once said "While we teach, we learn”. The Protege Effect states that the best way to learn is to teach someone else. This powerful theory is further explained by cybersecurity leader and mentor, Naomi Buckwalter during her stop at Barcode. We also get into topics such as cybersecurity mentoring, privacy post-pandemic, cybersecurity myths, Philly Tech Sistas, stopping cybercrime, breaking into cyber, advice for cybersecurity recruiters, and much more. SYMLINKS Li...

Mar 19, 202144 min

Data First

Data is always the main target in an attacker’s scope. Therefore, organization’s should take a “data first” approach to preventing a strike that could cripple them with one shot. I catch up with Purandar Das, Founder and CEO of Sotero, to discuss his data protection strategy. Purandar started Sotero with the conviction that today’s data protection was deficient and that a better approach was needed to protect data. He is a firm believer that security, where the core focus is not the data, is ...

Mar 12, 202138 min

Data Diva

Debbie Reynolds, AKA “The Data Diva,” is a world-renowned technologist, thought leader and advisor to multinational corporations for handling global data privacy, cyber data breach response, and complex cross-functional data-driven projects. She's also an internationally published author, highly sought-after speaker, and top media presence for global data privacy, data protection, and technology issues. Debbie joins me at the bar to discuss data privacy in the pandemic era, streamlining cryp...

Mar 05, 202156 min

Nucleus

nu·cle·us /n/ : the central and most important part of an object, movement, or group, forming the basis for its activity and growth. Having a nucleus to your Threat and Vulnerability Management Program is critical, as well as having an established TVM program itself. In this episode, I chat with Scott Kuffer, co-founder and COO of Nucleus Security. He is an expert in vulnerability management and workflow optimization. We discuss the critical pillar of cybersecurity and his Nucleus Security p...

Feb 26, 202146 min

Aviator

An aviator is an expert of the skies and must know how to properly navigate through clouds. Fully understanding cloud formations and their potential dangers when flying is a vital part their profession. Flying through clouds is just like driving through fog – little visibility can represent extreme danger for those unaware of the circumstance. To help us understand, Cloud Security expert Ashish Rajan, host of the popular Cloud Security Podcast, joins me and my special co-host Mike in BarCod...

Feb 19, 20211 hr 26 min

Data AWOL

Often, data goes Absent Without Official Leave. No one within the organization grants it permission to vacate the premises. How do organizations protect and secure their data and stay ahead of the bad actors? A data breach is the intentional or unintentional release of private/confidential information to an untrusted environment. It's extremely crucial that the risk and consequences of a data breach transcends to the public. Confidentially is the 1st tenant in the CIA triad. For those who may...

Feb 12, 202159 min

Hackable Mindset

To defend against modern day hackers, you must train your mind to think like one. Ted Harrington is the author of "HACKABLE: How To Do Application Security Right", which is an Amazon BEST SELLER in 9 Categories. He is also Executive Partner at Independent Security Evaluators (ISE), the security organization famous for hacking everything from cars to medical devices to smartphones, and more. Ted has been named both Executive of the Year and 40 Under 40. He also co-founded and organizes the pop...

Feb 05, 202151 min

Security Suplex

A "Suplex" is an offensive move used in wrestling by which an attacker uses his weight to throw a defender. Phillip Wylie’s unusual journey into the field of cybersecurity is preceded by his career as a powerlifter and pro wrestler for the WCW. He has since taken full control in the industry as an offensive security professional. He is an established Red Teamer, Pentester, Ethical Hacking Instructor, and founder of the PWN School Project - an education focused cybersecurity organization that ...

Jan 29, 202147 min

Rumble

HD Moore, famed developer of the wildly used Metasploit penetration testing tool spoke with me about his current focus, RUMBLE, in addition to his perspective on bug bounty programs, advice for aspiring pentesters and more. Of course, we also discussed the happening bar scene in Austin TX and how the city has become known as Silicon Hills. SYMLINKS Metasploit WarVox Axman Project SONAR Legion of Doom Masters of Deception Apache Win32 Chunked Encoding exploit TESO (Austrian hacker group) ADM ...

Jan 22, 202142 min

State of the Nation

Grayson Milbourne is the Security Intelligence Director for Webroot, Inc., an OpenText company that focuses on endpoint security and threat intelligence. He joins me at the bar to discuss new and emerging threats, securing our homes during the COVID era, IoT security and cybersecurity trends we should expect to develop in 2021 and beyond. SYMLINKS OpenText WebRoot Emotet LOLbinz Egregor Ransomware Detecting Deepfakes with mice DRINK INSTRUCTION LONG ISLAND IoT 1/2 oz Vodka 1/2 oz Rum 1/2 o...

Jan 15, 202155 min

Intelligence Unfiltered

Currently the Senior Director for Cyber Intelligence Strategy for Anomali, A.J. Nash is a cyber intelligence strategist and public speaker focused on building cyber intelligence programs that capitalize on disparate data and information to create and deliver tactical, operational, and strategic intelligence to protect personnel, facilities, data, and information systems. I speak with him about the cultural differences in Cybersecurity between the Government and Private Sector, his time spent...

Jan 01, 202153 min

Dragon Wizard

A fierce visionary, Ron Gula has redefined the security landscape and continues to do so. From co-creating Tenable, developing Dragon IDS, and now serving as President of Gula Tech Adventures, his incredible story is far from over. Ron joins me at the bar to discuss the conception of Tenable, his "Data-Care" approach, challenges during the COVID era, Cybersecurity’s #1 myth, advice for entrepreneurs and his new foundation which will provide millions of dollars in competitive grants to cybers...

Jan 01, 202143 min
For the best experience, listen in Metacast app for iOS or Android
Open in Metacast