We are Ron Eddings and Chris Cochran from the Hacker Valley Studio podcast. We explore the human condition to inspire peak performance in cybersecurity. Join us on our quest to find inspirational stories and knowledge to elevate ourselves and our communities.
…
continue reading
1
AI and the Future of Cyber Defense with John Hubbard
34:12
34:12
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
34:12
How can AI shape the future of cybersecurity defense? In this episode, we dive into SOC operations, AI integration, and the latest in threat detection with John Hubbard, Cyber Defense Curriculum Lead at SANS. John discusses the expansive landscape of cybersecurity defense, while sharing insights on AI's role in threat detection and the cutting-edge…
…
continue reading
1
How Adversaries Are Living Off The Dark Web with Jason Haddix
44:55
44:55
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
44:55
Have you ever lost something important, only to find out someone moved it without telling you? The same thing happens with our personal and business data. But what if you could see what the adversary sees? In this episode, Jason Haddix, Field CISO at Flare, shares his experiences in red teaming, accessing dark web credentials, and protecting agains…
…
continue reading
1
AT&T Dynamic Defense: Security Before It Reaches Your Company's Doorstep with Senthil Ramakrishnan
18:20
18:20
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
18:20
In this episode, Ron Eddings and Jen Langdon speak with Senthil Ramakrishnan, Assistant Vice President of Cybersecurity Product at AT&T Business. Senthil shares information about how a new product, AT&T Dynamic Defense™, helps protect customers by providing threat detection and mitigation at the network edge. They’ll discuss how it can address evol…
…
continue reading
1
Soft Skills in Technical Sales to Connect and Sell More with Evgeniy Kharam
31:29
31:29
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:29
Technical skills open doors, but are soft skills sealing the deal? In this episode, Evgeniy Kharam reveals how communication and connection lead to success in technical sales. From vulnerability to voice control, Evgeniy shares how to connect with clients and sell more effectively in tech. Evgeniy Kharam has authored “Architecting Success: The Art …
…
continue reading
1
Recon Like An Adversary: Uncovering Modern Techniques in Attack Surface Management with Jason Haddix
46:02
46:02
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
46:02
Ever wondered how the best defenders become unstoppable? They think like the attackers. In this episode with Jason Haddix, we reveal the strategies hackers don’t want you to know about and show you how to use them to your advantage. Jason, CEO of Arcanum Information Security and Field CISO at Flare, helps us step into the mind of a hacker. With sto…
…
continue reading
1
I Failed Over 300 Times Trying To Get Into Security ft. Joe South
40:12
40:12
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
40:12
Joe South is a testament to resilience, unconventional decisions, and finding success in unexpected places. If you’ve ever felt stuck in a rut or on the verge of giving up, Joe’s experience might be the jolt you need to keep pushing forward. Joe, Principal Security Engineer and host of the “Security Unfiltered” podcast, shares his journey into cybe…
…
continue reading
1
Cybersecurity Challenges: AI, Burnout, and Insider Threats with Kayla Williams
24:39
24:39
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
24:39
At Black Hat 2024, we sat down with Kayla Williams, Chief Information Security Officer at Devo, to discuss her career journey, the role of AI in cybersecurity, and the pervasive issue of burnout among SOC analysts. Through her research with Wakefield Research, Kayla and her team discovered that 83% of IT professionals are burnt out due to stress, l…
…
continue reading
1
Offensive Security: Unlocking Hidden ROI with Seemant Sehgal
15:15
15:15
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
15:15
In this episode, Ron sits down at Black Hat with guest Seemant Sehgal, Founder & CEO of BreachLock, to learn more about how offensive security, such as red teaming and pen testing, fits into the cyber ecosystem. Seemant highlights how his background as a practitioner has helped him better understand the pain points that customers feel and assist th…
…
continue reading
1
Black Hat 2024 Conference Pre-Game
13:17
13:17
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
13:17
In this episode, Ron and Jen welcome you to Vegas and discuss a little background on Black Hat and DEF CON and how to make the most of your time professionally. Impactful Moments: 00:00 - Welcome 00:56 - Hello From Vegas! 01:41 - Conference Anxiety 03:43 - Origins of Black Hat 06:17 - Which Conference? 08:18 - Conference Strategy 11:47+ - You Can O…
…
continue reading
1
The Present and Future of AI in Cyber
23:58
23:58
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
23:58
In this episode, Hosts Ron Eddings and Jen Langdon discuss questions about AI in Cyber. From the current state to where AI could be going, to resources to help you engage and up-level, there’s a little bit of everything for everyone in this episode. Impactful Moments: 00:00 - Welcome 00:46 - Introduction 02:29 - Engineering AI 06:54 - Was it Made B…
…
continue reading
1
Leaving an Impression: Strategies for Captivating a Massive Audience
32:29
32:29
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:29
In this episode, hosts Ron Eddings and Jen Langdon discuss the power of storytelling through various media. Whether your goal is to create video content, deliver keynotes on stage, or be creative through other digital mediums, there will be something for everyone! Impactful Moments: 00:00 - Welcome 01:05 - Introductions 04:55 - Storytelling in Stor…
…
continue reading
1
How Can I Best Proactively Secure My SaaS?
