Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
Tue, March 25, 2025
In this conversation, Mike Lisi shares his journey into the cybersecurity field, detailing his early interest in computers, the challenges he faced while obtaining his OSCP certification, and his transition into consulting. He discusses the importance of understanding client needs incybersecurity assessments and his leadership role in the Red Team Village. Mike also elaborates on the NCAE Cyber Games and the design of Capture The Flag (CTF) challenges, providing insights into effective content development for cybersecurity education. The conversation concludes with Mike sharing unique experiences from cybersecurity events and his thoughts on future engagements. TIMESTAMPS: 00:00 - Introduction to Cybersecurity Journey 03:23 - The Path to OSCP Certification 06:13 - Transitioning to Consulting in Cybersecurity 09:14 - Understanding Client Needs in Cybersecurity 11:56 - Leadership in Red Team Village 14:32 - NCAE Cyber Games and CTF Design 17:26 - Creating Effective CTF Challenges 20:04 Resources for Aspiring CTF Participants 22:57 Content Development for Cybersecurity Education 25:49 Unique Experiences in Cybersecurity Events 28:25 Closing Thoughts and Future Engagements SYMLINKS: [Maltek Solutions Website] - https://malteksolutions.com/ A cybersecurity consulting firm specializing in offensive security services, penetration testing, and risk assessments, founded by Mike Lisi. [Mike Lisi LinkedIn] - https://www.linkedin.com/in/mikelisi/ Mike Lisi's official LinkedIn profile, where he shares insights on cybersecurity, offensive security consulting, and industry trends. [Red Team Village (RTV) Website] - https://redteamvillage.io A nonprofit organization dedicated to providing educational experiences in offensive security. RTV organizes workshops, talks, and training opportunities, primarily at DEF CON and other cybersecurity conferences. [Red Team Village Discord] - https://discord.com/invite/redteamvillage The official Red Team Village Discord server where members can connect, discuss offensive security topics, and stay updated on upcoming events and volunteer opportunities. [Red Team Village X (Twitter)] - https://twitter.com/redteamvillage_ RTV's official social media account for announcem
Sun, March 16, 2025
Cybersecurity is a battle fought in the shadows, where threats emerge unseen, and defenses must anticipate the unpredictable. From threat modeling to AI-driven security shifts, this episode explores the evolving tactics of attackers and defenders, the future of automation in cyber risk, and the challenges of building resilient security architectures in an ever-changing landscape. Derek Fisher is a cybersecurity and engineering expert with nearly 30 years of experience across financial, healthcare, military, and commercial sectors. Beyond his extensive career, Derek has made a lasting impact through his authorship, teaching, and contributions to the security community. We discuss the art and science of threat modeling, the future of AI in security, and what it really takes to break into the industry today. In this conversation, Derek discusses his 30 years of experience and the impact of AI and cloud computing on cybersecurity. Derek emphasizes the importance of secure design, the challenges in the job market, and the gap between academic education and real-world skills. He also highlights his efforts to inspire the next generation through children's books and shares insights on future trends like robotics and quantum computing. TIMESTAMPS: 00:00 Introduction to Cybersecurity and Derek Fisher's Background 10:09 The Impact of AI and Cloud on Cybersecurity 19:19 Understanding Threat Modeling in Cybersecurity 27:47 Navigating the Security Hiring Process 35:48 Navigating the Job Market in Cybersecurity 36:40 Breaking into Cybersecurity: Finding Your Path 44:16 Bridging the Gap: Academia vs. Industry 47:24 Inspiring the Next Generation: Writing for Kids 50:46 The Challenges of Parenting in a Digital Age 54:08 Future Trends in Cybersecurity and Technology 56:52 Creating a Cybersecurity-Themed Bar: A Fun Concept SYMLINKS: [Derek Fisher's LinkedIn Profile ]- https://www.linkedin.com/in/derek-fisher-sec-arch Connect with Derek Fisher on LinkedIn to learn more about his professional background and expertise in cybersecurity. [Securely Built Website] - <a href="https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.securelybuilt.com%2F%3Ffbclid%3DIwZXh0bgNhZW0CMTAAAR0z5l7r7ifJpokX5CFNW-BMcNCENQ1feHCtNC5mx2j1UEIatWvdPRALT0Q_aem_jNI1JYQwxV3O_kHWQAJwqg&h=AT2-mSe0etIn7LIs-0bdhtMyFp9om3kVbcjq5Twp2rPJzttFJZVBijjclyM2FPi71zmcTsTiSbcUxcNgroLQ4fOb5xk97NHwWSuKrpOYEj8fNgmvcOLe_lyFWEIBvB3Vqt1ySw" target="_blank" rel="ugc noo
Fri, March 07, 2025
In this conversation, Perry Carpenter discusses the evolution of misinformation and disinformation in the age of AI and deepfakes. He explores the psychological principles that make individuals susceptible to deception, the ongoing arms race between detection and deception, and theregulatory landscape surrounding these issues. Carpenter emphasizes the importance of understanding narratives and cognitive biases in combating misinformation while also highlighting the challenges posed by rapidlyadvancing technology. In this conversation, Perry Carpenter discusses the implications of deepfakes and AI in cybersecurity, emphasizing the concept ofthe liar's dividend, the need for cognitive awareness training, and the ongoing arms race between AI-generated deception and truth verification. He highlights the erosion of trust in media and the necessity of understanding themotivations behind AI-generated content. Carpenter also shares insights on the future of deepfakes, ethical challenges, and the importance of focusing on the'why' behind AI technologies. TIMESTAMPS: 00:00 Introduction to Perry Carpenter and His Work 02:37 The Evolution of Misinformation and Disinformation 06:42 The Arms Race: Detection vs. Deception 12:00 The Impact of Deepfakes on Society 17:41 Psychological Principles Behind Deepfakes 23:16 Regulatory Landscape and Future Implications 34:59 The Liar's Dividend and Its Implications 36:09 Defending Against AI-Powered Threats 40:06 The Arms Race of AI and Cybersecurity 46:17 Erosion of Trust in Media 52:38 The Future of Deepfakes and Society 57:38 Understanding the Why Behind AI and Deception SYMLINKS: [LinkedIn – Perry Carpenter Profile] - https://www.linkedin.com/in/perrycarpenter/ Perry Carpenter’s professional LinkedIn profile details his background in cybersecurity, his work on AI-generated deception, and his industry engagements. It serves as a hub for networking and accessing more informationon his projects. [X (formerly Twitter) – Perry Carpenter Profile] - https://x.com/perrycarpenter?lang=en Perry Carpenter’s profile on X is where he shares real-time insights, commentary on cybersecurity trends, and updates related to his work in AI and digital deception. [Perry Carpenter’s Book “FAIK”] - https://www.thisbookisfaik.com/ This global retailer offers Perry Carpenter’s book, Fake:A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deception , which explores modern digital deception andcybersecurity. [YouTube – The Fake Files C
Tue, February 25, 2025
In this engaging conversation, Chris Glanden interviews Mariano Mattei, VP of Cybersecurity and AI at Azure Solutions. Mariano shares his extensive background in software engineering and cybersecurity, emphasizing the importance of metrics in communicating security risks to executive teams. He discusses the challenges organizations face in quantifying security effectiveness and adapting metrics to the rapidly evolving threat landscape, particularly with the rise of AI. The conversation also e...
Mon, February 17, 2025
In this conversation, Chris Glanden and Matt Canham delve into the realms of deep fakes, cognitive security, and the implications of AI technology on human agency. They explore the nuances of cognitive security, differentiating it from social engineering, and discuss the potential vulnerabilities that arise as AI continues to evolve. The conversation also touches on the OSI model and how cognitive security can be integrated into existing frameworks, highlighting the importance of understandin...
Tue, February 11, 2025
Torque is the force that keeps a system stable and in motion—just like cybersecurity, where constant pressure, precision, and adaptability are critical to staying ahead of threats. Curt Vincent knows this well, having transitioned from troubleshooting turbine engines in the Army to leading cybersecurity at the highest levels of Wall Street. A retired U.S. Army Lieutenant Colonel with tech-heavy deployments in Desert Storm and post-9/11 cyber warfare, Curt went on to build and lead Morgan Stan...
