POPULARITY
Most orgs have a major blind spot: the browser.This week on Defender Fridays, we're joined by Cody Pierce, Co-Founder and CEO at Neon Cyber, to discuss why browser security remains a critical gap, from sophisticated phishing campaigns that bypass traditional controls to shadow AI tools operating outside your security perimeter.Cody began his career in the computer security industry twenty-five years ago. The first half of his journey was rooted in deep R&D for offensive security, and he had the privilege of leading great teams working on elite problems. Over the last decade, Cody have moved into product and leadership roles that allowed him to focus on developing and delivering innovative and differentiated capabilities through product incubation, development, and GTM activities. Cody says he gets the most joy from building and delivering products that bring order to the chaos of cyber security while giving defenders the upper hand.About This SessionThis office hours format brings together the LimaCharlie team to share practical experiences with AI-powered security operations. Rather than theoretical discussions, we demonstrate working tools and invite the community to share their own AI security experiments. The session highlights the rapid evolution of AI capabilities in cybersecurity and explores the changing relationship between security practitioners and automation.Register for Live SessionsJoin us every Friday at 10:30am PT for live, interactive discussions with industry experts. Whether you're a seasoned professional or just curious about the field, these sessions offer an engaging dialogue between our guests, hosts, and you – our audience.Register here: https://limacharlie.io/defender-fridaysSubscribe to our YouTube channel and hit the notification bell to never miss a live session or catch up on past episodes!Sponsored by LimaCharlieThis episode is brought to you by LimaCharlie, a cloud-native SecOps platform where AI agents operate security infrastructure directly. Founded in 2018, LimaCharlie provides complete API coverage across detection, response, automation, and telemetry, with multi-tenant architecture designed for MSSPs and MDR providers managing thousands of unique client environments.Why LimaCharlie?Transparency: Complete visibility into every action and decision. No black boxes, no vendor lock-in.Scalability: Security operations that scale like infrastructure, not like procurement cycles. Move at cloud speed.Unopinionated Design: Integrate the tools you need, not just those contracts allow. Build security on your terms.Agentic SecOps Workspace (ASW): AI agents that operate alongside your team with observable, auditable actions through the same APIs human analysts use.Security Primitives: Composable building blocks that endure as tools come and go. Build once, evolve continuously.Try the Agentic SecOps Workspace free: https://limacharlie.ioLearn more: https://docs.limacharlie.ioFollow LimaCharlieSign up for free: https://limacharlie.ioLinkedIn: / limacharlieio X: https://x.com/limacharlieioCommunity Discourse: https://community.limacharlie.com/Host: Maxime Lamothe-Brassard - CEO / Co-founder at LimaCharlie
Between multi-cloud deployments, more employees working remotely, and increasing use of SaaS applications, the number of entry points for attackers to infiltrate your systems has exploded. But gaining visibility into all these possible attack vectors is time-consuming and often incomplete or just a snapshot in time. If the first rule of cyber is to “know what you have,” how can cyber professionals get a comprehensive, current picture of their assets? How can they feel confident that they understand which assets may be more vulnerable and prioritize defenses accordingly? In the first half of this episode of Cyberwire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Hash Table member Jaclyn Miller, the Head of InfoSec & IT at DispatchHealth. In the second half of the episode, Cody Pierce, Chief Product Officer at episode sponsor LookingGlass Cyber Solutions, talks with Dave Bittner. Listen to the discussions about answering the foundational cyber questions (What do I have? Is it protected?), why context is critical, and how an adversarial perspective helps you be a better defender.
