PodcastsBildungHacker Valley Studio

Hacker Valley Studio

Hacker Valley Media
Hacker Valley Studio
Neueste Episode

409 Episoden

  • Hacker Valley Studio

    Defending Dignity in the Messiest Data on Earth with George Al-Koura

    22.1.2026 | 35 Min.
    The most dangerous attack surface isn’t your infrastructure, it’s desire under pressure. When people are emotional, impulsive, and hoping for connection, security controls don’t fail… judgment does.

    Ron sits down with George Al-Koura, CISO at Ruby Life, to talk about securing some of the most psychologically sensitive data on the internet, and why dating data can carry more real-world risk than financial data. From the fallout of the Tea dating-safety app breaches to impulse-driven human behavior, sexual science, and intel-driven security, this conversation cuts straight to the uncomfortable truth: protecting users means understanding how people actually behave when emotion overrides logic.

    Impactful Moments
    00:00 - Introduction
    01:45 - Tea app breach reality-check
    04:26 - Why George chose Ruby Life
    09:10 - Dating data hits harder
    11:52 - Competitors refuse threat sharing
    16:15- AI boosts social engineering
    18:47 - Horny brains create risk
    19:49 - Sexual science meets security
    21:20 - AI avatars dating first
    33:13 - Trust is earned in layers

    Links
    Connect with our guest on LinkedIn: https://www.linkedin.com/in/george-y-al-koura/

     

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:
    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
  • Hacker Valley Studio

    When Automation Outruns Control with Joshua Bregler

    18.1.2026 | 37 Min.
    AI doesn’t break security, it exposes where it was already fragile. When automation starts making decisions faster than humans can audit, AppSec becomes the only thing standing between scale and catastrophe.

    In this episode, Ron sits down with Joshua Bregler, Senior Security Manager at McKinsey’s QuantumBlack, to dissect how AI agents, pipelines, and dynamic permissions are reshaping application security. From prompt chaining attacks and MCP server sprawl to why static IAM is officially obsolete, this conversation gets brutally honest about what works, what doesn’t, and where security teams are fooling themselves.

    Impactful Moments
    00:00 – Introduction
    02:15 – AI agents create identity chaos
    04:00 – Static permissions officially dead
    07:05 – AI security is still AppSec
    09:30 – Prompt chaining becomes invisible attack
    12:23 – Solving problems vs solving AI
    15:03 – Ethics becomes an AI blind spot
    17:47 – Identity is the next security failure
    20:07 – Frameworks no longer enough alone
    26:38– AI fixing insecure code in real time
    32:15 – Secure pipelines before production

    Connect with our Guest
    Joshua Bregler on LinkedIn: https://www.linkedin.com/in/breglercissp/

     

    Our Links

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:
    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
  • Hacker Valley Studio

    The Day AI Stopped Asking for Permission with Marcus J. Carey

    15.1.2026 | 33 Min.
    AI didn’t quietly evolve, it crossed the line from recommendation to execution. Once agents stopped advising humans and started acting inside real systems, trust replaced experimentation and consequences became unavoidable.

    In this episode, Ron sits down with Marcus J. Carey, Principal Research Scientist at ReliaQuest, to examine what happens after AI is given authority: agents running in production, prompt debt replacing technical debt, vibe coding accelerating risk, and maintenance emerging as the true bottleneck. Together, they discuss how cybersecurity, software engineering, and the job market are shifting now that AI operates with autonomy, often faster than organizations can explain what their systems are actually doing.

    Impactful Moments
    00:00 - Introduction
    02:26 - AI agents cross into production
    03:35 - Trust boundaries become attack surfaces
    6:46 - Vibe coding and hidden technical debt
    09:22 - Prompt debt changes everything
    17:40 - Why junior knowledge disappears
    19:00 - AI replaces repetitive cyber workflows
    23:43 - Coding becomes human leverage
    29:30 - Fall in love with the problem

     

    Connect with our guest, Marcus J. Carey:

    LinkedIn https://www.linkedin.com/in/marcuscarey/

    X https://x.com/marcusjcarey

     

    Articles and Books Mentioned:

    Article used for discussion:  https://www.techradar.com/pro/security/this-webui-vulnerability-allows-remote-code-execution-heres-how-to-stay-safe

     

    Atomic Habits: https://jamesclear.com/atomic-habits-summary

     

    Fall in Love with the Problem, Not the Solution: https://sobrief.com/books/fall-in-love-with-the-problem-not-the-solution

     

    Our Links:
    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:
    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
  • Hacker Valley Studio

    When AI Ships the Code, Who Owns the Risk with Varun Badhwar and Henrik Plate

    08.1.2026 | 35 Min.
    AI isn’t quietly changing software development… it’s rewriting the rules while most security programs are still playing defense. When agents write code at machine speed, the real risk isn’t velocity, it’s invisible security debt compounding faster than teams can see it.