Mon, February 03, 2025
In this conversation, Chris Glanden interviews Scotch Wichmann, a multifaceted individual with a rich background in cybersecurity and paranormal studies. Scotch shares his journey from a young hacker to a cybersecurity expert at Meta, discussing his experiences with paranormal phenomena and his research into psychic hacking. The conversation delves into the U.S. government's Stargate program, which explored remote viewing for military purposes, and Scotch's own experiments in psychic hacking,...
Tue, January 28, 2025
In this conversation, Chris Glanden interviews Slava Konstantinov, a lead architect at ThreatLocker, discussing the evolving landscape of cybersecurity, particularly focusing on macOS security. Slava shares his journey into cybersecurity, the misconceptions surrounding macOS security, and the importance of a zero trust approach in organizations. He emphasizes the growing threats from social engineering and the need for employee training. The discussion also touches on the impact of AI on secu...
Tue, January 21, 2025
In this engaging conversation, Chris Glanden interviews Brandon Prince, also known as Syntax, a multifaceted individual who is a hacker, DJ, and motorcycle racer. They delve into Brandon's early life, his journey into hacking and music, his experiences at DefCon, and his insights into the current job market in cybersecurity. Brandon shares unique stories from his life, including his transition from competitive motorcycle racing to DJing at security conferences, and discusses the challenges of...
Fri, January 10, 2025
Josh Marpet is a seasoned entrepreneur and a renowned authority in the field of information security, compliance, and risk management. With a rich background in law enforcement, Josh has translated his diverse experiences into shaping security protocols in various high-risk environments. He serves as the Chief Strategy Officer at Cyturus, where he drives advancements in compliance process products. Notably, Josh contributes to the esteemed IANS faculty and co-hosts the well-known Paul’s Secur...
Fri, October 18, 2024
SESSION TITLE: BCP LIVE on Rendezvous Yacht II RECORDED: 9/26/24 VENUE: Rendevous Yacht - https://www.cityexperiences.com/philadelphia/city-cruises/our-fleet/fleet-rendezvous/ LOCATION: Philadelphia, PA GUEST: Damian Oravez, CISO of City of Philadelphia | Jessica Hoffman, DCISO of City of Philadelphia SPONSOR: Philly Tech Council ABOUT GUESTS: Damian Oravez is the Chief Information Security Officer (CISO) for the city of Philadelphia. With a focused career in cybersecurity, Damian previousl...
Thu, October 17, 2024
Tammy Klotz is an award-winning technology leader and seasoned Chief Information Security Officer (CISO) with extensive experience in transforming cybersecurity programs for multinational manufacturing companies. Beginning her career in internal audit, Klotz transitioned into cybersecurity, holding leadership roles at major firms like Air Products, Covanta Energy, and now Trinseo. She is the author of Leading with Empathy and Grace: Secrets to Developing High-Performing Teams, where she share...
Mon, October 07, 2024
Len Noe, the world’s first transhumanist hacker, takes us on a captivating journey from his days as a black hat hacker to becoming a leader in ethical hacking. His natural curiosity pushed him to explore the fusion of man and machine through the use of implantable tech. This episode focuses on transhumanism, highlighting both the philosophy and the real-world impact that are redefining what it means to be human in the digital era. Len shares his personal and professional evolution, describing...
Fri, August 16, 2024
In this milestone episode, Chris reconnects with old friends at the bar, reflecting on his journey from starting a humble podcast to launching a thriving security firm. The episode sets the stage for the live event in Vegas, where Chris is joined by an impressive lineup of experts, including George Gerchow, Justin Hutchins, Len Neo, Chris Wright, Matthew Canhum, and Izzy Traub. The panel dives into a series of thought-provoking discussions centered around AI's far-reaching implications. From ...
Wed, August 07, 2024
A reputable human systems engineer and PhD candidate, Lisa Flynn’s background encompasses launching technology startups and C-suite executive roles. Her expertise spans information systems, business models, psychology, marketing, and entrepreneurship, all foundational to cognitive security advancements. We examined the dual-edged nature of AI, addressing both its potential for tremendous advancements and its capacity to facilitate misinformation and disinformation. TIMESTAMPS: 00:16:00 - Nav...
Wed, June 12, 2024
Chris Wright, founder and CEO of the AI Trust Council (AITC) stops by BarCode to share his perspective on critical issues related to artificial intelligence, corruption in big tech, and government oversight. With over 25 years of experience as an entrepreneur and former US Army attack helicopter pilot, Chris brings a unique perspective on AI and digital trust. The episode explores the complexities of AI and its societal implications, focusing on ethical considerations, psychological impacts, ...
Thu, May 09, 2024
Dr. Jessica Barker is an esteemed figure in the realm of cybersecurity with a commendable history of influencing cybersecurity awareness, behavior, and culture across the globe. As the co-founder and co-CEO of Cygenta, she has made notable strides in providing face-to-face cybersecurity awareness sessions to over 50,000 individuals. With accolades such as being named one of the top 20 most influential women in cybersecurity in the UK, her expertise, especially in the human aspect of cybersecu...
Wed, May 08, 2024
SESSION TITLE:WiCys Delaware Valley Career Fair II RECORDED: 4/25/24 VENUE: Chestnut Hill College - www.chc.ed LOCATION: Philadelphia, PA GUEST: Job Seekers, Hiring Organizations, and Recruiters SPONSOR: WiCys Delaware Valley - LinkedIn Page ABOUT WICYS AND GUESTS: WiCys Delaware Valley - A community focused on fostering professional growth through networking, mentoring, and collaboration. The group brings together individuals, both women and men, who are committed to sharing their ...
Fri, April 12, 2024
Izzy Traub, an innovative entrepreneur at the intersection of film and AI, has traversed from pioneering visual effects in the movie industry to the front lines of AI software development. With qualifications from UCLA and the University of Texas, Izzy co-founded Inspira with his COO and father, Benny, where they have patented computerized productivity systems. His expertise in managing large remote teams and pushing the boundaries of AI in VFX illuminates new possibilities for modern workflo...
Mon, March 04, 2024
Iceman is a renowned figure in the world of RFID hacking, with expertise in NFC and EMV technologies. As one of the lead open-source developers for Proxmark3—a powerful platform for RFID hacking and analysis—Iceman has significantly enhanced its capabilities. He is known for overhauling the user interface and expanding the feature set to allow device owners to maximize their usage. His work in the open source community has been focused on making RFID technology more accessible and understanda...
Mon, February 12, 2024
Hutch, an expert in AI and cybersecurity, discusses his early interest in using AI for algorithmic trading and automating social engineering attacks with chatbots. He highlights two main cyber risks of advanced AI - the ability to manipulate people and autonomously execute attacks. Hutch and Chris explore issues like commercialization of AI versus proprietary chatbots, and tech companies' ethical duties to reduce AI risks through testing and responsible development. They delve into potential ...
Fri, February 02, 2024
Wirefall is an Air Force veteran and cybersecurity expert. Wirefall shares his journey into hacking, from his early days of electronics tinkering to his career in security consulting. He also discusses the founding of the Dallas Hackers Association and the importance of community in the cybersecurity field. Wirefall explores the evolving cyber threat landscape and the potential impact of AI on hacking. Plus, he reveals how his newfound passion for improv has helped him overcome fear and becom...
Thu, January 11, 2024
Peter Schwacker is a cybersecurity thought leader with over 25 years of experience. Peter shares his unconventional journey in the industry, his passion for continuous learning, and his belief in the power of curiosity. He also discusses the importance of community building and the need for a deeper understanding of the roots of cybersecurity. With his unique perspective, Peter challenges the status quo and offers insights into the future of the industry. TIMESTAMPS: 0:03:06 - Discussi...
