Podcasts about hvr

  • 37PODCASTS
  • 170EPISODES
  • 39mAVG DURATION
  • ?INFREQUENT EPISODES
  • Jun 14, 2024LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about hvr

Latest podcast episodes about hvr

Daughters of Change
Feeling the Music

Daughters of Change

Play Episode Listen Later Jun 14, 2024 32:04


Sue Keller is an American ragtime pianist and singer, who has released several albums.  As a child, she had flute and singing lessons and also played guitar.Sue attended DePauw University.  She played professionally in various styles before settling on ragtime and old forms of jazz.In 1992 Sue founded the publishing firm Ragtime Press and the recording label HVR. She was the festival music director for the Scott Joplin International Ragtime Foundation from 2003 through 2009 and was awarded the foundation's 2010 Friend of Ragtime AwardIn addition, Sue was a contestant on the quiz show Jeopardy! in 1997, winning three gamesMost recently, Sue has written and produced her first musical, “Wabash Avenue After Dark” opening In October of 2024 in Chatham, Mass. Stay tuned as Sue and I discuss, her career, being a Jeopardy contestant, her new musical, and that certain feeling, you get when the music lives inside of you.To Contact Sue:Email: ragtime@rtpress.comFollow Daughters of Change:Website:Facebook:InstagramLinkedInMarie's LinkedIn:Daughters of Change Producer:  Sarah StaceySarah's LinkedIn Profile 

Horror VS Reality
Introducing: What in the Wide World of Cinema?!

Horror VS Reality

Play Episode Listen Later Sep 14, 2023 46:39


HVR will be back later this month, until then, enjoy the first episode of Anastasia's new podcast, What in the Wide World of Cinema?! Strap in for a lot of weird wild rides through cinema, and subscribe to the new pod for more trippy film journeys. Hosted on Acast. See acast.com/privacy for more information.

Detroit is Different
S4E1 -Hope Village Revitalization's Native Son takes the helm of Leadership, Congratulations Jeff Jones

Detroit is Different

Play Episode Listen Later Dec 30, 2022 35:50


Community leadership in Detroit looks in many ways. Jeff Jones is stepping into an uncommon community leadership position a community resident leading a community development corporation. Hope Village Revitalization is the community development corporation Jeff Jones now leads as President/CEO. He has spent his whole life walking around, talking with, and enjoying the residents of the HVR community. Formerly the organization's board president, he now proudly assumes the role of President and CEO. Jeff's passion for the community and what can be done is abundant. Witnessing the changes that have impacted the quality of life for HVR residents and the welcoming of more renters into a traditional home ownership area are concepts Jeff understands and intimately knows. Jeff shares what to expect from HVR in the future with personality, honesty, and enthusiasm. Detroit is Different is a podcast hosted by Khary Frazier covering people adding to the culture of an American Classic city. Visit www.detroitisdifferent.com to hear, see and experience more of what makes Detroit different. Follow, like, share, and subscribe to the Podcast on iTunes, Google Play, and Sticher. Comment, suggest and connect with the podcast by emailing info@detroitisdifferent.com Find out more at https://detroit-is-different.pinecast.co Send us your feedback online: https://pinecast.com/feedback/detroit-is-different/beaae4f8-6c3e-42c6-9814-a09e12a33f74

Esther Has A Podcast
Generation TikTok - A lesson on the social platform from the Gen that's dominating it.

Esther Has A Podcast

Play Episode Listen Later Nov 30, 2022 83:58


An EHAP First!  We sat down in studio with some of TikTok's rising stars to chat about the platform and how they use it to make money, honey. Whether you are a small (or large) business owner, a marketer, brand consultant or in any way tapped with building awareness, this is a conversation to listen to. We hear from Liz Kapran, Ethan Glenn,  and Zhanna Redneva on...How they built their own following(s)Instagram vs. TikTok?  Mistakes that brands make when trying to enter the spaceDo's, dont's and their own lists of wont'sBonus! We even get into...Evolution of the platform The "anti-influencer" movement? Gen Z Entitlement? And so much more. I absolutely loved talking to these creators and was blown away at how unfiltered they were. Special thanks to Nelson Thall, HVR and Cast of Creators for letting us invade their studio! If you have thoughts or feedback to share, we are here for it! Find us on Instagram @Esther_Has_A_Postcast and we want the judgement, so please do "rate & review" wherever you stream your podcasts.

Hacker Valley Blue
Bridging the Gap: Purple is the Future of Cybersecurity

Hacker Valley Blue

Play Episode Listen Later Oct 27, 2022 61:20


In this episode, we're joined by Maril Vernon. Maril is a purple team lead and co-host of the Cyber Queens Podcast. From a background in marketing, Maril's natural curiosity and determination lead her to a new career in cybersecurity with the Air National Guard and beyond. She discovered that there isn't one job in the field, but many types to choose from. She landed her first job in cyber security by applying her soft skills and tenacity. Maril says never to be afraid to ask “stupid” questions.    Timecode Guide:  [3:21] Maril's origin story [7:27] Beating imposter syndrome  [12:33] Curiosity of a pentester [16:47] Red Vs Blue [21:24] Purple works together [41:46] Invest in people [45:44] Maril's hobbies [52:10] Cyber Queens Podcast [58:12] A piece of advice [59:56] Where to find Maril   Sponsor Links:  Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!  Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone  PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley    Give the Rookie a Chance  Maril explains that entry-level employees aren't given the trust or space to grow. These employees are the future of the industry, and frankly, the older employees are burned out. When given the proper training and investment they can share the load and lift companies to higher places. “I leaned in hard to those soft skills that I knew that I brought with me, in lieu of the technical skills I did not have. And for that company, that was enough, that got my foot in the door.”   Red and Blue are Fighting the Same Enemies Red and Blue teams are often pitted against each other, but in reality, they are fighting the same war. Maril believes you should make small talk before you talk shop. Rapport, discourse, and transparency are key to creating workplace communication.  Davin and Maril explore the relationship between Red teams and Blue teams, how they differ, and what possibilities happen when they work together as a purple team. “One of the things purple teams are able to do is on the tangible side, it's to definitively demonstrate proactive and reactive cyber resilience. If it's done properly you can actually say this is our quantified ability to sport and attack proactively or to reactively.” ------ Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.  Follow Maril on Twitter and LinkedIn. Listen to Cyber Queens Podcast. Follow Davin on LinkedIn. Continue the conversation by joining our Discord.

Hacker Valley Studio
Keeping It Open Source with Metasploit's HD Moore

Hacker Valley Studio

Play Episode Listen Later Sep 15, 2022 37:33


This season of Hacker Valley Red wraps up with another interview of an incredible offensive cybersecurity legend. Known first and foremost for his work founding Metasploit and his recent work co-founding Rumble, HD Moore joins the show this week to hear about his journey from spiteful hacker to successful founder. HD walks through the history of Metasploit, the motivation behind their coding decisions, his opinions on open source software, and the excitement of exploration and discovery. Timecoded Guide: [04:57] Catching up with HD's career from his hacking exploits in the ‘90s through his founding of Metasploit to his recent activities with Rumble [11:41] Getting personal with the feelings and takeaways from a project as successful and impactful on the cyber industry as Metasploit [18:52] Explaining HD's personal philosophies around accessible education and the risk of sharing vulnerable information publicly [25:39] Diving deep into the technical stories of HD's path of discovery and exploration during his time at Metasploit [31:14] Giving advice for future founders and hackers looking to make a legendary impact on the cybersecurity community Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!   What were some of the trials, tribulations, and successes of Metasploit? Although Metasploit has had a lasting impact on the cyber world, HD Moore is not afraid to admit that part of Metasploit existed out of spite for critics, employers, and gatekeepers in the cybersecurity industry. In terms of trials and tribulations, HD saw a great deal of criticism come from his peers and from professionals ahead of him in the industry, often displaying rudeness towards the quality of the exploits and Metasploit's audience of young hackers. Later, HD says that a surprising and amusing side effect of his success with the project was watching employers and peers go from criticizing to lifting up his work with Metasploit and attributing success of many hacking professionals to its creation. “When we started the Metasploit project, we really wanted to open up to everybody. We wanted to make sure that, even if you barely knew how to program, you can still contribute something to Metasploit. So, we did our best to make it really easy for folks to get in touch with us, to submit code.”   Where does your philosophy land today on giving information freely? HD has heard the same opinions many professionals that teach and give information freely have heard: “You're making it easier for people to use this information the wrong way.” Instead of considering the worst possible outcomes of making hacking accessible, HD chooses to acknowledge the importance of accessible education and publicly provided information. According to HD, if someone is creating and teaching content to the next generation of red teamers, that content is theirs to use. Whether they're a physical pen tester teaching lock picking or a hacker disclosing a vulnerability, what they choose to share with others has to be based on personal moral code and what others do with that information is up to them. “It comes down to: You do the work, you own the result. If you're teaching people how to do stuff, great, they can do what they want. You can decide to do that, you can decide not to do that, but it's your decision to spend your time training people or not training them.”   Is it possible to be a CEO, or a co-founder, and stay technical? The downside of success in the cybersecurity industry is often stereotyped as losing the opportunity to be a hands-on hacker. However, for HD, his success has allowed him to do the exact opposite and instead prioritize his time to be technical. HD believes strongly in the ability to make this happen through proper delegation of duties, incorporating new leaders and managers in your company or project, and acknowledging when you may need the help to bring what you're working on to the next level. HD is proud of his success with Metasploit and Rumble, and is happy that he was able to hand off certain duties to other professionals that he knew would do better if they had a chance in the founder's shoes. “Don't let the growth of your company change what you enjoy about your work. That's really the big thing there, and there's lots of ways you can get there. You can hire folks to help out, you can promote your co-founder to CEO. You can bring on program managers or project managers to help with all the day to day stuff."   What advice do you have for people looking to follow a similar cyber career path? Content is the name of the game, especially when you're looking to get more eyes on what you do. HD is the first to admit that putting himself out there in a blog post, on a podcast, or at a stage show is not always a walk in the park, taking him out of his comfort zone and often away from the tech that he spends his time on. However, publicly displaying himself and his work has brought attention to Rumble and Metasploit, and HD knows he would not have achieved this level of success without putting his content out into the world, hearing feedback from his peers, and even receiving his fair share of criticism from industry professionals. “Not all of it is the most fun thing to do all the time, but it is crucially important, not just for growing yourself and getting out there and getting feedback from your peers, but for learning because you learn so much from the feedback you get from that effort.” ----------- Links: Stay in touch with HD Moore on LinkedIn, Twitter, and his website. Learn more about Rumble, Inc on LinkedIn and the Rumble website. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochran on Twitter and LinkedIn Continue the conversation by joining our Discord

