Discover
Hacker Valley Studio
Hacker Valley Studio
Author: Hacker Valley Media
Subscribed: 234Played: 12,336Subscribe
Share
© Copyright 2019 All rights reserved.
Description
Welcome back… to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
420 Episodes
Reverse
Most organizations are prepping for disaster recovery when they should be building for cyber recovery, and those are not the same thing.
Recorded live at RSAC Conference 2026, Ron sat down with Chris Bevil, Principal Security AI Strategist at Commvault, to break down what actually happens after a breach hits and why most teams are caught flat-footed.
Chris walks us through Commvault's Minutes to Meltdown tabletop exercise, why isolated recovery environments matter, and how clean data determines whether you get your company back in hours or in 200+ days.
This episode will tell you what separates a team that recovers from a team that unravels.
Impactful Moments
01:16 - Live at RSAC 2026 with Chris Bevil, Principal, Security AI Strategist at Commvault
01:40 - Minutes to Meltdown origin story
03:00 - What goes into a Meltdown?
04:48 - What happens in the first 30 minutes of chaos
07:00 - What Commvault actually does
08:21 - What is IRE? Isolated recovery environment breakdown
10:40 - What is Disaster Recovery in 2026?
13:00 - How cyber recovery differs from disaster recovery
14:20 - Where attackers go in the first 30 minutes
15:40 - The 3-2-1 rule and where teams fail
21:45 - What successful recovery looks like
25:14 - AI strategy at Commvault
Links
Connect with our guest, Chris Bevil, on LinkedIn: https://www.linkedin.com/in/chris-b-211998a/
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
AI adoption is outpacing governance at every level, and the cost of waiting is getting higher by the day. Guru Sethupathy, General Manager of AI Governance at Optro and former Founder of FairNow, breaks down what it really takes to build trust in AI systems before things go sideways.
Guru lays out a simple but powerful 3 P’s Framework: policies, process, and people, connecting it to what teams are actually dealing with right now, from shadow AI to security threats that don’t look like anything we’ve seen before.
If 2026 is the year AI moves from experiments to real operations, this conversation is your blueprint for keeping it under control.
Impactful Moments
00:00 - Introduction
02:25 - What does Optro do? Helping companies with the AI governance journey.
03:10 - Why AI governance is really about trust, not control
05:15 - The moment AI went mainstream, and why that changed everything
05:50 - The three real business risks: performance, security, and transparency
07:30 - Human accountability in an AI-driven world
08:48 - What’s actually happening with AI regulation, EU, US, and standards
10:28 - Where Optro fits, orchestration vs monitoring in AI governance
13:05 - The 3 Ps framework: policies, process, and people
14:47 - Governance 101, why AI inventory is the first move every team misses
16:12 - The reality check, AI adoption is outpacing governance everywhere
17:45 - Shadow AI explained, what your team is doing that you can’t see
19:45 - Optro’s top use cases: visibility, compliance, and operationalizing governance
20:43 - Who owns AI governance, and why it’s becoming a team sport
22:20 - Final advice, start now or play catch-up later
Links
Connect with our guest, Guru Sethupathy, on LinkedIn: https://www.linkedin.com/in/guru-sethupathy/
Learn more about Optro: https://optro.ai/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
What happens when attackers collaborate better than defenders?
Recorded live from RSAC 2026, this solo episode with Ron breaks down the biggest themes shaping cybersecurity right now, from organized threat groups and massive data breaches to the growing tension between productivity and control inside modern organizations.
This conversation highlights a hard truth. The threat landscape is evolving through collaboration. From phishing-as-a-service platforms like Tycoon 2FA to supply chain breaches impacting entire ecosystems, attackers are sharing tools and moving faster than ever.
But there’s another side to the story. As AI becomes embedded in how work gets done, security teams are being pushed to rethink their role. Blocking tools is no longer enough. The real challenge is enabling the business while managing risk, and that requires trust, alignment, and a stronger sense of community across the industry.