Tue, December 26, 2023
SESSION TITLE: IBM X-FORCE RECORDED: 12/13/23 VENUE: City Winery LOCATION: Philadelphia, PA GUEST: John Dwyer SPONSOR: IBM ABOUT THE GUEST: John Dwyer - John Dwyer is the Head of Research for IBM Security X-Force. He has extensive experience in cybersecurity research, threat actor behavioral modeling, immersive incident response simulations, and integrated security technologies. John is a highly regarded speaker at industry events and has expertise in AI, threat hunting, and detectio...
Fri, December 15, 2023
SESSION TITLE: LONE STAR CYBER CIRCUS RECORDED: 12/7/23 VENUE: Hop and Sting LOCATION: Grapevine, TX GUESTS: Various SPONSOR: IBM ABOUT THE GUESTS: Cyber Distortion - Security leaders Kevin Pentecost and Jason Popillion joined forced to create " Cyber Distortion", a leading security podcast which they describe as their own way of paying back an industry that has been so amazing to them over the past couple of decades. They believe that as cybersecurity experts, we all play a critical role i...
Fri, November 24, 2023
Kevin Pentecost and Jason Poppillon, hosts of the Cyber Distortion podcast, stop by BarCode to share their experiences and insights in the field of cybersecurity. We discuss topics such as ransomware, social engineering, and the CISSP. Their podcast combines technical expertise with a fun and engaging approach, making it accessible to both technical and non-technical audiences. They also highlight the importance of networking and building relationships in the cybersecurity industry. TI...
Thu, November 02, 2023
Vivek Ramachandran is a cybersecurity professional and the founder of SquareX, a browser-based cybersecurity solution. He is known for his groundbreaking Wi-Fi attack discoveries, best-selling hacking books, and trainings for cybersecurity professionals worldwide. Vivek is also the creator of the hacker comic book series, "Hackers: Superheroes of the Digital Age." Vivek stops by the bar to to discuss his background in cybersecurity and his journey to becoming an entrepreneur. He shares how h...
Mon, October 30, 2023
SESSION TITLE: BCP LIVE on Rendezvous Yacht RECORDED: 10/26/23 VENUE: Rendezvous (Private Yacht) LOCATION: Philadelphia, PA GUEST: David Lingenfelter, Anahi Santiago and Tammy Klotz SPONSOR: N/A ABOUT THE GUESTS: David Lingenfelter - VP of Information Security at Penn Entertainment, with a 30-year career in cybersecurity. Anahi Santiago - CISO at Christiana Care, the largest health system in Delaware, with a passion for healthcare cybersecurity. Tammy Klotz - CISO at Trinzio, with 7 y...
Mon, October 16, 2023
Paul V. McEnroe is an award-winning engineer and former IBM executive who played a pivotal role in the development of the universal product code (UPC), also known as the barcode. With over two decades of experience at IBM, McEnroe led a team that created one of the most influential technologies of our generation. He is the author of the business memoir titled "The Barcode," which tells the story of his journey and the development of the barcode. McEnroe shares his background, from being ado...
Wed, September 27, 2023
Ron Nissim, co-founder and CEO of Entitle IO, joins Chris at the bar to discuss identity and access management (IAM) in the cloud. They explore the differences between traditional IAM and cloud IAM, as well as the pain points organizations commonly face with access requests and approval processes. Ron shares a specific incident that sparked the idea for Entitle IO and explains how their platform has helped organizations improve their IAM efforts. He also discusses the future of IAM and upcomi...
Thu, August 31, 2023
Mike Petrie, a pioneer in the fraud investigative industry, discusses his journey into the field and the evolution of investigative techniques. He emphasizes the importance of social media intelligence and the role it plays in uncovering fraud. Mike also highlights the need for education on protecting personal information and the integration of AI in fraud detection and prevention. He shares advice for aspiring investigators and discusses the concept of Webutation, a platform for protecting o...
Sat, August 19, 2023
SESSION TITLE: METAWAR RECORDED: 8/10/23 VENUE: Virgil's Real BBQ LOCATION: Las Vegas, NV GUEST: Winn Schwartau TIMESTAMPS: 0:02:30 - Introduction to the METAWAR Project and the challenge of reality distortion 0:04:00 - Explanation of the six steps of the METAWAR thesis 0:05:58 - Discussion on immersive experiences and reality distortion 0:09:37 - Explanation of reality distortion and the difference between disinformation and misinformation 0:15:38 - Discussion on the addictive nature ...
Sat, August 19, 2023
SESSION TITLE: How I Rob Banks RECORDED: 8/9/23 VENUE: BAR CODE BURGER BAR LOCATION: Las Vegas, NV GUEST: FC (Freaky Clown) SPONSOR: Cyber Job Academy TIMESTAMPS: 0:00:22 - Introduction and discussion about FC's book "I Rob Banks" 0:01:12 - Reconnaissance and the importance of overplanning 0:02:07 - Digital recon and the limitations of Google Maps 0:03:36 - The value of extensive recon and avoiding people 0:04:21 - Possibility of book adaptation into a feature film 0:05:00 - Speculatio...
Fri, July 28, 2023
In the unpredictable landscape of the digital mountains, a remarkable group of Sherpas thrives as guides, offering vital information during expeditions. Among them, Tracy Z. Maleeff stands out as a cybersecurity expert, leading and inspiring others on their journey. Her story takes her from the humble setting of a library to the forefront of cybersecurity, where she provides essential guidance and support, navigating through the peaks and valleys of the cyber realm. TIMESTAMPS: 0:03:25 - Tra...
Mon, July 17, 2023
Cybersecurity professionals are essential for keeping organizations safe from potential threats and ensuring business continuity. According to recent studies, the demand for cybersecurity professionals has surged significantly, and this trend is expected to continue. Unfortunately, qualified people are still having a hard time breaking into the industry, although it's not impossible. And there is help from insiders that are here to help with the process. Colleen Lennox, founder of Cyber Job ...
Tue, June 27, 2023
Often, risk and reward collide. Corporate giants and high-stakes gamblers unknowingly walk parallel paths. Their worlds may seem separate to outsiders, although fate has a way of intertwining their destinies. Both are driven by ambition, chasing triumph. But as their desires for success grow, a hidden truth begins to reveal itself. LLMs, like the roll of Snake Eyes in a dice game, hold the power to shape kismet and shatter dreams. The line between success and ruin is as fragile as the edge of...
Thu, June 08, 2023
Embark on a captivating journey as we venture into the enigmatic and clandestine world lurking below the surface of the internet. Prepare to explore the depths of cybercrime, illicit trades, and covert activities that take place in the digital underworld. Larry Herzog, a Senior Sales Engineer for Thales, joins me at the bar to discuss the origins of the Darkweb, the technological underpinnings, aestetics, diverse marketplace services and the potential pitfalls of using it. TIMESTAMPS: 0:02:...
Fri, May 26, 2023
In the covert world of intelligence and espionage, where shadows merge with reality, there exists a select group of individuals who operate on the razor's edge between life and death. Among them is a man named Ric Prado, AKA the "Shadow Warrior." Ric's story is a testament to the indomitable human spirit and the unyielding pursuit of justice in the face of adversity. A true warrior with a heart of steel, Ric has spent his entire life on the frontlines of some of the most dangerous and classi...
Thu, May 11, 2023
Philip Wiley, AKA The Hacker Maker, is an experienced pentester, educator, author and speaker. He has been invited to give presentations at countless cons. He currently hosts a top ranked podcast, "Hacker Factory" and his self-titled podcast, "Philip Wiley Show", recently launched. He returns to the bar to talk all things CON, including his own experience, CFP differentiators, structuring a talk, defeating imposter syndrome, and more. TIMESTAMPS: 0:03:18 - Experience with Conference Present...
Fri, May 05, 2023
Pentera is a company that specializes in automated security testing and vulnerability management. Its platform uses a combination of automated and manual testing techniques to identify and prioritize security vulnerabilities in an organization's infrastructure. By doing so, Pentera helps unmask hidden vulnerabilities and provide visibility into potential security threats. Their "Automated Security Validation" component continuously validates cyber defenses. It's a method of testing that is be...
