An unofficial, companion podcast to FX/Hulu's "Devs" providing episode-by-episode analysis and general nerding out by a mother/son team
…
continue reading
Dev Diner is focused on emerging tech! We've got technology opinion pieces, interviews, links and guides for developers looking to get involved in VR, AR, wearables, IoT, AI and more! The Dev Diner Podcast is where you'll find audio versions of our recorded interviews for those who prefer to listen whilst out and about (or coding up a storm).
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Cookies are going away, Apple is limiting the data you can collect, and privacy regulations are making it difficult to target and measure the way we used to. If you're a marketer or analysts wondering how to measure your campaigns' performance, we're here to help you! Join Jim Gianoglio and Simon Poulton on the Measuring Up podcast, where they talk to marketers, analysts, and founders who are in the trenches of this new measurement world. You'll learn the best practices, tips, and actionable ...
…
continue reading
1
Decoding Threat Actor Names: Marketing, Confusion & the MITRE Solution – Jeffrey Bell
19:54
19:54
Play later
Play later
Lists
Like
Liked
19:54In this episode of the Security Repo Podcast, Jeffrey Bell, Principal Security Engineer and founder of CatchingPhish.com, discusses the confusion surrounding the naming conventions of threat actor groups across different security vendors. He explains how companies like CrowdStrike, Palo Alto, and Mandiant label the same adversaries with different n…
…
continue reading
1
Why Technical CISOs Matter and How AI Is Shaping Security Ops - David Cross on Leading Security
21:09
21:09
Play later
Play later
Lists
Like
Liked
21:09In this episode of the Security Repo Podcast, David Cross, CISO at Atlassian and former Microsoft, Google, and Oracle security leader, shares his journey from Navy electronic warfare to global cybersecurity leadership. He offers hard-won insights on breaking into the industry, the evolving demands of the CISO role, and the practical impacts of AI o…
…
continue reading
1
Identity Risks in Email: Your Inbox Might Be Lying About You – Amy Devine
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18In this episode of the Security Repo Podcast, Dwayne McDaniel sits down with Amy Devine, a systems architect who transitioned from embedded wireless systems to cybersecurity. Amy shares the eye-opening story behind her Blue Team Con talk on how misdirected emails exposed sensitive personal data and what that means for digital identity. The conversa…
…
continue reading
1
From Military Intel to CISO: Navigating Security Leadership in the Age of AI – Darren Desmond
22:54
22:54
Play later
Play later
Lists
Like
Liked
22:54In this episode of the Security Repo Podcast, we sit down with Darren Desmond, a seasoned CISO with a background in UK military intelligence, to unpack his unconventional journey from fish and chips to threat intelligence. He shares how his military forensics experience shaped his InfoSec leadership and dives deep into the evolving role of the CISO…
…
continue reading
1
Driving Business Growth through Experimentation - with Kelly Wortham & Ton Wesseling
50:36
50:36
Play later
Play later
Lists
Like
Liked
50:36Version A: Join Simon and Jim as they babble about button colors while the experts tell them what really matters in experimentation. Version B: Have you ever wondered what makes for a great experimentation culture? (Let us know in the comments which version you prefer!) We were lucky to talk with Kelly Worthham and Ton Wesseling, both experts in de…
…
continue reading
1
Mapping the InfoSec Community: Building InfoSecMap & Global Security Events – Martín Villalba
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04In this episode of the Security Repo Podcast, we sit down with Martín Villalba, founder of InfoSecMap, to explore how his platform is transforming the way InfoSec professionals discover global events, communities, and CFPs. We dive into the origin story of InfoSecMap, its recent growth surge, and its strategic partnerships with organizations like O…
…
continue reading
1
Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx
29:34
29:34
Play later
Play later
Lists
Like
Liked
29:34Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx In this episode of the Security Repo Podcast, François Proulx, VP of Security Research at Boost Security, discusses the evolving threats in software supply chain security, particularly focusing on attacks targeting CI/CD pipelines. He explains how open source tools li…