    In this episode, Ron Eddings sits down with Varun Badhwar, Co-Founder & CEO of Endor Labs, and Henrik Plate, Principal Security Researcher of Endor Labs, to break down how AI-assisted development is reshaping the software supply chain in real time. From MCP servers exploding across GitHub to agents trained on insecure code patterns, they analyze why traditional AppSec controls fail in an agent-driven world and what must replace them.

    This conversation pulls directly from Endor Labs’ 2025 State of Dependency Management Report, revealing why most AI-generated code is functionally correct yet fundamentally unsafe, how malicious packages are already exploiting agent workflows, and why security has to exist inside the IDE, not after the pull request.

    Impactful Moments
    00:00 – Introduction
    02:00 – Star Wars meets cybersecurity culture
    03:00 – Why this report matters now
    04:00 – MCP adoption explodes overnight
    10:00 – Can you trust MCP servers
    12:00 – Malicious packages weaponize agents
    14:00 – Code works, security fails
    22:00 – Hooks expose agent behavior
    28:30 – 2026 means longer lunches
    33:00 – How Endor Labs fixes this

    Links
    Connect with our Varun on LinkedIn: https://www.linkedin.com/in/vbadhwar/

    Connect with our Henrik on LinkedIn: https://www.linkedin.com/in/henrikplate/

     

    Check out Endor Labs State of Dependency Management 2025: https://www.endorlabs.com/lp/state-of-dependency-management-2025

     

    Check out our upcoming events: https://www.hackervalley.com/livestreams

    Join our creative mastermind and stand out as a cybersecurity professional:
    https://www.patreon.com/hackervalleystudio

    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com

    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
  • Hacker Valley Studio

    Think Like a Hacker Before the Hack Happens with John Hammond

    01.1.2026 | 28 Min.
    What if the most dangerous hackers are the ones who never touch a keyboard? The real threat isn't just about stolen credentials or ransomware; it's about understanding how attackers think before they even strike. In cybersecurity, defense starts with offense, and the best defenders are those who've walked in the hacker's shoes.

    In this episode, Ron sits down with John Hammond, principal security researcher at Huntress and one of cybersecurity's most recognizable educators. John shares his journey from Coast Guard enlistee to YouTube creator, building an entire media company around ethical hacking. They dig into the balance between public research and responsible disclosure, the rise of AI-augmented attacks, and why identity is now the biggest attack surface in modern enterprises.

    Impactful Moments:
    00:00 - Introduction
    01:00 - AI weaponized in cyber espionage
    05:00 - Learning by teaching publicly
    09:00 - Balancing curiosity with responsible disclosure
    13:00 - Building a creator company
    16:00 - Identity as the new frontier
    20:00 - AI agents running breach simulations
    22:00 - Predictions for cybersecurity in 2026
    25:00 - Ron's hacking habit confession

     

    Links:
    John Hammond LinkedIn: https://www.linkedin.com/in/johnhammond010/
    John Hammond Youtube: https://www.youtube.com/@_JohnHammond

    Article for Discussion: https://www.reuters.com/world/europe/russian-defense-firms-targeted-by-hackers-using-ai-other-tactics-2025-12-19/
    Check out our upcoming events: https://www.hackervalley.com/livestreams
    Join our creative mastermind and stand out as a cybersecurity professional:
    https://www.patreon.com/hackervalleystudio
    Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
    Continue the conversation by joining our Discord: https://hackervalley.com/discord

    Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

Weitere Bildung Podcasts

Über Hacker Valley Studio

Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
Podcast-Website

Höre Hacker Valley Studio, Wissen mit Johnny und viele andere Podcasts aus aller Welt mit der radio.de-App

Hol dir die kostenlose radio.de App

  • Sender und Podcasts favorisieren
  • Streamen via Wifi oder Bluetooth
  • Unterstützt Carplay & Android Auto
  • viele weitere App Funktionen

Hacker Valley Studio: Zugehörige Podcasts

Rechtliches
Social
v8.3.0 | © 2007-2026 radio.de GmbH
Generated: 1/22/2026 - 7:02:31 PM