Fri, April 28, 2023
SESSION TITLE: CISOs Riff on the Latest in Cybersecurity RECORDED: 4/19/23 LOCATION: Valley Forge Casino and Event Center GUESTS: David Lingenfelter (VP, Information Security, PENN Entertainment), Krista Arndt (CISO, United Musculoskeletal Partners) and Bistra Lutz (Director of Global Information Security Operations, Crown Holdings) CONNECT WITH US www.barcodesecurity.com Become a Sponsor Follow us on LinkedIn Tweet us at @BarCodeSecurity Email us at info@barcodesecurity.com
Fri, April 14, 2023
FC has gone through extreme adversity and has come out stronger on the other side. He grew up in a very negative environment, which unfortunately led to the development of complex PTSD. But from that emerged a unique talent, one that is both a gift and a curse: hypervigilance. He refused to allow his past define him and instead, leveraged the state of increased alertness to fuel his passion for security. FC talks with us about his breakthrough into ethical hacking and physical securit...
Fri, March 10, 2023
Grit in the context of behavior is defined as “firmness of character; indomitable spirit.” Andres Andreu, a NYC bred leader, has a career built on grit and sheer perseverance with experience spanning from the D.E.A. to corporate America. Co-Host, and cybersecurity sales veteran Doug Gotay and I post up with Andres and talk about overcoming adversary as a youth, his time within the D.E.A., his mastery in the judo philosophy, and traversing his unique skillset and mentality into success in the...
Fri, March 03, 2023
The Sociotechnical Theory is an organizational theory that emphasizes the importance of both social and technical factors in designing and managing systems. Sociotechnical systems are deeply embedded within society and prone to "hacking", a term meaning to subvert a systematic rules in unintended way. In his most recent book, "A Hacker's Mind", Bruce Schneier takes hacking beyond computer systems and uses it to analyze the systems that underpin our society. He stops by and we define th...
Thu, February 23, 2023
As a large language model trained by OpenAI, ChatGPT has been designed to understand and generate human-like text based on a massive amount of data. From writing creative stories and poetry to answering complex questions and providing personalized recommendations, ChatGPT seems to be running on all cylinders, and still accelerating. The possibility of ChatGPT extends beyond text, via Voice AI. John Miller, Co-Founder of Launchvox stops by to about ChatGPT's potential, mainstream adoption, et...
Fri, February 03, 2023
The Harkness method is a discussion-based learning style that emphasizes student centric discussion and active participation in a classroom setting. The goal is to create an environment where students can share their thoughts and perspectives, engage in meaningful conversations, and learn from each other. Jason Brooks, a native of South Central Los Angeles, taught Mandarin, Spanish & Mathematics for 18 years. During COVID-19, as he tracked student interaction by hand, he quickly recogniz...
Fri, January 20, 2023
Jim "Mad Dog" Lawler is a national security consultant, serving as the Senior Partner at MDO Group, which provides HUMINT training to the Intelligence Community and the commercial sector focused on WMD, CI, technical and cyber issues. He served for 25 years as a CIA case officer and is a noted speaker on Insider Threat within the government sector. He stops by and we discuss CIA war stories, Misconceptions of the Agency, Espionage, Counter Intelligence, Detecting Insider Threats and Spy Nov...
Fri, January 06, 2023
Mike Jones AKA the H4unt3d hacker, is a security researcher who formerly hacked underGROUND groups. He served in the military for several years within SIGINT operations. Mike started the H4unt3d hacker podcast from scratch, wanting to give people a unique point of view about cybersecurity. He has built a global community of members from different walks of life, religions, backgrounds and disciplines. Mike transends into BarCode to discuss his origins, Hacktivism, SIGNIT, in the military, pod...
Fri, December 23, 2022
Robert Bateman, head of content at GRC World Forums, is a well-respected expert on data protection, privacy, and security law. He built his reputation by producing in-depth reports on legal updates, compliance guidance documents for businesses, and news articles about the latest industry trends. He also has a deep interest in digital rights and is an avid supporter of free speech. We discuss EU-US Data Privacy Framework, Upstream and Prism NSA, Meta's Threat to the EU, Clearview, Open...
Wed, December 14, 2022
Crane Hassold is a threat researcher at Abnormal Security who specializes in discovering and analyzing malicious email campaigns targeting enterprises. He also works closely with law enforcement agencies to help bring these bad actors out into the open. Before joining Abnormal Security, Hassold was a senior investigator at the Federal Bureau of Investigations (FBI), where he worked for over eleven years. While there, he focused on identifying and tracking emerging threats such as sophisticate...
Fri, December 02, 2022
Mikko Hyppönen is considered one of the world’s foremost cybersecurity experts. He is known for his work on IoT security, where he coined the term “The Hyppönen law”. Currently he is working as Chief Research Officer at Withsecure and as Principal Research Advisor at F Secure. He has lectured at the universities of Stanford and Oxford and is a regular contributor to the New York Times, the Wall Street Journal and Scientific American. He was named among the 50 most influential people on the we...
Fri, November 18, 2022
As Imprivata’s VP of Worldwide Engineering, Cyber, Joel Burleson-Davis is responsible for overseeing teams in the organization that build and deliver cybersecurity solutions. Prior to joining Imprivata, he was an engineering manager in Sydney, Australia for 6 years. He holds a master’s degree in liberal arts from St. Edward’s University where his focus was on philosophy and behavioral sciences applied to technology. He has been working in cybersecurity for over 20 years and we link up at the ...
Thu, November 03, 2022
Most of what we do in the cybersecurity field is a direct result of a sinister underworld that most of us will never have full visibility into. This is a story of an individual who started, and led ShadowCrew, a major cybercrime syndicate within that underworld. After being identified and placed on the US Most Wanted List, he was ultimately captured, imprisioned, escaped prison, and captured again. He served his time, and now is considered a leading authority on internet crime, identity theft...
Fri, October 28, 2022
Eran Sinal is the CEO of IDSeal, a company that is dedicated to helping people keep their identities secure and protected from identity thieves. Based out of Charlotte in North Carolina, Eran has been in the business for 25 years and is very passionate about identity protection. He and his company work very hard to keep their clients safe and has dedicated his life to safeguarding people and their reputations. Eran believes that identity theft is one of the biggest security challenges for a...
Fri, October 21, 2022
Robert Leale is the president of CanBusHack, President of Pivvit and is also Founder of Car Hacking Village which can be seen at Def Con, DerbyCON, GrrCON, CypherCon, THOTCON, and many more hacking conferences across the globe. He stops by BarCode and we discuss vulnerable technology in automobiles, manufacturer responsibilities, car hacking tools, how to secure your vehicle and Car Hacking Village. SYMLINKS Twitter CanBusHack Car Hacking Village Flipper Zero ProxMark3 Introduction to Car Ha...
Fri, October 07, 2022
Jack Rhysider is the creator and host of the Darknet Diaries podcast, which features true stories from the dark side of the Internet. He stops by BarCode and we discuss the origin of his own story, masking of his identity, developing storytelling skills, growing an audience, productivity hacks for entrepreneurial content creators, and more. SYMLINKS Twitter Darknet Diaries Khan Academy | Pixar in a box Radiolab Serial This American Life Down the Security Rabbithole Paul’s Security Weekly Sec...
Fri, September 23, 2022
Charlie Northrup is the co-founder of NeurSciences, a software technology, architecture, and solutions development company that provides there artificially intelligent digital brain applications to integrate, manage, and automate the things that truly matter to us. He’s focused on the digital transformation of the web into an ecosphere of ecosystems operated by and for the benefit of intelligent agents, working for individuals, households, and organizations. Co-hosts Mike Elkins and Rohan L...
