The Security Repo
Podcast image
AI, Automation, & Humans' Role In Security: A View From Rsac 2026 With Jeff Man and Dwayne McDaniel
42 mins; April 01, 2026
Avoiding Operational Chaos While Defending A Credit Union With Data Classification - John Wallace
19 mins; March 25, 2026
OIDC And IAP In Production: Scaling Startup Security For Deepfake Defense - Talia Smiley
20 mins; March 18, 2026
The PCI Ultimatum -Thrift Store OSINT, and "Lost Media" with Dwayne Edwards and Mike Radigan
22 mins; March 17, 2026
From Annual Checkbox To Continuous SDLC Testing: Operationalizing AI Pentests - Andy Dennis of XBow
19 mins; March 13, 2026
Why Compliance Isn’t Governance & How GovOps Rebuilds Trust Boundaries – Mike Schwartz
37 mins; March 11, 2026
Building AI Solutions with a Security-First Mindset: Frameworks and Lessons with Henry Odibi
18 mins; February 11, 2026
Link Safety, Lightweight AI & Operationalizing Threat Modeling - Nathan Koester
20 mins; February 04, 2026
Tackling the Root of Incidents: Culture, Credentials, and AWS Insights – Robert Saul
25 mins; January 28, 2026
Hacking WebMethods: Legacy Systems, Modern Threats – Ryan Bonner
17 mins; January 21, 2026
Why Attackers Don’t Care About Your Contracts: A Deep Dive Into Exploit Markets – Evan Dornbush
24 mins; January 14, 2026
Untangling Identity: From Active Directory to Entra ID with Eric Woodruff
23 mins; January 07, 2026
A Special Holiday Message from The Security Repo Podcast
47 secs; December 19, 2025
The CISO Whisperer Approach: Security Leadership, Empathy, and ‘Dad Bod’ Metrics – Douglas Brush
23 mins; December 17, 2025
Scaling Open Source Observability and Managing Risk in the Software Supply Chain – Avi Press
26 mins; December 10, 2025
Decoding Threat Actor Names: Marketing, Confusion & the MITRE Solution – Jeffrey Bell
19 mins; December 03, 2025
Why Technical CISOs Matter and How AI Is Shaping Security Ops - David Cross on Leading Security
21 mins; November 26, 2025
Identity Risks in Email: Your Inbox Might Be Lying About You – Amy Devine
24 mins; November 19, 2025
From Military Intel to CISO: Navigating Security Leadership in the Age of AI – Darren Desmond
22 mins; November 12, 2025
Mapping the InfoSec Community: Building InfoSecMap & Global Security Events – Martín Villalba
26 mins; November 05, 2025
Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx
29 mins; October 29, 2025
Fighting Tool Squatting And Prompt Injection & The Security Gaps In MCP – Srajan Gupta
23 mins; October 22, 2025
Fixing Hiring, Fostering Diversity, and Finding Your Place in Security – Matt Torbin
19 mins; October 15, 2025
Dev Engagement in Security: From Content Strategy to Community Strategy with Alyssa Miles
18 mins; October 08, 2025
Beyond Controls: Building Trust and Communication in Security – Featuring AriaDear
19 mins; October 01, 2025
Misconfigurations, Legacy Landmines, and Tier Zero Truths – Jake Hildreth on Active Directory
21 mins; September 24, 2025
Rebuilding OWASP St. Louis & Strengthening Security Growing The Community – Andre Van Klaveren
24 mins; September 17, 2025
Teaching AppSec With Scratchers: Gamified Learning For Real-World Impact - Jenn Gile
20 mins; September 10, 2025
Threat Modeling OpenSSL, Lessons from a Data Breach, and Volunteering with Narayan Ram Narayanan
18 mins; September 03, 2025
From Risk Acceptance to Community Building: Inside Security With Sean Juroviesky
19 mins; August 27, 2025
Tackling Deepfakes - Battling Ai-Generated Faces, Scams, Detection, And Security – Sankalp Kumar
19 mins; August 20, 2025
Security Onion - From Classroom To SOC, Open Source and Education - Matt Gracie