Hacker Valley Studio
From Black Hat to Bug Bounties [Pt. 2] with Thomas DeVoss

Hacker Valley Studio

Play Episode Listen Later Sep 8, 2022 34:41


We're joined again by the hacker's hacker, Tommy DeVoss, aka dawgyg. Bug bounty hunter and reformed black hat, Tommy dives back into a great conversation with us about his journey in hacking and his advice to future red team offensive hackers. We cover everything we couldn't get to from part 1 of our interview, including his struggles with burnout, his past hacking foreign countries on a bold quest to stop terrorism, and his future in Twitch streaming to teach you how to be a better bug bounty hunter. Timecoded Guide: [02:57] Fixating on hacking because of the endless possibilities and iterations to learn [09:54] Giving advice to the next generation of hackers [17:17] Contacting Tommy and keeping up with him on Twitter [21:43] Planning a Twitch course to teach hackers about bug bounties using real bugs and real-world examples  [24:57] Hacking in the early 2000s and understanding the freedom Tommy has to talk about any and all illegal hacking he's done now that he's gone to prison   Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac is pleased to offer an exclusivecRed Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!   Do you ever struggle with burnout when it comes to hacking? Hacking has maintained Tommy's interest longer than anything else because of the constant changes in technology and the ever-evolving issues in the online world. However, just because hacking is his passion, doesn't mean that burnout or frustration never happens. Currently, Tommy is taking more of a break with hacking, letting his current day job and his passion for gaming have a front seat. However, he's still firmly in the industry, passionately developing learning opportunities for future hackers and answering questions from cyber professionals of all backgrounds. “I do get burned out sometimes…When it comes to bug bounty hunting, I try and make it so it averages out to where I make at least $1,000 an hour for my effort. It doesn't always work. Sometimes I'm more, sometimes I'm less, but I try and get it so it averages out to about that.”   What hacking advice would you give the younger version of yourself? Although his black hat ways resulted in prison time for Tommy, he doesn't regret his past and instead seeks to teach others the lessons he's learned. When we asked Tommy for advice for new hackers, he was clear that success is a longer journey than people assume it is. Tommy's success was not a fluke, it took years of hands-on learning and patience with failures in order to develop his bug bounty skills. Nothing is actually automatic or easy with hacking, especially as the technology continues to change and evolve. Tommy wants hackers to take every opportunity to try out their skills, even if it's a complete failure. “Don't expect success overnight. Also, don't let failure discourage you. When it comes to hacking, you're going to fail significantly more than you're going to succeed. And the people that are successful in bug bounties are the ones that don't let those failures discourage them.”   What do you think about the “media obsessed” stereotype many people have about black hat hackers? Wrapping up today, Tommy tells us that he'd be happy to be back in the Hacker Valley Studio again some time. Although the stereotype of a black hat hacker wanting attention from the media is disproven, Tommy believes that he definitely has craved that media attention for a large majority of his hacking career. Starting in the early 2000s, after 9/11, Tommy had one of his first brushes with fame in an interview with CNN about hacking Middle Eastern companies. Although his hacking and his politics have changed since then, Tommy enjoys having in-depth conversations about hacking and explaining the intricacies of what he does. “We loved the attention back then, and I still love the attention now, it's nice. The good thing about now is, because I already got in trouble for everything that I've done, I've done my prison time, I don't have anything that I did illegally on the computer anymore that I can't talk about, because I've already paid my debt to society.”   What are the best ways for people to keep up with what you're doing? Considering Tommy's success, it's understandable that a lot of cyber professionals and amateurs have tons of questions for him. When it comes to getting in contact with Tommy, he recommends tweeting him on Twitter publicly so that he can not only answer your question, but help others with the exact same questions. Education is key, and Tommy is so dedicated to teaching other hackers that he's currently developing a recurring Twitch stream centered around helping others learn about bug bounty hunting. “I don't know how successful we're going to be in finding the bugs, but I think it'll be fun to teach people [on Twitch] and do it that way, so that they can actually spend some time learning it. The best way to actually learn this stuff is to actually try and do the hacking.” ----------- Links: Stay in touch with Thomas DeVoss on LinkedIn and Twitter. Check out the Bug Bounty Hunter website. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochran on Twitter and LinkedIn Purchase a HVS t-shirt at our shop Continue the conversation by joining our Discord

Hacker Valley Studio
From Black Hat to Bug Bounties [Pt. 1] with Tommy DeVoss

Hacker Valley Studio

Play Episode Listen Later Sep 1, 2022 35:58


We're joined by million-dollar hacker and bug bounty hunter, Thomas DeVoss, this week as we continue our season-long discussion of offensive cybersecurity legends. A legend in the making with a success story in bug bounty hunting that has to be heard to be believed, Tommy is an incredibly successful blach hat hacker-turned-bug bounty hunter, representing how misunderstood the hacking community can be and how positively impactful bug bounties can be. Who hacks the hackers? Look no further than Tommy DeVoss. Timecoded Guide: [02:59] Becoming interested in hacking for the first time  [08:26] Encountering unfriendly visits with the government and the FBI after his hacking skills progressed  [14:20] Seeking his first computer job after prison and leveraging his hacking skills [25:21] Discussing with Yahoo the possibility of working with them due to his successful bug boundaries [30:56] Giving honest advice to hackers looking to break into the bug bounty scene  Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today! When did you get into hacking for the first time? At an early age, Thomas found his passion for hacking in an IRC chat room. Mentored by a man named Lewis and encouraged by fellow friends in the hacking world, popping shells and breaking into US systems using foreign IP addresses. Although Tommy became incredible at his craft from a young age, his early habits became serious black hat issues that ended up getting him in trouble with the US government. Just like the hacker in a big Hollywood blockbuster, the government caught up with Tommy and he faced 2 years in prison in his first sentence. “Instead of coming back to him and saying, "Hey, I'm done," I came back and I was actually asking him questions like, "Can you explain this?” And he saw that I was like, actually interested in this and I wasn't one of the people that was just expecting it to be handed to me and everything like that.”   After spending time in prison, were there barriers to getting involved in hacking again? After being in and out of prison a couple times, Tommy found the worst part of coming home to be his ban from touching any sort of device with internet access. Despite it being a part of his probation, his passion for tech continued to bring him back to computers and gaming. After his final stint in prison after being falsely suspected of returning to his black hat ways, the FBI lifted Tommy's indefinite ban on computer usage and immediately renewed his passion for working in tech. “They had banned me indefinitely from touching a computer. So, when I came home on probation the first time, they upheld that and I still wasn't allowed to touch computers as part of my probation. For the first month or so, I didn't get on a computer when I came home from prison, but then it didn't take long before I got bored.”   How did your cyber career pivot to bug bounty hunting? With prison behind him and his ban on computers lifted, Tommy got a job working for a family friend in Richmond, Virginia for a modest salary of $30,000. Although this amount felt like a lot at the time, he quickly realized that there was money to be made in bug bounties. His first few experiments in attempting bug bounty programs had him earning $20,000 or $30,000 for hours of work, a huge increase from the salary he was currently making. Encountering success after success, Thomas quit his job in 2017 to become a full-time bug bounty hunter. “The first bug bounty program that jumped out at me was Yahoo. I had started hacking Yahoo in the mid 90s, I knew their systems in the 90s and early 2000s better than a lot of their system admins and stuff. And I figured, if there's any company that I should start out with, it should be them.”   What success have you seen since becoming a bug bounty hunter, especially with major corporations like Yahoo? Thomas has become a huge earner in the cybersecurity community, and has continued to see incredible results from his hacking and bug bounty projects. Most notably, after numerous high earning days, making up to $130K at once, with companies like Yahoo, he's even been offered positions working with corporations he's bug bountied for. However, Tommy is quick to point out that his success was definitely not overnight, and warns fellow hackers of getting too confident in their bug bounty abilities without the proper skill sets or amount of experience under their belts. “I think at this point, I've had days where I've made six-digit income in that single day, at least six or seven times. And it's almost always been from Yahoo.” ----------- Links:  Stay in touch with Thomas DeVoss on LinkedIn and Twitter. Check out the Bug Bounty Hunter website. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochran on Twitter and LinkedIn Purchase a HVS t-shirt at our shop Continue the conversation by joining our Discord

Hacker Valley Studio
Unlocking Cyber Education with John Hammond

Hacker Valley Studio

Play Episode Listen Later Aug 25, 2022 28:35


John Hammond, Senior Security Researcher at Huntress Labs and self-described cybersecurity education enthusiast, joins us as we continue our discussion of red team legends. With a focus on content creation this week, John discusses his success with his YouTube channel, his passion for showcasing authentic and accessible educational materials online, and his advice for creating content safely and spreading awareness with not only a red team or blue team mindset, but with a purple team perspective. Timecode Guide: [01:37] Understanding the impact of content creators in the cybersecurity community, especially when it comes to YouTube educational content [06:58] Becoming a successful YouTube creator through consistently posting hacking content and ignoring the stereotype of “overnight success” [13:28] Combining his role as a cybersecurity educator with his security research at Huntress to explore exploits and have real life experience with what he teaches [16:47] Focusing on the blue side of the house as someone with red team experience, and understanding how to use a tool like PlexTrac to create a collaborative purple team [21:13] Being mindful of the impact he has through sharing this knowledge and understanding the risk of cybersecurity educational materials falling into “the wrong hands” Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! The Axonius solution correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action — giving IT and security teams the confidence to control complexity. Learn more at axonius.com/hackervalley PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!   What is your origin story for wanting to educate other hackers? Like many of us, John started his journey Googling how to become a hacker. As he gained more knowledge about the specific skills involved in hacking, John never left the internet behind, always seeking out videos and articles explaining new and emerging content. Inspired by those who created that content in the first place, he started his own YouTube channel, simply titled John Hammond, as has spent years cultivating a consistent hacker audience. “Along the way, creating content and helping educate others through YouTube is really my main stage platform and has been just a passion project, a labor of love, and something fun along the way.”   What feelings do you get looking back on the YouTube content you've created so far? John prioritizes clarity, transparency, and honesty in what he does, and he's not afraid to show some humbleness, too. Overall, John is thankful for his YouTube success and the impact it had on the cybersecurity community. No matter what he's showing in his videos, he prefers to keep things honest, to show where he's made mistakes, and to accept criticism and advice from other hackers and offensive cybersecurity professionals that see his work. “I'm showcasing just my computer screen, maybe you get a little face cam and a circle on the bottom right, but it's like you're looking over my shoulder. You're seeing me showcase something raw, live, genuine, and authentic…It's not all sexy, there's a lot of failure in hacking.”   Have you ever considered focusing on the blue team or the defensive side of cybersecurity? The majority of John's YouTube content and the work he does in his role at Huntress Labs heavily involves the red team and offensive side of cyber. However, John is a huge advocate for the blue team and the red team collaborating and communicating better. Through making more concepts in cybersecurity accessible through educational content like John's own videos, he hopes we can continue to bridge the gap and achieve that perfectly mixed purple team. “We're all playing in concert. As one team sharpens their skills in the red team pen test, then it's up to the blue team to figure that out. What did they do? How can we better detect it? How can we stop and mitigate that security threat?”   What advice do you have for red team content creators that want to share content and spread awareness safely? With the impact that he's had and the content he's put out onto the internet, John is no stranger to seeing the negative side of cybersecurity knowledge being more accessible than ever before.   Still, he wants to make sure content creators understand the value of transparency and honesty in what they do. Instead of fearing what could be, cultivate a community around making this level of knowledge and security available to everyone. “Share, be transparent, be forthcoming. I know there are a lot of conversations about gatekeeping in cybersecurity, but there shouldn't be that. I understand there's grit and determination and hard work to do all the things that you're doing, but be friendly and be transparent and honest.” ---------- Links: Check out our guest, John Hammond, on YouTube and LinkedIn. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn. Catch up with Chris Cochran on Twitter and LinkedIn. Continue the conversation by joining our Discord.

Hacker Valley Studio
Purposeful Communication Through PlexTrac with Dan DeCloss

Hacker Valley Studio

Play Episode Listen Later Aug 18, 2022 35:53


We're joined by sponsor and guest Dan DeCloss, CEO and Founder of PlexTrac, on the podcast today to talk about communication and collaboration between the red and blue side of cybersecurity and why security success depends on those two sides working together. On their mission to build stronger, more productive, and well-rounded security teams, PlexTrac provides incredible and insightful metric and messaging tools that change the game for the cybersecurity industry. Timecoded Guide: [05:36] Understanding PlexTrac's history and mission for cybersecurity teams [09:58] Lack of empathy and understanding in red team and blue team communication [18:48] Breaking through the resentment and confusion within a team [24:45] Envisioning the future of PlexTrac's community impact [27:52] Caring about your cybersecurity mission beyond yourself Sponsors: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today! What is the function of PlexTrac that would help you the most as a pen tester? With prior hands-on experience on the red side, Dan found his journey to creating PlexTrac to be full of moments where he wanted to fix the same problems he encountered over and over with reporting and communicating. One of these problems was solved easily with the addition of a video feature, a simple function that has existed since PlexTrac first began but is instrumental and is a huge time-saver for visual learners. “As a pen tester, I hated finding that I had 20-odd screenshots if it's a pretty complex exploit. I think the adage for us is like, if a picture's worth 1,000 words, then a video is worth 1,000 pictures, right?” What do you think are some of the gaps in skills that organizations face when hiring these professionals to perform offensive operations? Communication is key— not just in life, but in this episode. While we've discussed skills gaps previously in cybersecurity, Dan is quick to point out that a consistent gap he sees in all areas of cybersecurity is effective communication. PlexTrac keeps this struggle to communicate in mind and creates easy, simple pathways and functions that encourage communication and facilitate collaborative problem solving. “If there's one area that I really emphasize with anybody that I'm mentoring or have hired in the past is, as a security person, whether you're red or blue, you really do need to be a good communicator and be able to communicate risk effectively within the right context.”   What would you want to say to those folks that don't see eye-to-eye from the red or the blue side?   We're fighting the same fight, no matter if we're on the red side or the blue side of cybersecurity. Dan's message for our warring red and blue teams throughout the industry is to understand the importance of your mission and to not let relationships between red and blue feel clouded with misunderstanding or resentment. No one's job is harder than anyone else's, and each role on offensive and defensive plays a part in our collective victory. “I'm gonna just be point blank about it…Are you trying to just prove a point about your knowledge and your skills? Or, are you actually trying to make the world a safer place?”   What would you want to say to all those folks out there [in cybersecurity]? As PlexTrac aims to make a huge impact on our community, Dan and his team acknowledge a need for a unified, focused, and collaborative cybersecurity industry, with hard workers on both the red and blue sides. With PlexTrac's assistance in making reports, measurable results, and communication that much easier, our team at Hacker Valley is thankful to be a part of PlexTrac's amazing network and can't wait to share more tools like this with all of you. “I think keep fighting the good fight, for both sides, and recognizing that your mission is vital to the safety and security of your organization and the world at large, right? We are all in this battle together.” ---------- Links:   Spend some time with our guest, Dan DeCloss, on LinkedIn, and the PlexTrac website Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochran on Twitter and LinkedIn