34:36
34:36
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
34:36
In this episode, Ron Eddings will explore the massive adaptation of SaaS applications and ways to tame the beast. Our guest Yoni Shohet, Co-Founder & CEO at Valence Security, will help provide insight into the capabilities of a SaaS Security Posture Management (SSPM) platform and best practices for implementing a SaaS security solution. Impactful M…
…
continue reading
1
What We All Should Be Talking About When It Comes to AI and Security
33:15
33:15
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:15
In this episode, Host Ron Eddings is joined by guests Anirban Banerjee, CEO and Co-Founder at Riscosity, and James Berthoty, Founder and Analyst at Latio Tech. Together they focus on data security, AI-driven product development, and the challenges of implementing AI solutions responsibly. Anirban discusses the importance of organizational buy-in an…
…
continue reading
1
Navigating AI as a CISO with Whitney Palacios
22:43
22:43
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
22:43
In this episode, Host Ron Eddings catches up with one of his colleagues, Whitney Palacios, Vice President and CISO at BigBear.ai. They explore the challenges and responsibilities of being a CISO and Whitney addresses key cybersecurity issues such as the importance of balancing security with innovation, especially in the context of AI. Whitney offer…
…
continue reading
1
The Power of AppSec, Cyber Education, and Friendship with Tanya Janca
35:21
35:21
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
35:21
In this episode, Host Ron Eddings catches up with longtime friend, Tanya Janca, Head of Education and Community at SemGrep and author of 'Alice and Bob Learn Application Security.' Tanya shares her experiences from working in the Canadian government to joining Microsoft and eventually founding WeHackPurple. Tanya talks about her new role at SemGrep…
…
continue reading
1
Networking 2.0: The Future of Decentralized Networking & Access Management
32:18
32:18
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:18
In this episode, Hosts Ron Eddings, and Jen Langdon share takeaways from Ron's RSA conversation with Colin Constable, Co-Founder and CTO at Atsign On this show, they’ll break down Networking 2.0 and how it can serve as the next evolution for data ownership and access control. Colin and his team at Atsign have built the atProtocol®, a new open-sourc…
…
continue reading
1
How AI is the Key Turning Point in TPRM with Paul Valente
25:47
25:47
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
25:47
In this episode, Host Ron Eddings enjoys a reprieve from the hectic RSA conference with guest Paul Valente, CEO of VISO Trust. Paul discusses how he used his extensive experience as a CISO to solve a huge pain point he was experiencing with third party risk management (TPRM) and how it prompted him and a colleague to start their own company to crea…
…
continue reading
1
A Deep Dive into MSSPs: Understanding the Evolution and Secrets Within with Ricardo Nicolini
40:05
40:05
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
40:05
In this episode, Ron Eddings and Jen Langdon explore the origins of MSSPs and the solutions they offer to the cybersecurity industry with insights from Ricardo Nicolini, CTO at Bulletproof. Ricardo will uncover the potential of MSSPs to alleviate headaches and reduce burnout in cybersecurity by detailing his personal experience with overcoming a ra…
…
continue reading
1
Zero Trust Tactics: Preventing Breaches with Ivan Fonseca & Nick Cottrell
39:41
39:41
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
39:41
In this episode, Host Ron Eddings teams up with Ivan Fonseca and Nick Cottrell, Cybersecurity Engineers at ThreatLocker, as they break down the anatomy of previous breaches and the attacker’s playbook using MITRE ATT&CK. Ivan and Nick will take you through the defender’s perspective and will also share tools that are commonly used to defend breache…
…
continue reading
1
Enterprise Browsers: Work’s Natural Next Step
34:00
34:00
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
34:00
In this episode, Ron Eddings and Jen Langdon talk about the evolution of browsers and how enterprise browsers have entered to change the game for corporations. Special guest Brayden Rogers, Chief Customer Officer at Island, joins to explain how enterprise browsers expand capabilities in asset management, security, and user experience. They also dis…
…
continue reading
1
Building Tech and Adding Value in the Era of AI with Josh Danielson
24:28
24:28
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
24:28
In this episode, Ron Eddings talks with guest Josh Danielson, CEO at Kustos, about how his journey at a previous organization has led him to build and create new products in the industry. They’ll discuss everything from how AI is currently being used to how there are still many ways to optimize in the cybersecurity product and service space. Listen…