…
continue reading
1
Fighting Tool Squatting And Prompt Injection & The Security Gaps In MCP – Srajan Gupta
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41In this episode of the Security Repo Podcast, we welcome Srajan Gupta, a security engineer exploring the evolving security implications of Model Context Protocol (MCP) servers. Shrojan breaks down how MCPs act as AI connectors to external systems and the alarming rise in attack surfaces, including tool squatting and indirect prompt injections. The …
…
continue reading
1
Fixing Hiring, Fostering Diversity, and Finding Your Place in Security – Matt Torbin
19:15
19:15
Play later
Play later
Lists
Like
Liked
19:15In this episode of the Security Repo Podcast, we sit down with Matt Torbin to explore his inspiring journey from jazz musician to cybersecurity advocate and leader. We dive deep into the origins and impact of Day of Shecurity, a one-day conference aimed at increasing representation and mentorship for women and non-binary individuals in infosec. Mat…
…
continue reading
1
Dev Engagement in Security: From Content Strategy to Community Strategy with Alyssa Miles
18:44
18:44
Play later
Play later
Lists
Like
Liked
18:44In this episode of the Security Repo Podcast, we chat with Alyssa Miles, a product marketing leader at CyberArk, about building authentic developer communities in the security space. She shares her journey from agency marketing to driving developer engagement, along with insights from Hacker Summer Camp and strategies for enabling community-driven …
…
continue reading
1
Beyond Controls: Building Trust and Communication in Security – Featuring AriaDear
19:59
19:59
Play later
Play later
Lists
Like
Liked
19:59In this episode of the Security Repo Podcast, Aria Langer returns to share deep insights from her work in privileged access management and the challenges of implementing security controls without alienating coworkers. She and Dwayne dive into the often-overlooked importance of empathy in cybersecurity, exploring how human connection can make securi…
…
continue reading
1
Misconfigurations, Legacy Landmines, and Tier Zero Truths – Jake Hildreth on Active Directory
21:37
21:37
Play later
Play later
Lists
Like
Liked
21:37In this episode of the Security Repo Podcast, we chat with Jake Hildreth, Principal Security Consultant at Semperis, about the enduring challenges of securing Active Directory in a hybrid cloud world. Jake shares war stories from the field, including dangerously misconfigured environments and the real-world impacts of legacy systems. We also explor…
…
continue reading
1
Rebuilding OWASP St. Louis & Strengthening Security Growing The Community – Andre Van Klaveren
24:52
24:52
Play later
Play later
Lists
Like
Liked
24:52In this episode of the Security Repo Podcast, Andre Van Klaveren talks about his decades-long journey through IT, software development, and application security, culminating in the reboot of the OWASP St. Louis chapter. They discuss the history and importance of OWASP, community building in a post-pandemic world, and how risk-based thinking and str…
…
continue reading
1
Teaching AppSec With Scratchers: Gamified Learning For Real-World Impact - Jenn Gile
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29In this episode of the Security Repo Podcast, Jenn Gile shares insights from her hands-on security education at DEF CON's AppSec Village, where she ran a wildly successful lottery-style dependency upgrade game. She discusses the challenges developers face with remediation, the importance of empathy in AppSec, and how gamified, tangible learning exp…
…
continue reading
1
Threat Modeling OpenSSL, Lessons from a Data Breach, and Volunteering with Narayan Ram Narayanan
18:17
18:17
Play later
Play later
Lists
Like
Liked
18:17In this episode of the Security Repo Podcast, Narayan Ram Narayanan shares his journey into cybersecurity, sparked by a personal data breach and fueled by a passion for privacy and secure development. He discusses his upcoming talk on threat modeling OpenSSL applications using STRIDE and other threat models, and highlights the value of volunteering…
…
continue reading
1
Retail Media Networks: Measurement Challenges & Opportunities with Skye Frontier
45:33
45:33
Play later
Play later
Lists
Like
Liked
45:33Ever wonder how Walmart, Kroger, Home Depot, and Instacart are different from a guy in a trench coat? They ask for consent before exposure! Join Simon and Jim as they dive into the often misunderstood world of retail media networks with Sky Frontier, EVP at Incremental.Discover why retail media is the Wild West of advertising, how it's moving up th…