Omaha Sports Insider
The Nick Handley Show - Hour 4 (8-12-22)

Omaha Sports Insider

Play Episode Listen Later Aug 12, 2022 40:34


Hour four looked at the lines for Nebraska Football versus Northwestern, what number the crew would be confident betting on, and the daily Line Change with HVR.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Hacker Valley Studio
Representation Without Technicalities with Mari Galloway

Hacker Valley Studio

Play Episode Listen Later Aug 11, 2022 42:09


We're breaking down the concept of difference makers this week, and we couldn't help but call upon Mari Galloway, CEO of Women's Society of Cyberjutsu, to be our guest during this conversation. As a black woman in cybersecurity who has dedicated a large portion of her career to helping women and girls become a part of the cyber community on both the technical and non-technical sides, Mari is a stunning example of making a difference and creating a path to expand cybersecurity beyond stereotypes.   Timecoded Guide: [01:29] Defining the difference makers and explaining the OODA loop [13:52] Introducing Mari and the Women's Society of Cyberjutsu [20:14] Finding her purpose in helping others find their purpose [25:06] Explaining the roles and paths available outside of strictly technical [30:31] Understanding imposter syndrome and forging a freedom-based career journey Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!   What is that like to see people go from taking that original red pill all the way through starting their career in cybersecurity? When we talk about making a difference, many of us don't get to see our impact as clearly as the Women's Society of Cyberjutsu sometimes gets to see. Mari tells us numerous stories of women throughout this episode, including herself, who became a part of this industry because of the instrumental work they do in outreach and education. For Mari, seeing women change their minds and majors to become a part of the tech industry shows how vital this work is. “These are the moments we're waiting for, whether it's one person or 50 million people. We want you to feel confident enough to get the skills you need, get in the industry, continue to refine those skills, and be super successful.”   What would you equate your purpose to, and how does everything you do fit into it? Like many of us, Mari isn't entirely sure what her purpose is, but she knows that she enjoys helping the next generation and making a difference in the landscape of cybersecurity. Working with a nonprofit is not an easy job, even if it is rewarding, and Mari still prioritizes her freedom alongside meeting her purpose. No matter what Mari's future holds, she knows that this work and this purpose to help others will always find her. “I think as I get older, as I start to take steps back to just kind of look at what's happened and the impact that I'm having and others around me are having on the next generation of folks coming up, I think my purpose is to help people. It's to help other people see their potential.”   How do you feel like creating that safe environment has affected others? Helping others find their footing in the cybersecurity industry can be extremely rewarding, especially when Mari found herself in a situation of uncertainty when she first joined the Cyberjutsu Tribe. The community of cybersecurity and the stereotypes around hackers can feel incredibly uninviting from the outside. Offering people, especially women and young girls, an opportunity to step into a safe space where they can ask anything has been huge for Mari. “We call it our Cyberjutsu Tribe, and we want to make sure that anybody that comes to us feels like they can reach out and touch us and ask us questions and get answers and just have a conversation with us.”   How do we invite more people in and let them know that there are opportunities in cyber outside of technical roles? Whether you're hacking, selling, managing, or marketing, there is a space for you in the cybersecurity world. You don't have to code or to be extremely technical to fit in this industry anymore, and you don't have to have a certain look. The Women's Society of Cyberjutsu prioritizes educating people on every role involved in the industry and showing them that they don't have to be a tech wizard or a computer guru to find a satisfying and profitable position. “You don't have to look like this to be a hacker. You can look like me…That stereotype, I think, is dying, as we see the number of women coming in and men coming into the space that don't look like that anymore.” Links: Spend some time with our guest, Mari Galloway, on LinkedIn, Twitter, her website , and the Women's Society of Cyberjutsu website. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter. Catch up with Chris Cochan on Twitter.  

Omaha Sports Insider
The Nick Handley Show - Hour 4 (8-11-22)

Omaha Sports Insider

Play Episode Listen Later Aug 11, 2022 40:14


Hour four included conversations with Evan Bland of the Omaha World Herald as well as the daily Line Change with the HVR crew.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Hacker Valley Studio
Learning from Cybersecurity Legends with Davin Jackson

Hacker Valley Studio

Play Episode Listen Later Aug 4, 2022 29:56


Those on the red team may not be household names to the everyday person, but they are absolutely legends and icons in the world of cybersecurity and hacking. While we have our personal favorite hackers between the two of us, we also invite our guest, Davin Jackson, to share his favorite cybersecurity legends and the lessons he's learned from them. Timecode Guide: [00:50] The importance of red teaming, especially during this season [02:17] Ron and Chris' first experience working in a red team environment [11:23] Communication and collaboration between blue and red [16:53] Knowledge gained from Davin Jackson's humble beginnings in tech [22:19] Gaining the blue perspective with Hacker Valley Blue Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today! _____________ Legends, Icons, Teachers, and Friends From Marcus Carey to Johnny Long, we're excited to share the legends that had an early influence and lasting impact on our careers in cybersecurity. While our two backgrounds in red teaming are different, we can attribute so much of our success and our ability to share our knowledge with all of you to the experts that were willing to invite us to join and learn the best hacking techniques alongside them. “I think that's the most important thing in red teaming, it's passing that knowledge on to someone else.” - Chris Cochran   Communication, collaboration, and community instead of red vs blue It is not two teams with two separate fights when we're talking about red teams and blue teams. Often, when cybersecurity is too focused on this split between offensive and defensive, we forget to collaborate and fall short of improving on issues we discovered. Communication between red and blue can be a costly struggle, which is why we're happy to see our sponsor PlexTrac stepping in to develop communication technology for these teams. “There's this push and pull of collaboration. On one hand, you want the red team to work autonomously…but on the other hand, they do need insight if you're going to go deeper and deeper.” - Ron Eddings   Legends met, lessons learned, tech loneliness understood In the latter half of our episode, we're joined by Hacker Valley Blue host Davin Jackson, also known as DJax Alpha. Davin started his cybersecurity journey with no computer of his own. Working his way up from basic tech jobs at corporations like Circuit City, lessons Davin learned from the legends he looked up to include finding a mentor, focusing on networking (even when it feels like a dead end), and being always willing to share what you've learned. “It's about consistency, and you have to have self control and discipline…It's one thing to get it, but it's another to maintain that success.” - Davin ---------- Spend some time with our guest, Davin Jackson (DJax Alpha/Alpha Cyber Security) on his website, Twitter, Instagram, Facebook, and weekly on the Hacker Valley Blue podcast. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochan on Twitter and LinkedIn Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Hacker Valley Studio
Making Hacking Accessible with Deviant Ollam

Hacker Valley Studio

Play Episode Listen Later Jul 28, 2022 34:14


In this season of Hacker Valley Red, we focus on cybersecurity legends in offensive operations with a legend in the physical pen testing and lockpicking: Deviant Ollam. As a pioneer in our industry and an author of two incredible books about lockpicking, Deviant shares his history from hobbyist to professional and all that he's learned along the way about making the secrets of the hacking world accessible to all. Timecoded Guide: [01:28] Defining the pioneers in cybersecurity [08:47] Deviant's first explorations in lockpicking [16:03] Accessing and democratizing hacking secrets [18:58] Becoming an author to transfer his knowledge [23:12] Seeing the past, present, and future of hacking Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy! And be sure to come say hello to us at Black Hat at Booth #1686! ---------------- What does it mean to be a pioneer in cybersecurity? As our season focuses on legends, it's important that we explain what makes these individuals such a vital part of our community. In the case of this episode, we explain that our guest Deviant is nothing short of a pioneer. Deviant has been willing to take on new challenges and revolutionize the industry throughout his career, influencing hundreds of individuals and leaving a lasting educational impact on the entire industry. “That ‘zero to one' part can be the hardest part of any progression in any field, but especially in cybersecurity.” — Chris   When you reflect on changing this whole industry, how does that make you feel? Despite our guest's legendary reputation, Deviant is humble about his achievements, caring more about how his work has impacted others than himself. What he focuses most on in his teaching, presentations, and writing is making lockpicking and penetration testing accessible and understandable. Instead of harboring secrets and perpetuating exclusionary policies, Deviant wants anyone to be able to master these skills and understand this knowledge. “I'm not the first one who ever did this. What I like to think of my contributions is that they have chiefly been making it accessible and democratizing this knowledge.” — Deviant   Do you think it's harder today to stand out than it was a couple decades ago? For Deviant, our globalized internet and algorithm-focus social media sites are both a blessing and a curse. While knowledge can be found on every corner of the web and anyone can become familiar with information that was once borderline inaccessible, Deviant also recognizes that younger hackers and lockpickers will have a very different rise to success than he did years ago, especially due to fragmented audiences and tricky algorithms. “We have more avenues to put yourself on display, to put yourself out there than ever before, but that means the audience is fragmented and is spread so thin.” — Deviant   What piece of advice would you have for the folks that want to make an impact in security and technology and in our community today? Although success will look different for newer members of our cybersecurity community, Deviant is confident that the younger innovative minds of the future will be able to solve so many of the long-standing problems within our industry. However, he reminds our younger audience that they need to still respect the tenured members of the cybersecurity world and to learn from them without oversimplifying the issues past professionals have faced. “Start thinking about it in a way that doesn't use ‘just,' because every old head in the industry has heard that….We couldn't ‘just' do it, or we would've ‘just' done it.” - Deviant ------ LINKS: Spend some time with our guest, Deviant Ollam, on his website, Twitter, Instagram, and Youtube channel. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter. Catch up with Chris Cochan on Twitter.

Hacker Valley Red
Keeping It Open Source with Metasploit's HD Moore

Hacker Valley Red

Play Episode Listen Later Jul 1, 2022 37:00


This season of Hacker Valley Red wraps up with another interview of an incredible offensive cybersecurity legend. Known first and foremost for his work founding Metasploit and his recent work co-founding Rumble, HD Moore joins the show this week to talk about his journey from spiteful hacker to successful founder. HD walks through the history of Metasploit, the motivation behind their coding decisions, his opinions on open source software, and the excitement of exploration and discovery. Timecoded Guide: [04:57] Catching up on HD's career from his hacking exploits in the ‘90s through his founding of Metasploit to his recent activities with Rumble [11:41] Getting personal with the feelings and takeaways from a project as successful and impactful on the cyber industry as Metasploit [18:52] Explaining HD's personal philosophies around accessible education and the risk of sharing vulnerable information publicly  [25:39] Diving deep into the technical stories of HD's path of discovery and exploration during his time at Metasploit [31:14] Giving advice for future founders and hackers looking to make a legendary impact on the cybersecurity community   Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley   What were some of the trials, tribulations, and successes of Metasploit?  Although Metasploit has had a lasting impact on the cyber world, HD Moore is not afraid to admit that part of Metasploit existed out of spite for critics, employers, and gatekeepers in the cybersecurity industry. In terms of trials and tribulations, HD saw a great deal of criticism come from his peers and from professionals ahead of him in the industry, often displaying rudeness towards the quality of the exploits and Metasploit's audience of young hackers. Later, HD says that a surprising and amusing side effect of his success with the project was watching employers and peers go from criticizing to lifting up his work with Metasploit and attributing success of many hacking professionals to its creation. “When we started the Metasploit project, we really wanted to open up to everybody. We wanted to make sure that, even if you barely knew how to program, you can still contribute something to Metasploit. So, we did our best to make it really easy for folks to get in touch with us, to submit code.”   Where does your philosophy land today on giving information freely? HD has heard the same opinions many professionals that teach and give information freely have heard: “You're making it easier for people to use this information the wrong way.” Instead of considering the worst possible outcomes of making hacking accessible, HD chooses to acknowledge the importance of accessible education and publicly provided information. According to HD, if someone is creating and teaching content to the next generation of red teamers, that content is theirs to use. Whether they're a physical pen tester teaching lock picking or a hacker disclosing a vulnerability, what they choose to share with others has to be based on personal moral code and what others do with that information is up to them.  “It comes down to: You do the work, you own the result. If you're teaching people how to do stuff, great, they can do what they want. You can decide to do that, you can decide not to do that, but it's your decision to spend your time training people or not training them.”   Is it possible to be a CEO, or a co-founder, and stay technical? The downside of success in the cybersecurity industry is often stereotyped as losing the opportunity to be a hands-on hacker. However, for HD, his success has allowed him to do the exact opposite and instead prioritize his time to be technical. HD believes strongly in the ability to make this happen through proper delegation of duties, incorporating new leaders and managers in your company or project, and acknowledging when you may need the help to bring what you're working on to the next level. HD is proud of his success with Metasploit and Rumble, and is happy that he was able to hand off certain duties to other professionals that he knew would do better if they had a chance in the founder's shoes.  “Don't let the growth of your company change what you enjoy about your work. That's really the big thing there, and there's lots of ways you can get there. You can hire folks to help out, you can promote your co-founder to CEO. You can bring on program managers or project managers to help with all the day to day stuff.”   What advice do you have for people looking to follow a similar cyber career path? Content is the name of the game, especially when you're looking to get more eyes on what you do. HD is the first to admit that putting himself out there in a blog post, on a podcast, or at a stage show is not always a walk in the park, taking him out of his comfort zone and often away from the tech that he spends his time on. However, publicly displaying himself and his work has brought attention to Rumble and Metasploit, and HD knows he would not have achieved this level of success without putting his content out into the world, hearing feedback from his peers, and even receiving his fair share of criticism from industry professionals. “Not all of it is the most fun thing to do all the time, but it is crucially important, not just for growing yourself and getting out there and getting feedback from your peers, but for learning because you learn so much from the feedback you get from that effort.”  ----------- Stay in touch with HD Moore on LinkedIn, Twitter, and his website. Learn more about Rumble, Inc on LinkedIn and the Rumble website. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochran on Twitter and LinkedIn Continue the conversation by joining our Discord