Fri, September 09, 2022
Arun Vishwanath, a leading expert in human cyber risk, has held faculty positions at the University at Buffalo, Indiana University, and the Berkman Klein Center for Internet & Society at Harvard University. He has published close to 50 peer-reviewed papers on human cyber vulnerabilities and also written for CNN, The Washington Post, and other major media outlets. Special co-host Dr. Matthew Canham joins me as well. Matt is an expert in Cognitive Psychology, Social Engineering and the Hu...
Fri, August 26, 2022
Jeff Jockisch is a privacy expert with experience in privacy rights, privacy laws, data breaches, intrusion detection, as well as other areas, such as cognitive computing, content development and trust systems. He is also cohost of “Your Bytes, Your Rights” podcast. Dave Burnett is the head of global business development at Zero Biometrics. He’s a serial entrepreneur who brings global executive expertise and experience from private and public companies into the security, biometric, and digi...
Thu, August 11, 2022
Alyssa Miller is a life-long hacker and experienced security executive. She has a passion for security which she advocates to fellow business leaders and industry audiences both as a high-level cyber security professional and through her presence in the security community. She blends a unique mix of technical expertise and executive experience to bridge the gap that can often form between security practitioners and business leaders. Her goal is to change the way we look at the security of our...
Fri, July 29, 2022
Anastasia Edwards is an innovative thinker and Cybersecurity Professional with refreshing soft skills in empathy, emotional intelligence, awareness communications, and cultural change implementation. Her sweet spot is melding Cybersecurity Awareness together with Insider Threat monitoring and detection. She is a forward thinking Cybersecurity professional with dreams and aspirations of bringing Cybersecurity awareness and best practices for a safer digital lifestyle, to people all over the wo...
Fri, July 15, 2022
Mark, aka @LargeCardinal is a researcher and Technical Specialist in Quantum Cybersecurity and ML at a bank. He has specialist knowledge in many areas, including cryptography, embedded systems, quantum information and maths. He has contributed a chapter to various papers and a book, and consults to numerous companies and research groups, including academic and commercial. Victoria, @V__Wave has worked with several startups in wide ranging areas, from deep tech for cybersecurity to consumer ...
Mon, June 27, 2022
Pablos Holman is a notorious hacker, inventor, entrepreneur and technology futurist who thinks differently to solve the world’s biggest problems by inventing new technology. At The Intellectual Ventures Lab, he has worked on a brain surgery tool, a machine to suppress hurricanes, 3D food printers, and a laser that can shoot down mosquitos – part of an impact invention effort to eradicate malaria with Bill Gates. Previously, Pablos helped build spaceships with Jeff Bezos at Blue Origin, the wo...
Tue, June 21, 2022
Frankie McRae is a storied former US Army Special Forces soldier and assault team leader. Since his retirement, Frankie has developed Range 37PSR, founded Raidon Tactics (a premiere training organization), deployed all over the world as a contractor to both combat zones and disaster areas, and taken the stand as an expert witness in homicide cases involving soldiers brought charged with shootings during combat operations. We catch up at the bar to discuss his storied experience, mission pla...
Thu, June 16, 2022
Experienced Intelligence Analyst and creator of the Cognitive Stairways of Analysis Framework, Nicole Hoffman has a passion for developing the analytic tradecraft. Her work, research, and presentations have inspired and educated others around the international analytic community. For someone diagnosed with ADHD, intelligence analysis can be mentally taxing. An experienced speaker, Nicole developed frameworks to dive deeper into the process of sensemaking in order to increase her analytic capa...
Tue, May 17, 2022
For those unfamiliar with the snowboarding slang term Shred, it means “to ride with exceptional speed, ability, or enthusiasm, especially in difficult terrain and conditions”. Sumo Logic’s CSO, George Gerchow, applies this methodology whether it’s by way of Board, or by Way of Life. George has been carving up IT and Systems Management territory for over 20 years. His background has allowed him to gain unmatched expertise in the areas of security, compliance, and cloud computing. His thought...
Fri, May 06, 2022
Louis Rosenberg, PhD is a technology pioneer in fields of virtual reality (AR), augmented reality (AR) and artificial intelligence (AI). He founded Unanimous AI to amplify the intelligence of networked human groups using the biological principle of Swarm Intelligence combined with AI. The idea panned out, resulting in Swarm AI, an award-winning technology used by a wide range of organizations from Fortune 500 corporations to the United Nations. Rosenberg created the Virtual Fixtures platfor...
Fri, April 01, 2022
The YinYang philosophy says that the universe is composed of competing and complementary forces governed by a cosmic duality, sets of two opposing and complementing principles or energies that can be observed in nature. Similarly, the nature of offensive security requires a balance of proper mindset and technical expertise. To truly master this security discipline, you must learn to balance and draw from different sides of experiences in life, including the psychological aspect as well as the...
Tue, March 08, 2022
Matt Barnett is a nationally recognized expert on physical and cybersecurity, incident response, identity theft, and digital forensics. His expertise is backed by decades of combined information security and law enforcement experience. As a certified forensic analyst, Matt conducts various investigations for clients in the public and private sectors. It is with his technical competency, professionalism, and strategies, that he is able to protect his clients from threats and cyberterrorism. Ed...
Tue, February 22, 2022
Gummo is a former blackhat hacker and reverse engineer turned whitehat who has been breaking shit since '86. His success has been attributed to a unique gift we discuss as well as his extensive knowledge of defeating secure networks and physical vectors. His deep understanding of crypto allowed him to create four supercomputers that were able to mine more than 5.1 billion U.S. dollar’s worth of bitcoin. He has also created high capacity, ultra-secure systems and networks for trading & hed...
Tue, February 15, 2022
Jim Tiller is a security executive with over two decades of information security experience, leadership, a history of outstanding performance and growth, business turnarounds, and global recognition for innovation in security strategies and execution. He currently serves as the global CISO for Harvey Nash Group. He joins me at BarCode to discuss organizational targets that have typically stayed in the shadows, security challenges associated with those organizations, the COVID “accelerator”,...
Thu, February 03, 2022
Adi Elliott is the Chief Revenue Officer at Canopy, Data Breach Response Software. He has extensive experience building and leading high-performance marketing, sales, product, and strategy teams. He’s also held leadership roles at three companies with $100M+ liquidity events, led multiple marketing and product teams recognized for innovation, and led the positioning, branding, and definition of three of the strongest corporate & product brands in the eDiscovery market. He has deep experie...
Fri, January 21, 2022
Igor Volovich has built a career as a global CISO, strategist, advisor, author, speaker, and global cybersecurity leader with 20+ years of service to the world’s largest private and public-sector entities, Fortune 100 firms, and US policy, legislative, and regulatory communities. As a cyber strategy advisor and leader, he has helped large multinationals develop and execute enterprise risk management programs designed to protect hundreds of millions of consumers and billions of dollars in as...
Sun, January 09, 2022
Regina Bluman is an infosec professional who previously worked in IT Marketing for almost a decade, before leaving the dark side and moving across! She is an experienced panelist, guest author, podcast guest, and was recently nominated as ‘Technical Employee of the Year’, ‘Role Model of the Year’, ‘Rising Star’, and ‘Woman of the Year’ in the CRN Women in Channel Awards. She also volunteers for the Cyber House Party and is part of the Ladies of London Hacking Society. When not working, Regina...
Fri, December 17, 2021
Dr. Magda Chelly is a keynote speaker, serial entrepreneur and a senior security expert. She is a strong activist for women in security, and founded Women on Cyber in Singapore, which is focused on supporting female professionals in the industry. She’s is also the founder of of Responsible Cyber, and a member of the Advisory Board for the Executive Summit at Black Hat Asia. She has conducted research on Cyber Security, the future of localization and positioning, education and more, with publi...
Fri, December 03, 2021
The US government and military have recently confirmed investigations and sightings of UFOs, reigniting the phenomenon of aliens among us. Ironically, an unidentified spaceship descends into BarCode, and official contact is made. Sherri Davidoff is the CEO of LMG Security and the author of “Data Breaches.” She is a recognized expert in cybersecurity and data breach response, co-author of Network Forensics: Tracking Hackers Through Cyberspace and is the subject for the book , Breaking and En...
