BarCode

Chris Glanden

Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe.

Hosted by Chris Glanden.

read less
TechnologyTechnology

Episodes

Unreal
Apr 12 2024
Unreal
Izzy Traub, an innovative entrepreneur at the intersection of film and AI, has traversed from pioneering visual effects in the movie industry to the front lines of AI software development. With qualifications from UCLA and the University of Texas, Izzy co-founded Inspira with his COO and father, Benny, where they have patented computerized productivity systems. His expertise in managing large remote teams and pushing the boundaries of AI in VFX illuminates new possibilities for modern workflows. Izzy shares his journey from early fascination with green screen magic to his pioneering role in adapting deepfake technology. He provides insights into how deepfakes are disrupting the film industry and ignites discussion on the consequences of this powerful technology, from ethical implications to its rapid integration into advertising and beyond, painting a thought-provoking picture of AI's burgeoning role in content creation.TIMESTAMPS:00:00:16 - Introduction to deepfakes and their impact on perception00:02:19 - Background in film and visual effects00:11:23 - Interest in AI and learning coding00:14:02 - Increase in deepfake inquiries and major deals00:16:53 - Responsibility of AI developers in shaping the ethical advancement of deepfake tools00:20:23 - Simplifying the deepfake production process00:24:30 - Concerns about AI's impact on the filmmaking process00:26:42 - Narrow application in AI leading to powerful outcomes00:31:28 - Lack of identity safeguards for actors in the entertainment industry00:35:03 - Potential benefits of actors adopting deepfake technology00:39:55 - Potential impact of deepfakes on politicians and lawmakers00:41:00 - Potential for real-time deepfakes and their applications in scams and fraud00:44:30 - Company focus on predicting behavior, implementing AI managers, and automating high leverage tasks00:50:23 - Benefits of a hybrid approach combining AI and human management00:51:53 - Utilizing AI for detecting user behavior anomalies and insider threat detectionSYMLINKSVFX LA (company): https://vfxlosangeles.com/ Sin City (movie): https://www.imdb.com/title/tt0401792/After Effects (software): https://www.adobe.com/products/aftereffects.htmlUCLA Extensions (educational institution): https://www.uclaextension.edu/Ender's Game (movie): https://www.imdb.com/title/tt1731141/University of Texas (educational institution): https://www.utexas.edu/SSRN Paper: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4739430#Inspira AI (website): https://www.inspira.ai/Han Barbecue (restaurant): https://www.yelp.com/biz/han-bbq-burbankScum and Villainy Cantina (bar): https://scumandvillainycantina.com/Buena Vista Cigar Lounge (bar): https://www.yelp.com/biz/buena-vista-cigar-club-beverly-hillsDRINK INSTRUCTIONThe Replicant1.5 oz Vodka3/4 oz Midori3/4 oz Lemon Juice1/2 oz Lemon JuiceCombine all ingredients into a shaker with ice. Shake well and strain into a chilled cocktail glass.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
Iceman
Mar 4 2024
Iceman
Iceman is a renowned figure in the world of RFID hacking, with expertise in NFC and EMV technologies. As one of the lead open-source developers for Proxmark3—a powerful platform for RFID hacking and analysis—Iceman has significantly enhanced its capabilities. He is known for overhauling the user interface and expanding the feature set to allow device owners to maximize their usage. His work in the open source community has been focused on making RFID technology more accessible and understandable, and he continues to contribute actively to the field.TIMESTAMPS:00:02:27 - Introduction of Iceman, RFID hacker and contributor to the Proxmark project00:07:23 - Explanation of Proxmark device capabilities and the development of the Iceman fork00:14:13 - Formation of the RFID research group and transitioning from a hobby to a public figure00:17:49 - Introduction of new RFID tools, concepts, and weaponizing RFID readers for unauthorized access00:20:40 - Effectiveness of RFID wallets and the cat-and-mouse game with weaponized readers00:24:06 - Development of magic cards for RFID hacking and the potential impact of AI on RFID research00:28:29 - Participation in RFID hacking competitions, CTFs, and the importance of forums and Discord for knowledge sharing00:34:42 - Flipper Zero as a well-made tool with an ecosystem for extending functionality00:35:57 - The future of RFID hacking, including secure communications, advanced crypto, and chip implants by Dangerous Things00:39:38 - Iceman's experience with metal detectors, TSA, and the exciting future of RFID for hackers and end users00:42:52 - The need for vendors to allow legal copying of items and the importance of disrupting tracking and logistics systems00:45:07 - Iceman's recommendations for following his work and joining relevant Discord serverSYMLINKSX: https://twitter.com/herrmann1001/YouTube: https://youtube.com/@iceman1001/Discord: https://discord.com/invite/QfPvGFRQxH/Proxmark3: https://proxmark.com/Iceman Fork: https://github.com/RfidResearchGroup/proxmark3/Dangerous Things: https://dangerousthings.com/Flipper Zero: https://flipperzero.one/IceDev: icedev.seDRINK INSTRUCTIONWildcard1 oz Cardamaro1 oz Genever1 oz CynarAdd all ingredients to a shaker filled with ice. Stir until chilled and properly diluted. Strain into a lowball glass filled with fresh ice. Optionally garnish with a sprig of rosemary or an orange peel.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