Hacker Valley Red
From Black Hat to Bug Bounties [Pt. 2] with Thomas DeVoss

Hacker Valley Red

Play Episode Listen Later Jun 24, 2022 34:06


We're joined again by the hacker's hacker, Tommy DeVoss, aka dawgyg. Bug bounty hunter and reformed black hat, Tommy dives back into a great conversation with us about his journey in hacking and his advice to future red team offensive hackers. We cover everything we couldn't get to from part 1 of our interview, including his struggles with burnout, his past hacking foreign countries on a bold quest to stop terrorism, and his future in Twitch streaming to teach you how to be a better bug bounty hunter.   Timecoded Guide: [02:57] Fixating on hacking because of the endless possibilities and iterations to learn, but understanding that burnout does happen, especially when hacking gets frustrating [09:54] Giving advice to the next generation of hackers, including patience for success, getting back up after a failure, and dedicating yourself to a hands-on learning experience [17:17] Contacting Tommy and keeping up with him on Twitter, and asking questions publicly so that others can learn from the answers he gives you [21:43] Planning a Twitch course to teach hackers about bug bounties using real bugs and real-world examples of how they work [24:57] Hacking in the early 2000s and understanding the freedom Tommy has to talk about any and all illegal hacking he's done now that he's gone to prison    Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley   Do you ever struggle with burnout when it comes to hacking? Hacking has maintained Tommy's interest longer than anything else because of the constant changes in technology and the ever-evolving issues in the online world. However, just because hacking is his passion, doesn't mean that burnout or frustration never happens. Currently, Tommy is taking more of a break with hacking, letting his current day job and his passion for gaming have a front seat. However, he's still firmly in the industry, passionately developing learning opportunities for future hackers and answering questions from cyber professionals of all backgrounds. “I do get burned out sometimes…When it comes to bug bounty hunting, I try and make it so it averages out to where I make at least $1,000 an hour for my effort. It doesn't always work. Sometimes I'm more, sometimes I'm less, but I try and get it so it averages out to about that.”   What hacking advice would you give the younger version of yourself?  Although his black hat ways resulted in prison time for Tommy, he doesn't regret his past and instead seeks to teach others the lessons he's learned. When we asked Tommy for advice for new hackers, he was clear that success is a longer journey than people assume it is. Tommy's success was not a fluke, it took years of hands-on learning and patience with failures in order to develop his bug bounty skills. Nothing is actually automatic or easy with hacking, especially as the technology continues to change and evolve. Tommy wants hackers to take every opportunity to try out their skills, even if it's a complete failure. “Don't expect success overnight. Also, don't let failure discourage you. When it comes to hacking, you're going to fail significantly more than you're going to succeed. And the people that are successful in bug bounties are the ones that don't let those failures discourage them.”   What do you think about the “media obsessed” stereotype many people have about black hat hackers? Wrapping up today, Tommy tells us that he'd be happy to be back in the Hacker Valley Studio again some time. Although the stereotype of a black hat hacker wanting attention from the media is disproven, Tommy believes that he definitely has craved that media attention for a large majority of his hacking career. Starting in the early 2000s, after 9/11, Tommy had one of his first brushes with fame in an interview with CNN about hacking Middle Eastern companies. Although his hacking and his politics have changed since then, Tommy enjoys having in-depth conversations about hacking and explaining the intricacies of what he does. “We loved the attention back then, and I still love the attention now, it's nice. The good thing about now is, because I already got in trouble for everything that I've done, I've done my prison time, I don't have anything that I did illegally on the computer anymore that I can't talk about, because I've already paid my debt to society.”   What are the best ways for people to keep up with what you're doing? Considering Tommy's success, it's understandable that a lot of cyber professionals and amateurs have tons of questions for him. When it comes to getting in contact with Tommy, he recommends tweeting him on Twitter publicly so that he can not only answer your question, but help others with the exact same questions. Education is key, and Tommy is so dedicated to teaching other hackers that he's currently developing a recurring Twitch stream centered around helping others learn about bug bounty hunting. “I don't know how successful we're going to be in finding the bugs, but I think it'll be fun to teach people [on Twitch] and do it that way, so that they can actually spend some time learning it. The best way to actually learn this stuff is to actually try and do the hacking.” ----------- Stay in touch with Thomas DeVoss on LinkedIn and Twitter Check out the Bug Bounty Hunter website Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochran on Twitter and LinkedIn Continue the conversation by joining our Discord  

Hacker Valley Red
From Black Hat to Bug Bounties [Pt. 1] with Tommy DeVoss

Hacker Valley Red

Play Episode Listen Later Jun 17, 2022 35:25


We're joined by million-dollar hacker and bug bounty hunter, Thomas DeVoss, this week as we continue our season-long discussion of offensive cybersecurity legends. A legend in the making with a success story in bug bounty hunting that has to be heard to be believed, Tommy is an incredibly successful black hat hacker-turned-bug bounty hunter. He represents how misunderstood the hacking community can be and how positively impactful bug bounties can be. Who hacks the hackers? Look no further than Tommy DeVoss.   Timecoded Guide: [02:59] Becoming interested in hacking for the first time at a young age through internet chat rooms and finding a mentor through those rooms [08:26] Encountering unfriendly visits with the government and the FBI after his hacking skills progressed and being arrested in the 2000s [14:20] Seeking his first computer job after a couple visits to prison and finding a new position with someone that knew of his hacking skills  [25:21] Discussing with Yahoo the possibility of working with them due to his successful bug boundaries and understanding the limitation he would be under if he did that [30:56] Giving honest advice to hackers looking to break into the bug bounty scene and make the amount of money that he's making   Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley   When did you get into hacking for the first time? At an early age, Thomas found his passion for hacking in an IRC chat room. Mentored by a man named Lewis and encouraged by fellow friends in the hacking world, popping shells and breaking into US systems using foreign IP addresses. Although Tommy became incredible at his craft from a young age, his early habits became serious black hat issues that ended up getting him in trouble with the US government. Just like the hacker in a big Hollywood blockbuster, the government caught up with Tommy and he faced 2 years in prison in his first sentence. “Instead of coming back to him and saying, "Hey, I'm done," I came back and I was actually asking him questions like, "Can you explain this?” And he saw that I was like, actually interested in this and I wasn't one of the people that was just expecting it to be handed to me and everything like that.”    After spending time in prison, were there barriers to getting involved in hacking again?  After being in and out of prison a couple times, Tommy found the worst part of coming home to be his ban from touching any sort of device with internet access. Despite it being a part of his probation, his passion for tech continued to bring him back to computers and gaming. After his final stint in prison after being falsely suspected of returning to his black hat ways, the FBI lifted Tommy's indefinite ban on computer usage and immediately renewed his passion for working in tech.  “They had banned me indefinitely from touching a computer. So, when I came home on probation the first time, they upheld that and I still wasn't allowed to touch computers as part of my probation. For the first month or so, I didn't get on a computer when I came home from prison, but then it didn't take long before I got bored.”   How did your cyber career pivot to bug bounty hunting? With prison behind him and his ban on computers lifted, Tommy got a job working for a family friend in Richmond, Virginia for a modest salary of $30,000. Although this amount felt like a lot at the time, he quickly realized that there was money to be made in bug bounties. His first few experiments in attempting bug bounty programs had him earning $20,000 or $30,000 for hours of work, a huge increase from the salary he was currently making. Encountering success after success, Thomas quit his job in 2017 to become a full-time bug bounty hunter. “The first bug bounty program that jumped out at me was Yahoo. I had started hacking Yahoo in the mid 90s, I knew their systems in the 90s and early 2000s better than a lot of their system admins and stuff. And I figured, if there's any company that I should start out with, it should be them.”   What success have you seen since becoming a bug bounty hunter, especially with major corporations like Yahoo? Thomas has become a huge earner in the cybersecurity community, and has continued to see incredible results from his hacking and bug bounty projects. Most notably, after numerous high earning days, making up to $130K at once, with companies like Yahoo, he's even been offered positions working with corporations he's bug bountied for. However, Tommy is quick to point out that his success was definitely not overnight, and warns fellow hackers of getting too confident in their bug bounty abilities without the proper skill sets or amount of experience under their belts. “I think at this point, I've had days where I've made six-digit income in that single day, at least six or seven times. And it's almost always been from Yahoo.” ----------- Stay in touch with Thomas DeVoss on LinkedIn and Twitter. Check out the Bug Bounty Hunter website. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochran on Twitter and LinkedIn Continue the conversation by joining our Discord  

Hacker Valley Red
Unlocking Cyber Education with John Hammond

Hacker Valley Red

Play Episode Listen Later Jun 10, 2022 28:02


John Hammond, Senior Security Researcher at Huntress Labs and self-described cybersecurity education enthusiast, joins us as we continue our discussion of red team legends. With a focus on content creation this week, John discusses his success with his YouTube channel, his passion for showcasing authentic and accessible educational materials online, and his advice for creating content safely and spreading awareness with not only a red team or blue team mindset, but with a purple team perspective. Timecode Guide:  [01:37] Understanding the impact of content creators in the cybersecurity community, especially when it comes to YouTube educational content [06:58] Becoming a successful YouTube creator through consistently posting hacking content and ignoring the stereotype of “overnight success” [13:28] Combining his role as a cybersecurity educator with his security research at Huntress to explore exploits and have real life experience with what he teaches [16:47] Focusing on the blue side of the house as someone with red team experience, and understanding how to use a tool like PlexTrac to create a collaborative purple team [21:13] Being mindful of the impact he has through sharing this knowledge and understanding the risk of cybersecurity educational materials falling into “the wrong hands” Sponsor Links:  Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley What is your origin story for wanting to educate other hackers? Like many of us, John started his journey Googling how to become a hacker. As he gained more knowledge about the specific skills involved in hacking, John never left the internet behind, always seeking out videos and articles explaining new and emerging content. Inspired by those who created that content in the first place, he started his own YouTube channel, simply titled John Hammond, as has spent years cultivating a consistent hacker audience.  “Along the way, creating content and helping educate others through YouTube is really my main stage platform and has been just a passion project, a labor of love, and something fun along the way.”   What feelings do you get looking back on the YouTube content you've created so far? John prioritizes clarity, transparency, and honesty in what he does, and he's not afraid to show some humbleness, too. Overall, John is thankful for his YouTube success and the impact it had on the cybersecurity community. No matter what he's showing in his videos, he prefers to keep things honest, to show where he's made mistakes, and to accept criticism and advice from other hackers and offensive cybersecurity professionals that see his work.  “I'm showcasing just my computer screen, maybe you get a little face cam and a circle on the bottom right, but it's like you're looking over my shoulder. You're seeing me showcase something raw, live, genuine, and authentic…It's not all sexy, there's a lot of failure in hacking.”   Have you ever considered focusing on the blue team or the defensive side of cybersecurity? The majority of John's YouTube content and the work he does in his role at Huntress Labs heavily involves the red team and offensive side of cyber. However, John is a huge advocate for the blue team and the red team collaborating and communicating better. Through making more concepts in cybersecurity accessible through educational content like John's own videos, he hopes we can continue to bridge the gap and achieve that perfectly mixed purple team. “We're all playing in concert. As one team sharpens their skills in the red team pen test, then it's up to the blue team to figure that out. What did they do? How can we better detect it? How can we stop and mitigate that security threat?”   What advice do you have for red team content creators that want to share content and spread awareness safely?  With the impact that he's had and the content he's put out onto the internet, John is no stranger to seeing the negative side of cybersecurity knowledge being more accessible than ever before. Still, he wants to make sure content creators understand the value of transparency and honesty in what they do. Instead of fearing what could be, cultivate a community around making this level of knowledge and security available to everyone. “Share, be transparent, be forthcoming. I know there are a lot of conversations about gatekeeping in cybersecurity, but there shouldn't be that. I understand there's grit and determination and hard work to do all the things that you're doing, but be friendly and be transparent and honest.”   Hacking the Vocabulary: Cybersecurity Capture the Flag (CTF): Competitions to demonstrate expertise in attacking computer resources. The “flag” is normally a file or code a team recovers and provides as proof of their successful penetration of defenses. Python Programming Language: A powerful, general-use programming language, often used in web development, data science, and creating software prototypes. The Onion Router (TOR): ​​A free and open-source software for enabling anonymous communication, with each “onion” network having layers of encryption.  Kaseya VSA Ransomware Incident: A ransomware attack in July of 2021. This paralyzed as many as 1,500 organizations by compromising tech-management software from a company called Kaseya. Log4j: A Java-based logging utility used by developers to keep track of what happens in their software applications or online services. Zero-Day Vulnerability: A vulnerability in a system or device that has been disclosed but is not yet patched.  ---------- Links: Check out our guest, John Hammond, on YouTube and LinkedIn. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn. Catch up with Chris Cochran on Twitter and LinkedIn. Continue the conversation by joining our Discord.  