…
continue reading
1
Building Fast and Not Breaking Things with Shlomi Matichin
32:26
32:26
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:26
In this episode, Ron Eddings and guest Shlomi Matichin, Co-Founder & CTO at Valence Security, discuss how the hurdles and triumphs in the journey of establishing Valence Security resulted in a reduction in SaaS misconfigurations and vulnerabilities. Impactful Moments: 0:00 - Welcome 01:50 - Introducing guest, Shlomi Matichin 02:46 - Founder’s Journ…
…
continue reading
1
Leaping Over the ‘BAR’ to Leading Cyber in Africa with Confidence Staveley
35:45
35:45
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
35:45
In this episode, Host Ron Eddings gets to know guest Confidence Staveley, founder of Merkel Fence and CyberSafe Foundation. He uncovers Confidence’s inspiring story, not only about how she transforms her community and the people around her through her non-profit, but the grit she needed to overcome the obstacles to get to a career in cyber and buil…
…
continue reading
1
How to Hack your Career: Building a vCISO Business with Ayman Elsawah
31:42
31:42
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:42
In this episode, Ron Eddings gets a chance to speak with Ayman Elsawah, Founder of Cloud Security Labs, and have him share his experience with becoming a vCISO. Ayman will break down the vast business of security consulting and help you determine the best approach and next steps to catalyze you on your way to owning your time and your own business.…
…
continue reading
1
Hyperautomation, Open Security Data Architecture, and the Future of SIEM with Neal Humphrey
40:18
40:18
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
40:18
Ron Eddings and Neal Humphrey, Vice President of Market Strategy at Deepwatch, discuss the changes in Security Operations infrastructure, and how these changes in structure, data, and automation are going to impact operations in the near future. Their discussion will revolve around more than just SIEM, alerts, and responses; it will go into market …
…
continue reading
1
Securing Your SaaS and Cyber Influencer Networking with CRO Bob Horn
30:15
30:15
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:15
Ron Eddings sits down with Bob Horn, Chief Revenue Officer at Valence Security. Their conversation centers around the world of SaaS security, examining the current landscape and challenges in managing SaaS risks. Bob also shares experiences from his 25-year career in sales, focusing on the importance of storytelling in sales and innovative approach…
…
continue reading
1
From ‘Hand-to-Hand Combat’ To Management in Cyber with Ofer Gayer
35:27
35:27
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
35:27
HVS Host Ron Eddings chats it up with guest Ofer Gayer, VP of Product at Hunters. While both of them reminisce about their first love in security research, Ofer clarifies how he diverted his path and reached the VP stage, while also helping to level up his teams. They’ll conclude by discussing how AI is the ‘zeitgeist of our time’ and how you can g…
…
continue reading
1
How Threat Actors Are Accessing Your SaaS Environments with Jaime Blasco
45:14
45:14
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
45:14
Ron Eddings and Jaime Blasco, Co-Founder and CTO at Nudge Security, discuss how well-known adversaries are taking advantage of enterprises that don’t have visibility into their full SaaS footprint, and therefore can’t secure it. Grab a front-row seat to gain a new perspective on your vulnerabilities through the eyes of an attacker. Impactful Moment…
…
continue reading
1
The Future of Endpoint Threats and Why Zero Trust is the Only Option with Rob Allen
43:42
43:42
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
43:42
Get ready for a SPECIAL episode! Ron Eddings will take you on an inside look at Threatlocker’s rapidly growing event, Zero Trust World, and will talk with Rob Allen, Chief Product Officer at Threatlocker, to discuss what you can find out from your endpoints (hint: it’s more than remote access tools you didn’t know were running!) Impactful Moments: …
…
continue reading
1
Slugging it Out in the SOC to Find Your Niche in Cyber with Nate Malicoat
16:26
16:26
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
16:26
Ron Eddings sits down in-person with Nate Malicoat, Threat Intel Engineer at ContraForce, for a down-to-earth interview about entering the cybersecurity workforce from the Marines. Impactful Moments: 00:00 - Welcome 01:20 - Introducing guest, Nate Malicoat 03:00 - Marines to Computer Life 05:13 - Importance of Mentoring & Mentors 10:04 - Participat…
…
continue reading
1
Creating Value in the Cyber Industry with Nick Lantuh
31:45
31:45
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
31:45