Hutch with Justin Hutchins
Feb 12 2024
Hutch with Justin Hutchins
Hutch, an expert in AI and cybersecurity, discusses his early interest in using AI for algorithmic trading and automating social engineering attacks with chatbots. He highlights two main cyber risks of advanced AI - the ability to manipulate people and autonomously execute attacks. Hutch and Chris explore issues like commercialization of AI versus proprietary chatbots, and tech companies' ethical duties to reduce AI risks through testing and responsible development. They delve into potential weaponization of AI in lethal autonomous weapons and "flash wars", as well as risks from intelligent humanoids. The need for global AI partnerships is discussed, but challenged by current geopolitics. Private sector researchers and companies have a key role in addressing AI safety and risks. However, adversaries likely have an edge in exploiting AI vulnerabilities, underscoring the importance of innovative defense strategies. TIMESTAMPS:00:02:14 - Introduction to Justin Hutchins (Hutch) and his background00:03:43 - Hutch's interest in AI and cybersecurity00:08:43 - Discussion on GPT-4 and its key risks00:15:21 - Comparison between different AI platforms00:20:28 - Viability of weaponizing emerging technologies00:25:10 - Viability of embedding AI into realistic form factors00:30:53 - Psychological effects of chatbots on humanity00:35:48 - The need for global partnerships to regulate AI00:40:36 - Adapting AI capabilities for weaponization00:47:30 - Adversarial threat actors and their adaptation to AI00:50:46 - AI systems circumventing security controls00:53:48 - The concept of singularity in AISYMLINKSLinkedin: https://www.linkedin.com/in/justinhutchens/X: https://twitter.com/sociosploit/status/1546218889675259904The Language of Deception- Weaponizing Next Generation: https://www.amazon.com/Language-Deception-Weaponizing-Next-Generation/dp/1394222548/Socioploit: https://www.sociosploit.com/Cyber Cognition Podcast: https://www.itspmagazine.com/cyber-cognition-podcastDRINK INSTRUCTIONThe Hallucination1 oz Elderflower Liqueur1 oz Absinthe1 oz Fresh Lemon JuiceGuava SodaAdd ice into a chilled cocktail glass. Add the Elderflower Liqueur, Absinthe, and lemon juice into a cocktail shaker without ice. Shake vigorously. Strain into the glass with ice. Top off with guava soda.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
Wirefall with Dustin Dykes
Feb 2 2024
Wirefall with Dustin Dykes
Wirefall is an Air Force veteran and cybersecurity expert. Wirefall shares his journey into hacking, from his early days of electronics tinkering to his career in security consulting. He also discusses the founding of the Dallas Hackers Association and the importance of community in the cybersecurity field. Wirefall explores the evolving cyber threat landscape and the potential impact of AI on hacking. Plus, he reveals how his newfound passion for improv has helped him overcome fear and become a better communicator.  TIMESTAMPS:0:03:37 - Wirefall’s early exposure to technology and computers0:06:06 - How Wirefall started hacking and manipulating computer systems0:10:50 - Wirefall’s curiosity about the World Wide Web and exploration of the internet0:12:40 - Transitioning from a network technician to a security consultant during the dot-com boom0:14:23 - The need for security on the enterprise level and the awareness of professionals0:19:31 - The desire for a different format of talks at local cybersecurity groups0:23:11 - The meetup is held at encore family karaoke0:28:26 - The threat landscape has remained similar over the years0:30:22 - Wirefall’s transformation and interest in AI and machine learning0:35:19 - Wirefall’s experience with improv and its parallels to hacking0:41:33 - Improv helps with pivoting and redirecting0:47:46 - Finding Wirefall on social mediaSYMLINKSTwitter: @DHAholeLinkedIn Profile: https://www.linkedin.com/in/wirefall/Telesploit: https://www.telesploit.com/DHA (Dallas Hackers Association): https://www.meetup.com/dallas-hackers-association/DC214:https://www.meetup.com/dc214dfw/DRINK INSTRUCTIONLone Ranger1 1/2 oz Blanco Tequila3/4 oz Freah Lemon Juice1/2 oz Simple Syrup2 oz Sparkling WineLemon TwistFill a shaker with ice. Add in tequila. lemon juice and simple syrup. Shake well and then strain into an ice filled glass. Top with sparkling wine. Optionally garnish with a lime twist.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
Guerrilla Theory with Peter Schawacker
Jan 11 2024
Guerrilla Theory with Peter Schawacker