Hacker Valley Red
Purposeful Communication Through PlexTrac with Dan DeCloss

Hacker Valley Red

Play Episode Listen Later Jun 3, 2022 35:18


We're joined by sponsor and guest Dan DeCloss, CEO and Founder of PlexTrac, on the podcast today to talk about communication and collaboration between the red and blue side of cybersecurity and why security success depends on those two sides working together. On their mission to build stronger, more productive, and well-rounded security teams, PlexTrac provides incredible and insightful metric and messaging tools that change the game for the cybersecurity industry. Timecoded Guide: [05:36] Understanding PlexTrac's history and mission for cybersecurity teams [09:58] Lack of empathy and understanding in red team and blue team communication [18:48] Breaking through the resentment and confusion within a team [24:45] Envisioning the future of PlexTrac's community impact [27:52] Caring about your cybersecurity mission beyond yourself Sponsor: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley   What is the function of PlexTrac that would help you the most as a pen tester? With prior hands-on experience on the red side, Dan found his journey to creating PlexTrac to be full of moments where he wanted to fix the same problems he encountered over and over with reporting and communicating. One of these problems was solved easily with the addition of a video feature, a simple function that has existed since PlexTrac first began but is instrumental and is a huge time-saver for visual learners. “As a pen tester, I hated finding that I had 20-odd screenshots if it's a pretty complex exploit. I think the adage for us is like, if a picture's worth 1,000 words, then a video is worth 1,000 pictures, right?” What do you think are some of the gaps in skills that organizations face when hiring these professionals to perform offensive operations? Communication is key— not just in life, but in this episode. While we've discussed skills gaps previously in cybersecurity, Dan is quick to point out that a consistent gap he sees in all areas of cybersecurity is effective communication. PlexTrac keeps this struggle to communicate in mind and creates easy, simple pathways and functions that encourage communication and facilitate collaborative problem solving. “If there's one area that I really emphasize with anybody that I'm mentoring or have hired in the past is, as a security person, whether you're red or blue, you really do need to be a good communicator and be able to communicate risk effectively within the right context.” What would you want to say to those folks that don't see eye-to-eye from the red or the blue side? We're fighting the same fight, no matter if we're on the red side or the blue side of cybersecurity. Dan's message for our warring red and blue teams throughout the industry is to understand the importance of your mission and to not let relationships between red and blue feel clouded with misunderstanding or resentment. No one's job is harder than anyone else's, and each role on offensive and defensive plays a part in our collective victory. “I'm gonna just be point blank about it…Are you trying to just prove a point about your knowledge and your skills? Or, are you actually trying to make the world a safer place?” What would you want to say to all those folks out there [in cybersecurity]? As PlexTrac aims to make a huge impact on our community, Dan and his team acknowledge a need for a unified, focused, and collaborative cybersecurity industry, with hard workers on both the red and blue sides. With PlexTrac's assistance in making reports, measurable results, and communication that much easier, our team at Hacker Valley is thankful to be a part of PlexTrac's amazing network and can't wait to share more tools like this with all of you. “I think keep fighting the good fight, for both sides, and recognizing that your mission is vital to the safety and security of your organization and the world at large, right? We are all in this battle together.” Hacking the Vocabulary: DOD: The United States Department of Defense. ---------- Additional resources to check out: Spend some time with our guest, Dan DeCloss, on LinkedIn, and the PlexTrac website  Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochran on Twitter and LinkedIn Continue the conversation by joining our Discord

Hacker Valley Red
Representation Without Technicalities with Mari Galloway

Hacker Valley Red

Play Episode Listen Later May 27, 2022 41:35


We're breaking down the concept of difference makers this week and we couldn't help but call upon Mari Galloway, CEO of the Women's Society of Cyberjutsu, to be our guest during this conversation. As a black woman in cybersecurity who has dedicated a large portion of her career to helping women and girls become a part of the cyber community on both the technical and non-technical sides, Mari is a stunning example of making a difference and creating a path to expand cybersecurity beyond stereotypes.  Timecoded Guide:  - [01:29] Defining the difference makers and explaining the OODA loop - [13:52] Introducing Mari and the Women's Society of Cyberjutsu  - [20:14] Finding her purpose in helping others find their purpose  - [25:06] Explaining the roles and paths available outside of strictly technical  - [30:31] Understanding imposter syndrome and forging a freedom-based career journey  Sponsor:  Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!  Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone  PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley    What is that like to see people go from taking that original red pill all the way through starting their career in cybersecurity?  When we talk about making a difference, many of us don't get to see our impact as clearly as the Women's Society of Cyberjutsu sometimes gets to see. Mari tells us numerous stories of women throughout this episode, including herself, who became a part of this industry because of the instrumental work they do in outreach and education. For Mari, seeing women change their minds and majors to become a part of the tech industry shows how vital this work is.  “These are the moments we're waiting for, whether it's one person or 50 million people. We want you to feel confident enough to get the skills you need, get in the industry, continue to refine those skills, and be super successful.”    What would you equate your purpose to, and how does everything you do fit into it? Like many of us, Mari isn't entirely sure what her purpose is, but she knows that she enjoys helping the next generation and making a difference in the landscape of cybersecurity. Working with a nonprofit is not an easy job, even if it is rewarding, and Mari still prioritizes her freedom alongside meeting her purpose. No matter what Mari's future holds, she knows that this work and this purpose to help others will always find her.  “I think as I get older, as I start to take steps back to just kind of look at what's happened and the impact that I'm having and others around me are having on the next generation of folks coming up, I think my purpose is to help people. It's to help other people see their potential.”    How do you feel like creating that safe environment has affected others?  Helping others find their footing in the cybersecurity industry can be extremely rewarding, especially when Mari found herself in a situation of uncertainty when she first joined the Cyberjutsu Tribe. The community of cybersecurity and the stereotypes around hackers can feel incredibly uninviting from the outside. Offering people, especially women and young girls, an opportunity to step into a safe space where they can ask anything has been huge for Mari.  “We call it our Cyberjutsu Tribe, and we want to make sure that anybody that comes to us feels like they can reach out and touch us and ask us questions and get answers and just have a conversation with us.”    How do we invite more people in and let them know that there are opportunities in cyber outside of technical roles?  Whether you're hacking, selling, managing, or marketing, there is a space for you in the cybersecurity world. You don't have to code or to be extremely technical to fit in this industry anymore, and you don't have to have a certain look. The Women's Society of Cyberjutsu prioritizes educating people on every role involved in the industry and showing them that they don't have to be a tech wizard or a computer guru to find a satisfying and profitable position.  “You don't have to look like this to be a hacker. You can look like me…That stereotype, I think, is dying, as we see the number of women coming in and men coming into the space that don't look like that anymore.”    Hacking the Vocabulary:  OODA Loop: Observe, Orient, Decide, Act. A four-step approach to decision-making that focuses on filtering available information, putting it in context and quickly making the most appropriate decision.  CISO: The chief information security officer, a senior-level executive responsible for developing and implementing an information security program Taking the red pill: The terms "red pill" and "blue pill" refer to a choice between the willingness to learn a potentially unsettling or life-changing truth by “taking the red pill,” or remaining in contented ignorance with the blue pill.  ---------  Additional resources to check out:  Spend some time with our guest, Mari Galloway, on LinkedIn, Twitter, her website, and the Women's Society of Cyberjutsu website.  Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochan on Twitter and LinkedIn Continue the conversation by joining our Discord

Hacker Valley Red
Learning from Cybersecurity Legends with Davin Jackson

Hacker Valley Red

Play Episode Listen Later May 20, 2022 29:23


Those on the red team may not be household names to the everyday person, but they are absolute legends and icons in the world of cybersecurity and hacking. While we have our personal favorite hackers between the two of us, we also invite our guest, Davin Jackson, to share his favorite cybersecurity legends and the lessons he's learned from them. Timecode Guide: [00:50] The importance of red teaming, especially during this season [02:17] Ron and Chris' first experience working in a red team environment [11:23] Communication and collaboration between blue and red [16:53] Knowledge gained from Davin Jackson's humble beginnings in tech [22:19] Gaining the blue perspective with Hacker Valley Blue   Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac, the proactive cybersecurity management platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley Legends, Icons, Teachers, and Friends From Marcus Carey to Johnny Long, we're excited to share the legends that had an early influence and lasting impact on our careers in cybersecurity. While our two backgrounds in red teaming are different, we can attribute so much of our success and our ability to share our knowledge with all of you to the experts that were willing to invite us to join and learn the best hacking techniques alongside them. “I think that's the most important thing in red teaming, it's passing that knowledge on to someone else.” - Chris Cochran   Communication, collaboration, and community instead of red vs blue It is not two teams with two separate fights when we're talking about red teams and blue teams. Often, when cybersecurity is too focused on this split between offensive and defensive, we forget to collaborate and fall short of improving on issues we discovered. Communication between red and blue can be a costly struggle, which is why we're happy to see our sponsor PlexTrac stepping in to develop communication technology for these teams. “There's this push and pull of collaboration. On one hand, you want the red team to work autonomously…but on the other hand, they do need insight if you're going to go deeper and deeper.” - Ron Eddings   Legends met, lessons learned, tech loneliness understood In the latter half of our episode, we're joined by Hacker Valley Blue host Davin Jackson, also known as DJax Alpha. Davin started his cybersecurity journey with no computer of his own. Working his way up from basic tech jobs at corporations like Circuit City, lessons Davin learned from the legends he looked up to include finding a mentor, focusing on networking (even when it feels like a dead end), and being always willing to share what you've learned. “It's about consistency, and you have to have self control and discipline…It's one thing to get it, but it's another to maintain that success.” - Davin   Hacking the Vocabulary: Pen test — Pen test, or penetration testing, is a method of identifying and testing vulnerabilities and gaps in an IT security system that could be exploited. This can also be referred to as “ethical hacking”. Popping a shell — A slang term for when a hacker exploits a security vulnerability to make a program run a hacker code. Red team — A group within an organization made up of offensive security experts who try to attack an organization's cybersecurity defenses. Blue team — A group of defensive security experts within the same organization that defends against and responds to the red team attack. Additional resources to check out: Marcus J Carey, Johnny Long/Hackers for Charity, United States Cyber Command, Booz Allen Hamilton ---------- Spend some time with our guest, Davin Jackson (DJax Alpha/Alpha Cyber Security) on his website, Twitter, Instagram, Facebook, and on the Hacker Valley Blue podcast. Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter. Follow Ron Eddings on Twitter and LinkedIn Catch up with Chris Cochan on Twitter and LinkedIn  

