Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
…
continue reading
Josh Stroschein Podcasts
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
1
From Pre-Law to FLARE: How Josh Stroschein Became Google's Malware Analyst
39:38
39:38
Play later
Play later
Lists
Like
Liked
39:38In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Josh Stroschein — aka The Cyber Yeti — a former professor turned reverse engineer now working on one of the largest malware analysis teams in the world. Josh shares his unconventional path through .NET development, credit card processing security, and academia before landi…
…
continue reading
1
EP20 Windows Under the Hood: Kernel Design, EDRs, and the Shift to VBS with Pavel Yosifovich
1:10:25
1:10:25
Play later
Play later
Lists
Like
Liked
1:10:25In this episode, we get a unique look at the history of Windows through the eyes of one of its leading experts, Pavel Yosifovich. We delve into his fascinating origin story, including the "fluke" that led him to become the author of the legendary Windows Internals series, and why he describes himself as a developer who "hates security." The convers…
…
continue reading
1
Building Zero Trust Tools: Inside ThreatLocker with Product Manager Yuriy Tsibere
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Yuriy Tsibere, Product Manager at ThreatLocker, for a behind-the-scenes look at how security products actually get built. Yuriy's path to cybersecurity started in Ukraine, where he worked in telecom during sophisticated APT campaigns that lasted over a year. Now at ThreatL…
…
continue reading
1
EP19 The Art of Deconstructing Problems: Tools, Tactics, and the ScatterBrain Obfuscator with Nino Isakovic
1:53:18
1:53:18
Play later
Play later
Lists
Like
Liked
1:53:18In this episode, we’re joined by Nino Isakovic, a long-time low-level security expert, for a thought-provoking conversation that spans the foundational and the cutting-edge. Nino discusses the art of deconstructing problems—sharing insights on how to learn effectively, the building blocks of a robust RE toolkit, and the critical shift required in o…
…
continue reading
1
Cyber Insurance Explained: What Blue Teams Need to Know Before an Incident
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54From teaching AP art history to brokering cyber insurance deals. 🎓➡️🛡️ In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Andy Runyan from Yukon to break down everything blue teamers need to know about cyber insurance — before an incident happens. Andy shares his unconventional journey from fourth-generation educator and b…
…
continue reading
1
Building Forensics Tools That Last | Brian Carrier (Autopsy, Sleuth Kit)
31:40
31:40
Play later
Play later
Lists
Like
Liked
31:40Josh Mason and Wade Wells sit down with Brian Carrier, the creator of Sleuth Kit and Autopsy, two of the most widely used digital forensics tools in the world. They dig into how Brian got his start in the early days of computer forensics, how open source shaped his career, and what he’s building now with Cyber Triage. From stories about government …
…
continue reading
1
EP18 10,000 DLLs and Too Much Math - Wrapping Up FLARE-On 12 with the FLARE Team
47:45
47:45
Play later
Play later
Lists
Like
Liked
47:45In this episode, we sit down with Nick Harbour, Blas Kojusner, Moritz Raabe, and Sam Kim — members of the FLARE Team and some of this year’s challenge authors — for a deep dive into the design and execution of FLARE-On 12. The team discusses the complexity and intent behind this year's challenges, including how Sam created his grueling final challe…
…
continue reading
1
Balancing Education and Real-World Cybersecurity with a SOC Analyst Student
31:50
31:50
Play later
Play later
Lists
Like
Liked
31:50In this episode of Simply Defensive, host Josh Mason and co-host discuss their experiences and challenges in cybersecurity, along with guest Victoria, a student and SOC analyst at UNLV. The conversation covers the complexities of building a Security Operations Center (SOC) and compares academic learning with real-world applications. Victoria shares…
…
continue reading
1
EP17 What Lurks Beneath: Building a Robust Network at Black Hat with Mark Overholser
1:09:36
