Go offline with the Player FM app!
Podcasts Worth a Listen
SPONSORED


Episode 2: An Interview with a Cyborg Hacker - How are body modfications and changing the threat landscape
Manage episode 378288641 series 3516169
Len Noe is both a white hack hacker and a pioneer in the transhuman movement. Current Len has 8 implants which he uses to enhance his offensive security activities. In this episode, I discuss with Len what Biohacking or bio modifications mean as a security threat and what we can do to defend against this new threat.
95 episodes
Manage episode 378288641 series 3516169
Len Noe is both a white hack hacker and a pioneer in the transhuman movement. Current Len has 8 implants which he uses to enhance his offensive security activities. In this episode, I discuss with Len what Biohacking or bio modifications mean as a security threat and what we can do to defend against this new threat.
95 episodes
All episodes
×
1 Bridging the Gap Between Dev and Sec: Tools, Culture, and Careers - Thomas Jost 24:49

1 What Tools Miss and Why Humans Matter in AppSec - Yash Shahani 18:02

1 Visualizing Data Poisoning and Rethinking Threat Detection Through Graphs – Maria Khodak 21:05

1 Building Human-Centric Security and Hacker Communities in Argentina - Ailin Castellucci 23:04

1 From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski 20:03

1 Quarantine Policies and Cloud Security Strategies for AWS – Bleon Proko 23:06

1 Helping Developers Use Open Source Security Tools & Improving Defense With AI - Mackenzie Jackson 24:19

1 How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard Johansen 22:20

1 Navigating And Defining The Evolving Role Of The CISO In Government Security - Josh Kuntz 22:53

1 The State And Future Of Cybersecurity Training and AIShaping The Role - Zach Hill 22:36

1 Secrets Management With The OpenPao Project And Open Source Security - Alex Scheel 22:15

1 Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna Jonssen 22:45

1 Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John Poulin 41:51

1 What Does It Mean To Be A Security Lead - A Conversion With Kayssar Daher 42:21

1 Understanding Security Champions and Making Human Connections - Dustin Lehr 48:29

1 Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett 37:54

1 Observability ownership, monitoring apps at scale, and learning DevOps like a language- Josh Lee 30:59

1 The Freedom Of Information Act, Ethical AI, And NerdCore Music - Stephanie Honore 36:39

1 Securing Workload Identities And Working On Conjure - Jody Hunt 43:31

1 The Updated OWASP Top 10 for LLM Applications and the AI landscape - Talesh Seeparsan 42:37

1 Securing Flight Simulators And Other Operational Technology - Coburn Slay 45:02

1 Getting Out Of Walled Gardens By Running Your Own Email - Michael Harrison 36:03

1 Understanding Psychological Safety And Asking Questions To Stay Relevant - Deanna Stanley 37:37

1 Phone Phreaking, The History Of The Security Community, And Social Engineering - Matt Scheurer 41:39

1 Getting Started In Offensive Security: A Journey Into Tech - Alexis Diediker 33:14

1 Securing Human Access Through Privileged Access Management and Just In Time Access - Aria Langer 33:58

1 Undocumented Hacking - Applying Pentesting Skills To Navigating Bureaucracy - José Martinez 27:13

1 STIR/SHAKEN and Password Policies- Per Thorsheim 34:14

1 Being a Lifeguard Instead of a Police Officer and Compliance Is NOT Security - David Hawthorne 31:05

1 From The Theory Of Constraints to Scorecard Patterns for Better Compliance - Justin Reock 44:36

1 Rotating Secrets At Scale, Automatically, and With High Availability - Kenton McDonough 35:29

1 Countering Shadow IT Through Nudging Intervention - Garret Gross 28:35

1 What Does The Future Hold For The Security Repo Podcast? Some Changes & Introducing Our New Co-Host 0:59

1 Data Loss Prevention and Stopping Breaches Before They Start 36:09

1 Security Automation And Leveraging AI To Deal With Security At Scale - Huxley Barbee 39:32

1 Developer Awareness Training and AI Assisted Tooling for Improving Security - Chris Lindsey 36:14

1 Improving Your Security by Leveraging AI: The Arcanum Cyber Security Bot - Jason Haddix 46:40

1 DeepCover & DART Academy: Fighting Scammers Through Educating Seniors 31:17

1 Mining for Vulnerabilities: Hidden Dangers of Open Buckets 42:48

1 The Frontline of Cybersecurity: Defending Against Supply Chain Intrusions - Jossef Harush Kadouri 44:38

1 Enhancing Security Through Community and Innovation - A Conversation with Avi Douglen 41:00

1 Behind the Scenes of Offensive Security with Bobby Kuzma 33:56

1 Frameworks and Relationships: J Wolfgang Goerlich on Security Strategy 36:32

1 Nuclear Security & Cyber Resilience: Insights from KPMG's Andrew Elliot 37:02

1 Securing the Future - The Art of Threat Modeling with Paul McCarty 32:50
Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.