Hacker Valley Red
Making Hacking Accessible with Deviant Ollam

Hacker Valley Red

Play Episode Listen Later May 13, 2022 33:50


In this season of Hacker Valley Red, we focus on cybersecurity legends in offensive operations with a legend in physical pen testing and lockpicking: Deviant Ollam. As a pioneer in our industry and an author of two incredible books about lockpicking, Deviant shares his history from hobbyist to professional and all that he's learned along the way. He also discusses making the secrets of the hacking world accessible to all. Timecoded Guide: [01:28] Defining the pioneers in cybersecurity [08:47] Deviant's first explorations in lockpicking  [16:03] Accessing and democratizing hacking secrets [18:58] Becoming an author to transfer his knowledge [23:12] Seeing the past, present, and future of hacking   Sponsor Links: Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life! Life is complex. But it's not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone PlexTrac, the Proactive Cybersecurity Management Platform, brings red and blue teams together for better collaboration and communication. Check them out at plextrac.com/hackervalley _________   What does it mean to be a pioneer in cybersecurity?  As our season focuses on legends, it's important that we explain what makes these individuals such a vital part of our community. In the case of this episode, we explain that our guest Deviant is nothing short of a pioneer. Deviant has been willing to take on new challenges and revolutionize the industry throughout his career, influencing hundreds of individuals and leaving a lasting educational impact on the entire industry. “That ‘zero to one' part can be the hardest part of any progression in any field, but especially in cybersecurity.” — Chris   When you reflect on changing this whole industry, how does that make you feel? Despite our guest's legendary reputation, Deviant is humble about his achievements, caring more about how his work has impacted others than himself. What he focuses most on in his teaching, presentations, and writing is making lockpicking and penetration testing accessible and understandable. Instead of harboring secrets and perpetuating exclusionary policies, Deviant wants anyone to be able to master these skills and understand this knowledge. “I'm not the first one who ever did this. What I like to think of my contributions is that they have chiefly been making it accessible and democratizing this knowledge.” — Deviant    Do you think it's harder today to stand out than it was a couple of decades ago? For Deviant, our globalized internet and algorithm-focus social media sites are both a blessing and a curse. While knowledge can be found on every corner of the web and anyone can become familiar with the information that was once borderline inaccessible, Deviant also recognizes that younger hackers and lockpickers will have a very different rise to success than he did years ago, especially due to fragmented audiences and tricky algorithms.  “We have more avenues to put yourself on display, to put yourself out there than ever before, but that means the audience is fragmented and is spread so thin.” — Deviant   What piece of advice would you have for the folks that want to make an impact in security and technology and in our community today? Although success will look different for newer members of our cybersecurity community, Deviant is confident that the younger innovative minds of the future will be able to solve so many of the long-standing problems within our industry. However, he reminds our younger audience that they need to still respect the tenured members of the cybersecurity world and learn from them without oversimplifying the issues past professionals have faced.  “Start thinking about it in a way that doesn't use ‘just,' because every old head in the industry has heard that….We couldn't ‘just' do it, or we would've ‘just' done it.” - Deviant   Hacking the Vocabulary: Physical pen-testing — A simulated real-world threat scenario where a malicious actor attempts to compromise a business's physical barriers to gain access to infrastructure, buildings, systems, and employees. CVE— Common Vulnerabilities and Exposures (CVE) is a database of publicly disclosed information security issues.  Lockpick Village — A physical security demonstration and participation area where participants can learn about the vulnerabilities of various locking devices, techniques used to exploit these vulnerabilities, and practice on locks of various levels of difficulty. Additional resources to check out: Robert Morris, the Morris worm, TOOOL, the CORE group, Practical Lock Picking: A Physical Penetration Tester's Training Guide by Deviant Ollam, Keys to the Kingdom by Deviant Ollam, DEF CON ________ Spend some time with our guest, Deviant Ollam, on his website, Twitter, Instagram, and Youtube channel.  Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.  Follow Ron Eddings on Twitter and LinkedIn  Catch up with Chris Cochran on Twitter and LinkedIn Purchase a HVS t-shirt at our shop Continue the conversation by joining our Discord  

Tech It Out
The Latest in Pet Tech, Free New Apps, and Handy Laptop Accessories

Tech It Out

Play Episode Listen Later Mar 5, 2022 39:07


* Google Live Transcribe gets a major update. This free Android app is for the deaf and hearing impaired.* Be the first to learn about Hvr, an app that fuses a web browser with social media* Kensington stops by for a chat on its latest laptop and tablet accessories* The program is powered by ASUS, for those in search of incredible. Check out the laptop lineup at ASUS.com* Speaking of computers, be sure to back-up your files onto an external WD or SanDisk drive, on sale this week

Brands In Action
Jon Schlesinger / Hidden Valley Ranch

Brands In Action

Play Episode Listen Later Feb 24, 2022 38:02


Today we welcome Jon Schlesinger, Vice President and General Manager, Hidden Valley Ranch at the Clorox company. Jon talks about taking a storied brand into new categories and new possibilities by listening to culture and even helping to shape it a bit. Jon is one of the smartest marketing minds we've ever worked with on a previous client, we always learn a lot from him. You will too. 00:18 - Jon Intro02:03 - How do you manage all the specific brands under the Clorox umbrella?03:55 - What adjustments were made from Clorox to food?06:12 - Story behind Hidden Valley Ranch08:10 - How ranch has become so popular11:24 - How much has HVR contributed to market change?13:23 - How has Covid affected business?17:04 - Brand awareness17:55 - Where are the dollars focused?19:59 - How has the branding evolved?21:32 - Iconography22:57 - If HVR was a Pinterest board23:45 - Where is HVR in the spectrum of purpose brands?26:21 - How do you stay relevant in culture?29:23 - Traditional marketing30:26 - What have you learned from Burt's Bees?34:19 - What's next for HVR?35:11- Is there anything that scares you?36:33 - Where can you find HVR? https://www.hiddenvalley.comhttps://www.instagram.com/hidden.valley/https://www.youtube.com/user/hiddenvalleyveggieshttps://twitter.com/HVRanchhttps://www.pinterest.com/hvranch/https://www.facebook.com/hiddenvalley

CTO Connection
Short Byte: Mark Van de Wiel - Managing an engineering team through an acquisition

CTO Connection

Play Episode Listen Later Jan 13, 2022 29:31


What with covid and the great resignation, it's hard enough to keep an engineering organization intact, aligned and motivated. Imagine doing the same while negotiating a transaction that could impact everything from your feature roadmap to your long-term tech stack. In this episode, I chat with Mark Van de Wiel, VP Technology at Fivetran who recently navigated an acquisition of his company, HVR into Fivetran. PARTNERThanks to our partner CloudZero — Cloud Cost Intelligence Platform. Control cost and drive better decisions with CloudZero cloud cost intelligence. The CloudZero platform provides visibility into cloud spend without the typical pitfalls of legacy cloud cost management tools, like endless tagging or clunky Kubernetes support. Optimize unit economics, decentralize cost data to engineering, and create a shared language between finance and technical teams. CloudZero helps you organize cloud spending better than anyone else. Join companies like Drift, Rapid7, and SeatGeek by visiting cloudzero.com/ctoconnection to get started.

Startup Snapshot
Deep Dive: The bright future of dark stores

Startup Snapshot

Play Episode Listen Later Dec 9, 2021 23:40


Dark stores – more widely known as microdistribution hubs – have been gaining prominence in India and Southeast Asia, with grocery delivery startups like Dropezy and Zepto raising millions of dollars in funding and setting up hundreds of centers across the region. The future of this segment is brighter than its name suggests. By 2025, India's consumables market is projected to hit roughly US$1 trillion while Southeast Asia's online grocery market is expected to reach US$11.9 billion – a prime opportunity for operators of dark stores. In this episode of Deep Dive, Tech in Asia's Nikita Puri discusses the ins and outs of this rising phenomenon, the key players leading the segment, and how dark stores can change the way we buy groceries - or anything else we might need. More information on today's episode here: https://www.techinasia.com/deep-dive-bright-future-dark-stores Featured reporter: Nikita Puri, a Tech in Asia journalist based in India Essential reading: Dark stores light up red-hot grocery delivery market Stanford dropouts' firm bags $60m to speed up grocery delivery in India Indonesian e-grocery startup raises $2.5m to deliver orders in 20 minutes Episode sponsor: HVR 6.0 allows organizations to incorporate real-time movement into new and existing data management strategies, load massive tables much faster to speed up the adoption of new analytics systems, configure network encryption to make it secure by default, and dramatically simplify the deployment of initial data replication. Sign up now to take a test drive of HVR 6.0: https://techin.asia/hvr6

Startup Snapshot
Deep Dive: Atome's enigmatic parent company

Startup Snapshot

Play Episode Listen Later Nov 12, 2021 16:21


After recently closing a US$400 million series D round from an investor consortium led by SoftBank Vision Fund 2 and Warburg Pincus, Singapore-headquartered Advance Intelligence Group joined the unicorn club. Its most well-known service? Atome, one of the region's most prevalent buy now, pay later (BNPL) platforms. However, the group has a lot more under its belt, offering services ranging from digital lending and risk management to merchant software services that span 12 markets across Asia, Greater China, and Latin America. In this episode of Deep Dive, Tech in Asia's Melissa Goh sheds light on Advance Intelligence, discussing the common thread that runs through its various business units, how it fared during the pandemic, and the company's plans for the future. More information on today's episode here: https://www.techinasia.com/deep-dive-atomes-enigmatic-parent-company Featured reporter: Melissa Goh, a Tech in Asia journalist based in Singapore Essential reading: The enigmatic unicorn behind BNPL firm Atome Southeast Asia's biggest buy now, pay later players StanChart to pour $500m into Atome as part of strategic partnership Singapore's Advance Intelligence Group enters unicorn club after SoftBank co-led $400m round Episode sponsor: HVR 6.0 allows organizations to incorporate real-time movement into new and existing data management strategies, load massive tables much faster to speed up the adoption of new analytics systems, configure network encryption to make it secure by default, and dramatically simplify the deployment of initial data replication. Sign up now to take a test drive of HVR 6.0: https://techin.asia/HVR6

Hashmap on Tap
#97 Data Integration, Fivetran, and HVR at Powell Industries with Ajay Bidani

Hashmap on Tap

Play Episode Listen Later Oct 26, 2021 59:10


On this episode of Hashmap on Tap, we welcome back, Ajay Bidani. Ajay leads digital enablement and insights at Powell Industries which manufacturers a range of electrical, automation, and control monitoring systems and solutions. He continues to build his modern data stack and adjust his approach to data architecture, engineering, and analytics and in this episode, Kelly and Ajay focus in on Data Integration and the recent Fivetran acquisition of HVR and what it means. Show Notes: Connect with Ajay on LinkedIn: https://www.linkedin.com/in/ajaybidani/ Start a conversation around Data Integration with us: https://www.hashmapinc.com/workshop-dataintegration On tap for today's episode: Melozio Nespresso and Kyoto Black Coffee Contact Us: https://www.hashmapinc.com/reach-out

Google Cloud Platform Podcast
Google Cloud Next '21 with Brian Hall and Forrest Brazeal

Google Cloud Platform Podcast

Play Episode Listen Later Oct 13, 2021 44:01


On the podcast this week, Mark Mirchandani and Stephanie Wong hear all about the cool stuff happening at Cloud Next 2021. Brian Hall and Forrest Brazeal join the show to outline exciting announcements, fun partnerships, and what the future holds for Google Cloud. The immense prep and planning that went into Next shows through in the intentional and unified strategy of announcements and offerings at the conference. Our guests talk about this process and the challenges and decisions that went into the content choices and scheduling. The addition of Community Day, for example, was implemented to create a sense of in-person participation in an online-only event. Next kicked off this week with a Keynote presentation talking about the momentum of production and infrastructure innovation at Google Cloud, new product announcements across data cloud and open cloud infrastructure, security advancements, sustainability, and more. Our guests talk about important partnerships Google Cloud has fostered this year with clients like Ford, Univision, and GE using AI and other technologies to advance innovative ideas in their businesses. Announcements around AI and analytics at Google Cloud were plentiful, including Spark on Google Cloud that offers managed serverless data processing. Brian details the work Tableau and Google Cloud are doing to advance data visualization. Our guests talk about the work Google has done to embrace the multi-cloud culture with advancements in Anthos and BigQuery Omni. The newly announced Google Distributed Cloud lets clients use their multi-cloud infrastructures across edge locations. Forrest talks about the pragmatic evolution to the Google Distributed Cloud offering and how other announcements like security advancements through strategic European partnerships have positively affected multi-cloud customers. We talk more about the importance of the new security announcements, like the Google Cyber Security Action Team. The changing landscape of work brought on by the pandemic has lead to more and more remote work. Workspace is adapting to this new environment, and our guests tell us about the new features available to workers at home. As Google works to revolutionize technologies for clients, they also keep sustainability in mind. Next saw announcements in the clean cloud space and Google’s continued commitment to a carbon-free existence. New carbon reporting for clients and new features in Google Earth Engine and Active Assist help Google clients with their sustainability goals, too. Brian Hall Brian is the VP of Product and Industry Marketing at Google Cloud. He was formerly a VP at AWS, CEO of Doppler Labs, and VP for Microsoft Surface with 20+ years at Microsoft. Forrest Brazeal Forrest is a cloud educator, author, speaker, and Pwnie Award-winning songwriter based in Charlotte, NC. Cool things of the week Cloud Next site Solving for What’s Next blog Training more than 40 million new people on Google Cloud skills blog Interview Cloud Next site Next Catalog site Opening Keynote site Solving for What’s Next blog GKE Autopilot site Workspace site Vertex AI site Apache Spark on Google Cloud site Tableau site Fivetran site HVR site Informatica site Trifacta site Anthos site Bringing multi-cloud analytics to your data with BigQuery Omni blog Google Distributed Cloud site NetApp site T-Systems and Google Cloud Partner to Deliver Sovereign Cloud for Germany press release Thales and Google Cloud Announce Strategic Partnership to Jointly Develop a Trusted Cloud Offering in France press release Google Cybersecurity Action Team site AppSheet site BeyondCorp site Google Earth Engine site Active Assist site Data Cloud Keynote site What’s something cool you’re working on? Stephanie is working on a video series with Eric Brewer.