Peter Schwacker is a cybersecurity thought leader with over 25 years of experience. Peter shares his unconventional journey in the industry, his passion for continuous learning, and his belief in the power of curiosity. He also discusses the importance of community building and the need for a deeper understanding of the roots of cybersecurity. With his unique perspective, Peter challenges the status quo and offers insights into the future of the industry. TIMESTAMPS:0:03:06 - Discussing Peter's background and journey to Mexico0:08:47 - Differences between US and Mexican cyber culture0:11:28 - The impact of niche knowledge in today's world0:13:15 - Peter's fascination with technology and the concept of magic0:14:51 - Peter's eclectic approach to security0:17:38 - The establishment of a Linux user group and practical activities0:20:19 - The size and structure of the community0:23:23 - The importance of hands-on experience and practical training0:25:36 - The significance of software development skills in cybersecurity0:27:08 - The need to understand the history and foundations of security0:30:07 - The essential characteristic of security: an intelligent, malicious adversary0:32:02 - The potential for security to learn from other industries0:35:03 - The power of the human mind and skepticism towards AI0:38:38 - Where to find Peter and connect with him onlinePSYMLINKSPeter Schwacker's LinkedInNearshore Cyber WebsiteBooks and Literature Mentioned:Communist ManifestoAnthony Trollope's workArthur C. Clark's worksPaolo Freire and Bell Hooks for education philosophyDRINK INSTRUCTIONPaloma2 oz Blanco Tequila1/2 oz Fresh Lime Juice1/2 oz Simple Syrup1/4 cup Grapefruit JuiceSparkling waterIceFill a glass with ice. Add in tequila,lime juice, simple syrup and grapefruitjuice. Top off with sparking water. Optionally garnish with a lime.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
BONUS: BCP LIVE with John Dwyer
Dec 26 2023
BONUS: BCP LIVE with John Dwyer
SESSION TITLE: IBM X-FORCERECORDED: 12/13/23VENUE: City WineryLOCATION: Philadelphia, PAGUEST: John Dwyer  SPONSOR: IBMABOUT THE GUEST:​John Dwyer - John Dwyer is the Head of Research for IBM Security X-Force. He has extensive experience in cybersecurity research, threat actor behavioral modeling, immersive incident response simulations, and integrated security technologies. John is a highly regarded speaker at industry events and has expertise in AI, threat hunting, and detection engineering.John Dwyer discusses the impact of artificial intelligence (AI) on the threat landscape and the changing role of AI in security tools. He emphasizes the importance of understanding the goals and objectives of attackers and how AI can be used to enhance security measures. John also highlights the need for proactive risk reduction strategies and the potential of AI in threat detection and response automation. He concludes by discussing the future possibilities of fully immersive deception and the importance of training and awareness in the face of evolving cyber risks.TIMESTAMPS:00:01:00 - Introduction and thanks to sponsor IBM00:02:28 - Introduction of guest, John Dwyer00:08:28 - Discussion on how AI is changing the threat landscape00:11:33 - AI’s impact on security tools and risks introduced00:13:48 - Commercial vs proprietary LLMs for organizations00:15:06 - Predicting attack surfaces in AI and importance of security fundamentals00:16:17 - Differentiating between credible threats and hype threats00:18:13 - Goals of financially motivated threat actors00:20:35 - Phishing attacks and the need for better defense strategies00:24:17 - Altering security awareness stance for employees00:26:09 - AI capabilities in threat detection, response automation, and vulnerability analysis00:29:11 - Need to invest in infrastructure and innovation to combat crime00:30:15 - Guidance for proactive risk reduction outside of AI00:33:57 - IBM Xforce Threat Intelligence index provides year in review00:37:08 - Closing remarks and thank yousEVENT PHOTOSCONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
BONUS: BCP LIVE @ Lone Star Cyber Circus
Dec 15 2023
BONUS: BCP LIVE @ Lone Star Cyber Circus
SESSION TITLE: LONE STAR CYBER CIRCUSRECORDED: 12/7/23VENUE: Hop and StingLOCATION: Grapevine, TXGUESTS: VariousSPONSOR: IBMABOUT THE GUESTS:​Cyber Distortion - Security leaders Kevin Pentecost and Jason Popillion joined forced to create " Cyber Distortion", a leading security podcast which they describe as their own way of paying back an industry that has been so amazing to them over the past couple of decades. They believe that as cybersecurity experts, we all play a critical role in protecting businesses and individuals from cyber threats. Phillip Wylie - Phillip is an offensive security professional with over 25 years of passion and experience in information technology and cybersecurity specializing in penetration testing, assessments, application security, and threat and vulnerability management. An international speaker and author, Phillip shares his expertise by hosting The Hacker Factory Podcast and Phillip Wylie Show while also serving as a penetration tester, instructor, and founder of the DEFCON Group 940.Wirefall - As a military and law enforcement veteran, local security community advocate, and entrepreneur behind Telesploit, Wirefall has over 25 years of experience, including founding the Dallas Hackers Association while consulting on attack and penetration tests, having previously served on the boards of BSides DFW and TheLab.MS.Juneau Jones- Raised in the Alaskan wilderness