…
continue reading
1
From Risk Acceptance to Community Building: Inside Security With Sean Juroviesky
19:32
19:32
Play later
Play later
Lists
Like
Liked
19:32In this episode of the Security Repo Podcast, Sean Juroviesky joins us to share their journey through cybersecurity, from finding community in BurbSec to giving talks at major conferences like DEF CON and BlueTeamCon. Sean dives deep into the realities of risk management, executive sign-off processes, and the critical importance of understanding bu…
…
continue reading
1
Tackling Deepfakes - Battling Ai-Generated Faces, Scams, Detection, And Security – Sankalp Kumar
19:51
19:51
Play later
Play later
Lists
Like
Liked
19:51In this episode of the Security Repo Podcast, Dwayne McDaniel and Sankalp Kumar dive into the world of deepfakes, how they are created using transformer models and GANs, and the real-world scams they enable. They discuss current detection techniques, including physiological analysis, iris scanning, and PKI-based authentication. Sankalp also shares …
…
continue reading
1
Security Onion - From Classroom To SOC, Open Source and Education - Matt Gracie
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32In this episode of the Security Repo Podcast, we’re joined by Matt Gracie, a seasoned blue team expert and senior engineer at Security Onion Solutions. Matt dives deep into the architecture and practical deployment of Security Onion, a powerful open-source enterprise security monitoring tool. He also shares insights from his role as a cybersecurity…
…
continue reading
1
From Code to Crypto: How Learning Fundamentals Empowers Security Pros – Matt Olmsted
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58In this episode of the Security Repo Podcast, software engineer and newly minted CISSP Matt Olmsted joins us to explore cryptographic fundamentals and why understanding them matters for anyone in security. From explaining symmetric vs. asymmetric encryption to the real-world implications of side-channel attacks, Matt delivers practical insights for…
…
continue reading
1
Inside BurbSec: From Suburban InfoSec Beers to Global Discord Community – Johnny Xmas
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04In this episode of the Security Repo Podcast, Johnny Xmas shares the grassroots story and philosophy behind BurbSec, a unique InfoSec meetup network focused on genuine community and consistent in-person engagement. He dives into the evolution from IRC to Discord, detailing how digital platforms have helped expand and sustain their hyperlocal connec…
…
continue reading
1
From Car Culture to Cybersecurity: Building Community and Skills with Christian Pinkston
22:49
22:49
Play later
Play later
Lists
Like
Liked
22:49In this episode of the Security Repo Podcast, we meet Christian Pinkston, a cybersecurity student and car culture enthusiast who's become a recognizable figure in the hacker community. Christian shares his unique journey into cybersecurity—from early experiments with hacking tools to volunteering at major conferences and running mesh networks with …
…
continue reading
1
Keeping Drupal Running With Static Code Analysis & Lessons From Drupalgeddon - Matt Glaman
20:00
20:00
Play later
Play later
Lists
Like
Liked
20:00In this episode of the Security Repo Podcast, we sit down with Matt Glaman, a veteran developer in the Drupal community, to explore the role of static code analysis in maintaining secure, performant, and upgrade-ready PHP applications. We dive into tools like PHPStan and DrupalCheck, and how they help identify deprecations and prevent security risk…
…
continue reading
1
From Phishing Scam Response to Cyber Defender: A Journey into Security - Manoj Viswanathan
25:52
25:52
Play later
Play later
Lists
Like
Liked
25:52In this episode of the Security Repo Podcast, Manoj Viswanathan shares his unconventional journey into cybersecurity, from a personal phishing incident to mastering Capture The Flag (CTF) competitions and interning at Toshiba. The conversation dives deep into the community-driven value of groups like BurbSec, the practical benefits of hands-on expe…
…
continue reading
1
Decoding the Future of SEO (Measurement) with Mike King
49:57
49:57
Play later
Play later
Lists
Like
Liked