This episode is a call to rethink how we approach security. Not as isolated teams enforcing policy, but as a connected community working together to adapt, respond, and move forward.
Impactful Moments
00:00 - Introduction, live from RSAC 2026
02:50 - Tycoon2FA and the rise of phishing-as-a-service
04:45 - The TELUS breach and what a petabyte-scale attack looks like
06:21 - Why you need strict controls … everywhere
07:30 - Are AI agents the new Shadow IT?
09:00 - The balance between productivity and security controls
09:27 - Boards’ demands for their teams to use AI
11:53 - Why leading security teams is more like parenting than policing
12:42 - Community is the foundation for the future of cybersecurity
Links
Connect with Ron Eddings on LinkedIn: https://www.linkedin.com/in/ronaldeddings/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
What does it mean when your smart doorbell becomes an entry point for surveillance? What happens when a single hacker can jailbreak every major AI model within hours of its release? And why are the same tools being used by both nation-state attackers and the defenders trying to stop them?
In this solo episode, Ron Eddings breaks down the urgent case for practitioner unity in cybersecurity, from AI-powered jailbreaking and IoT surveillance creep to geopolitical cyber operations. With RSAC 2026 just around the corner, this episode is a rallying cry for the community to come together, share intelligence, and build the defenses that no single team can build alone.
The episode also tackles one of the biggest misconceptions in the industry right now. AI already came for your job, but now it is changing how we define responsibility, decision-making, and trust. Add in rising pressure across the workforce, new legislation pushing for human oversight, and real-world examples of AI being used in global conflict, and the stakes become hard to ignore.
Impactful Moments
00:00 - Introduction
02:00 - Pliny the Elder, God Mode and AI Jailbreaks
03:30 - Cyber in US-Israeli Operations in Iran and Anthropic Tensions
06:00 - Cyber threats that are hitting normal people
07:30 - Is my Ring Doorbell a surveillance risk?
10:05 - Attackers are collaborating and sharing more than defenders today
11:30 - RSAC: the cyber Super Bowl
14:30 - AI has already replaced your job
14:30 - Why mental health is cybersecurity's hidden crisis
17:00 - Governance in AI and what Texas is doing about it
19:00 - Was Claude used in state-level ops?
Links
Connect with Ron Eddings on LinkedIn: https://www.linkedin.com/in/ronaldeddings/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
What does it look like when a cybersecurity founder who built a $2.5 billion company decides to level up, again? Dean Sysman, co-founder of Axonius, sits down with Ron Eddings to pull back the curtain on what it really took to go from zero to $100M ARR in four and a half years, and what came next.
Dean breaks down the founder mindset, the emotional weight of tying your identity to your company, and why he stepped into the Executive Chairman role while simultaneously pursuing a PhD in AI systems at Columbia University. He gets into how boxing taught him what solo performance reveals about leadership, why vulnerability is a non-negotiable skill at scale, and what it means to care about something bigger than yourself. This one hits differently if you're building, leading, or figuring out what your next chapter looks like.
Impactful Moments
00:00 – Introduction
05:00 – Boxing for charity: raising $55K
08:00 – Competitive by nature, born to build
10:00 – Solo performance sharpens team leadership
13:00 – Axonius: zero to $100M ARR in 4.5 years
15:00 – Founder identity tied to company success
21:00 – Purpose bigger than yourself fuels resilience
25:00 – Self-awareness as the #1 growth tool
28:00 – Executive Chairman + Columbia PhD pursuit
33:00 – Ron's personal reflection on founder identity
Links
Connect with our guest, Dean Sysman, on LinkedIn: https://www.linkedin.com/in/deansysman/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Last episode, Ron and Marcus made predictions. This episode, they brought the receipts.
A journalist built an app with vibe coding and got hacked on live television.
A social network built entirely by AI (not a single line of human code!) exposed 1.5 million authentication tokens and private messages between agents.
And 88% of organizations have already had an AI security incident, while barely 14% of deployed agents ever saw a security review.
The warnings from last episode aged fast. Marcus J. Carey is back to talk about what that actually means for the people building right now, not the people theorizing about it. Ron and Marcus are in the code themselves, and this conversation is what that experience actually looks like: OpenClaw running loose on your machine, agents racking up API bills, and why guidance, not prompts, not tools, is the real skill that separates builders who thrive from builders who ship disasters.
Impactful Moments
00:00 - Introduction
02:00 - Vibe coding hack on live TV
03:30 - Mo Book leaks 1.5M auth tokens
06:00 - Marcus' origin story: War Games, 1983
08:00 - OpenClaw escapes the lab
13:30 - AT&T cuts help desk spend 90%
17:00 - Context is king, guidance is everything
19:00 - Can AI do your job rec right now?
24:00 - The first cybersecurity jobs agents will replace
27:00 - Expertise + AI = 1000x yourself
30:00 - Focus on outcomes, not new tools
Links
Connect with our guest, Marcus J. Carey, on LinkedIn: https://www.linkedin.com/in/marcuscarey/
Read the articles we referenced in this episode:
The vibe coding hack that aired on live TV, ICAEW breaks down exactly how it happened and what it means for anyone building with AI: https://www.icaew.com/insights/viewpoints-on-the-news/2026/feb-2026/cyber-dangers-of-agents-and-vibe-coding
88% of organizations have already had an AI security incident. See the full data from the Cisco State of AI Security 2026 report: https://www.helpnetsecurity.com/2026/02/23/ai-agent-security-risks-enterprise/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
The CISO role isn’t the finish line, it’s a launchpad. 69% of security executives are eyeing the exit, and Anthony Johnson is proof that what comes next can be even bigger.
Anthony Johnson, former Global CISO at JP Morgan and Fannie Mae, now founder and managing partner at Delve Risk, breaks down what really happens when a security leader stops buying tools and starts building companies. From the trap of unpaid advisory boards to why AI is eliminating the entry-level pipeline, Anthony delivers a no-nonsense look at career strategy, the future of fractional work, and why understanding how your company makes money is the most underrated skill in cybersecurity. If you’re a security practitioner at any level, this episode will change how you think about your next move.
Impactful Moments
00:00 - Introduction
01:00 - Meet Anthony Johnson
02:00 - 69% of CISOs want out
06:00 - Why Anthony left the CISO seat
09:00 - Revenue changes your security priorities
11:00 - Career paths after the CISO role
13:00 - The advisory board compensation trap
17:00 - AI’s threat to the talent pipeline
22:00 - Hiring for aptitude over competency
24:00 - Soft skills win in the AI era
29:00 - Corporate loyalty is dead—now what
31:00 - Networking that actually lands roles
34:00 - Know how your company makes money
36:00 - Ron’s personal reflection on freedom
Links
Connect with our guest, Anthony Johnson, on LinkedIn: https://www.linkedin.com/in/anthony-johnson-delverisk/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Your email gateway isn't enough anymore, attackers are already inside the workspace through OAuth apps, browser extensions, and account takeover.
In this episode, Ron sits down with Rajan Kapoor, VP of Security at Material Security, to break down the real risks hiding inside Google Workspace and Microsoft 365. They cover how phishing has evolved into full-blown business email compromise, why malicious OAuth apps are the new favorite attack vector, and what security teams, especially lean ones, can do right now to lock down their cloud workspace. Rajan also drops practical advice on passkeys, document sharing hygiene, and why data lifecycle management is a problem no one is solving well enough.
Impactful Moments
00:00 – Introduction
03:30 – The current state of phishing
05:30 – Outbound email compromise risk
09:30 – OAuth apps as attack vectors
15:00 – AI agents accessing your workspace
16:00 – Prompt injection is the new SQL injection
18:00 – Allow listing apps immediately
24:30 – Google Workspace vs Microsoft 365 security
27:30 – Custom detections require API expertise
28:00 – Why passkeys matter right now
32:00 – Data lifecycle management for shared docs
Links
Connect with our guest, Rajan Kapoor, on LinkedIn: https://www.linkedin.com/in/rajankkapoor/
Learn more about Material Security: https://material.security
___
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Text threads made AI feel personal, then agents made it productive, and suddenly “success” turns into chaos you can’t even track.
In this episode, Ron sits down with Pedram Amini, creator of Maestro, to show what agent work looks like when you stop babysitting and start orchestrating. Pedram lays out why context windows are the limiter, why harnessing beats model-chasing right now, and how Auto Run executes task-docs with fresh context every iteration so agents can run for hours (or days) without melting down.
Impactful Moments
00:00 - Intro
02:05 - Codex desktop sparks agent shift
06:40 - Harness beats model iteration
08:10 - Context window: the hidden limiter
12:10 - Terminal sprawl creates agent chaos
14:05 - Maestro panels: agents, tabs, history
17:25 - Auto Run: fresh context per task
26:15 - “Donate tokens” via Symphony PRs
28:20 - AI tax debate gets spicy
33:05 - Start simple: download and run
Links
Connect with Pedram on LinkedIn: https://www.linkedin.com/in/pedramamini/
Check out Maestro for yourself: https://runmaestro.ai/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Phishing didn’t get smarter, it got better at looking normal. What used to be obvious scams now blend directly into the platforms, workflows, and security controls people trust every day.
In this episode, Ron sits down with Yaamini Barathi Mohan, 2024 DMA Rising Star, to break down how modern phishing attacks bypass MFA, abuse trusted services like Microsoft 365, and ultimately succeed inside the browser. Together, they examine why over-reliance on automation creates blind spots, how zero trust becomes practical at the browser layer, and why human judgment is still the deciding factor as attackers scale with AI.
Impactful Moments
00:00 - Introduction
02:44 - Cloud infrastructure powering crime at scale
07:45 - What phishing 2.0 really means
12:10 - How MFA gets bypassed in real attacks
15:30 - Why the browser is the final control point
18:40 - AI reducing SOC alert fatigue
23:07 - Mentorship shaping cybersecurity careers
27:00 - Thinking like attackers to defend better
31:15 - When trust becomes the attack surface
Links
Connect with our guest, Yaamini Barathi Mohan, on LinkedIn: https://www.linkedin.com/in/yaamini-mohan/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Cybersecurity didn’t start as a billion-dollar crime machine. It started as pranks, ego, and curiosity. That origin story explains almost everything that’s breaking today.
Ron sits down with Graham Cluley, one of the earliest antivirus developers turned trusted cyber voice, to trace how malware evolved from digital graffiti into organized financial warfare. From floppy disks and casino-style viruses to ransomware, extortion, and agentic AI, the conversation shows how early decisions still shape today’s most dangerous assumptions. Graham also explains why AI feels inevitable, but still deeply unfinished inside modern organizations.
Impactful Moments
00:00 - Introduction
04:16 - Malware before money existed
07:30 - Cheesy biscuits changed cybersecurity
13:10 - When documents became dangerous
14:33 - Crime replaced curiosity
15:23 - Sony proved no one was safe
20:15 - Reporting hacks without causing harm
24:01 - AI replacing penetration testers
29:18 - Agentic AI shifts the threat model
36:30 - Why rushing AI breaks trust
Links
Connect with our guest on LinkedIn: https://www.linkedin.com/in/grahamcluley/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
AI doesn’t break security, it exposes where it was already fragile. When automation starts making decisions faster than humans can audit, AppSec becomes the only thing standing between scale and catastrophe.
In this episode, Ron sits down with Joshua Bregler, Senior Security Manager at McKinsey’s QuantumBlack, to dissect how AI agents, pipelines, and dynamic permissions are reshaping application security. From prompt chaining attacks and MCP server sprawl to why static IAM is officially obsolete, this conversation gets brutally honest about what works, what doesn’t, and where security teams are fooling themselves.
Impactful Moments
00:00 – Introduction
02:15 – AI agents create identity chaos
04:00 – Static permissions officially dead
07:05 – AI security is still AppSec
09:30 – Prompt chaining becomes invisible attack
12:23 – Solving problems vs solving AI
15:03 – Ethics becomes an AI blind spot
17:47 – Identity is the next security failure
20:07 – Frameworks no longer enough alone
26:38– AI fixing insecure code in real time
32:15 – Secure pipelines before production
Connect with our Guest
Joshua Bregler on LinkedIn: https://www.linkedin.com/in/breglercissp/
Our Links
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
AI isn’t quietly changing software development… it’s rewriting the rules while most security programs are still playing defense. When agents write code at machine speed, the real risk isn’t velocity, it’s invisible security debt compounding faster than teams can see it.
In this episode, Ron Eddings sits down with Varun Badhwar, Co-Founder & CEO of Endor Labs, and Henrik Plate, Principal Security Researcher of Endor Labs, to break down how AI-assisted development is reshaping the software supply chain in real time. From MCP servers exploding across GitHub to agents trained on insecure code patterns, they analyze why traditional AppSec controls fail in an agent-driven world and what must replace them.
This conversation pulls directly from Endor Labs’ 2025 State of Dependency Management Report, revealing why most AI-generated code is functionally correct yet fundamentally unsafe, how malicious packages are already exploiting agent workflows, and why security has to exist inside the IDE, not after the pull request.
Impactful Moments
00:00 – Introduction
02:00 – Star Wars meets cybersecurity culture
03:00 – Why this report matters now
04:00 – MCP adoption explodes overnight
10:00 – Can you trust MCP servers
12:00 – Malicious packages weaponize agents
14:00 – Code works, security fails
22:00 – Hooks expose agent behavior
28:30 – 2026 means longer lunches
33:00 – How Endor Labs fixes this
Links
Connect with our Varun on LinkedIn: https://www.linkedin.com/in/vbadhwar/
Connect with our Henrik on LinkedIn: https://www.linkedin.com/in/henrikplate/
Check out Endor Labs State of Dependency Management 2025: https://www.endorlabs.com/lp/state-of-dependency-management-2025
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Three banks in four days isn't just a bragging right for penetration testers. It's a wake-up call showing that expensive security tools and alarm systems often fail when tested by skilled operators who understand both human behavior and technical vulnerabilities.
Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, talk about their latest physical penetration tests on financial institutions, manufacturing facilities protecting COVID-19 vaccine production, and why their new Server 2025 course had to rewrite most common Active Directory tools. They share stories of armed guards, police gun draws, poison ivy reconnaissance, and a bag of chips that saved them from serious trouble. The conversation reveals why EDR alone won't stop ransomware, how offline backups remain the exception rather than the rule, and what security controls actually work when attackers bring custom tooling.
Impactful Moments:
00:00 - Intro
01:00 - New training courses launched
03:00 - Server 2025 breaks standard tools
05:00 - COVID facility physical penetration
07:00 - Armed guards change the game
10:00 - Police draw guns on operators
13:00 - Bag of chips saves the day
15:00 - Nighttime versus daytime physical tests
18:00 - VIP home security assessments
20:00 - 2026 threat predictions
22:00 - Why EDR doesn't stop ransomware
27:00 - Low cost ransomware simulation ROI
29:00 - Three banks in four days
32:00 - Deepfake as the new EDR
Links:
Connect with our guests –
Greg Hatcher: https://www.linkedin.com/in/gregoryhatcher2/
John Stigerwalt: https://www.linkedin.com/in/john-stigerwalt-90a9b4110/
Learn more about White Knight Labs: https://www.whiteknightlabs.com
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
When your firewall forgets to buckle up, the crash doesn’t happen in the network first, it happens in your blindspots.
In this episode, Ron is joined by returning guest Chris Hughes, Co-Founder of Aquia and host of the Resilient Cyber podcast. Chris helps reframe vulnerability work as exposure management, connect technical risk to human resilience, and break down the scoring and runtime tools security teams actually need today. Expect clear takeaways on EPSS, reachability analysis, ADR, AI’s double-edged role, and the one habit Chris swears by as a CEO. This episode fuses attack-surface reality with mental-attack-surface strategy so you walk away with both tactical moves and daily practices that protect systems and people.
Impactful Moments:
00:00 - Intro
02:00 - Breaking: Fortinet WAF zero-day & visibility lesson
05:00 - Meet Chris Hughes: CEO, author, Resilient Cyber host
08:00 - Mental attack surface explained and why it matters
18:00 - From CVSS to EPSS, reachability, and ADR realities
21:00 - AI as force-multiplier for attackers and defenders
24:30 - Exposure vs vulnerability naming, market trends
26:00 - Chris’s book & how to follow his work
30:00 - Ron’s solo: 3 pillars to patch your mindset
34:00 - Closing takeaways and subscribe reminder
Links:
Connect with our guest, Chris Hughes, on LinkedIn: https://www.linkedin.com/in/resilientcyber/
Check out the article on the Fortinet exploit here: https://www.helpnetsecurity.com/2025/11/14/fortinet-fortiweb-zero-day-exploited/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
The real disruption isn’t AI replacing humans, it’s the shocking possibility that human labor was the economic bubble all along.
In this episode, Ron Eddings sits down with Daniel Miessler, founder of Unsupervised Learning and longtime security leader, to break open why companies are hitting record profits with shrinking workforces, and what that means for your future. Daniel shares how AI agents, context management, and his Telos problem-first framework are reshaping what it means to create value in the modern economy. From Apple to Human 3.0, Daniel explains why building in public, learning fast, and solving real problems are the ultimate career edge in an AI-powered world.
Impactful Moments:
00:00 - Introduction
02:00 - Jobless profit boom accelerates
05:00 - Daniel's AI journey at Apple
08:00 - Building careers around problems
12:00 - AI bubble or timing problem
15:00 - Nine-year-old codes app in two hours
18:00 - Human labor is the bubble
22:00 - Context management changes everything
26:00 - Adaptation equals survival
Links:
Daniel’s Website: danielmiessler.com/
Daniel’s Github: https://github.com/danielmiessler/
Daniel’s LinkedIn: https://www.linkedin.com/in/danielmiessler/
Upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
AI agents aren't just reacting anymore, they're thinking, learning, and sometimes deleting your entire production database without asking. The real question isn't if your AI agent will be hacked, it's when, and whether you'll have the right hooks in place to stop it before it happens.
In this episode, Ron breaks down the ChatGPT Atlas vulnerability that shocked researchers, revealing how malicious prompts can turn AI assistants against their own users by bypassing safeguards and accessing file systems. He presents his new talk "Hooking Before Hacking," introducing a framework for applying EDR principles, prevention, detection, and response, to AI agents before they execute unauthorized commands. From pre-tool use hooks that catch malicious intent to one-time passwords that put humans back in the loop, this episode shares practical security controls you can implement today to prevent your AI agents from going rogue.
Impactful Moments:
00:00 - Introduction
02:00 - ChatGPT Atlas vulnerability exposed
04:00 - AI technology outpacing security guardrails
05:00 - Guardrail jailbreaks and prompt injection
06:00 - AI agents deleting production databases
07:00 - EDR principles for AI agents
09:00 - Pre-tool use hooks catch intention
11:00 - User prompt sanitization prevents leaks
14:00 - One-time passwords for agent workflows
16:00 - Automation mistakes across 10 years
Links:
Connect with Ron on LinkedIn: https://www.linkedin.com/in/ronaldeddings/
Check out the entire article here: https://www.yahoo.com/news/articles/cybersecurity-experts-warn-openai-chatgpt-101658986.html
GitHub Repository: https://hackervalley.com/hooking-before-hacking
See Ron's "Hooking Before Hacking" presentation slides here: http://hackervalley.com/hooking-before-hacking-presentation
Check out our website: https://hackervalley.com/
Upcoming events: https://www.hackervalley.com/livestreams
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio
What if your security team never missed a single alert and actually had time to think strategically?