1:09:36
Play later
Play later
Lists
Like
Liked
1:09:36In this episode, we're asking the question: "What Lurks Beneath?" We're joined by Mark Overholser, a Technical Marketing Engineer at Corelight who's part of the team running the Black Hat Network Operations Center (NOC). We discuss the incident during Black Hat 2025 that introduced us and revealed the team's proactive approach to protecting every g…
…
continue reading
1
From Help Desk to SOC: How KevTech Broke Into Cybersecurity Without Certs
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40What happens when you go from fixing executives’ laptops at Goldman Sachs to defending against cyber threats in a SOC? In this episode of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Kevin Apolinario — better known as KevTech — to unpack his journey from IT support to cybersecurity analyst, all without a single certification. Kev…
…
continue reading
1
Detection Engineering Tutorial: Cloud Security, Kubernetes Logging & SOC Career Path
34:44
34:44
Play later
Play later
Lists
Like
Liked
34:44In this episode of Simply Defensive, we sit down with JB, a Senior Cybersecurity Engineer working in detection engineering. JB shares his journey from SOC analyst to detection engineer, diving deep into the challenges of cloud-native security, Kubernetes logging, and building a sustainable career in cybersecurity. What We Cover: What detection engi…
…
continue reading
1
Hands-On Defense: Markus Schober on DFIR, Labs, and Building Better Blue Teamers
30:31
30:31
Play later
Play later
Lists
Like
Liked
30:31In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Markus Schober, founder of Blue Cape Security, to talk all things digital forensics, incident response (DFIR), and why hands-on training beats theory every time. We dig into: 🔹 The hidden value of building your own cyber range 🔹 How IR pros train using real attacks (and wh…
…
continue reading
1
EP16 The Machine Learning Revolution in Reverse Engineering with Hahna Kane Latonick
1:25:26
1:25:26
Play later
Play later
Lists
Like
Liked
1:25:26In this episode of Behind the Binary, we're joined by renowned security researcher Hahna Kane Latonick for a deep dive into the powerful world where reverse engineering meets data science. Hahna shares her expertise on how techniques like supervised and unsupervised learning can be used to classify and predict security threats, and she explains how…
…
continue reading
1
EP15 Getting Ready for FLARE-On 12 - An Inside Look at the Reverse Engineering Gauntlet
39:13
39:13
Play later
Play later
Lists
Like
Liked
39:13In this episode, we're "Getting Ready for FLARE-On 12" with an inside look at the world-renowned reverse engineering competition. We’re joined by long-time FLARE-On host and challenge author Nick Harbour and regular challenge author Blas Kojusner for an in-depth conversation. We'll take a brief tour of FLARE-On history and discuss how it has grown …
…
continue reading
1
Cyber Threat Intelligence for Blue Teams with Jordan Kalm (Morado COO)
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50From Army recon missions to building Morado, COO Jordan Kalm reveals how military intelligence tactics translate into modern cyber threat intelligence. In this Simply Defensive episode, Josh Mason and Wade Wells dive into what really works for blue teams and SOC analysts — and what’s just noise. 👉 If you’ve ever wondered how to turn raw intel into …
…
continue reading
1
How a Detective Became the Ginger Hacker: SOC Life, Job Hunts & Blue Team Wisdom
36:02
36:02
Play later
Play later
Lists
Like
Liked
36:02From the streets to the SOC. 💻 In this episode of Simply Defensive, Josh Mason and Wade Wells talk with Andrew Crotty — aka Ginger Hacker. A former detective turned Tier 3 SOC analyst and Army reservist, Andrew shares his journey into cyber, the struggles of breaking in, and the lessons he’s learned (including the rookie mistake that accidentally d…
…
continue reading
1
EP14 Web3's Dark Side: Unmasking the New Age of Financial Crime
1:12:14
1:12:14
Play later
Play later
Lists
Like
Liked
