Channel Avatar

The Security Repo @UCj42P7D7cMS0xnUrH5CjTpA@youtube.com

1.8K subscribers - no pronouns :c

The Security Repo is a Podcast where thought leaders from ar


31:06
Being a Lifeguard Instead of a Police Officer and Compliance Is NOT Security - David Hawthorne
44:37
From The Theory Of Constraints to Scorecard Patterns for Better Compliance - Justin Reock
35:30
Rotating Secrets At Scale, Automatically, and With High Availability - Kenton McDonough
28:36
Countering Shadow IT Through Nudging Intervention - Garret Gross
01:00
What Does The Future Hold For The Security Repo Podcast? Some Changes & Introducing Our New Co-Host
36:10
Data Loss Prevention and Stopping Breaches Before They Start - Daniel Jay
39:33
Security Automation And Leveraging AI To Deal With Security At Scale - Huxley Barbee
36:15
Developer Awareness Training and AI Assisted Tooling for Improving Security - Chris Lindsey
46:41
Improving Your Security By Leveraging AI: The Arcanum Cyber Security Bot - Jason Haddix
31:18
DeepCover & DART Academy: Fighting Scammers Through Educating Seniors - Anita Nikolich
42:49
Mining for Vulnerabilities: Hidden Dangers of Open Buckets - Glen Helton
44:39
The Frontline of Cybersecurity: Defending Against Supply Chain Intrusions - Jossef Harush Kadouri
41:01
Enhancing Security Through Community and Innovation - A Conversation with Avi Douglen
33:57
Behind the Scenes of Offensive Security with Bobby Kuzma
36:33
Frameworks and Relationships: J Wolfgang Goerlich on Security Strategy
37:03
Nuclear Security & Cyber Resilience: Insights from KPMG's Andrew Elliot
32:51
Securing the Future - The Art of Threat Modeling with Paul McCarty
40:20
Pen Testing in Academia - University Cybersecurity Challenges with JR Johnson
39:38
From Desktop Support to Red Team: Brendan Hohenadel Journey in Cybersecurity
36:59
Navigating AI in Cybersecurity: Insights from Sonya Moisset
39:48
Securing Kubernetes Dashboards: Insights from Tremolo Security's CTO
45:40
The Secrets behind GitGuardian: Building a security platform with Eric Fourrier
42:03
Solving Secret Zero: The Future of Machine Identities & SPIFFE with Mattias Gees
56:39
Building secure platforms with Kubernetes: Bridging the DevOps-Security Divide with John Dietz
34:26
Authorization vs. Authentication: Decoding the Layers of Security with Emre Baran
28:35
Unpacking ASPM: Trends, Truths, and the Future of Security Tools
31:06
Decoding Security: An Analyst's Perspective on Trends and Tools
07:06
Creating a positive security culture in a company
05:11
How do you implement DevSecOps?
42:41
Building Conferences and Communities in Cybersecurity with Huxley Barbee
02:40
What is DevOps? A short and simple explanation
36:38
The Evolution of DevSecOps: Strategies for Integrating Security into DevOps with Gregory Zagraba
34:39
Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas
41:42
The Evolution of Offensive Security with Erik Cabetas
55:20
From Bank Heists to Security Insights: The Jayson E. Street Story
55:32
Why You Need a Pentest with - Abraham Aranguren
40:06
Reducing the noise: Cutting through the data in security Buck Bundhund
34:01
Solving the bottom turtle: Fixing the authentication problem with Ethan Heilman
41:45
The right tool for the job: Finding and evaluating security tools with James Berthoty
02:51
Hacker escapes capture after breaking into Bank
43:53
Securing our APIs - Thinking differently about API Security with Isabelle Mauny
02:53
Coinbase API vulnerability creates an infinite money loop
28:44
Revolutionizing SAST: Bridging the Gap for Modern Developers with Nipun Gupta
30:34
API Security Unveiled: Safeguarding the Heart of Modern Applications
32:49
Guarding Against Deception: Detecting and Defending Against Social Engineering with Reanna Schultz
33:29
Contextual Security: Revolutionizing Developer-Focused Cybersecurity with James Wickett
35:14
Mastering Physical Security: Unveiling the Secrets with Brice Self
03:23
Choosing SBOMs or VEX or Both - Understanding your software composition and risk
35:45
Secrets inside packages, scanning Python PyPi for credentials with Tom Forbes
03:54
3 qualities to look for when hiring in Application Security
01:54
What is self serve threat modelling?
05:11
Why is updating & managing on-premise software so difficult for enterprises
04:35
SBOMs and VEX? What they are and what is the difference (Software bill of material)
38:04
Artificial intelligence, a friend or foe in cyber security - with Simon Maple from Snyk
38:13
Scaling security and AppSec in fast moving enterprises with Jeevan Singh
02:55
Should organisations Block ChatGPT and other LLMs? Data privacy
37:54
Enterprise Software Distribution - Managing updates and security in enterprise software at scale
29:44
Securing data in a world of AI with Jeremiah Jeschke
37:17
Getting boardroom buy-in for security - CISO conversations with Walt Powell
48:35
Social engineering, phishing and building grass roots communities with Dan and Ken