Thu, November 18, 2021
In recent years, there has been significant consumer demand for instant payments through their mobile phones. Unfortunately, the security aspect of mobile NFC payments has been ignored and mobile wallet theft is real threat. Timur Yunusov is a Security Expert in the area of payment security and application security, one of the organizers of Payment Village. He has authored extensive research in the field of payment security. He regularly speaks at conferences and has previously spoken at Can...
Thu, November 11, 2021
At this moment, more than 70% of us are currently compromised by cybersecurity attacks that we underplay, ignore, or simply aren’t aware of because of their hyper-stealthy and invisible nature. In fact, most individuals and businesses will have been compromised for more than 3 years before they realize what’s happened. It's vital to help other's understand the genuine threat of cybersecurity attacks while delivering steps they can take to quickly and easily develop a proactive plan to mitigate exposure and damage and ensure the security of their businesses, their families, and their futures. Dr. Eric Cole, AKA the OG, is a former CIA hacker, cybersecurity commissioner to the Obama administration, and advisor to clients including the Obama family, Bill Gates, Lockheed Martin, and McAfee. Eric stops by BarCode, and special co-host Mike Elkins and I engage in a conversation with him that includes translating the importance of cybersecurity to executives, the importance of technical aptitude needed for a CISO role, dealing with haters, risk taking, his new book and more! Tony the Bartender empowers us with the "Godfather". This episode is sponsored by Nucleus Security. CONNECT WITH US Become a Sponsor Support us on Patreon Follow us on LinkedIn Tweet us at @BarCodeSecurity Email us at info@thebarcodepodcast.com Thanks for listening, and we will see you next round!
Wed, October 27, 2021
Predicted to be a $20 Billion cybercrime empire by the end of 2021, Ransomware is impacting businesses like never before… resulting in loss of revenue, reputation, and resources for organizations of all types. To put things in perspective, it is reported that an attack hits once every 11 seconds, and as if that stat isn’t hard enough to fathom, it’s predicted to worsen in the near future. As the war against Ransomware continues, I catch up with Ransomware-focused expert Greg Edwards at BarCod...
Mon, October 18, 2021
Organizations are increasingly adopting a Zero Trust model, which is based on the philosophy that there should be no implicit trust in a corporate network. Rooted in the principle of “Never Trust, Always Verify”, Zero Trust is designed to protect modern digital environments against successful data breaches. While it has existed for over a decade, Zero Trust is one of the most misused “buzzwords” in the industry today. Vendor marketing and other misleading data has unfortunately caused mass co...
Mon, October 04, 2021
Engines require three vital elements to generate power: AIR, SPARK, and FUEL. If any of these three elements aren’t present, the engine will struggle to function or even start. Fuel injectors are a vital part of a complex system that delivers the fuel to an engine, so it’s a critical component for ensuring successful ignition. In the startup world, air and spark may come naturally… such as an idea, concept, or solution to a major problem. Although, let’s think of the third element, FUEL, as s...
Fri, September 24, 2021
A former data scientist at Facebook, Sophie Zhang was tasked with investigating “fake engagements” although instead, discovered global political manipulation and opposition harassment in 25 countries. She was fired from Facebook in September 2020, after declining a $64,000 severance package attached to an NDA, restricting her ability to speak publicly about it. Upon leaving, she posted a 7,800 word departure letter to Facebook’s internal message board outlining Facebook’s failure to combat po...
Thu, September 16, 2021
A former data scientist at Facebook, Sophie Zhang was tasked with investigating “fake engagements” although instead, discovered global political manipulation and opposition harassment in 25 countries. She was fired from Facebook in September 2020, after declining a $64,000 severance package attached to an NDA, restricting her ability to speak publicly about it. Upon leaving, she posted a 7,800 word departure letter to Facebook’s internal message board outlining Facebook’s failure to combat po...
Tue, September 07, 2021
nu·cle·us /n/ : the central and most important part of an object, movement, or group, forming the basis for its activity and growth. Having a nucleus to your Threat and Vulnerability Management Program is critical, as well as having an established TVM program itself. In this episode, I chat with Scott Kuffer, co-founder and COO of Nucleus Security. He is an expert in vulnerability management and workflow optimization. We discuss the critical pillar of cybersecurity and his Nucleus Security program. Tony the Bartender unifies sources for a "Gin Rickey". CONNECT WITH US Become a Sponsor Support us on Patreon Follow us on LinkedIn Tweet us at @BarCodeSecurity Email us at info@thebarcodepodcast.com Thanks for listening, and we will see you next round!
Tue, August 31, 2021
Jacob Horne is the Managing Director at DEFCERT where he specializes in DFARS and CMMC level three compliance for manufacturers in the Defense Industrial Base. As a former NSA intelligence analyst and U.S. Navy cryptologic technician, Jacob has over 14 years of experience in offensive and defensive cybersecurity operations. As a civilian he has led Governance, Risk, and Compliance teams at AT&T, Northrop Grumman, and the NIST Manufacturing Extension Partnership. He has developed and taugh...
Tue, August 24, 2021
William Lin became an avid technology enthusiast after building his very first computer in elementary school and then began experimenting with the latest venture-backed consumer business models in his spare time. He is now Managing Director and a founding team member at ForgePoint Capital, a VC firm focused on cybersecurity startups. he has worked with more than 20 cybersecurity companies to date. In his spare time he enjoys connecting friends, enabling serendipity and building communities. ...
Tue, August 17, 2021
Dr. Matthew Canham is the CEO of Beyond Layer 7 (a cybersecurity consulting firm specializing in human security and data analytics), and a Research Professor of Cybersecurity at the Institute of Simulation and Training, University of Central Florida. Previously, as a federal investigator, Dr. Canham investigated cybercrimes, intellectual property theft, and insider threats. He holds a PhD in Cognitive Neuroscience with specialized expertise in human-centered security, data analytics, and beha...
Fri, August 06, 2021
Re-running this great chat with Ron Gula from the early days! A fierce visionary, Ron Gula has redefined the security landscape and continues to do so. From co-creating Tenable, developing Dragon IDS, and now serving as President of Gula Tech Adventures, his incredible story is far from over. He joins me at the bar to discuss the conception of Tenable, his "Data-Care" approach, challenges during the COVID era, Cybersecurity’s #1 myth, advice for entrepreneurs and his new foundation which will provide millions of dollars in competitive grants to cybersecurity non-profits. Tony the Bartender rings in a “Manhattan”. CONNECT WITH US Become a Sponsor Support us on Patreon Follow us on LinkedIn Tweet us at @BarCodeSecurity Email us at info@thebarcodepodcast.com Thanks for listening, and we will see you next round!
Fri, July 30, 2021
The quickly growing field of vendors in cybersecurity getting attention of security leaders is becoming more difficult by the day. The fatigue of the continuous vendor attempts to fill up their time is very real. Getting your solution seen and even getting a few minutes with these leaders requires a tactical and strategic approach and proving your value with the time you get is more important than ever. Cybersecurity Sales experts Neil Saltman and Doug Gotay stop by BarCode to di...
Fri, July 23, 2021
Brazilian Jiu-Jitsu (BJJ) is extremely difficult to master since it goes against conventional thinking. It is procedural and it is technical. While in combat, chaos ensues although the fighters must stay laser focused. Just as one needs to apply the proper technique in BJJ, cybersecurity professionals must find ways to creatively apply their techniques in unconventional attack scenarios as well. It’s proven that implementing fundamental BJJ concepts and principles will help strengthen the cor...
Fri, July 16, 2021
Cyber threats still exist in the sky. Therefore, security controls within the Aviation industry is needed to protect the aircraft vessel, as well as it’s interconnected technology. Past investigations performed by hackers, researchers, and flight authorities have cast doubt on the industry’s perceived culture of safety. The need to address the novel challenges posed by modern-day cyber threats is evident and the importance is often overlooked. Nothing less than pure havoc would occur if compr...