Startup Snapshot
Deep Dive: Stripe's rough road into Indonesia

Startup Snapshot

Play Episode Listen Later Oct 8, 2021 21:57


Over the past year, financial services major Stripe has been stepping up its efforts to enter the Indonesian market, targeting key positions for early hires. Among them is former Grab Indonesia executive director Ongki Kurniawan, who's now leading Stripe's charge in the country. However, Indonesia is bustling with ambitious, freshly funded fintech players such as Xendit, Doku, and Gojek's Midtrans, and this could make Stripe's foray into the Southeast Asian archipelago all the more challenging. In this episode of Deep Dive, Tech in Asia's Ardi Wirdana discusses the payment giant's Indonesia ambitions, the hurdles it faces in establishing a foothold in the market, and the impact that Stripe could have on the local fintech scene. Featured reporter: Ardi Wirdana, a Tech in Asia journalist based in Indonesia Essential reading: Stripe readies Indonesia entry, but the road just got rougher Indonesia fintech hits hurdle with new rules on foreign control Episode sponsor: HVR 6.0 allows organizations to incorporate real-time data movement into new and existing data management strategies, load massive tables much faster to speed up the adoption of new analytics systems, configure network encryption to make it secure by default, and dramatically simplify the deployment of initial data replication. Sign up now to take a test drive of HVR 6.0 at https://techin.asia/hvr6  

Life in the Cloud
Duplicating and Dissecting Data with Mark Van de Wiel of HVR

Life in the Cloud

Play Episode Listen Later Sep 27, 2021 31:34


How do you provide data feedback near instantaneously on a massive scale?Mark Van de Wiel, CTO at HVR, joins me for another episode of Life in the Cloud. HVR is in the data replication space. It serves large enterprise customers like Pitney Bowes, Lufthansa Airlines, and the U.S. Coast Guard.Fifteen years ago, the most extensive data warehouses used maybe ten terabytes total. Nowadays, HVR is handling ten terabytes of data changes in a single day. Instrumental to their continued successes, Mark alludes to HVR having been scalable and highly efficient."What can we do to help our customers be successful in adopting some of these technologies and essentially solve their data problems?" Mark shares insights into how HVR anticipates changes in the industry to meet their customers' needs best.Mark teaches about the least intrusive approach to capturing changes out of a transactional database system. It's through an innovation called Change Data Capture, and blockchain plays a role. Listen to this episode to learn more.Don't forget to subscribe to the show on iTunes, Spotify, or wherever you get your podcasts.See you in the next episode!

The SaaS News Roundup
Typed, Mirakl, Cloudsmith, DeepFactor and Blackbird.AI raises funds | Fivetran acquires HVR | Salesforce has announced new Slack features | Salesforce has declared a significant victory in the fight against global climate change | project44 acquires Conv

The SaaS News Roundup

Play Episode Listen Later Sep 22, 2021 3:10


Data integration software Fivetran acquires data replication technology HVR. Customers of Fivetran now have access to a broader set of high-performance data replication solutions, including HVR's change data capture connectors. Fivetran also raised a funding round of $565M.Business Canvas, the company document management SaaS behind Typed, has announced a $2.5M seed round led by Mirae Asset Venture Investment. The seed funding will be used to speed up product development and the global open beta launch of its AI-powered document management platform.Salesforce has announced new Slack features just a few months after announcing integrations with Sales Cloud, Service Cloud, Marketing Cloud, and Tableau. According to the company, the features are intended to “build a digital HQ” at enterprises that are embracing hybrid work.Salesforce has declared a significant victory in the fight against global climate change. Utilizing 100 percent renewable energy and purchasing carbon offsets has effectively achieved Net Zero energy usage across its value chain.project44 acquires customer experience provider Convey for $255M to become a definitive global leader in modern digital supply chain technology. It said that the new AI capabilities from Convey would improve collaboration, bolster workflow automation and defend against business disruption with end-to-end visibility and predictive order intelligence.Mirakl raised $555M in Series E funding from Silver Lake to accelerate the growth of leading enterprises and online marketplaces. The company said it targets hiring 350 engineers, growing its team to 500 by 2023, expanding its geographic reach, with a dual focus on growing its Paris and Boston headquarters.Package management SaaS provider Cloudsmith raised $15M in Series A from Tiger Global and others to grow its team, deliver on its product roadmap and continue expanding into international markets.DeepFactor raises $15M in Series A from Insight partners and others to continue developing its AppSec observability platform, automatically observing billions of live telemetry events to detach anomalies without making code changes.Blackbird.AI, an AI-powered platform that combats disinformation, raised $10 million in a Series A funding round led by Dorilton Ventures to support hiring, scale-up engineering and sales teams.

TechCrunch Startups – Spoken Edition
Fivetran hauls in $565M on $5.6B valuation, acquires competitor HVR for $700M

TechCrunch Startups – Spoken Edition

Play Episode Listen Later Sep 21, 2021 3:09


Fivetran, the data connectivity startup, had a big day today. For starters it announced a $565 million investment on $5.6 billion valuation, but it didn't stop there. It also announced its second acquisition this year, snagging HVR, a data integration competitor that had raised over $50M, for $700 million in cash and stock.

Mikkipedia
Optimising health and performance with Dr Dan Plews. Your questions answered

Mikkipedia

Play Episode Listen Later Sep 21, 2021 116:40


This week on the podcast Mikki talks to Dr Dan Plews  about life, performance, continuous glucose monitors, HVR, sauna, strength  training and optimising wellbeing (among other things). They answer your questions about all of the aforementioned and about his EndureIQ courses and online community, and his TriQ app, a new training platform. This is a long one, perfect for your longer training session (though not just for athletes) and drops Wednesday. I also have a giveaway attached, which you will hear throughout the podcast and see on my social media pages. Please, if you enjoy the podcast, subscribe and leave a review :-)Dan Plews is an Applied Sport Scientist, Researcher, Coach and competitive Triathlete. As an applied Sports Scientist, Dan has worked closely with athletes who have won more than 25 World and Olympic titles in sports including rowing, kayak and triathlon. Dan was part of Rowing New Zealand's preparations for both 2012 and 2016 in Olympic Games as a Sports Scientist.As a Researcher Dan has a PhD in Exercise Physiology with a particular interest in heart rate variability and 30 peer reviewed publications to his name. As a Coach, Dan has coached three professional Ironman Triathletes to sub 8 hour times including Terenzo Bozzone, Jan Van Berkel and Tim Van Berkel.  Recently Dan founded endureiq.com an online learning hub for anyone interested in optimal long course Triathlon performance and a third course to go live is all about heat training and acclimation. He was also the high performance manager for the recently successful Team New Zealand bid for the America's Cup.Dan Plews: https://www.endureiq.com/about-usEndure IQ: https://www.endureiq.com/Tri Q: https://triq.ai/Competition Link - What is Dan Plews' favourite meal? https://forms.gle/MtbNjo3EuCKCfBPf8

Best of the Morning Sickness Podcast
The Best of the Morning Sickness - The one with a bike winner

Best of the Morning Sickness Podcast

Play Episode Listen Later Sep 17, 2021 50:37


This week, we kicked things off with the Monday Morning Throwback and talked to our bike winner for the 95 Days of Summer, Brian Woods! Plus, we talked about the best time to purchase flights for the holidays, and discussed a few signs you should turn down a job offer. Speaking of holidays, Halloween is right around the corner, and Hidden Valley Ranch has treat-sized HVR that you can hand out to all the trick-or-treaters in your 'hood. Shaw scored big points by figuring out this week's "You're killin' me, Shaws"(RIP, Norm).  And we polled our listeners to see how many spots in line one person can save. On Thursday, Brian discovered the song "Fancy Like" and it didn't go well....but, he did find another talking parrot that helped ease his pain. And on Friday, we talked about what kind of "pumpkin spice" garbage people are Googling, and we gave you a list of three things to do in & around La Crosse this weekend. See omnystudio.com/listener for privacy information.

Startup Snapshot
Deep Dive: India's D2C boom

Startup Snapshot

Play Episode Listen Later Sep 10, 2021 19:41


It wasn't too long ago that in India, Kashmiri apparel sellers carrying large, red-checked bed sheets full of handmade embroidered shawls, dress materials, and stoles would spend their days knocking on door after door, trying to sell their wares to people in the neighborhood. These sellers took a direct-to-consumer (D2C) approach to business, doing away with middlemen by hawking their merchandise to customers themselves. That same business model has evolved, and it's been seeing a boom in investments in India. Consumer brands are raking in hundreds of millions of dollars from prominent venture capital firms like Sequoia and Temasek. However, there are some key differences between today's D2C businesses and the door-to-door sellers of yesteryears. On this episode of Deep Dive, Tech in Asia's Samreen Ahmad discusses the emergence of India's D2C decade, the sheer potential within the sector, and the hurdles that players in the scene may face in the future. More information on today's episode here: https://www.techinasia.com/deep-dive-indias-d2c-boom Featured reporter: Samreen Ahmad, a Tech in Asia journalist based in India Essential reading: The decade of D2C has just begun in India In Indonesia, a golden age of VC-backed consumer brands may be imminent Episode sponsor: HVR 6.0 allows organizations to incorporate real-time data movement into new and existing data management strategies, load massive tables much faster to speed up the adoption of new analytics systems, configure network encryption to make it secure by default, and dramatically simplify the deployment of initial data replication. Take a test drive of HVR 6.0 now: https://techin.asia/hvr6

Humans vs Robots

Together at again at Greymont, several members of the Ossian War Council travel to Roothollow where an ancient power is uncovered Engrin Ai played by John Golden Thiradin Ossran played by Jake Petersen DMed by Isaiah Petty Edited by Steve Petty Some sound effects in this show are from https://freesfx.co.uk/ Produced by Audiomancer Media

Marketing Trends
Using Content to Lure Clients into the Sales Funnel with HVR's Meredith Stowe Christie

Marketing Trends

Play Episode Listen Later Aug 18, 2021 42:37


B2B marketing gets a bad reputation. Some will say it's boring and you can't be creative in the B2B space. But who wrote the rulebook that said B2B couldn't be fun or inspiring? Meredith Stowe Christie, the VP of Marketing at HVR, says that regardless of who your client is, B2B doesn't have to be boring.“It's B2B, but you're still marketing to a human. Chances are, given the amount of people that are watching the Super Bowl, your target is watching the Super Bowl. If you have the budget and a message that resonates to a lot of organizations, why not do that? You want to be top of mind to these folks when they need to make that decision on your product.”On this episode of Marketing Trends, Meredith explains how HVR is spicing up B2B marketing by putting the customer at the center of everything it does. What does that look like? Meredith says it's about aligning S sales and marketing efforts to tell the best stories because content is what should be leading prospects through the funnel. Enjoy this episode. Main Takeaways:Know your Story: Make sure you know your product inside and out so you can fully tell the story of your company. When you're marketing complex products, such as data replication, you have to know all aspects of your product to know what your unfair advantage is and what differentiates you from competitors. Make sure you talk to stakeholders at every level of the company so you can gather that intel in order to best tell the story of the company.Every Last Cent: Digital marketing has made it easier for marketers to track where every dollar and every cent is going, but it's important to remember that as the company grows, your digital practices should too. This means you have to make sure to experiment with what channels you are spending in to create new avenues for the business.Can I Get an Alignment?: We hear a lot about the importance of marketing and sales aligning their efforts, but it's important to remember that your content should be a driver to make those sales conversations easier for your reps. Make sure the content you produce opens up opportunities for prospective clients to learn about your product prior to the sales conversations.---Marketing Trends podcast is brought to you by Salesforce. Discover marketing built on the world's number one CRM: Salesforce. Put your customer at the center of every interaction. Automate engagement with each customer. And build your marketing strategy around the entire customer journey. Salesforce. We bring marketing and engagement together. Learn more at salesforce.com/marketing. 