where she developed her love of hacking through building and breaking things, Juneau later studied computer science and economics before moving to Dallas, Texas and finding her place in the local hacker community where she now works as an adversarial analyst while continuing her cybersecurity research.NEURAL PHANTOM- @hacknotcrime advocate/Marine Corps Veteran/CISO/Leader of @Hack_FtW/Mentor/Public Speaker/Hacker/Gamer/Meiklejohnian absolutist.Justin "Hutch" Hutchins - Industry leader in the fields of cybersecurity, artificial intelligence, and technical risk management. He is the creator of Sociosploit, a research blog which examines exploitation opportunities on the social web – a confluence of his interests in both technical hacking and social psychology. He is the host of Cyber Cognition, a podcast focused on trends and risks related to emerging artificial intelligence and machine learning technologies. And he is the author of "The Language of Deception: Weaponizing Next Generation AI." Hutch has also spoken at multiple conferences to include HouSecCon, Texas Cyber Summit, ISSA, ToorCon, DEFCON, and RSA ConferenceQuentin Rhoads-Herrera - Seasoned information security professional with over 15 years of experience leading security teams and safeguarding organizations. Expertise includes security analysis, risk assessments, penetration testing, and physical security implementations. Instrumental in building and maturing security programs for Fortune 500 companies, mitigating risks, and protecting critical assets.​The Barcode podcast welcomes cybersecurity leaders and ethical hackers to the Lone Star Cyber Circus LIVE in Grapevine, TX. The guest panel, comprised of Texas-based cybersecurity professionals, discusses the growth of the hacker community in the DFW area and the impact of AI on the threat landscape. They highlight the potential for AI to be used in offensive and defensive cybersecurity strategies, but also cauCONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
X-Factor with Vivek Ramachandran
Nov 2 2023
X-Factor with Vivek Ramachandran
Vivek Ramachandran is a cybersecurity professional and the founder of SquareX, a browser-based cybersecurity solution. He is known for his groundbreaking Wi-Fi attack discoveries, best-selling hacking books, and trainings for cybersecurity professionals worldwide. Vivek is also the creator of the hacker comic book series, "Hackers: Superheroes of the Digital Age."Vivek stops by the bar to to discuss his background in cybersecurity and his journey to becoming an entrepreneur. He shares how his curiosity and passion for technology led him to teach himself programming and eventually specialize in cybersecurity. He also talks about the inspiration behind VRN Comics, and the importance of demystifying hacking for the general public. Vivek then delves into the concept of SquareX, a deterministic cybersecurity solution that aims to provide productivity-first protection by isolating and disposing of potentially malicious files and websites. He explains how SquareX uses containerization and cloud-based technology to ensure that users can safely open documents and visit websites without the risk of infection. Vivek concludes by discussing the future of malware and the role of AI in cybersecurity, emphasizing the need for deterministic security solutions like SquareX to combat evolving threats. TIMESTAMPS:0:00:00: Introduction to Barcode and Elite consulting services 0:01:20: Introduction to Vivek Ramachandran and his achievements 0:02:56: Introduction to the Superhero Sipper cocktail 0:03:34: Vivek's background and journey into cybersecurity 0:08:54: Vivek's experience in college and internships 0:12:37: Vivek's internship opportunity in wireless LAN security 0:13:38: On-site internship at a university in Zurich 0:14:24: WLAN security and lack of practical experience 0:15:03: Early stages of WLAN security and network administration 0:15:37: Learning WLAN and WLAN security quickly 0:16:49: Joining Airtight Networks and getting a lucky break 0:17:49: Getting the opportunity to speak at Defcon and Black Hat 0:18:43: Transitioning from practitioner to entrepreneur 0:19:38: Creating SecurityTube and initial discouragement 0:21:08: Positive feedback and growing readership 0:23:33: Quitting job to pursue research and training full-time 0:26:05: Perseverance and hard work in cybersecurity 0:27:03: Creating VRN comics to demystify hacking 0:29:36: Changing the negative perception of hackers0:34:55: Identifying the need for a new cybersecurity solution 0:36:21: Problems with existing endpoint security solutions 0:37:50: Moving from probabilistic to deterministic security 0:38:18: SquareX's productivity-first approach to endpoint security 0:39:44: SquareX's seamless user experience and isolation solutions 0:40:40: SquareX's freemium model for both consumers and enterprises 0:43:29: AI's potential to supercharge malware and phishing attacks 0:46:26: SquareX's deterministic security approach in the face of AI threats 0:47:44: Vivek's love for meeting motivated individuals and exchanging ideas 0:48:30: Vivek's unique experience at Black Hat Abu Dhabi 0:50:55: Connect with Vivek and learn more about SquareX at sqrx.comSYMLINKSVivek - LinkedinVivek - XSquareX - LinkedinSquareX - XCONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