Fri, July 09, 2021
Paul Asadoorian is a security veteran that has spent time “in the trenches” implementing comprehensive security programs across a wide array of industries. A proven cybersecurity leader and innovator, Paul founded “Security Weekly” – a podcast network providing free knowledge for the entire security community to benefit from. As former Product Evangelist for Tenable, Paul built a library of materials on the topic of vulnerability management. He has also spent time as an instructor for The SAN...
Fri, July 02, 2021
John Sileo left hi-tech consulting and became an entrepreneur to reclaim his greatest priority – being present, every day, for his wife Mary and their dream of starting a family. Six successful years, a $2M business and two precious daughters later, he lost it all to cybercrime. Because the cybercriminal, a company insider, masked the crimes using John’s identity, John was held legally and financially responsible for the felonies committed. The losses destroyed his company, decimated his fina...
Fri, June 18, 2021
Videogame studios are under serious attack, partly because they don't need to adhere to the same security requirements and regulatory demands as more prominent industries. From an attacker's viewpoint, it's very lucrative. Not only are game developers at risk for attack, so are the gamers themselves. Access to one's XBOX LIVE account, or game profile could cause irreversible damage in gameplay as well as personal financial loss. Matt Huysman, Co-Founder and COO of Cyrex, specializes in softwa...
Fri, June 11, 2021
"AM I NEXT???" That's a question CEOs WORLDWIDE are asking themselves. Recent Ransomware attacks on JBS and the Colonial Pipeline have certainly elevated alert levels, although Ransomware remains an industry plague. With seemingly no end in sight, the attacks continue to cripple businesses while making its perpetrators millionaires. Aviv Grafi is CEO & Founder of Votiro, an award-winning cybersecurity company specializing in neutralizing weaponized files of all kinds through Secure File G...
Fri, June 04, 2021
Joe Grand is an electrical engineer, hardware hacker, product designer and the founder of Grand Idea Studio, Inc. He specializes in creating, exploring, manipulating, and teaching about electronic devices. Also known as Kingpin, Joe was a member of the legendary hacker group L0pht Heavy Industries, where he helped raise awareness of the hacker ethos and the importance of independent security vulnerability research. He also brought engineering to the masses as a co-host of Discovery Channel’s ...
Fri, May 28, 2021
At this moment, more than 70% of us are currently compromised by cybersecurity attacks that we underplay, ignore, or simply aren’t aware of because of their hyper-stealthy and invisible nature. In fact, most individuals and businesses will have been compromised for more than 3 years before they realize what’s happened. It's vital to help other's understand the genuine threat of cybersecurity attacks while delivering steps they can take to quickly and easily develop a proactive plan to mitigat...
Fri, May 14, 2021
In Cybersecurity, we aim to protect the most valuable assets. In the games of chess, that asset is the king. Developing a successful chess strategy requires time, effort, and patience. There is also no universal strategy, and every move a player makes is crucial. In this episode, the iconic Security Blogger and co-host of the popular Smashing Security podcast, Graham Cluley visits Barcode. We talk about his influencers, Cybersecurity's biggest challenge currently, Buzzword buzzkill, NFTs, th...
Fri, May 07, 2021
Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. At one point in time, the Social Security number was described as the skeleton key needed to unlock theft of your assets, your identity, and your life. Although that's since changed, and the skeleton key now is much more accessible... and it's ease of obtainability may surprise you. Ada...
Fri, April 30, 2021
A Flying Fish will leap out of the water and use its winglike pectoral fins to glide over the surface. Then, once below the surface, it is out of site and flows amongst the others in different directions until it appears above water again. Rohan Light is an expert on governance, strategy and risk capability throughout the data, evidence and decision management value chain. He is also well versed in Artificial Intelligence, trusted data use and platform governance. He, along with special co-h...
Fri, April 23, 2021
Social engineering is the art of exploiting human psychology. There is no perimeter defense for this method of infiltration. Known as the “People Hacker”, Jenny Radcliffe has spent a lifetime learning how to use the human element to gain access to the buildings, data and information, and the things we would wish to keep private. Her main objective is to smash security measures, using psychology, con-artistry, subliminal linguistics, cunning and guile. She’s an international keynote speaker, T...
Fri, April 16, 2021
Nato Riley takes what others know to be true and is still able to find something hidden below the surface. It’s a mind frame that proves that seeing the invisible is not impossible. Equipped with true XRAY Vision, Nato joins me at the bar to discuss DevSecOps beyond the SDLC, Security Maturity, his homegrown "Olympiad" SIEM, Man VS Machines, and the potential of technology takeover. SYMLINKS LinkedIn YouTube – NATO AS CODE Cloud Underground Blumira The Tavern (Colorado) DRINK INSTRUCTION C...
Fri, April 09, 2021
The 2020 Xfinity Cyber Health Report cites an estimate that 854 million connected-home devices will be shipped by manufacturers in 2020, with that number is projected to grow to nearly 1.4 billion by 2024. Most of the consumers of these products don’t realize is that once a smart devices goes online, it poses serious security risks. Tony Reinert manages the DevSecOps Transformation program for Comcast, the largest cable TV company and largest home Internet service provider in the United Stat...
Fri, April 02, 2021
The major cause of insecurity is the lack of secure software development practices. It’s crucial to understand the importance of security within the SDLC. Jim Manico is the founder of MANICODE Security where he trains software developers on secure coding and security engineering. He stops by BarCode to help us define “DevSecOps”, building an Effective CI/CD Pipeline, the differences between SAST/SCA/RASP/DAST and IAST, Security Team/ Development Team Cohesion, what most organizations GET WRO...
Fri, March 26, 2021
Overseeing security and privacy challenges in COVID era is an extremely difficult task, and it’s even more complicated if you’re a Healthcare CISO. You must monitor the vital signs of your security program while keeping the pulse on threat vectors and adversaries. Anahi Santiago meets with me at the bar to discuss being a CISO during the pandemic, medical device security, Ransomware, advice for aspiring healthcare security professionals and more. SYMLINKS Linkedin HIMSS ChristianaCare DRIN...
Fri, March 19, 2021
The great Philosopher Seneca once said "While we teach, we learn”. The Protege Effect states that the best way to learn is to teach someone else. This powerful theory is further explained by cybersecurity leader and mentor, Naomi Buckwalter during her stop at Barcode. We also get into topics such as cybersecurity mentoring, privacy post-pandemic, cybersecurity myths, Philly Tech Sistas, stopping cybercrime, breaking into cyber, advice for cybersecurity recruiters, and much more. SYMLINKS Li...
Fri, March 12, 2021
Data is always the main target in an attacker’s scope. Therefore, organization’s should take a “data first” approach to preventing a strike that could cripple them with one shot. I catch up with Purandar Das, Founder and CEO of Sotero, to discuss his data protection strategy. Purandar started Sotero with the conviction that today’s data protection was deficient and that a better approach was needed to protect data. He is a firm believer that security, where the core focus is not the data, is ...
Fri, March 05, 2021
Debbie Reynolds, AKA “The Data Diva,” is a world-renowned technologist, thought leader and advisor to multinational corporations for handling global data privacy, cyber data breach response, and complex cross-functional data-driven projects. She's also an internationally published author, highly sought-after speaker, and top media presence for global data privacy, data protection, and technology issues. Debbie joins me at the bar to discuss data privacy in the pandemic era, streamlining cryp...
Fri, February 26, 2021
nu·cle·us /n/ : the central and most important part of an object, movement, or group, forming the basis for its activity and growth. Having a nucleus to your Threat and Vulnerability Management Program is critical, as well as having an established TVM program itself. In this episode, I chat with Scott Kuffer, co-founder and COO of Nucleus Security. He is an expert in vulnerability management and workflow optimization. We discuss the critical pillar of cybersecurity and his Nucleus Security p...
Fri, February 19, 2021
An aviator is an expert of the skies and must know how to properly navigate through clouds. Fully understanding cloud formations and their potential dangers when flying is a vital part their profession. Flying through clouds is just like driving through fog – little visibility can represent extreme danger for those unaware of the circumstance. To help us understand, Cloud Security expert Ashish Rajan, host of the popular Cloud Security Podcast, joins me and my special co-host Mike in BarCod...
