Download the App!

show episodes
 
Cybersecurity with 1337% ABV. BarCode is a place where Cybersecurity professionals can unite in a relaxed atmosphere while getting to hear experts opensource their wisdom and insight....outside of conference walls. Untap the knowledge of an industry guru, find out what fuels their drive, or simply kick back, relax, and listen to their story. Due to COVID-19 restrictions, most bars are limited or closed for on-prem service. Therefore, each episode will feature Tony, a virtual bartender who wi ...
 
Loading …
show series
 
The 2020 Xfinity Cyber Health Report cites an estimate that 854 million connected-home devices will be shipped by manufacturers in 2020, with that number is projected to grow to nearly 1.4 billion by 2024. Most of the consumers of these products don’t realize is that once a smart devices goes online, it poses serious security risks. Tony Reinert ma…
 
The major cause of insecurity is the lack of secure software development practices. It’s crucial to understand the importance of security within the SDLC. Jim Manico is the founder of MANICODE Security where he trains software developers on secure coding and security engineering. He stops by BarCode to help us define “DevSecOps”, building an Effect…
 
Overseeing security and privacy challenges in COVID era is an extremely difficult task—and it’s even more complicated if you’re a Healthcare CISO. You must monitor the vital signs of your security program while keeping the pulse on threat vectors and adversaries. Anahi Santiago meets with me at the bar to discuss being a CISO during the pandemic, m…
 
The great Philosopher Seneca once said "While we teach, we learn”. The Protege Effect states that the best way to learn is to teach someone else. This powerful theory is further explained by cybersecurity leader and mentor, Naomi Buckwalter during her stop at Barcode. We also get into topics such as cybersecurity mentoring, privacy post-pandemic, c…
 
Data is always the main target in an attacker’s scope. Therefore, organization’s should take a “data first” approach to preventing a strike that could cripple them with one shot. I catch up with Purandar Das, Founder and CEO of Sotero, to discuss his data protection strategy. Purandar started Sotero with the conviction that today’s data protection …
 
Debbie Reynolds, AKA “The Data Diva,” is a world-renowned technologist, thought leader and advisor to multinational corporations for handling global data privacy, cyber data breach response, and complex cross-functional data-driven projects. She's also an internationally published author, highly sought-after speaker, and top media presence for glob…
 
An aviator is an expert of the skies and must know how to properly navigate through clouds. Fully understanding cloud formations and their potential dangers when flying is a vital part their profession. Flying through clouds is just like driving through fog – little visibility can represent extreme danger for those unaware of the circumstance. To h…
 
Often, data goes Absent Without Official Leave. No one within the organization grants it permission to vacate the premises. How do organizations protect and secure their data and stay ahead of the bad actors? A data breach is the intentional or unintentional release of private/confidential information to an untrusted environment. It's extremely cru…
 
To defend against modern day hackers, you must train your mind to think like one. Ted Harrington is the author of "HACKABLE: How To Do Application Security Right", which is an Amazon BEST SELLER in 9 Categories. He is also Executive Partner at Independent Security Evaluators (ISE), the security organization famous for hacking everything from cars t…
 
A "Suplex" is an offensive move used in wrestling by which an attacker uses his weight to throw a defender. Phillip Wylie’s unusual journey into the field of cybersecurity is preceded by his career as a powerlifter and pro wrestler for the WCW. He has since taken full control in the industry as an offensive security professional. He is an establish…
 
Grayson Milbourne is the Security Intelligence Director for Webroot, Inc., an OpenText company that focuses on endpoint security and threat intelligence. He joins me at the bar to discuss new and emerging threats, securing our homes during the COVID era, IoT security and cybersecurity trends we should expect to develop in 2021 and beyond. Deepfake …
 
Currently the Senior Director for Cyber Intelligence Strategy for Anomali, A.J. Nash is a cyber intelligence strategist and public speaker focused on building cyber intelligence programs that capitalize on disparate data and information to create and deliver tactical, operational, and strategic intelligence to protect personnel, facilities, data, a…
 
A fierce visionary, Ron Gula has redefined the security landscape and continues to do so. From co-creating Tenable, developing Dragon IDS, and now serving as President of Gula Tech Adventures, his incredible story is far from over. He joins me at the bar to discuss Tenable, the COVID era, Cybersecurity’s #1 myth, advice for entrepreneurs and his ne…
 
Internationally renowned security guru, privacy specialist and author, Bruce Schneier, stops by BarCode to discuss the FireEye Hack, Covid-19 Vaccine Cold Chain Attacks, CISA, and Net Neutrality. I'm also joined by special guest co-host Alex, and Tony the Bartender explains his theorem for a "Blitzen". Support the show (https://paypal.me/thebarcode…
 
Open source intelligence (OSINT) describe the techniques used to gather information online from publicly available sources. This methodology can be used to target specific individuals for nefarious purposes, or alternatively, provide direct evidence against perpetrators and bring them to justice. Stephen Adams, Intelligence specialist with a focus …
 
I have the privilege of speaking with an AI trailblazer and a member of Forbes 30 Under 30, Przemek Chojecki. We discuss "Contentyze", a platform he created that aims to fix the inefficiencies in journalism with automated content generation. We also talk Machine Learning, Deepfake Technology, and also where the intersection of AI and Cybersecurity …
 
It's a BarCode NCSAM/ HALLOWEEN special, where I speak with established author and iconic security professional who is no stranger to disguises, deception and duplicity - Ira Winkler! We discuss security awareness, his time in the NSA, Secure Mentem, his new book "You CAN Stop Stupid", and some of his insane espionage expeditions that make James Bo…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login