1:12:14Web3 promised a new era of decentralized finance, but it has also created a new frontier for crime, with thefts and hacks far surpassing those in the traditional financial sector. In this episode, we sit down with experts Blas Kojusner, Robert Wallace, and Joseph Dobson to explore the Wild West of Web3 and decentralized finance (DeFi). But what is …
…
continue reading
1
Automating the Blue Team | Kevin Mata (Swimlane) on SOAR & AI in Cybersecurity
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43Automation is changing the way defenders work. In this episode of Simply Defensive, we sit down with Kevin Mata, Director of Cloud Operations at Swimlane, to talk about his journey from flipping burgers at In-N-Out to flipping SOC alerts with automation, SOAR, and AI. Kevin shares how he got started in cybersecurity, how Swimlane helps Blue Teams s…
…
continue reading
1
Inside Hack Defender Academy: Gamified Malware Training for Blue Teamers
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27Ready to level up your defensive cybersecurity skills? In this episode of Simply Defensive, Josh Mason and Wade Wells sit down with Dan Regalado and Belem — the founders of Hack Defender Academy — to explore how they’re using CTF-style challenges, real malware cases, and gamification to prepare the next generation of defenders. 💡 We cover: Why gami…
…
continue reading
1
Rob Allen (ThreatLocker) on Zero Trust, Proactive Security, and Ransomware Prevention
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27In Season 4, Episode 4 of Simply Defensive, hosts Josh Mason and Wade Wells sit down with Rob Allen, Chief Product Officer at ThreatLocker, to dive deep into the world of Zero Trust security, proactive cybersecurity strategies, and ransomware prevention. Rob shares expert insights on: Proactive vs. Reactive cybersecurity — why a balanced security s…
…
continue reading
1
EP13 Beyond the Bug: Scaling Bug Bounty Programs & Launching a Cyber Startup with Dr. Jared DeMott
37:15
37:15
Play later
Play later
Lists
Like
Liked
37:15In this episode of Behind the Binary, we sit down with Dr. Jared DeMott to pull back the curtain on the world of cybersecurity. Formerly with the Microsoft Security Response Center (MSRC), Jared shares invaluable wisdom on managing bug bounty programs at scale and what truly makes a good bug report. We then pivot to explore his fascinating career j…
…
continue reading
1
Why Your CISO Needs a “Shut Up, Boss” Button
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09What if GitHub sucks for security detections—and AI is finally good enough to replace it? Join Josh Mason and Wade Wells as they sit down with Aaron Mog, the outspoken founder of Detections.ai, to unpack why detection engineering is broken—and how his new platform signed up 4,000+ users in just two weeks. Aaron doesn’t hold back. From ranting about…
…
continue reading
1
Why Jack in the Box Might Have the Best Security Team in Fast Food
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58How does a Navy fire control tech who once wrangled a six-barrel death robot become the head of security operations at Jack in the Box? In this episode of Simply Defensive, we sit down with Chris Julio — SOC Manager, veteran, and self-proclaimed lover of both metrics and munchie meals. Chris shares his journey from Windows NT and dot-matrix printer…
…
continue reading
1
Coffee Is Your Top Supply Chain Risk: A Conversation with Kyle Kelly
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56SOC analysts, detection engineers, and pentesters—you’re not imagining it: software supply chain security is a dumpster fire 🔥. In this episode of Simply Defensive, we sit down with Kyle Kelly, engineering manager at GitHub and author of Crime Hacks, to unpack the chaos. We cover: - Why malicious packages are sneaking past defenders - The truth abo…
…
continue reading
1
EP12 Unpacking Malware & Minds: A Reverse Engineer's Journey with Danny Quist
59:50
59:50
Play later
Play later
Lists
Like
Liked
59:50Join us as we explore the world of reverse engineering with pioneer and CTO, Danny Quist. We'll examine the evolving landscape of binary analysis tools, the constant battle with malware obfuscation, and what it was like building one of the very first malware repositories for research. Plus, Danny shares unique insights on neuro-diversity and cognit…