22 mins; August 13, 2025
From Code to Crypto: How Learning Fundamentals Empowers Security Pros – Matt Olmsted
25 mins; August 06, 2025
Inside BurbSec: From Suburban InfoSec Beers to Global Discord Community – Johnny Xmas
36 mins; July 30, 2025
From Car Culture to Cybersecurity: Building Community and Skills with Christian Pinkston
22 mins; July 23, 2025
Keeping Drupal Running With Static Code Analysis & Lessons From Drupalgeddon - Matt Glaman
20 mins; July 16, 2025
From Phishing Scam Response to Cyber Defender: A Journey into Security - Manoj Viswanathan
25 mins; June 25, 2025
AI, Zero Trust, And The Future Of DevSecOps In A Cloud-First World – Nivathan Athiganoor Somasundharam
19 mins; June 18, 2025
Reducing Developer Toil, Shifting Security Left, And Using Caution With AI – Andy Dennis
20 mins; June 11, 2025
Educate, Empower, Prepare: Building Inclusive Cybersecurity With Rebekah Skeete
23 mins; June 04, 2025
Bridging the Gap Between Dev and Sec: Tools, Culture, and Careers - Thomas Jost
24 mins; May 28, 2025
What Tools Miss and Why Humans Matter in AppSec - Yash Shahani
18 mins; May 21, 2025
Visualizing Data Poisoning and Rethinking Threat Detection Through Graphs – Maria Khodak
21 mins; May 14, 2025
Building Human-Centric Security and Hacker Communities in Argentina - Ailin Castellucci
23 mins; April 30, 2025
From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski
20 mins; April 23, 2025
Quarantine Policies and Cloud Security Strategies for AWS – Bleon Proko
23 mins; April 16, 2025
Helping Developers Use Open Source Security Tools & Improving Defense With AI - Mackenzie Jackson
24 mins; April 09, 2025
How Digital Forensics Supports Incident Response And Who Should Own IAM - Gerard Johansen
22 mins; April 02, 2025
Navigating And Defining The Evolving Role Of The CISO In Government Security - Josh Kuntz
22 mins; March 26, 2025
The State And Future Of Cybersecurity Training and AIShaping The Role - Zach Hill
22 mins; March 19, 2025
Secrets Management With The OpenPao Project And Open Source Security - Alex Scheel
22 mins; March 12, 2025
Playing (And Winning) CTFs To Advance Your Cybersecurity Career - Edna Jonssen
22 mins; March 05, 2025
Defense In Depth Means Writing More Tests To Make Sure You Don't Regress - John Poulin
41 mins; February 26, 2025
What Does It Mean To Be A Security Lead - A Conversion With Kayssar Daher
42 mins; February 19, 2025
Understanding Security Champions and Making Human Connections - Dustin Lehr
48 mins; February 12, 2025
Leveraging Hermeneutics In Cyber Threat Intelligence at The MM-ISAC - Cherie Burgett
37 mins; February 05, 2025
Observability ownership, monitoring apps at scale, and learning DevOps like a language- Josh Lee
30 mins; January 29, 2025
The Freedom Of Information Act, Ethical AI, And NerdCore Music - Stephanie Honore
36 mins; January 22, 2025
Securing Workload Identities And Working On Conjure - Jody Hunt
43 mins; January 15, 2025
The Updated OWASP Top 10 for LLM Applications and the AI landscape - Talesh Seeparsan
42 mins; January 08, 2025
Securing Flight Simulators And Other Operational Technology - Coburn Slay
45 mins; December 18, 2024
Getting Out Of Walled Gardens By Running Your Own Email - Michael Harrison
36 mins; December 11, 2024
Understanding Psychological Safety And Asking Questions To Stay Relevant - Deanna Stanley
37 mins; December 04, 2024
Phone Phreaking, The History Of The Security Community, And Social Engineering - Matt Scheurer
41 mins; November 27, 2024
Getting Started In Offensive Security: A Journey Into Tech - Alexis Diediker