Nick Lantuh, CEO of Interpres Security, joins Ron Eddings on the mic at Hacker Valley’s “On the Big Screen” event to talk about how Nick’s previous career experience have given him unique insight into the cybersecurity industry. Ron and Nick discuss everything from Nick’s immigrant background and his experience with helping customers, to threat mod…
…
continue reading
1
AI & Phishing: Fighting Fire with Fire
37:53
37:53
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
37:53
In this episode, Host Ron Eddings is joined by Vishal Dixit, Co-founder & CTO at Graphus Inc., and Sven Bechmann, Senior Product Manager of Email Security at Kaseya to dig into how phishing attacks are evolving and how you can keep your business safe. Get the ultimate email security software and stop phishing attacks that others miss! Request a dem…
…
continue reading
1
Andrew Forgie's Path From Apache Mechanic to Cybersecurity Sales Leader and Mastering Cyber Sales
26:58
26:58
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
26:58
In this episode, Andrew Forgie takes us on his journey from his early days as an Apache helicopter mechanic in the military to his current role as a regional sales manager in cybersecurity. Andrew shares his trials and challenges, the significant shift from being in a service role to mastering the art of sales in the highly competitive tech industr…
…
continue reading
1
Zinet Kemal's Journey From Ethiopian Immigrant to TEDx Speaker & Cloud Security Engineer at Fortune
38:39
38:39
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
38:39
In this episode of Hacker Valley Studio, we dive into the inspiring journey of Zinet Kamal, an immigrant from Ethiopia who has carved a niche for herself in cybersecurity. Despite starting her journey with limited access to technology and not having mentors until 2020, Zinet's resilience and passion led her to become a cloud security engineer at a …
…
continue reading
1
Paving the Path for CISOs of the Future with Gary Hayslip
29:13
29:13
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
29:13
In this episode, Host Ron Eddings catches up with repeat guest, Gary Hayslip, CISO at SoftBank Investment Advisors and co-author of CISO Desk Reference guide. Gary explains that the varied nature of his current CISO role contrasts with the broader industry trends. He discusses how that nature plays into the CISO hiring process and career path, as w…
…
continue reading
1
The Untold Story of Browser Risks: Pioneering Enterprise Browser Security with Or Eshed
35:56
35:56
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
35:56
In this episode, Host Ron Eddings and guest Or Eshed, CEO of Layer X, discuss how changes in IT infrastructure, employee behavior and malicious tech have created an era where browser security is a must. Or details how he is spearheading a movement to reposition browsers as our first line of defense. Impactful Moments: 00:00 - Welcome 02:50 - Introd…
…
continue reading
1
Cyber Defense Reinvented: The New Era of Attack Surface Management with Isaac Clayton
32:47
32:47
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
32:47
In this episode, Host Ron Eddings talks with guest Isaac Clayton, Senior Research Engineer at NetSPI. Ron and Isaac discuss the importance of ASM for organizations of all sizes, the challenges of asset identification, and framing a practical strategy to handle ASM. Impactful Moments: 00:00 - Welcome 03:00 - Introducing guest, Isaac Clayton 04:25 - …
…
continue reading
1
Cyber Resilience Unpacked: Securing Tomorrow Today with Bill Bernard
37:59
37:59
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
37:59
In this episode, Host Ron Eddings dives deep into crafting a resilient cybersecurity approach with guest speaker Bill Bernard, VP of Security Strategy at Deepwatch. Bill discusses the necessity of understanding business objectives to protect valuable assets but emphasizes focusing on risk-based strategies in addition to stronger detection and respo…
…
continue reading
1
Looking Backward to GROW Forward in Cybersecurity in 2024
23:35
23:35
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
23:35
In this episode, we’ll take a walk down memory lane. Hacker Valley looks back to 2023 to bring you some of the best clips with great advice and insight into being more creative, reflective, and resourceful with the hopes of inspiring you in 2024 to grow beyond where you are today. Impactful Moments 00:00 - Welcome 00:54 - A New Year is on the Way! …
…
continue reading
1
What’s Lurking In Your Containers? AMBERSQUID Operations, Freejacking, and Microservice Exploitation
23:11
23:11
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
23:11
In this episode, Host Ron Eddings, discusses new tactics of adversaries with Director of Threat Research at Sysdig, Michael Clark. Michael digs into the cloud and shares trends about the AMBERSQUID operation and how to protect yourself from potential container-based threats. Impactful Moments 00:00 - Welcome 01:20 - Introducing guest Michael Clark …
…
continue reading
1
Pivotal Policy in the Age of AI with AJ Grotto
24:05