This Episode we interview Isaiah Eilson, Cody Pierce, Jeff Lauer about their take on being a Gym Owner. Welcome to the Gym Lords Podcast, where we talk with successful gym owners to hear what they're doing that is working RIGHT NOW, and to hear lessons and failures they've learned along the way. We would love to share your story! If you'd like to be featured on the podcast, fill out the form on the link below. https://gymlaunchsecrets.com/podcast
This Episode we interview Isaiah Eilson, Cody Pierce, Jeff Lauer about their take on being a Gym Owner. Welcome to the Gym Lords Podcast, where we talk with successful gym owners to hear what they're doing that is working RIGHT NOW, and to hear lessons and failures they've learned along the way. We would love to share your story! If you'd like to be featured on the podcast, fill out the form on the link below. https://gymlaunchsecrets.com/podcast
This Episode we interview Isaiah Eilson, Cody Pierce, Jeff Lauer about their take on being a Gym Owner. Welcome to the Gym Lords Podcast, where we talk with successful gym owners to hear what they're doing that is working RIGHT NOW, and to hear lessons and failures they've learned along the way. We would love to share your story! If you'd like to be featured on the podcast, fill out the form on the link below. https://gymlaunchsecrets.com/podcast
This Episode we interview Isaiah Eilson, Cody Pierce, Jeff Lauer about their take on being a Gym Owner. Welcome to the Gym Lords Podcast, where we talk with successful gym owners to hear what they're doing that is working RIGHT NOW, and to hear lessons and failures they've learned along the way. We would love to share your story! If you'd like to be featured on the podcast, fill out the form on the link below. https://gymlaunchsecrets.com/podcast
Cody Pierce joins the show for the first time as a guest host. --- Support this podcast: https://anchor.fm/brockinthemorning/support
The CEO and Co-Founder of AlphaWave, Mr. Cody Pierce appears on Episode #167 of Task Force Radio to unpack what motivates different cyber attackers, how an attacker goes through the process of targeting a business, how organizations define their attack surface, and how the move to digital transformation, cloud migration, and work-from-home environments change the cyber security equation. Mr. Pierce also discusses the flip side of the coin in what motivates cyber defenders, how should cyber defenders think about defending their business, and how offense and defense differ in the Cyber Security world. All this and much, much more on Episode #167 of Task Force 7 Radio...
The CEO and Co-Founder of AlphaWave, Mr. Cody Pierce appears on Episode #167 of Task Force Radio to unpack what motivates different cyber attackers, how an attacker goes through the process of targeting a business, how organizations define their attack surface, and how the move to digital transformation, cloud migration, and work-from-home environments change the cyber security equation. Mr. Pierce also discusses the flip side of the coin in what motivates cyber defenders, how should cyber defenders think about defending their business, and how offense and defense differ in the Cyber Security world. All this and much, much more on Episode #167 of Task Force 7 Radio...
Today I had the opportunity to talk with Head S&C Coach at Grapeland I.S.D. We talk about his journey to being a S&C Coach, his faith, his mental battles he's faced throughout his journey, and even find out how many milligrams of caffeine Cody drinks a day!!!
Today’s episode features Cody Pierce, a local musician and self-described Weezer fan. We dive into the nitty-gritty of what the hell is going on with this band that is somehow still relevant today. The post #8: Yet Another Discussion About Weezer (feat. Cody Pearce) appeared first on The Tape Deck.
Cody Pierce from Endgame will be giving a 15 minute segment on Pre-exploit Preventing. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode484#Tech_Segment:_Pre-exploit_Preventing_-_6:00PM-6:30PM Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
Cody Pierce from Endgame will be giving a 15 minute segment on Pre-exploit Preventing. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode484#Tech_Segment:_Pre-exploit_Preventing_-_6:00PM-6:30PM Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
Cody Pierce from Endgame will talk about pre-exploit prevention. Security news will discuss Yahoo! spying, Mirai source code lessons learned, and more! Our interview this week is with Ed Skoudis of Counterhack Challenges and the SANS Institute. Stay tuned!
Cody Pierce from Endgame will talk about pre-exploit prevention. Security news will discuss Yahoo! spying, Mirai source code lessons learned, and more! Our interview this week is with Ed Skoudis of Counterhack Challenges and the SANS Institute. Stay tuned!
Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.
Processor emulation has been around for as long as the processor it emulates. However, emulators have been difficult to use and notoriously lacking in flexibility or extensibility. In this presentation I address these issues and provide a solution in the form of a scriptable multi-purpose x86 emulator written in Python. The concept was to allow a security researcher the ability to quickly integrate an emulator into their work flow and custom tools. Python was chosen as the development language for multiple reasons, mainly to leverage the benefits of existing Python libraries such as PaiMei/PyDbg and IDApython. With obvious uses in reverse engineering, vulnerability research, and malware analysis PyEmu is a very valuable addition to any security researchers repertoire.
Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.
Processor emulation has been around for as long as the processor it emulates. However, emulators have been difficult to use and notoriously lacking in flexibility or extensibility. In this presentation I address these issues and provide a solution in the form of a scriptable multi-purpose x86 emulator written in Python. The concept was to allow a security researcher the ability to quickly integrate an emulator into their work flow and custom tools. Python was chosen as the development language for multiple reasons, mainly to leverage the benefits of existing Python libraries such as PaiMei/PyDbg and IDApython. With obvious uses in reverse engineering, vulnerability research, and malware analysis PyEmu is a very valuable addition to any security researchers repertoire.