BONUS: BCP LIVE with Philly CISOs
Oct 30 2023
BONUS: BCP LIVE with Philly CISOs
SESSION TITLE: BELOW DECKRECORDED: 10/26/23VENUE: Rendezvous (Private Yacht) LOCATION: Philadelphia, PAGUEST: David Lingenfelter, Anahi Santiago and Tammy KlotzSPONSOR: N/AABOUT THE GUESTS:​David Lingenfelter - VP of Information Security at Penn Entertainment, with a 30-year career in cybersecurity.Anahi Santiago - CISO at Christiana Care, the largest health system in Delaware, with a passion for healthcare cybersecurity.Tammy Klotz - CISO at Trinzio, with 7 years of experience in cybersecurity in the manufacturing industry.​By way of an invation sent by VP of IT for Visit Philadelphia, Keith McMeniman, Chris  hosts a live podcast on a yacht with three esteemed Philadelphia based security leaders: David Lingenfelter, Anahi Santiago, and Tammy Klotz. They discuss the current state of cybersecurity, the challenges they face in their respective industries, and the importance of educating and raising awareness among end users. They also touch on the potential of AI in cybersecurity and the need for collaboration between different stakeholders in the organization.TIMESTAMPS:0:00:06 - Introduction to the podcast and the guests 0:04:18 - Priorities in different industries: manufacturing, healthcare, and gaming 0:08:32 - Lessons learned from recent breaches and social engineering attacks 0:13:18 - Importance of continuous cybersecurity training and awareness 0:14:51 - Innovations on the horizon to combat cyber risks 0:14:51 - Introduction to the topic of cyber risks and new technologies 0:15:39 -  Buzz around artificial intelligence and its potential 0:17:28 -  Recognition of innovative cybersecurity startups 0:18:43 -  Discussion on the adoption and governance of AI technologies 0:21:22 -  Importance of user awareness and education 0:22:03 -  AI's role in enabling end users to understand risks 0:25:26 -  Engaging with end users and understanding their needs 0:27:08 -  AI's impact on healthcare diagnosis and complex cases 0:28:38 - Collaboration between cybersecurity and clinical experts 0:30:20 - Conclusion on the need for collective decision making in AI implementation 0:30:18 - Discussion about the need for a team to solve problems 0:30:39 - Importance of involving stakeholders in conversations 0:31:48 - Question about favorite bar in Philadelphia 0:32:26 - David talks about his basement bar, the Underground Cantina 0:32:55 - David's bourbon of choice 0:33:17 - Anahi's preference for watching the Super Bowl in Las Vegas 0:33:26 - Anahi's favorite bar, St. Stephen's Green 0:33:47 - Tammy mentions she doesn't have a favorite Philly bar 0:34:03 - Chris mentions Barcode Security and its advisory services EVENT PHOTOSCONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
The Barcode with Paul V. McEnroe
Oct 16 2023
The Barcode with Paul V. McEnroe
Paul V. McEnroe is an award-winning engineer and former IBM executive who played a pivotal role in the development of the universal product code (UPC), also known as the barcode. With over two decades of experience at IBM, McEnroe led a team that created one of the most influential technologies of our generation. He is the author of the business memoir titled "The Barcode," which tells the story of his journey and the development of the barcode. McEnroe shares his background, from being adopted as a child to his education and career at IBM. He discusses how he became involved in the development of the barcode and the challenges he faced along the way. McEnroe also reflects on the unexpected uses and impact of the barcode, such as its role in Amazon's operations. He emphasizes the importance of teamwork and mentorship in achieving success and offers advice for structuring effective teams. TIMESTAMPS:0:01:27: Introduction to Paul V. McEnroe and his role in developing the barcode0:02:20: Paul's background and journey to IBM0:04:09: Paul's role in starting a new business at IBM0:06:21: Choosing the point of sale industry for barcode implementation0:08:43: The selection of IBM's barcode as the industry standard0:10:15: The complexity of developing the barcode system0:12:05: The technological challenges and innovations in barcode implementation0:14:32: The unexpected impact and innovative uses of the barcode0:14:51: Conclusion and final thoughts on the barcode's legacy0:15:23: Jeff Bezos made money on barcodes through Amazon automation0:16:39: Barcode technology wiped out traditional stores like Macy's.0:17:49: 18 states passed laws against barcodes, causing legal issues0:19:19: Paul had to become a lobbyist to explain barcode benefits0:20:59: Canadian woman found barcode system helpful for price comparison0:22:14: IBM lawyers worried about eye safety and laser suicide0:25:04: Paul became president of Trilogy after leaving IBM0:27:49: QR codes were a natural evolution of barcode technology0:29:10: QR codes offer more data but may not compete with barcodes0:30:06: Reading barcodes at high speeds was a challenge in development0:30:33: Paul recalls the CEO's skepticism about the barcode project0:31:11: The CEO tests the barcode's functionality and is amazed0:32:18: Barcodes are still relevant and have magnetic encoding for retail0:34:18: Paul shares his motivation for writing a memoir about the barcode0:37:18: Paul emphasizes the importance of teamwork in achieving goals0:39:14: Paul discusses the composition of his barcode development team0:41:11: Paul adds more engineers to his team to cover various expertise0:43:31: Communication and leadership are crucial for a successful team0:45:16: Problem with the code: it needed to be small0:46:03: X scan for the barcode0:48:10: Importance of teamwork in creating the barcode0:49:06: Mentorship played a pivotal role in Paul's successSYMLINKSENTREPRENEUR.COMThe Barcode: How a Team Created One of the World's Most Ubiquitous TechnologiesDRINK INSTRUCTIONThe U.P.C.1 oz Unaged Rum1 oz Peach Liquor1 oz Cranberry JuiceCombine all ingredients in a glass with ice.CONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
Entitle with Ron Nissim
Sep 27 2023
Entitle with Ron Nissim
Ron Nissim, co-founder and CEO of Entitle IO, joins Chris at the bar to discuss identity and access management (IAM) in the cloud. They explore the differences between traditional IAM and cloud IAM, as well as the pain points organizations commonly face with access requests and approval processes. Ron shares a specific incident that sparked the idea for Entitle IO and explains how their platform has helped organizations improve their IAM efforts. He also discusses the future of IAM and upcoming features from Entitle IO. TIMESTAMPS:0:00:16 - Introduction to IAM and its importance in security 0:01:49 - Differences between traditional IAM and cloud IAM 0:05:33 - The need for cloud IAM due to common access management issues 0:08:18 - Pain points in traditional access requests and approval processes 0:11:49 - Success story of a company implementing Entitle IO 0:12:45 - Rapid deployment of Entitle IO 0:13:12 - Importance of cloud native approach and reducing administrative privileges 0:14:59 - Difficulty of calculating ROI in security 0:16:14 - Overcoming resistance to change in organizations 0:19:07 - Strategies for organizations hesitant to transition to new methodologies 0:22:19 - Features and differentiators of Entitle IO as an innovative solution 0:26:17 - Change management policy and attribute-based model for access provisioning. 0:27:20 - Automated governance and visibility into access and permissions. 0:28:15 - Future of privileged access management (PAM) for cloud resources. 0:29:03 - Evolving aspects of PAM: connectivity, authentication, authorization, and session recording. 0:31:43 - Entitle IO's upcoming open source project for connectivity and authentication. 0:33:12 - Importance of collaboration and feedback from industry professionals. 0:33:54 - Contact information for Ron Nistam and Entitle IO.SYMLINKSRon Nissim - LinkedinEntitle.io - LinkedinEntitle.ioDRINK INSTRUCTIONGOTHAM MARTINI2 oz Vodka1 splash Blackberry Schnapps1 splash Black SambucaIn a cocktail shaker filled with ice,combine all ingredients. Shakevigorously for 10-15 seconds.Strain into chilled glass.EPISODE SPONSOREntitle.ioCONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
Under The Rose with Mike Petrie
Aug 31 2023
Under The Rose with Mike Petrie
Mike Petrie, a pioneer in the fraud investigative industry, discusses his journey into the field and the evolution of investigative techniques. He emphasizes the importance of social media intelligence and the role it plays in uncovering fraud. Mike also highlights the need for education on protecting personal information and the integration of AI in fraud detection and prevention. He shares advice for aspiring investigators and discusses the concept of Webutation, a platform for protecting online reputations. Discover the hidden truths, covert operations, and the art of undercover work that define the intriguing realm of sub rosa AKA "Under The Rose" investigations. TIMESTAMPS:0:00:16 - The role of private investigators 0:02:15 - Mike's background and interest in investigative work 0:04:24 - Getting started in the private investigation industry 0:06:12 - Opening a startup in the investigative field 0:07:40 - Working on fraud cases in the insurance industry 0:09:06 - The methodology used pre-internet for gathering evidence 0:11:37 - Challenges and dangers faced during field surveillance 0:13:11 - Pretexting and social engineering as methods of gathering information 0:13:44 - Ensuring personal safety in dangerous situations 0:13:36 - Gaining intel pre-OSINT and pre-social media 0:14:06 - Ensuring personal safety through preparation and blending in 0:15:56 - Transitioning to leverage OSINT as an intelligence tool 0:20:45 - Educating individuals about the criticality of protecting personal data 0:24:35 - Fraud techniques evolving and the need to inform others 0:25:14 - The impact of removing metadata on investigators and using OSINT 0:26:33 - The abundance of social network sites and their usefulness0:26:54 - Discussion on the deep web and illegal activities 0:27:40 - Warning about dangerous chat room sites for kids 0:29:15 - Integration of AI in fraud detection and prevention 0:30:09 - Use of facial recognition software in investigations 0:31:46 - Limitations of relying on Google for investigations 