Artwork

Content provided by Lukasz Lazewski. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lukasz Lazewski or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cybersecurity for coders: insights from a Microsoft Team Leader at NATO Locked Shields | Grzegorz Tworek

1:06:26
 
Share
 

Manage episode 428347526 series 3516159
Content provided by Lukasz Lazewski. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lukasz Lazewski or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

How can coders stay ahead in the relentless race against cyber threats?

Join us with cybersecurity expert Grzegorz Tworek as we explore the decline of assembly, C++, and kernel development, and its implications for security. Discover crucial tips for coders, how to uncover zero-day vulnerabilities and the ongoing battle between cyber defenders and attackers.

Learn how AI is transforming code security and gain insights from NATO's Locked Shields exercise on which country leads in cyber defense. Tune in for expert advice and practical insights to elevate your cybersecurity knowledge.
► Our guest 🌟

Grzegorz Tworek 👉 https://www.linkedin.com/in/grzegorztworek/
Microsoft MVP^17, Security Internals Fanatic, hominoid Windows defender.

► In today’s episode:

  • The enduring relevance of assembly, C++, and other low-level languages amidst modern programming trends.
  • Why these languages are becoming less popular and what this means for future development.
  • Essential security considerations for both coders and companies to stay protected.
  • Exploring zero-day vulnerabilities: What they are, how to find them, and why they matter.
  • The dynamic race between good guys and bad guys in the cybersecurity landscape.
  • Building and leveraging a community of security experts for better defense strategies.
  • The role of AI in writing code and the implications for the future of cybersecurity.
  • A deep dive into NATO's Locked Shields exercise: Which country leads the pack in cyber defense?

► Decoding the timeline:

00:00 – The most important security considerations for coders and companies

08:55 – Predictions for security advancements in applications

13:28 – Memory abuse attacks

15:00 – Reverse engineering strategies

31:00 – How to start learning about cybersecurity?

41:35 – Publicly exposing vulnerabilities, Net Zero Days, threat actors

50:00 – NATO Lock shields

54:20 – Catch-up race with bad guys

***
The Dev is in the Details is a podcast where we talk about technology, business and their impacts on the world around us.

Łukasz Łażewski 👉 https://www.linkedin.com/in/lukasz-lazewski-40562718/
Pedro Paranhos 👉 https://www.linkedin.com/in/pedroparanhos/
Write to us 👉 podcast@llinformatics.com

  continue reading

Chapters

1. The most important security considerations for coders and companies (00:00:00)

2. Predictions for security advancements in applications (00:08:55)

3. Memory abuse attacks (00:13:28)

4. Reverse engineering strategies (00:15:00)

5. How to start learning about cybersecurity? (00:31:00)

6. Publicly exposing vulnerabilities, Net Zero Days, threat actors (00:41:35)

7. NATO Lock shields (00:50:00)

8. Catch up race with bad guys (00:54:20)

8 episodes

Artwork
iconShare
 
Manage episode 428347526 series 3516159
Content provided by Lukasz Lazewski. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lukasz Lazewski or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

How can coders stay ahead in the relentless race against cyber threats?

Join us with cybersecurity expert Grzegorz Tworek as we explore the decline of assembly, C++, and kernel development, and its implications for security. Discover crucial tips for coders, how to uncover zero-day vulnerabilities and the ongoing battle between cyber defenders and attackers.

Learn how AI is transforming code security and gain insights from NATO's Locked Shields exercise on which country leads in cyber defense. Tune in for expert advice and practical insights to elevate your cybersecurity knowledge.
► Our guest 🌟

Grzegorz Tworek 👉 https://www.linkedin.com/in/grzegorztworek/
Microsoft MVP^17, Security Internals Fanatic, hominoid Windows defender.

► In today’s episode:

  • The enduring relevance of assembly, C++, and other low-level languages amidst modern programming trends.
  • Why these languages are becoming less popular and what this means for future development.
  • Essential security considerations for both coders and companies to stay protected.
  • Exploring zero-day vulnerabilities: What they are, how to find them, and why they matter.
  • The dynamic race between good guys and bad guys in the cybersecurity landscape.
  • Building and leveraging a community of security experts for better defense strategies.
  • The role of AI in writing code and the implications for the future of cybersecurity.
  • A deep dive into NATO's Locked Shields exercise: Which country leads the pack in cyber defense?

► Decoding the timeline:

00:00 – The most important security considerations for coders and companies

08:55 – Predictions for security advancements in applications

13:28 – Memory abuse attacks

15:00 – Reverse engineering strategies

31:00 – How to start learning about cybersecurity?

41:35 – Publicly exposing vulnerabilities, Net Zero Days, threat actors

50:00 – NATO Lock shields

54:20 – Catch-up race with bad guys

***
The Dev is in the Details is a podcast where we talk about technology, business and their impacts on the world around us.

Łukasz Łażewski 👉 https://www.linkedin.com/in/lukasz-lazewski-40562718/
Pedro Paranhos 👉 https://www.linkedin.com/in/pedroparanhos/
Write to us 👉 podcast@llinformatics.com

  continue reading

Chapters

1. The most important security considerations for coders and companies (00:00:00)

2. Predictions for security advancements in applications (00:08:55)

3. Memory abuse attacks (00:13:28)

4. Reverse engineering strategies (00:15:00)

5. How to start learning about cybersecurity? (00:31:00)

6. Publicly exposing vulnerabilities, Net Zero Days, threat actors (00:41:35)

7. NATO Lock shields (00:50:00)

8. Catch up race with bad guys (00:54:20)

8 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide