Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Lukasz Lazewski. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lukasz Lazewski or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Grzegorz Tworek on cybersecurity for coders, transforming security with AI, and zero-day vulnerabilities | The Dev is in the Details #8

1:06:26
 
Share
 

Manage episode 428347526 series 3516159
Content provided by Lukasz Lazewski. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lukasz Lazewski or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

How can coders stay ahead in the relentless race against cyber threats?

Join us with cybersecurity expert Grzegorz Tworek as we explore the decline of assembly, C++, and kernel development, and its implications for security. Discover crucial tips for coders, how to uncover zero-day vulnerabilities and the ongoing battle between cyber defenders and attackers.

Learn how AI is transforming code security and gain insights from NATO's Locked Shields exercise on which country leads in cyber defense. Tune in for expert advice and practical insights to elevate your cybersecurity knowledge.
► Our guest

Grzegorz Tworek: https://www.linkedin.com/in/grzegorztworek/
Microsoft MVP^17, Security Internals Fanatic, hominoid Windows defender.

► In today’s episode:

  • The enduring relevance of assembly, C++, and other low-level languages amidst modern programming trends.
  • Why these languages are becoming less popular and what this means for future development.
  • Essential security considerations for both coders and companies to stay protected.
  • Exploring zero-day vulnerabilities: What they are, how to find them, and why they matter.
  • The dynamic race between good guys and bad guys in the cybersecurity landscape.
  • Building and leveraging a community of security experts for better defense strategies.
  • The role of AI in writing code and the implications for the future of cybersecurity.
  • A deep dive into NATO's Locked Shields exercise: Which country leads the pack in cyber defense?

► Decoding the timeline:

00:00:00 – The most important security considerations for coders and companies

00:08:55 – Predictions for security advancements in applications

00:13:28 – Memory abuse attacks

00:15:00 – Reverse engineering strategies

00:31:00 – How to start learning about cybersecurity?

00:41:35 – Publicly exposing vulnerabilities, Net Zero Days, threat actors

00:50:00 – NATO Lock shields

00:54:20 – Catch-up race with bad guys

***
The Dev is in the Details is a podcast where we talk about technology, business and their impacts on the world around us.

Do you want to recommend a guest or discuss with us further?

Connect with Lukas on LinkedIn or write to us at [email protected].

  continue reading

Chapters

1. The most important security considerations for coders and companies (00:00:00)

2. Predictions for security advancements in applications (00:08:55)

3. Memory abuse attacks (00:13:28)

4. Reverse engineering strategies (00:15:00)

5. How to start learning about cybersecurity? (00:31:00)

6. Publicly exposing vulnerabilities, Net Zero Days, threat actors (00:41:35)

7. NATO Lock shields (00:50:00)

8. Catch up race with bad guys (00:54:20)

15 episodes

Artwork
iconShare
 
Manage episode 428347526 series 3516159
Content provided by Lukasz Lazewski. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Lukasz Lazewski or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

How can coders stay ahead in the relentless race against cyber threats?

Join us with cybersecurity expert Grzegorz Tworek as we explore the decline of assembly, C++, and kernel development, and its implications for security. Discover crucial tips for coders, how to uncover zero-day vulnerabilities and the ongoing battle between cyber defenders and attackers.

Learn how AI is transforming code security and gain insights from NATO's Locked Shields exercise on which country leads in cyber defense. Tune in for expert advice and practical insights to elevate your cybersecurity knowledge.
► Our guest

Grzegorz Tworek: https://www.linkedin.com/in/grzegorztworek/
Microsoft MVP^17, Security Internals Fanatic, hominoid Windows defender.

► In today’s episode:

  • The enduring relevance of assembly, C++, and other low-level languages amidst modern programming trends.
  • Why these languages are becoming less popular and what this means for future development.
  • Essential security considerations for both coders and companies to stay protected.
  • Exploring zero-day vulnerabilities: What they are, how to find them, and why they matter.
  • The dynamic race between good guys and bad guys in the cybersecurity landscape.
  • Building and leveraging a community of security experts for better defense strategies.
  • The role of AI in writing code and the implications for the future of cybersecurity.
  • A deep dive into NATO's Locked Shields exercise: Which country leads the pack in cyber defense?

► Decoding the timeline:

00:00:00 – The most important security considerations for coders and companies

00:08:55 – Predictions for security advancements in applications

00:13:28 – Memory abuse attacks

00:15:00 – Reverse engineering strategies

00:31:00 – How to start learning about cybersecurity?

00:41:35 – Publicly exposing vulnerabilities, Net Zero Days, threat actors

00:50:00 – NATO Lock shields

00:54:20 – Catch-up race with bad guys

***
The Dev is in the Details is a podcast where we talk about technology, business and their impacts on the world around us.

Do you want to recommend a guest or discuss with us further?

Connect with Lukas on LinkedIn or write to us at [email protected].

  continue reading

Chapters

1. The most important security considerations for coders and companies (00:00:00)

2. Predictions for security advancements in applications (00:08:55)

3. Memory abuse attacks (00:13:28)

4. Reverse engineering strategies (00:15:00)

5. How to start learning about cybersecurity? (00:31:00)

6. Publicly exposing vulnerabilities, Net Zero Days, threat actors (00:41:35)

7. NATO Lock shields (00:50:00)

8. Catch up race with bad guys (00:54:20)

15 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play