…
continue reading
1
EP11 Tracing Lazarus: Greg Sinclair on Attributing North Korean Cyber Threats Through Binary Similarity
1:02:10
1:02:10
Play later
Play later
Lists
Like
Liked
1:02:10Ever wonder who names the world's most notorious APTs? In this episode, we sit down with Greg Sinclair, a reverse engineer from the FLARE team at Google. Greg not only hunts down sophisticated malware but also shares the behind the scenes story of how he discovered and named the North Korean APT, the Lazarus Group. He also discusses his innovative …
…
continue reading
1
EP10 Tim Blazytko - Protecting Intellectual Property: Obfuscation & Anti-Reverse Engineering in Software
1:08:32
1:08:32
Play later
Play later
Lists
Like
Liked
1:08:32What goes into creating effective software protections? This episode features a conversation with Tim Blazytko, Chief Scientist and Head of Engineering at Emproof, about the essential strategies for protecting software intellectual property. We cover the core concepts of code obfuscation and anti-reverse engineering and discuss practical, modern ap…
…
continue reading
1
S3 E8: Innovations in Cybersecurity: A Conversation with Threat Locker's John Liliston
27:21
27:21
Play later
Play later
Lists
Like
Liked
27:21In the final episode of Season 3 on Simply Defensive, hosts Josh Mason and Wade Wells welcome John Liliston, the Product Director at ThreatLocker. John shares his journey into cybersecurity, his role at ThreatLocker, and his thoughts on the evolution of security solutions. He discusses ThreatLocker's approach to zero trust, the impact of AI on cybe…
…
continue reading
1
S3 E7: Cybersecurity Chat with Chuck Sapp | From Military Service to Cyber Awareness
38:06
38:06
Play later
Play later
Lists
Like
Liked
38:06Join hosts Josh and Wade as they sit down with Charles (Chuck) Sapp, a seasoned cybersecurity expert and security awareness specialist. In this episode, Chuck shares his unique journey from serving in the Marine Corps to becoming an influencer in the cybersecurity community. Gain insights into his military background, his passion for educating othe…
…
continue reading
1
EP09 Thomas Roccia - AI, Data Visualization, and the Future of Security Research
1:08:07
1:08:07
Play later
Play later
Lists
Like
Liked
1:08:07In this episode, we’re joined by Thomas Roccia, a security researcher at Microsoft. Thomas discusses the growth of the Unprotect Project, how AI is changing security research, and the impact of data visualizations for conveying technical information. Drawing on his experience, Thomas offers a unique perspective on the intersection of open-source co…
…
continue reading
1
S3 E6: From Submarines to Cybersecurity - Navigating Small Business Security
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37Welcome to another episode of Simply Defensive! In this installment, hosts Josh Mason and Wade Wells are joined by cybersecurity expert James Bierly. James shares his unique journey from a submarine sonar technician in the Navy to founding his own security firm, Secure Point Solutions, which specializes in helping small businesses tackle cybersecur…
…
continue reading
1
S3 E5: The Ultimate Guide to Detection as Code and Blue Team Tactics with David French
48:33
48:33
Play later
Play later
Lists
Like
Liked
48:33Join hosts Josh Mason and Wade Wells as they sit down with David French for an insightful episode of Simply Defensive. Discover David's journey from coding CCTV systems to becoming a staff security engineer at Google Cloud. Explore their discussion on detection as code, automation, detection testing, and relevant tools like Dorothy and Atomic Red T…
…
continue reading
1
S3 E4: Breaking Barriers in Cybersecurity with Eddie Miro
37:06
37:06
Play later
Play later
Lists
Like
Liked
37:06Josh Mason and Wade Wells bring us an exciting episode of Simply Defensive, featuring special guest Eddie Miro. Eddie shares his journey in cybersecurity, offering insights into his experiences at DEFCON, the creation of Octopus Game, and his mission to make cybersecurity more inclusive. Join us as we delve into the benefits of Capture the Flag (CT…
…
continue reading
1
EP08 Roman Hussy - Inside AbuseCH: A Community's Fight Against Malware
