Hacker Valley Blue S2 Episode 6 - John Strand

Hacker Valley Blue S2 Episode 6 - John Strand

If want to get into computer security, you're going to learn to love it, you're going to have to be successful, because a lot of computer security isn't just about bits and bytes, it's really about effectively communicating what needs to be done to the right people.

In this episode wet have the incredible John Strand. Organizations need to become more proactive, and see where those weak spots are to protect themselves from something like ransomware. You need to run a pen test because you can have somebody literally launch those attacks, and identify those weaknesses in those vulnerabilities before the bad people do.

What's the gap that we can all learn from? It's passwords. By and large for most users, passphrases are the way to go. And, multi-factor authentication is actually a very sound strategy.

If you look at one key tenant of computer security, complexity is the enemy of computer security. And security is constantly trying to catch up and protect against yesterday's attacks. So, the future is more connected, it's more complicated. And the problem is, we still have people that use weak passwords, we still have people that click on links from strangers. And ultimately, when we're looking at that future, you're going to see the exact same problems that we've always had complicated on a much, much, much, much, much larger scale. As things get more and more pushed to the cloud. There'll be no shelter here, the front line is everywhere. World of computer security.

Key Takeaways:

0:00 Previously on the show 2:02 John introduction 2:44 Episode begins 2:47 What John is doing today 3:45 John’s core tenets 5:51 How pen testing is “Blue” 6:17 Why understanding fundamentals matters 8:55 Ransomware 10:41 Organizations need to be prepared 11:58 Password gap 13:37 Password philosophy 17:07 Multi-factor authentication 21:40 What to do today 24:24 New problems 26:44 Learn your own network 28:26 Where to find John

John Strand on Twitter

John Strand on LinkedIn

Black Hills Information Security

Learn more about Hacker Valley Studio

Support Hacker Valley Studio on Patreon

Follow Hacker Valley Studio on Twitter

Follow Ron Eddings on Twitter

Follow Chris Cochran on Twitter

Sponsored by Axonius

Episoder(417)

RSAC 2026: Show Up or Fall Behind

RSAC 2026: Show Up or Fall Behind

What does it mean when your smart doorbell becomes an entry point for surveillance? What happens when a single hacker can jailbreak every major AI model within hours of its release? And why are the sa...

20 Mar 21min

What’s Next After Building a $2.5B Cybersecurity Company with Dean Sysman

What’s Next After Building a $2.5B Cybersecurity Company with Dean Sysman

What does it look like when a cybersecurity founder who built a $2.5 billion company decides to level up, again? Dean Sysman, co-founder of Axonius, sits down with Ron Eddings to pull back the curtain...

16 Mar 37min

Can AI Do Your Cyber Job? Post Your Job Req and Find Out with Marcus J. Carey

Can AI Do Your Cyber Job? Post Your Job Req and Find Out with Marcus J. Carey

Last episode, Ron and Marcus made predictions. This episode, they brought the receipts. A journalist built an app with vibe coding and got hacked on live television.  A social network built entirely...

6 Mar 38min

Why 69% of CISOs Are Ready to Walk Away with Anthony Johnson

Why 69% of CISOs Are Ready to Walk Away with Anthony Johnson

The CISO role isn’t the finish line, it’s a launchpad. 69% of security executives are eyeing the exit, and Anthony Johnson is proof that what comes next can be even bigger. Anthony Johnson, former Gl...

6 Mar 40min

Securing the Workspace Attackers Already Live In with Rajan Kapoor

Securing the Workspace Attackers Already Live In with Rajan Kapoor

Your email gateway isn't enough anymore, attackers are already inside the workspace through OAuth apps, browser extensions, and account takeover.  In this episode, Ron sits down with Rajan Kapoor, VP...

19 Feb 38min

Beating “Checkbox Security” With Continuous Offense with Sonali Shah

Beating “Checkbox Security” With Continuous Offense with Sonali Shah

Security doesn’t fail because you missed a tool, it fails because “secure today” tricks you into relaxing tomorrow. This episode exposes why the real fight isn’t compliance… it’s whether your defenses...

12 Feb 41min

Turning Agent Chaos into a Command Center with Pedram Amini

Turning Agent Chaos into a Command Center with Pedram Amini

Text threads made AI feel personal, then agents made it productive, and suddenly “success” turns into chaos you can’t even track. In this episode, Ron sits down with Pedram Amini, creator of Maestro,...

10 Feb 37min

Why MFA Isn’t the Safety Net You Think It Is with Yaamini Barathi Mohan

Why MFA Isn’t the Safety Net You Think It Is with Yaamini Barathi Mohan

Phishing didn’t get smarter, it got better at looking normal. What used to be obvious scams now blend directly into the platforms, workflows, and security controls people trust every day. In this epi...

29 Jan 32min

Populært innen Fakta

fastlegen
dine-penger-pengeradet
relasjonspodden-med-dora-thorhallsdottir-kjersti-idem
foreldreradet
rss-strid-de-norske-borgerkrigene
treningspodden
jakt-og-fiskepodden
rss-sunn-okonomi
sinnsyn
mikkels-paskenotter
takk-og-lov-med-anine-kierulf
hverdagspsyken
gravid-uke-for-uke
rss-kunsten-a-leve
tomprat-med-gunnar-tjomlid
hagespiren-podcast
rss-bisarr-historie
rss-var-forste-kaffe
fryktlos
rss-kull