49:57Should you measure SEO by its ability to climb a tree? Hear Mike King's take on all things SEO - how AI is disrupting the space, and how measurement is (or should be) changing for this channel.Mike King is the founder and CEO of digital marketing agency iPullRank. King's journey from battle rapping with the Wu-Tang Clan to decoding Google's algorit…
…
continue reading
1
AI, Zero Trust, And The Future Of DevSecOps In A Cloud-First World – Nivathan Athiganoor Somasundharam
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35In this episode of the Security Repo Podcast, we dive deep into the evolving role of DevSecOps with Nivathan Athiganoor Somasundharam, a technical account manager at Teleport. He shares his journey from cloud engineering to becoming a DevSecOps practitioner, emphasizing proactive security, the elimination of secrets, and the future of identity-base…
…
continue reading
1
Reducing Developer Toil, Shifting Security Left, And Using Caution With AI – Andy Dennis
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41In this episode of the Security Repo Podcast, Andy Dennis, VP at Modus Create, joins Dwayne McDaniel to unpack what "shifting left" really means for security and engineering teams. They explore the impact of hands-on security training at B-Sides events, the concept of developer toil, and the role AI tools like GitHub Copilot AutoFix are starting to…
…
continue reading
Google Marketing Live 2023: Key Announcements, AI in Search, and the Future of Measurement Simon and Jim unpack the highlights of Google Marketing Live 2025. Fresh from the conference, Simon "delves" (yes, AI was a big part) into key announcements, including AI in Search, AI Max for Search, VEO advancements, and measurement challenges. They discuss…
…
continue reading
1
Educate, Empower, Prepare: Building Inclusive Cybersecurity With Rebekah Skeete
23:26
23:26
Play later
Play later
Lists
Like
Liked
23:26In this episode of the Security Repo Podcast, we sit down with Rebekah Skeete, COO of BlackGirlsHack, to explore how her organization is increasing diversity and accessibility in cybersecurity through hands-on training, mentorship, and inclusive community building. Rebekah shares the origin story of BlackGirlsHack, their evolving programs including…
…
continue reading
1
Bridging the Gap Between Dev and Sec: Tools, Culture, and Careers - Thomas Jost
24:49
24:49
Play later
Play later
Lists
Like
Liked
24:49In this episode of the Security Repo Podcast, Thomas Jost shares his journey from software development to becoming a Senior Application Security Engineer, offering insights into the value of diverse tech backgrounds in AppSec. He discusses the real-world friction between security practices and developer workflows, especially around static analysis …
…
continue reading
1
What Tools Miss and Why Humans Matter in AppSec - Yash Shahani
18:02
18:02
Play later
Play later
Lists
Like
Liked
18:02In this episode of the Security Repo Podcast, Dwayne McDaniel sits down with Yash Shahani, a seasoned AppSec engineer and vulnerability hunter, to dive into the nuances of manual code review and the limitations of automated security tools. They explore the evolving role of AI in AppSec, its promise and pitfalls, and why human intuition still plays …
…
continue reading
1
Visualizing Data Poisoning and Rethinking Threat Detection Through Graphs – Maria Khodak
21:05
21:05
Play later
Play later
Lists
Like
Liked
21:05In this episode of the Security Repo Podcast, Maria Khodak explores how graph theory and data visualization can be used to uncover machine learning vulnerabilities like data poisoning. She explains how her work as a penetration tester intersects with research on threat detection and the importance of making abstract security concepts more human-rea…
…
continue reading
1
Plot your next move: From web dev to CRO to SaaS founder, with Sani Manić
50:41
50:41
Play later
Play later
Lists
Like
Liked
50:41Are you wondering what to do next in your career? Is AI going to leave you living in a van, down by the river? What paths have others taken through this crazy measurement industry we're in?Let's learn from a sample of 1: Sani Manić - who has gone from web dev to CRO to co-founder of a SaaS company. Find out how he transitioned across various web de…
…
continue reading
1
Building Human-Centric Security and Hacker Communities in Argentina - Ailin Castellucci
23:04
23:04
Play later
Play later
Lists
Like
Liked
23:04In this episode of the Security Repo Podcast, Ailin Castellucci shares her inspiring journey from selling shoes to building cybersecurity teams and leading human-centric education projects. She discusses the unique challenges and perspectives of cybersecurity education in Argentina, emphasizing the importance of empathy, communication, and passion …