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13This episode shines a light on abuse.ch, a vital non-profit project built by and for the global cybersecurity community. We chat with founder Roman Huessy about the collective effort behind tracking malware and botnets for over a decade. Discover the journey of maintaining a crucial shared resource—the technical challenges of hosting an open platfo…
…
continue reading
1
S3 E3: Unlocking the Secrets of OPSEC - A Deep Dive with Mitch Cohen
42:31
42:31
Play later
Play later
Lists
Like
Liked
42:31In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome Mitch Cohen, privacy and OPSEC expert from flare.io. Mitch shares his journey to becoming a 'digital ghost' and offers valuable insights into operational security (OPSEC) and privacy practices. He discusses the importance of securing personal information, the risks associa…
…
continue reading
1
S3 E2: Navigating the Cybersecurity Landscape with Edna Johnson - From Developer to Threat Hunter
31:52
31:52
Play later
Play later
Lists
Like
Liked
31:52Navigating the Cybersecurity Landscape with Edna Johnson: From Developer to Threat Hunter Join hosts Josh Mason and Wade Wells as they welcome Edna Johnson, a vibrant and passionate cybersecurity engineer, to Simply Defensive. Edna shares her journey from initially wanting to be a developer to diving deep into the world of cybersecurity, attending …
…
continue reading
1
S3 E1: Building Effective Cyber Defense Teams with Fletus Poston III
35:56
35:56
Play later
Play later
Lists
Like
Liked
35:56In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by special guest Fletus Poston III, a seasoned cyber defense expert with nearly 18 years of experience. Learn about the complexities of cyber defense in various industries, discussing the pros and cons of regulatory red tape, the impact of audits on cybersecurity, and t…
…
continue reading
1
EP07 Jordan Wiens - Inside the Mind of a Binary Ninja: CTFs, AI and the Future of Cyber Security
59:16
59:16
Play later
Play later
Lists
Like
Liked
59:16In this episode, we have a fascinating conversation with Jordan Wiens, developer of the widely used Binary Ninja, and co-founder of Vector 35. Jordan brings his expertise as an avid CTF player to a discussion about the complexities of building a commercial reverse engineering platform, the importance of community growth, and the significant future …
…
continue reading
1
EP06 Duncan Ogilvie - Piano Tuning & Debugging: The Story of x64dbg
46:15
46:15
Play later
Play later
Lists
Like
Liked
46:15In this episode, we're sitting down with Duncan Ogilvie, the creator of x64dbg! We'll dive deep into how one of the most popular Windows debuggers got its start, explore the real-world challenges of running a major open-source software project, and even get a glimpse into the future of this essential tool. You'll also learn how piano tuning almost …
…
continue reading
1
S2 E8: SOC Challenges, Trends, and Community Wisdom with Reanna Schultz
41:58
41:58
Play later
Play later
Lists
Like
Liked
41:58In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Reanna Schultz, a renowned cyber influencer and SOC manager. Reanna shares her journey from aspiring state highway patrolwoman to cybersecurity expert, emphasizing the importance of community engagement and continuous learning. Join us as we cover the challenges and …
…
continue reading
1
S2 E7: Understanding Mac Security - Challenges and Insights with Slava Konstantinov
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55Understanding Mac Security: Challenges and Insights with Slava Konstantinov In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Slava Konstantinov, the Head of Mac Development at ThreatLocker. Slava dives deep into the world of Mac security, explaining the challenges and intricacies of developing security agents for m…
…
continue reading
1
S2 E6: Navigating OT Security - An Inside Look with Lesley Carhart
36:44
36:44
Play later
Play later
Lists
Like
Liked
36:44In this episode of Simply Defensive, hosts Josh Mason and Wade Wells welcome the highly esteemed Leslie Carhart from Dragos. We step into the world of industrial cybersecurity, discussing the critical nature of securing vital infrastructure like power plants, water treatment facilities, and manufacturing setups. Leslie shares insights on the unique…