In this episode, Ahmed Achchak, CEO and Co-Founder of Qevlar AI, reveals how autonomous SOCs are reshaping security operations worldwide. From tackling alert fatigue to empowering analysts with intelligent AI-driven investigations, Ahmed shares the inside story of building a system that can act on threats faster than any human alone. Learn how Qevlar’s innovative approach is giving organizations clarity, control, and measurable ROI while freeing security teams to focus on what truly matters.
Impactful Moments
00:00 - Introduction
01:30 - Founding Qevlar AI by chance
03:30 - Inefficiency of current SOCs
05:00 - Augmenting analysts, not replacing them
08:00 - AI investigating alerts at scale
11:30 - How autonomous agents handle phishing
14:30 - Why tackling all alerts maximizes ROI
17:30 - Graph technology as investigation backbone
25:00 - Limitations and randomness of LLMs
30:30 - Advice for testing AI in SOCs
Links
Connect with our guest Ahmed on LinkedIn: https://www.linkedin.com/in/ahmed-achchak-872554109/
Check out Qevlar’s website: https://www.qevlar.com/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
To defend like a human, you first have to think like a hacker.
In this episode, Ron Eddings sits down with Chris Dale, Co-Founder and Chief Hacking Officer at River Security, to explore the human side of hacking, where curiosity, persistence, and vigilance meet defense. Chris shares how the traditional idea of penetration testing has evolved into a continuous journey of discovery, and why reconnaissance and storytelling are critical tools for modern defenders. From real-world breach stories to lessons on trust and responsibility, this episode reveals how thinking like a hacker, and acting like a human can transform the way we approach cybersecurity.
Impactful Moments
00:00 - Introduction and massive breach overview
03:00 - Trusted systems become exposure points
05:00 - Meet Chris Dale of River Security
07:00 - The problem with traditional pen testing
08:30 - Continuous reconnaissance and real-world risk
10:00 - Knowing yourself as a security principle
13:00 - The meaning of continuous vigilance
15:00 - Turning cybersecurity lessons into stories
18:00 - Storytelling and mindset in defense
19:30 - Final takeaways on fundamentals and vigilance
Links:
Connect with our Chris on LinkedIn: https://www.linkedin.com/in/chrisad/
Read the Tech Radar article here: https://www.techradar.com/pro/security/f5-breach-fallout-over-266-000-instances-exposed-to-remote-attacks
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
The real edge in cybersecurity isn’t found in new tools, it’s built through timeless fundamentals and a mindset that never stops learning.
In this episode, Ron sits down with Rich Greene, Senior Solutions Engineer and Instructor at SANS Institute, to uncover how true cyber value starts with skills, curiosity, and mindset. Rich shares his remarkable story of surviving a battlefield injury, retraining his brain, and how that journey shaped his approach to mastering cybersecurity. Together, they connect real-world lessons like the recent Discord breach to the core truth that even advanced systems depend on people who master the basics.
Impactful Moments
00:00 - Introduction
02:00 - Discord breach and third-party risk
05:00 - Meet Rich Greene from SANS
06:00 - The power of mastering fundamentals
07:00 - Learning how to learn
08:30 - Rich’s story of rebuilding his memory
11:00 - Forcing the brain to grow stronger
12:00 - Top skills that get you paid
14:00 - Skills that lead to fulfillment
16:00 - Fundamentals that fuel long-term success
17:00 - The OSI model decoded
20:00 - Why operating systems matter
21:00 - Security operations fundamentals
23:00 - Why cloud is the #1 must-learn skill
25:00 - Final advice: sharpen your fundamentals
Links
Connect with our Rich on LinkedIn: https://www.linkedin.com/in/secgreene/
Check out our upcoming events: https://www.hackervalley.com/livestreams
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com
Continue the conversation by joining our Discord: https://hackervalley.com/discord
Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/




I needed this! hands down favorite episode!