0:32:53 - AI's role in analyzing images, videos, and data 0:35:49 - Importance of human involvement in research 0:36:32 - Advice for aspiring investigators and learning resources 0:40:53 - Mike's expertise and public speaking engagements 0:41:24 - Building and selling a search platform 0:41:53 - Importance of online reputation and its impact on trust 0:42:37 - Social media intelligence gathering for critical decision-making 0:43:40 - Advocating for thorough gun purchase background checks 0:44:39 - Webutation benefits both individuals and businesses 0:45:08 - Webutation's URL: webutation.io 0:46:03 - Special thanks to family, business partner, and mentors 0:46:49 - Favorite bars in Philadelphia and outside of Philly 0:48:06 - Recommended bar in Mumbai and recent favorites in Miami SYMLINKSLinkedInWebutationDRINK INSTRUCTIONTHE SHADOW2 Oz Gin1 Oz Chilled Earl Gret Tea1/2 Oz Creme De Violette1/2 Oz Fresh Lemon JuiceLemon Twist (Optional)In a cocktail shaker, combine gin,chilled Earl Grey tea, Crème deViolette, and fresh lemon juice.Fill the shaker with ice, and shakevigorously. Strain into chilled glass.Optionally, garnish with a lemon twist.EPISODE SPONSORN/ACONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
The Cheat Code with Colleen Lennox & Jason Brooks
Jul 17 2023
The Cheat Code with Colleen Lennox & Jason Brooks
Cybersecurity professionals are essential for keeping organizations safe from potential threats and ensuring business continuity. According to recent studies, the demand for cybersecurity professionals has surged significantly, and this trend is expected to continue. Unfortunately, qualified people are still having a hard time breaking into the industry, although it's not impossible. And there is help from insiders that are here to help with the process.Colleen Lennox, founder of Cyber Job Central, and Jason Brooks, co-founder of Relative AI, discuss the challenges faced by aspiring professionals trying to break into the cybersecurity industry. They introduce Cyber Job Academy, a platform that offers courses taught by industry experts to help individuals prepare for a career in cybersecurity. They also highlight the benefits of using AI technology, such as Relative.ai's avatar, ARIA, to practice and improve interview skills. The goal is to provide individuals with the tools, resources, and cheat codes needed to succeed in the cybersecurity field.TIMESTAMPS: 0:02:46 - Challenges faced by aspiring professionals in breaking into the cybersecurity industry 0:09:39 - Overview of Cyber Job Academy and its role in addressing these challenges 0:11:38 - Introduction to Relative AI and its role in enhancing interview skills 0:14:15 - Discussion on ARIA, the avatar used in the Cyber Job Academy 0:16:59 - The ability of ARIA to pivot responses based on applicant input 0:23:00 - Advantages of Cyber Job Academy for students 0:27:30 - The potential of AI to eliminate bias in the hiring process 0:34:03 - Where to find more information about Cyber Job Central and the Academy 0:41:41 - The best bar in Philly and favorite drinks for Colleen and JasonSYMLINKSLinkedin - Jason BrooksLinkedin - Colleen LennoxCyber Job CentralRelativ.aiDRINK INSTRUCTIONAVATAR1 Oz Vodka1/2 Oz Blue Curacao1/2 Cup Lemonade1/4 Cup Orange JuiceIcePour all ingredients over ice into a glass and top off with Orange Juice.INTERVIEWERSChris GlandenEPISODE SPONSORN/ACONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
Snake Eyes with Allen Woods
Jun 27 2023
Snake Eyes with Allen Woods
Often, risk and reward collide. Corporate giants and high-stakes gamblers unknowingly walk parallel paths. Their worlds may seem separate to outsiders, although fate has a way of intertwining their destinies. Both are driven by ambition, chasing triumph. But as their desires for success grow, a hidden truth begins to reveal itself. LLMs, like the roll of Snake Eyes in a dice game, hold the power to shape kismet and shatter dreams. The line between success and ruin is as fragile as the edge of a dice. As corporate entities collide with the ultimate risktakers, a new game emerges.Allen Woods served as a soldier in the British Army, primarily with Infantry battalions. Afterwards, he made a pivotal decision to enter into the world of computing. He devoted himself to studies, and eventually reached the esteemed level of a degree . He is a Charter member of the British Computer Society, and has extensive experience in building information management frameworks. He stops by BarCode to share his incredible journey of transformation, risk, and lifelong pursuit of knowledge. We focus on software development, Cybernetics, LLMs and fragility within data relationships.TIMESTAMPS:0:06:12 - Military IT Career and Knowledge Sharing0:12:43 - The Value of Connecting Databases0:17:45 - Incorporating Cybernetics in Software Development0:21:02 - Technological Economy's Low Equilibrium State0:27:01 - Importance of Due Diligence0:32:03 - Exploiting Relationships in Network Science0:38:59 - The UK Post Office's Horizon System0:42:47 - Limits of Probability Testing in AI0:48:28 - LLMs in Small BusinessesSYMLINKSLinkedInBritish Computer SocietyLudwig von Bertalanffy’s “General Systemology”"Autopoiesis and Congition: The Realization of the Living"  by Humberto Maturana"Brain of the Firm" by Stafford Beer "The Heart of Enterprise" by Stafford Beer"Living Systems" by James Greer Miller Stephen Wolfram WritingsCommon Crawl DatasetProject GutenbergNetwork Science by BarabásiUK Post Office Horizon Case"The Age of Surveillance Capitalism" by Shoshana ZuboffDRINK INSTRUCTIONTHE LAST MECHANICAL ART3/4 Oz Mezcal3/4 Oz Cynar3/4 Oz Sweet Vermouth3/4 Oz CampariStir all ingredients in an ice-filled mixing glass and strain into a chilled coupe.  Optionally garnish with an Orange twist.INTERVIEWERSChris GlandenRohan LightMike ElkinsEPISODE SPONSORTUXCARECONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