33 mins; November 20, 2024
Securing Human Access Through Privileged Access Management and Just In Time Access - Aria Langer
33 mins; November 13, 2024
Undocumented Hacking - Applying Pentesting Skills To Navigating Bureaucracy - José Martinez
27 mins; November 06, 2024
STIR/SHAKEN and Password Policies- Per Thorsheim
34 mins; October 30, 2024
Being a Lifeguard Instead of a Police Officer and Compliance Is NOT Security - David Hawthorne
31 mins; October 23, 2024
From The Theory Of Constraints to Scorecard Patterns for Better Compliance - Justin Reock
44 mins; October 16, 2024
Rotating Secrets At Scale, Automatically, and With High Availability - Kenton McDonough
35 mins; October 09, 2024
Countering Shadow IT Through Nudging Intervention - Garret Gross
28 mins; October 02, 2024
What Does The Future Hold For The Security Repo Podcast? Some Changes & Introducing Our New Co-Host
59 secs; September 26, 2024
Data Loss Prevention and Stopping Breaches Before They Start
36 mins; September 25, 2024
Security Automation And Leveraging AI To Deal With Security At Scale - Huxley Barbee
39 mins; September 18, 2024
Developer Awareness Training and AI Assisted Tooling for Improving Security - Chris Lindsey
36 mins; September 11, 2024
Improving Your Security by Leveraging AI: The Arcanum Cyber Security Bot - Jason Haddix
46 mins; September 04, 2024
DeepCover & DART Academy: Fighting Scammers Through Educating Seniors
31 mins; August 28, 2024
Mining for Vulnerabilities: Hidden Dangers of Open Buckets
42 mins; August 23, 2024
The Frontline of Cybersecurity: Defending Against Supply Chain Intrusions - Jossef Harush Kadouri
44 mins; August 14, 2024
Enhancing Security Through Community and Innovation - A Conversation with Avi Douglen
41 mins; August 07, 2024
Behind the Scenes of Offensive Security with Bobby Kuzma
33 mins; July 31, 2024
Frameworks and Relationships: J Wolfgang Goerlich on Security Strategy
36 mins; July 24, 2024
Nuclear Security & Cyber Resilience: Insights from KPMG's Andrew Elliot
37 mins; July 17, 2024
Securing the Future - The Art of Threat Modeling with Paul McCarty
32 mins; July 12, 2024
Pen Testing in Academia - University Cybersecurity Challenges with JR Johnson
40 mins; June 28, 2024
From Desktop Support to Red Team: Brendan Hohenadel Journey in Cybersecurity
40 mins; June 14, 2024
Navigating AI in Cybersecurity: Insights from Sonya Moisset
36 mins; June 07, 2024
Securing Kubernetes Dashboards: Insights from Tremolo Security's CTO
39 mins; May 27, 2024
The Secrets behind GitGuardian: Building a security platform with Eric Fourrier
45 mins; May 15, 2024
Solving Secret Zero: The Future of Machine Identities & SPIFFE with Mattias Gees
42 mins; May 08, 2024
Building secure platforms with Kubernetes: Bridging the DevOps-Security Divide with John Dietz
56 mins; April 30, 2024
Authorization vs. Authentication: Decoding the Layers of Security with Emre Baran
34 mins; April 26, 2024
Unpacking ASPM: Trends, Truths, and the Future of Security Tools
28 mins; April 12, 2024
Decoding Security: An Analyst's Perspective on Trends and Tools
31 mins; April 09, 2024
Building Conferences and Communities in Cybersecurity with Huxley Barbee
42 mins; March 14, 2024
The Evolution of DevSecOps: Strategies for Integrating Security into DevOps with Gregory Zagraba
36 mins; March 08, 2024
Hacking the Hackers: The Art of Compromising C2 Servers with Vangelis Stykas
34 mins; March 04, 2024
The Evolution of Offensive Security with Erik Cabetas
41 mins; February 24, 2024
From Bank Heists to Security Insights: The Jayson E. Street Story
55 mins; February 16, 2024