…
continue reading
Is MMM the right solution for your company? With seasoned professionals Gabriel Franco (Founder of Cassandra) and TS Kelly (Managing Director at Arima), we go deep into the world of Marketing Mix Modeling (MMM). What does the adoption of MMM look like? What's the role of open-source tools like Meta's Robyn and Google's Meridian? When is MMM the NOT…
…
continue reading
1
From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski
20:03
20:03
Play later
Play later
Lists
Like
Liked
20:03In this episode of the Security Repo Podcast, Chris Kulakowski, a seasoned detection engineer from IBM, delves into the complexities of threat detection, from writing detection rules to collaborating with red teams for proactive security strategies. He shares insights on prioritizing security risks, the evolving role of AI in cybersecurity, and the…
…
continue reading
1
Quarantine Policies and Cloud Security Strategies for AWS – Bleon Proko
23:06
23:06
Play later
Play later
Lists
Like
Liked
23:06In this episode of the Security Repo Podcast, Bleon Proko dives into the intricacies of AWS security, focusing on the role and impact of quarantine policies in mitigating the risks of compromised credentials. He explains how AWS policies prioritize denial to prevent privilege escalation, lateral movement, and financial fraud, offering practical str…
…
continue reading
1
Helping Developers Use Open Source Security Tools & Improving Defense With AI - Mackenzie Jackson
24:19
24:19
Play later
Play later
Lists
Like
Liked
24:19In this episode of the Security Repo Podcast, we welcome back Mackenzie Jackson, security researcher and founder of this very show, to discuss the evolving landscape of AI in cybersecurity. Mackenzie dives deep into how AI is reshaping open-source security, revealing research that uncovered 600 unreported vulnerabilities in popular packages. We als…
…
continue reading
1
How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard Johansen
22:20
22:20
Play later
Play later
Lists
Like
Liked
22:20In this episode of the Security Repo Podcast, we sit down with cybersecurity expert Gerard Johansen to dive deep into identity and access management (IAM) challenges in the enterprise space. We explore the explosion of data and identities, the ongoing debate over who "owns" IAM in organizations, and how threat actors are evolving their tactics to e…
…
continue reading
1
The MMM Zeitgeist with Elea Feit & Karen Chisholm
58:25
58:25
Play later
Play later
Lists
Like
Liked
58:25A professor, an analytics director, and a podcaster walk into a bar and order a whiskey. Which brand do they order? And how does that data make it's way into a marketing mix model? That's what Simon and Jim wanted to know, so they asked Elea Feit - Associate Dean of Research and Professor of Marketing at Drexel, and Karen Chisholm, Director of Tran…
…
continue reading
1
Navigating And Defining The Evolving Role Of The CISO In Government Security - Josh Kuntz
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53In this episode of the Security Repo Podcast, we sit down with Josh Kuntz, Chief Information Security Officer (CISO) for the Texas Department of Licensing and Regulation, to explore the unique challenges of securing state agencies. With nearly three decades in public service, Josh shares his insights on navigating government cybersecurity, hiring t…
…
continue reading
1
The State And Future Of Cybersecurity Training and AIShaping The Role - Zach Hill
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36In this episode of the Security Repo Podcast, we sit down with Zach Hill from Antisyphon Training to discuss affordable cybersecurity education and the evolving landscape of IT training. Zach shares insights on the importance of hands-on learning, the challenges of misinformation in online education, and how AI is reshaping entry-level IT roles. We…
…
continue reading
1
Secrets Management With The OpenPao Project And Open Source Security - Alex Scheel
22:15
22:15
Play later
Play later
Lists
Like
Liked
22:15In this episode of the Security Repo Podcast, we sit down with Alex Scheel, staff back-end engineer at GitLab and chair of the OpenBao Technical Steering Committee, to discuss the origins and future of OpenBao, a fork of HashiCorp Vault. Alex explains the implications of HashiCorp's licensing change, the technical advantages OpenBao brings to the t…
…
continue reading
1
Is Google's Meridian a Game Changer for MMM?