Startup Snapshot
Deep Dive: Why Bukalapak's IPO is a big deal for Indonesia

Startup Snapshot

Play Episode Listen Later Aug 13, 2021 22:56


Founded in 2010, Bukalapak initially had trouble raising funds because “nobody wanted to invest,” co-founder and former CEO Achmad Zaky said during a fireside chat at the Tech in Asia Conference in 2019. He even considered closing the business after its first year, but he persevered instead and Bukalapak became a unicorn around eight years after its launch. Last week, the ecommerce player notched another milestone: It went public on the Indonesia Stock Exchange – the first unicorn to do so – boosting its valuation to approximately US$7.5 billion. On this episode of Deep Dive, Tech in Asia's Aditya Hadi Pratama and Simon Huang discuss the early days of Bukalapak, dive into the numbers behind its landmark initial public offering, and posit what's in store for the company's future. Featured reporter: Aditya Hadi Pratama, a Tech in Asia journalist based in Indonesia Simon Huang, Tech in Asia's industry analyst based in Singapore Essential reading: Bukalapak's IPO, the largest ever on IDX, takes its valuation to $7.5b Visual: Bukalapak's decade-long journey to IPO Bukalapak is using this deck to make its case for a $1.5b IPO 9 highlights from Bukalapak's confidential investor deck Bukalapak's seed round pitch deck How Gojek and Bukalapak found the initial spark that turned them into giants Mitra Bukalapak's roadblock: Indonesia's FMCG giants Being no. 2 isn't a bad thing: Bukalapak's Achmad Zaky For more stories on Bukalapak, click here Episode sponsor: HVR's technology empowers organizations to realize their full potential with continuous, high-volume data movement between cloud-based and on-premise systems. Visit HVR's website to get fresh data when you need it: https://techin.asia/hvr

Humans vs Robots

After finishing the last trial, the time to get some answers has finally come and Thiradin makes an important decision Engrin Ai played by John GoldenThiradin Ossran played by Jake PetersenDMed by Isaiah PettyEdited by Steve PettySome sound effects in this show are from https://freesfx.co.uk/Produced by Audiomancer Media

Startup Snapshot
Deep Dive: Why HungryGoWhere ended up being all sizzle and no steak

Startup Snapshot

Play Episode Listen Later Jul 2, 2021 19:59


For years, HungryGoWhere was the go-to platform for anyone looking for grub and sustenance in Singapore. But last month, the site announced that it's ending its 15-year run, bidding loyal users - the few who were still around - farewell and thank you. On this episode of Deep Dive, Tech in Asia's Melissa Goh discusses the events that led to HungryGoWhere's shuttering, insider accounts about how the company was run, and a potential sale that could give the platform a second wind. Featured reporter: Melissa Goh, a Tech in Asia journalist based in Singapore Essential reading: Singtel's restaurant review portal HungryGoWhere to close in July Why did HungryGoWhere go nowhere? Not dead yet: Singtel looks to sell HungryGoWhere after receiving offers Why many of Singtel's digital bets failed after a decade of trying A history of Singtel's successes and failures in reinventing itself For more stories on Singtel, click here Episode sponsor: HVR is joining Tech in Asia for a virtual event on July 14, where chief technology officer Mark Van De Wiel will discuss how to accelerate your business with real-time data delivery, alongside Geoff Soon, South Asia managing director of cloud data firm Snowflake; Andrew Psaltis, Asia Pacific director of data analytics and AI/ML at Google; and Kai Xin Thia, senior data scientist at the London Stock Exchange Group. Sign up now to discover how to harness the power of cloud data to accelerate your business growth and increase revenue opportunities with HVR.

Humans vs Robots

Thiradin is left to save Engrin from the opalEngrin Ai played by John GoldenThiradin Ossran played by Jake PetersenDMed by Isaiah PettyEdited by Steve PettySome sound effects in this show are from https://freesfx.co.uk/Produced by Audiomancer Media

Startup Snapshot
Deep Dive: Gojek and Tokopedia's merger

Startup Snapshot

Play Episode Listen Later Jun 10, 2021 26:45


Last month, Indonesia-based super app Gojek and online marketplace Tokopedia announced a merger to form GoTo Group. The move would give both companies a boost against their respective rivals: Gojek against fellow super app Grab, and Tokopedia against Shopee, Sea Group's ecommerce arm. However, potential redundancies in the combined entity have already been spotted, raising questions about the future of its various services. On this episode of Deep Dive, Tech in Asia's Aditya Hadi Pratama discusses the events in the lead-up to the deal, GoTo's prospective future, and what impact the merger could have on the wider Asian startup ecosystem. Featured reporter: Aditya Hadi Pratama, a Tech in Asia journalist based in Indonesia Essential reading: Gojek and Tokopedia officially announce merger Gojek, Tokopedia's merged entity GoTo plans pre-IPO fundraise Following the GoTo merger, should Grab buy an ecommerce marketplace? Overlap in Gojek and Tokopedia services suggests possible redundancy GoTo appoints ex-Ernst & Young exec as CFO ahead of its IPO plans Visual: How a decade of work led to the GoTo merger For more stories on GoTo, click here Episode sponsor: HVR's technology empowers organizations to realize their full potential with continuous, high-volume data movement between cloud-based and on-premise systems. Visit https://techin.asia/hvr to get fresh data when you need it.

intricity101
Data Sharks 10: HVR & Data Replication Market with Anthony

intricity101

Play Episode Listen Later Jun 4, 2021 47:45


Joined by Guest Shark Anthony Brooks-Williams, CEO of HVR, the Data Sharks discuss the evolution of the Data Replication Market and HVR's emergence in the space. Meet today's Sharks: - Jared Hillam, EVP of Emerging Technologies at Intricity - Arkady Kleyner, Principal, and CoFounder of Intricity - Anthony Brooks-Williams, CEO of HVR Watch the Video on YouTube Sign up for the live session, and ask the Data Sharks questions here: intricity.com/datasharks Talk with a Data Shark: intricity.com/intricity101 www.intricity.com youtube.com/intricity101

Humans vs Robots
34 | Climbing

Humans vs Robots

Play Episode Listen Later Jun 3, 2021


Alone and with few options left, the cousins push forwards towards trial twoEngrin Ai played by John GoldenThiradin Ossran played by Jake PetersenDMed by Isaiah PettyEdited by Steve PettySome sound effects in this show are from https://freesfx.co.uk/Produced by Audiomancer Media

Aging-US
Potential Benefits of Daily Transcutaneous Vagus Nerve Stimulation

Aging-US

Play Episode Listen Later Jun 2, 2021 6:26


Aging published this high-scoring research paper on July 30, 2019, entitled, “Effects of transcutaneous vagus nerve stimulation in individuals aged 55 years or above: potential benefits of daily stimulation,” by researchers from the United Kingdom's University of Leeds and University of Glasgow. In 2019, the researchers reported on the results of the effects of tVNS among participants 55 years of age and older in three studies. In the first study, they observed the effects of acute, single-session tVNS on cardiovascular autonomic function compared with the effects of sham (ear lobe/placebo) stimulation among 14 healthy participants 55 years of age and older. They collected baseline values and measured heart rate variability (HVR) and baroreflex sensitivity. “Since not all participants responded to tVNS, we examined if it was possible to identify potential tVNS responders from baseline parameters.” In the second study, the researchers explored the effects of acute, single-session tVNS on autonomic function in the same age group by expanding the sample to 51 participants. The third study examined 26 participants in the same age group when administered tVNS once per day, for 15-minutes, over the course of two weeks. The researchers reported the impacts of daily tVNS in measures of autonomic function, health-related quality of life (QoL), mood, and sleep. “Transcutaneous vagal nerve stimulation (tVNS) acutely administered to the tragus in healthy volunteers aged ≥ 55 years was associated with improvements in spontaneous cardiac baroreflex sensitivity and HRV.” To date, this study has generated an Altmetric Attention Score of 350. The Altmetric Attention Score provides an at-a-glance indication of the volume and type of online attention the research has received. Top Aging publications rated by Altmetric Attention Score - https://www.aging-us.com/news_room/altmetric Sign up for free Altmetric alerts about this article - https://oncotarget.altmetric.com/details/email_updates?id=10.18632%2Foncotarget.102074 DOI - https://doi.org/10.18632/aging.102074 Full text - https://www.aging-us.com/article/102074/text Correspondence to: Jim Deuchars email: J.Deuchars@leeds.ac.uk Keywords: vagus nerve stimulation, autonomic nervous system, neuromodulation, quality of life, mood, aging About Aging Launched in 2009, Aging publishes papers of general interest and biological significance in all fields of aging research and age-related diseases, including cancer—and now, with a special focus on COVID-19 vulnerability as an age-dependent syndrome. Topics in Aging go beyond traditional gerontology, including, but not limited to, cellular and molecular biology, human age-related diseases, pathology in model organisms, signal transduction pathways (e.g., p53, sirtuins, and PI-3K/AKT/mTOR, among others), and approaches to modulating these signaling pathways. Please visit our website at http://www.Aging-US.com​​ or connect with us on: Twitter - https://twitter.com/AgingJrnl​ Facebook - https://www.facebook.com/AgingUS/​ SoundCloud - https://soundcloud.com/aging-us​ YouTube - https://www.youtube.com/agingus​ LinkedIn - https://www.linkedin.com/company/aging​ Aging is published by Impact Journals, LLC please visit http://www.ImpactJournals.com​​ or connect with @ImpactJrnls Media Contact 18009220957 MEDIA@IMPACTJOURNALS.COM

Startup Snapshot
Deep Dive: Grab’s investor presentation

Startup Snapshot

Play Episode Listen Later May 14, 2021 26:18


Last month, Grab announced its plans to go public in the US via a merger with Altimeter Capital, a special purpose acquisition company. Shortly after, Grab unveiled an investor presentation that revealed previously closely guarded financial details. On this episode of Deep Dive, Tech in Asia industry analyst Simon Huang dives into the deck, parsing through what it says - and doesn’t say - and what it may indicate for the future of the Southeast Asian super app. Featured reporter: Simon Huang, Tech in Asia’s industry analyst based in Singapore Essential reading: 6 surprises from the reveal of Grab’s jealously guarded financials Retrace the forgotten history of Grab with this timeline Grab used this deck to reveal its financials to investors Visualizing the size of Grab Visual: Tracking Grab’s journey to a $40 billion valuation Breaking down Grab’s $40b valuation The superpower behind Grab’s super app? For more stories on Grab, click here Episode sponsor: HVR’s technology empowers organizations to realize their full potential with continuous, high-volume data movement between cloud-based and on-premise systems. Visit https://techin.asia/hvr to get fresh data when you need it.

Cloud Wars Live with Bob Evans
HVR: Real-Time Data Where You Need It

Cloud Wars Live with Bob Evans

Play Episode Listen Later Nov 5, 2020 24:39


This episode is brought to you by HVR.For this sponsored episode of Cloud Wars Live, I spoke with Anthony Brooks-Williams, CEO of HVR. As a cloud provider of data-replication and data-integration solutions, HVR takes hybrid to the next level.The Big Themes:People are taking a digital approach to their businesses: Where are they sending that data? They're typically sending it to the cloud.HVR had the best quarter ever: It was a wow moment. And Q1 is looking even better for them.Data is the lifeblood of corporations: Whether the challenge is operational efficiencies, inventory management, or better communication with their customers, more companies across multiple industries are turning to HVR for their hybrid data. HVR's customer include some of the world's largest corporations.HVR helps connect the dots to help leaders lead: What kind of data do companies want? What is the strategy? Ultimately it gets driven down from the top.The Big Quotes:“It's constantly evolving because customers' expectations are rapidly changing.” This episode is brought to you by HVR.  

The Odds Against All
7: The Odds v.s. Happy Valley Rockers (Monarch House)

The Odds Against All

Play Episode Listen Later Feb 22, 2019 100:02


The Odds sit down with The Happy Valley Rockers A.K.A. The Monarch House. HVR are local music promoters, venue owners, great friends, and potentially The Odds Against All in a past life.