Hacker Valley Studio

Hacker Valley Studio

Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.

Episoder(389)

Episode 5 - What legacy do you want to leave

Episode 5 - What legacy do you want to leave

In this episode, Chris presents a deep question to Ron during a live recording. What legacy do you want to leave? This can have many meanings for people. Do you want to leave a legacy with your family? Your career? Life in general? In this video, Ron and Chris also share future episode topics

7 Jul 201917min

Episode 4 - Layer 8 Fitness, Diet, Focus

Episode 4 - Layer 8 Fitness, Diet, Focus

In this Episode, Scott Behrens (https://twitter.com/helloarbit) join us to discuss optimizing diet, fitness, and focus for performance. These three pillars ensure exceptional performance on and off the court of cybersecurity.

22 Jun 201942min

Episode 3 - All Things Threat Intelligence

Episode 3 - All Things Threat Intelligence

In this episode Ron and Chris do a function deep dive on threat intelligence. They discuss everything from training and processes to sharing across communities. As always leave a comment on what you want us to tackle next!

22 Jun 201927min

Episode 2 - Layer 8 Level Up Career, Life, and Self

Episode 2 - Layer 8 Level Up Career, Life, and Self

In this video Ronald Eddings and Chris Cochran discuss Layer 8 - The Human Element. It's vital to onboard and promote productivity, positivity, and creativity to Security Practitioners. Ron and Chris share tips on patching and updating Layer 8 for continued success.

22 Jun 201916min

Episode 1 - Cybersecurity Alchemy

Episode 1 - Cybersecurity Alchemy

Alchemy - "A seemingly magical process of transformation, creation, or combination" In this video, Chris Cochran and Ronald Eddings discuss how alchemy can be applied to Cybersecurity data to create, transform, and combine security incident data to actionable events. As security practitioners, we aim to purify, mature, and nearly perfect security workflows. Link to blog: https://secdevops.ai

19 Jun 201915min

Populært innen Fakta

fastlegen
dine-penger-pengeradet
hanna-de-heldige
relasjonspodden-med-dora-thorhallsdottir-kjersti-idem
rss-hva-velger-du
treningspodden
foreldreradet
jakt-og-fiskepodden
fryktlos
hverdagspsyken
rss-sunn-okonomi
dypdykk
sinnsyn
rss-kunsten-a-leve
smart-forklart
gravid-uke-for-uke
bedragere
tomprat-med-gunnar-tjomlid
mikkels-paskenotter
rss-strid-de-norske-borgerkrigene