Fri, February 12, 2021
Often, data goes Absent Without Official Leave. No one within the organization grants it permission to vacate the premises. How do organizations protect and secure their data and stay ahead of the bad actors? A data breach is the intentional or unintentional release of private/confidential information to an untrusted environment. It's extremely crucial that the risk and consequences of a data breach transcends to the public. Confidentially is the 1st tenant in the CIA triad. For those who may...
Fri, February 05, 2021
To defend against modern day hackers, you must train your mind to think like one. Ted Harrington is the author of "HACKABLE: How To Do Application Security Right", which is an Amazon BEST SELLER in 9 Categories. He is also Executive Partner at Independent Security Evaluators (ISE), the security organization famous for hacking everything from cars to medical devices to smartphones, and more. Ted has been named both Executive of the Year and 40 Under 40. He also co-founded and organizes the pop...
Fri, January 29, 2021
A "Suplex" is an offensive move used in wrestling by which an attacker uses his weight to throw a defender. Phillip Wylie’s unusual journey into the field of cybersecurity is preceded by his career as a powerlifter and pro wrestler for the WCW. He has since taken full control in the industry as an offensive security professional. He is an established Red Teamer, Pentester, Ethical Hacking Instructor, and founder of the PWN School Project - an education focused cybersecurity organization that ...
Fri, January 22, 2021
HD Moore, famed developer of the wildly used Metasploit penetration testing tool spoke with me about his current focus, RUMBLE, in addition to his perspective on bug bounty programs, advice for aspiring pentesters and more. Of course, we also discussed the happening bar scene in Austin TX and how the city has become known as Silicon Hills. SYMLINKS Metasploit WarVox Axman Project SONAR Legion of Doom Masters of Deception Apache Win32 Chunked Encoding exploit TESO (Austrian hacker group) ADM ...
Fri, January 15, 2021
Grayson Milbourne is the Security Intelligence Director for Webroot, Inc., an OpenText company that focuses on endpoint security and threat intelligence. He joins me at the bar to discuss new and emerging threats, securing our homes during the COVID era, IoT security and cybersecurity trends we should expect to develop in 2021 and beyond. SYMLINKS OpenText WebRoot Emotet LOLbinz Egregor Ransomware Detecting Deepfakes with mice DRINK INSTRUCTION LONG ISLAND IoT 1/2 oz Vodka 1/2 oz Rum 1/2 o...
Fri, January 01, 2021
Currently the Senior Director for Cyber Intelligence Strategy for Anomali, A.J. Nash is a cyber intelligence strategist and public speaker focused on building cyber intelligence programs that capitalize on disparate data and information to create and deliver tactical, operational, and strategic intelligence to protect personnel, facilities, data, and information systems. I speak with him about the cultural differences in Cybersecurity between the Government and Private Sector, his time spent...
Fri, January 01, 2021
A fierce visionary, Ron Gula has redefined the security landscape and continues to do so. From co-creating Tenable, developing Dragon IDS, and now serving as President of Gula Tech Adventures, his incredible story is far from over. Ron joins me at the bar to discuss the conception of Tenable, his "Data-Care" approach, challenges during the COVID era, Cybersecurity’s #1 myth, advice for entrepreneurs and his new foundation which will provide millions of dollars in competitive grants to cybers...
Fri, December 18, 2020
Internationally renowned security guru, privacy specialist and author, Bruce Schneier, stops by BarCode to discuss the FireEye Hack, Covid-19 Vaccine Cold Chain Attacks, CISA, and Net Neutrality. SYMLINKS Schneier on Security EFF Section 230 WE HAVE ROOT The Aspen Cybersecurity Institute DuckDuckGO You.com Inrupt Back Bar (Cambridge Mass) Triple Crown (Whiskey sour with grapefruit liquor) PDT (NYC) Jub-Jub at Callooh Callay – London, UK Volstead’s Emporium (Minneapolis, Minn) DRINK INSTRUC...
Fri, December 04, 2020
Open source intelligence (OSINT) describe the techniques used to gather information online from publicly available sources. This methodology can be used to target specific individuals for nefarious purposes, or alternatively, provide direct evidence against perpetrators and bring them to justice. Stephen Adams, Intelligence specialist with a focus in Internet Investigations and based in the UK, speaks with me about OSINT, SOCMINT, ethics and available tools. We also discuss "Intelligence Wit...
Mon, November 23, 2020
I have the privilege of speaking with an AI trailblazer and a member of Forbes 30 Under 30, Przemek Chojecki. We discuss "Contentyze", a platform he created that aims to fix the inefficiencies in journalism with automated content generation. We also talk Machine Learning, Deepfake Technology, and also where the intersection of AI and Cybersecurity meet. SYMLINKS Linkedin Account Twitter Account Medium Blog Contentyze Explainable AI OpenAI’s GPT3 Vocal Synthesis WaveNet by DeepMi...
Tue, October 20, 2020
It's a BarCode NCSAM/ HALLOWEEN special, where I speak with established author and iconic security professional who is no stranger to disguises, deception and duplicity - Ira Winkler! We discuss security awareness, his time in the NSA, Secure Mentem, his new book "You CAN Stop Stupid", and some of his insane espionage expeditions that make James Bond look like 006. The virtual bartender social engineers a scary good Dracula Margarita. SYMLINKS LinkedIn Account Twitter Account Personal Websit...
Wed, October 14, 2020
I tap into the knowledge of Stan Ivanov, industry expert in Secure Programming, Cryptography and Entrepreneurship. We verbally decipher Cryptocurrency, Quantum Crypto, "Secure My Files" and advice for Start-Ups. SYMLINKS LinkedIn Secure Monkey YCombinator Startup School Monero Code Crackers IPFS – InterPlanetary File System DRINK INSTRUCTION SAPPHIRE ALPINE 1 oz Gin 1 oz Blue Curacao 1 oz Peach Schnapps Combine, shake and then pour into a chilled glass. CONNECT WITH US www.barcodesecurity.c...
Fri, October 09, 2020
Cybersecurity and 3D Printing unite! Cybersecurity professionals Gabriel Doncel and Scott Darkow meet up with me at the bar to discuss cyber risk involving both personal and enterprise-grade 3D printing. SYMLINKS 3D Prints (Guest Showcase) OctoPrint Raspberry Pi TinkerCAD Fusion 360 Invasion of Privacy and Tracking via 3D Printed watermarks QR to STL Thingiverse Cults3D My Mini Factory DRINK INSTRUCTION NEXT-GEN FIREBALL 1 pint of cold apple cider beer 1 shot of Fireball Combine into pint g...
Tue, October 06, 2020
Security legend Troy Hunt stops by to discuss cyber attack vectors in the COVID era, VPNs, IoT Security and why he decided to opensource HIBP. SYMLINKS Pluralsite Blog NordVPN HaveIBeenPwned Twitter Account Shelly Cloud PiHole DRINK INSTRUCTION BLUE MONDAY 1 1/2 oz Vodka 3/4 oz Blue Curacao 1/2 oz Triple Sec 1/2 oz Dry Vermouth 2 dashes of orange bitter Shake all ingredients with ice and fine strain into a chilled glass. CONNECT WITH US www.barcodesecurity.com Become a Sponsor Follow us on L...
Wed, September 30, 2020
Joshua Feldman, VP of Security Architecture and Engineering at Radian joins me at the bar to discuss Strategy, APPSEC, and Advice for Cyber-Sales Professionals. SYMLINKS CISSP Study Guide DRINK INSTRUCTION KAMIKAZE 1 1/2 oz vodka 1 oz triple sec 1 oz lime juice Add the vodka, triple sec and lemon lime soda to a shaker with ice and shake thoroughly until well-chilled. Strain into glass. CONNECT WITH US www.barcodesecurity.com Become a Sponsor Follow us on LinkedIn Tweet us at @BarCodeSecurit...
loading...