Darkside with Larry Herzog
Jun 8 2023
Darkside with Larry Herzog
Embark on a captivating journey as we venture into the enigmatic and clandestine world lurking below the surface of the internet. Prepare to explore the depths of cybercrime, illicit trades, and covert activities that take place in the digital underworld.Larry Herzog, a Senior Sales Engineer for Thales, joins me at the bar to discuss the origins of the Darkweb, the technological underpinnings, aestetics, diverse marketplace services and the potential pitfalls of using it.TIMESTAMPS:0:02:56 - An Overview of Its Architecture and Anonymity Features 0:09:14 - Tails OS and Privacy Tools 0:11:11 - Understanding the Risks of Cash Access, Credit, and Debit Services 0:13:16 - The Risks of Credit Card Fraud and How to Protect Yourself 0:17:13 - Dark Web Search Engines: Exploring User Friendliness and Functionality 0:19:01 - Search Engines, Illegal Drugs, and Contract Killers 0:22:20 - Cybercriminal Services and "As-A-Service" Price Points 0:24:33 - Exploits, RaaS, and Crowdfunding 0:29:35 - Bitcoin Mixing and Tumbling Services 0:32:20 - Obtaining Services, Equipment, and New Identities 0:34:05 - An Overview of Marketplace Services and Cybercrime Networks 0:38:20 - The Risk of Operating on the Dark Web 0:40:42 - Exit Node Monitoring and Social Engineering0:42:13 - Ransomware Protection MechanismsSYMLINKSLinkedInTwitterInternet 2Freenode IRCTORTails OSAlphaBayDream MarketSilk RoadDRINK INSTRUCTIONLABYRINTH1 Part Rye Bourbon1/2 Part Oloroso Sherry1/4 Part Amaretto3 dashes Angostura Bitters.Stir all ingredients with ice. Strain into a rocks glass over a large cube.Optionally, garnish with an orange peel and a cherry.INTERVIEWERSChris GlandenEPISODE SPONSORTHALESCONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
Shadow Warrior with Ric Prado
May 26 2023
Shadow Warrior with Ric Prado
In the covert world of intelligence and espionage, where shadows merge with reality, there exists a select group of individuals who operate on the razor's edge between life and death. Among them is a man named Ric Prado, AKA the "Shadow Warrior."Ric's story is a testament to the indomitable human spirit and the unyielding pursuit of justice in the face of adversity. A true warrior with a heart of steel, Ric has spent his entire life on the frontlines of some of the most dangerous and classified missions the world has ever seen. His esteemed career spans over three decades, defined by his unwavering commitment to national security and counterterrorism. From his early years as a military officer to his exceptional service in the CIA, Ric's expertise in counterterrorism and intel operations is unparalleled.TIMESTAMPS:0:03:09 - Impact of the Cuban Revolution on Private Businesses and Education 0:05:38 - Operation Peter Pan and Ric’s journey to the US 0:10:46 - Transition from an Orphanage to Hialeah, FL 0:12:34 - From High School Troublemaker to Elite Pararescueman 0:14:47 - A Professional Diver's Journey to Becoming a Pararescueman and Joining the Central Intelligence Agency 0:16:26 - CIA Recruitment and President Reagan's Latin American Policy 0:22:27 - Ric’s Journey from Miami to Honduras and Beyond 0:29:09 - Entry into the Counterterrorist Center 0:31:08 - Plank Owner of the Bin Laden Task Force 0:34:35 - Billy Waugh: Legendary Green Beret and CIA Paramilitary Operations Officer 0:36:10 - Ric's Experiences in North Africa and Korea with the Bin Laden Task Force 0:40:38 - The Mental and Physical Fortitude Required for High-Risk Missions 0:42:21 - Recounting Near-Death Experiences 0:46:07 - CIA Operations Officer's Dedication to the Mission 0:47:37 - Unwavering Love of Country: The Challenges of Counterterrorism in the 21st Century 0:52:31 - Private Military Contractors and the Rise of ISIS 0:56:31 - Blackwater's Role in Saving the Polish Ambassador's Life 0:57:44 - The Use of Private Military Contractors in the Ukraine Conflict 1:02:06 - Cybersecurity and His New Book "Black Ops: The Life of a CIA Shadow Warrior 1:07:53 - The Benefits of Responsible Training 1:14:00 - The Proper Usage of Handguns for Effective SecuritySYMLINKSLinkedInRic Prado - Black OpsBlack Ops: Life of a CIA Shadow WarriorOperation Peter PanCofer BlackBilly WaughBuzzy KrongardErik PrinceBlackwaterFour BranchesDRINK INSTRUCTION4 BRANCHES BOURBONFounder's BlendPour 2 oz of Bourbon into a whiskey glass. Swirl, smell the aromas, take small sip, savor the flavors, swallow and then exhale.Enjoy slowly.INTERVIEWERSChris GlandenDoug GotayEPISODE SPONSORN/ACONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com