45:41
45:41
Play later
Play later
Lists
Like
Liked
45:41There's been a lot of excitement about Google's recent launch of Meridian - their open-source MMM framework. But does it live up to the hype? Jim and Simon explore what sets Meridian apart from other tools like Meta's Robyn and PyMC Marketing. They also discuss the evolution and impact of open-source MMM, the role of new data streams such as Google…
…
continue reading
1
Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna Jonssen
22:45
22:45
Play later
Play later
Lists
Like
Liked
22:45In this episode of the Security Repo Podcast, we sit down with Edna Jonnson, a cybersecurity engineer and SOC analyst, to discuss their journey from web development to security operations. Edna shares insights on the value of Capture the Flag (CTF) competitions for skill development, recounting their recent victory at Wild West Hacking Fest. We als…
…
continue reading
1
Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John Poulin
41:51
41:51
Play later
Play later
Lists
Like
Liked
41:51In this episode of the Security Repo Podcast, we dive into the concept of defense in depth with guest John Poulin, who shares insights on secure code reviews, architecture design, and threat modeling. We discuss the importance of integrating security tests into development workflows, the role of security headers in assessing a company's security po…
…
continue reading
1
What Does It Mean To Be A Security Lead - A Conversion With Kayssar Daher
42:21
42:21
Play later
Play later
Lists
Like
Liked
42:21In this episode of the Security Repo Podcast, Dwayne and Kayssar dive into Kayssar's role as a security leader at GitGuardian, exploring his responsibilities, challenges, and the balance between proactive and reactive security work. They also discuss the evolution of security tools, the importance of relationship-building in security roles, and sha…
…
continue reading
1
Understanding Security Champions and Making Human Connections - Dustin Lehr
48:29
48:29
Play later
Play later
Lists
Like
Liked
48:29In this episode of the Security Repo Podcast, Dwayne and Kayssar sit down with Dustin Lehr, co-founder and chief product and tech officer at Katilyst , to explore the power of Security Champions programs. Dustin shares insights from his journey as a software engineer turned cybersecurity leader and explains how security champions can bridge the gap…
…
continue reading
1
From MMM to AI: Jim & Simon's Big Bets for 2025
1:00:45
1:00:45
Play later
Play later
Lists
Like
Liked
1:00:45Big Bets for 2025: AI, Marketing Mix Modeling, and the Future of Retail MediaJoin Simon and Jim as they place their bets for 2025. Find out why Jim thinks MMM adoption is going to skyrocket, and why Simon is all in on retail media measurement.More importantly, find out why Simon's house was once listed on Google Maps as a Forever 21 location. ▶️Wat…
…
continue reading
1
Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett
37:54
37:54
Play later
Play later
Lists
Like
Liked
37:54In this episode of the Security Repo Podcast, we dive into the world of ISACs (Information Sharing Analysis Centers) with Cherie Burgett. Cherie shares insights into the nuanced field of cyber threat intelligence, discussing how interpretation techniques like hermeneutics can enhance understanding of threat actor behavior. The conversation also exp…
…
continue reading