24:05
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
24:05
In this episode, Host Chris Cochran chats it up with former White House Senior Director for Cyber Policy, AJ Grotto. AJ shares his viewpoints about the current state of AI policies, the potential risks and benefits of AI technology, and the challenges in crafting effective policies in the field of cybersecurity. Impactful Moments 00:00 - Welcome 00…
…
continue reading
1
Ransomware: How to Use AI to Create a Readiness Kit with Scott Sutherland
28:32
28:32
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
28:32
The adversary is using Artificial Intelligence. Why aren’t you? In this episode, Host Chris Cochran talks with Scott Sutherland, VP of Research at NetSPI, about everyone’s favorite hot topics; ransomware and AI. Scott will detail his experience with simulating ransomware attack scenarios, as well as discussing the difficulties businesses face when …
…
continue reading
1
Cover Your SaaS: Navigating OAuth and SaaS Security Challenges
45:02
45:02
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
45:02
SaaS misconfigurations may be responsible for up to 63% of security incidents. Do your SaaS applications have risky OAuth grants and misconfigurations? Let’s not find out. We will unravel the complexities of OAuth and how attackers are using OAuth to move from one app to another. Our special guest Jaime Blasco, co-founder and CTO at Nudge Security,…
…
continue reading
1
Standing Out On LinkedIn as a Cybersecurity Professional with Chris Hughes
23:37
23:37
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
23:37
In this episode, host Ron Eddings speaks with Chris Hughes, President at Aquia, Cyber Innovation Fellow at CISA, and cybersecurity legend. Special guest, Chris Hughes, was initially inspired to build a personal brand through a desire to mend his weaknesses and highlight his strengths. However, LinkedIn offered a platform to display his growth and l…
…
continue reading
1
Adversarial AI: Navigating the Cybersecurity Landscape
39:37
39:37
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
39:37
In this episode, host Ron Eddings is joined by Sr. Director of Red Team Operations at Coalfire, Pete Deros, to discuss the hottest topic around; adversarial AI. Ron and Pete discuss how AI is used and how the adversary is using AI so everyone can stay one step ahead of them as well. Impactful Moments 00:00 - Welcome 01:35 - Introducing Pete Deros 0…
…
continue reading
1
Protecting What You Can’t See with HD Moore
24:10
24:10
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
24:10
In this episode, host Ron Eddings is joined by Metasploit creator, co-founder and CEO of runZero, HD Moore. HD changed the world with Metasploit and he’s doing it again with runZero. Attack Surface Management can’t happen unless you have visibility into your home or company network and HD shares how he’s able to deliver that and so much more in his…
…
continue reading
1
Penetration Testing, Public Speaking, and Content Creation with Phillip Wylie
30:23
30:23
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
30:23
In this episode, Ron Eddings is joined by Penetration Tester, Instructor, International Speaker, Best Selling Author, and Podcast Host, Phillip Wylie. Phillip shares how pen testing and the need to educate people helped motivate him to speak at conferences and become a central voice in the cyber community. But more than that, he explains how he’s h…
…
continue reading
1
Ruse and Deception: From Hollywood to Corporate Espionage with Robert Kerbeck
28:44
28:44
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
28:44
In this episode, Host Ron Eddings interviews Robert Kerbeck, author of Ruse: Lying the American Dream from Hollywood to Wall Street. Robert shares how his professional acting skills helped his career in corporate spying and espionage. Impactful Moments 00:00 - Welcome 00:46 - Introducing guest, Robert Kerbeck 00:55 - …And That’s How I Became A Spy …
…
continue reading
1
Hacker Culture and ADHD with Kim Crawley
37:13
37:13
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
37:13
In this episode, host Ron Eddings is joined by cybersecurity researcher and writer, Kim Crawley, to deep dive into one of her greatest passions; computing! From its origins to its newest capabilities in quantum and AI, Kim shares her love of computers as well as her passion for educating others through her writing. Lastly, Kim explains how she wrot…
…
continue reading
1
Starting at the Endpoint with Danny Jenkins
33:44
33:44
Redă mai târziu
Redă mai târziu
Liste
Like
Plăcut
33:44
In this episode, host Ron Eddings is joined by Co-Founder and CEO of ThreatLocker, Danny Jenkins, to talk about his "Hero’s Journey" from IT to launching ThreatLocker. From spam emails, bots, and ransomware to persuading people to take a new approach -- this story has all of the villains and obstacles any cybersecurity champion will inevitably face…
…
continue reading