…
continue reading
1
EP05 Saumil Shah - From Black Hat to RingZer0: Shaping the World of Reverse Engineering
1:06:31
1:06:31
Play later
Play later
Lists
Like
Liked
1:06:31Saumil Shah, a security researcher, discusses his journey into reverse engineering, starting with his early interest in patching games and analyzing viruses. He emphasizes the evolution of reverse engineering tools and techniques, from manual approaches to AI-driven automation, and shares his insights on the future of the field and the importance o…
…
continue reading
1
S2 E5: From Red to Blue - David Perez's Cybersecurity Odyssey
36:19
36:19
Play later
Play later
Lists
Like
Liked
36:19From Navy Red Team to Blue Team: David Perez's Cybersecurity Journey In this episode of Simply Defensive, hosts Josh Mason and Wade What’s Up interview David Perez, a Navy veteran who transitioned from red teaming to blue teaming in cybersecurity. David shares insights into his career path, his experience with the Navy’s Skillbridge program, and th…
…
continue reading
1
S2 E4: SOC Operations and Metrics with Hayden Covington
36:13
36:13
Play later
Play later
Lists
Like
Liked
36:13In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by Hayden Covington from Black Hills Information Security. Hayden shares insights into his role at a Security Operations Center (SOC), discussing key metrics, challenges in SOC work, and the importance of communication with MSP customers. The conversation also delves in…
…
continue reading
1
S2 E3: Unlocking the Potential of Blue Teaming with Microsoft Intel Analyst Simeon
39:51
39:51
Play later
Play later
Lists
Like
Liked
39:51In this episode of Simply Defensive, hosts Josh Mason and Wade Wells talk with Simeon, an Intel Analyst at Microsoft. Listen as they explore his journey from aspiring doctor to cybersecurity expert, discussing his innovative contributions like the creation of KC7 Cyber, a tool that democratizes access to cybersecurity training. Learn about Simeon's…
…
continue reading
1
S2 E2: From Military Police to Cyber Sleuth - Jess Bishop's Journey and Insights
34:51
34:51
Play later
Play later
Lists
Like
Liked
34:51In this episode of Simply Defensive, hosts Josh Mason and Wade Wells are joined by SOC analyst Jessica Bishop. Jessica shares her unconventional journey into cybersecurity, transitioning from military police to a corporate role and eventually into a SOC analyst position at an MSSP. She discusses her job's dynamic and engaging aspects, the importanc…
…
continue reading
1
EP04 Stephen Eckels - A Journey From Game Modding to SolarWinds: How One Gamer Became a Renowned Reverse Engineer
1:05:36
1:05:36
Play later
Play later
Lists
Like
Liked
1:05:36In this episode, we are joined by Stephen Eckels of the FLARE team at Google (Mandiant). Stephen discusses his journey into the field, starting with his early interest in video game modding and hacking. He shares his experience in discovering the Sunburst backdoor in the SolarWinds attack and emphasizes the importance of continuous learning, commun…
…
continue reading
1
S2 E1: Cybersecurity Adventures with Dan Reardon - Memes, Blogging, and Community Insights
37:23
37:23
Play later
Play later
Lists
Like
Liked
37:23Join hosts Josh Mason and Wade Wells in this episode of Simply Defensive as they welcome cybersecurity meme-maker and SOC analyst, Dan Reardon, also known as The HaircutFish. Discover Dan's unconventional journey into cybersecurity, from creating influential memes about prominent figures like Jon Hammond and John Strand to writing insightful blogs …
…
continue reading
1
EP03 Ryan Chapman - From Software Cracking to Threat Hunting: A Reverse Engineering Story
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Join us as I sit down with renowned threat hunter, Ryan Chapman. Ryan shares his incredible journey from a curious young hacker to a formidable force in cybersecurity. Discover how his early fascination with software cracking ignited a passion for reverse engineering, ultimately leading him to the front lines of cyber defense. In this conversation,…
…
continue reading