KakaComputer : Weekly Guide for IT Insights

YoungCTO and others

>> Episodes Drop Tuesday and Thursday Morning >> "🎙️ Dive into the digital world with KakaComputer! 💻 Your go-to podcast for tech tips, IT insights, and the latest in computing. Whether you're a newbie or a pro, we've got something for everyone. Tune in and level up your tech game!"

  1. 114 - When Non-Tech Goes Tech - A Transformation Journey

    16 HR AGO

    114 - When Non-Tech Goes Tech - A Transformation Journey

    Your Degree Doesn't Define You. Tech Is For Everyone. On this episode, we have Michael Escobilla, Charvin Peñaverde, Juan Carlo Claudio, and Luigi Espiritu joining us to discuss "When Non-Tech Goes Tech - A Transformation Journey" and why your degree doesn't define you. This episode is for anyone who thinks a career in tech is out of reach without a computer science degree. We'll share our own stories of moving from non-tech roles, like Human Resources, into the digital world. Join us as we talk about the changes we made and the lessons we learned on our journey. It's an inspiring conversation that proves you don't have to be a traditional tech professional to innovate and make a real impact in today's world. What was the moment you realized you wanted to shift into tech? (Generalization) The realization often comes from a moment of dissatisfaction with the status quo of the previous career and an attraction to the problem-solving nature of technology. It might be realizing that tech skills were needed to solve a key issue in the non-tech field, or simply discovering that the fast pace and continuous learning inherent in the IT world were more engaging. For many, the shift is driven by seeing the massive impact that technology has on every industry and wanting to be part of that innovation. For someone coming from a non-tech background, what's the one skill they can leverage the most? (Generalization) The most valuable skill non-tech professionals can leverage is domain expertise and business context. A background in fields like HR, finance, or marketing gives them an intimate understanding of specific user needs, regulatory constraints, and business goals that pure technologists often lack. This knowledge is crucial for bridging the gap between technical teams and business stakeholders, allowing them to build products and solutions that are truly relevant and impactful to the organization. What was the biggest learning curve for you? Was it a technical skill or something else entirely? (Generalization) For many, the biggest learning curve is less about a specific technical language and more about adopting the "tech mindset". This involves shifting from a static, procedure-driven approach to an iterative, agile, and constantly evolving one. It means becoming comfortable with continuous failure, debugging, and rapid change. While technical skills can be learned, internalizing the culture of perpetual learning, documentation, and systematic problem-solving is often the hardest, yet most critical, transition. How did you deal with the feeling of imposter syndrome when you first started working in a tech role? (Generalization) Dealing with imposter syndrome requires consciously separating feelings from facts. The strategy involves acknowledging the feeling but focusing on small, verifiable wins and contributions to build confidence incrementally. Finding a mentor or supportive colleague to talk to is also crucial, as they can provide objective validation of skills and progress. Recognizing that everyone in tech is constantly learning and that having a non-traditional path provides a unique, valuable perspective helps to quiet the internal critic.

    17 min
  2. 113 - SheTech the Futures: A Student Lens. The Future is Hers, The Mic Is On.

    2 DAYS AGO

    113 - SheTech the Futures: A Student Lens. The Future is Hers, The Mic Is On.

    On this episode, we have Kelcey Cruz, Angela Samboa, Angelyn Viterbo, and Helena Rose Tantongco joining us to discuss "SheTech the Futures: A Student Lens" and the powerful message that the future is hers. The future is here, and it's hers. In this episode, we're talking about the evolving tech industry and how we can catch up. We'll explore the power in a woman's voice as she navigates corporate politics, and how leading with her light can optimize team work. This is a crucial conversation for young women in tech, offering lessons, advice, and a powerful message of empowerment. What's the biggest challenge you've faced as a young woman entering the tech space? (Generalization) The biggest challenge often involves dealing with unconscious bias or the feeling of having to constantly prove your competence. This can manifest as having your ideas questioned more frequently or facing assumptions about your technical knowledge based on your gender. Overcoming this requires building unshakeable confidence in your skills and finding allies who recognize and champion your contributions. It's a journey of self-advocacy and persistence in showing that talent has no gender. In a male-dominated environment, how do you ensure your voice is heard and your ideas are taken seriously? (Generalization) To ensure your voice is heard, it's vital to be well-prepared and assertive. Always back up your ideas with data, research, or solid technical rationale. Use clear, direct language and avoid qualifiers that might undermine your statements. A key strategy is finding allies or sponsors who can help amplify your points in a group setting. If you are interrupted, calmly but firmly reclaim the floor. You must consciously command the space your expertise has earned you. Can you share a story about a time when you saw another woman leading and it inspired you? (Generalization) I was deeply inspired by a senior technical leader who, despite facing immense pressure, handled a major system outage with calm decisiveness and empathy. She didn't shout or panic; she systematically delegated tasks, communicated clearly with executives, and supported her team. Her style showed me that true power in leadership lies in competence and composure, not aggression. It validated the idea that I didn't need to adopt a traditionally aggressive "male" style of leadership to be effective and respected. What message would you give to your younger self about starting a career in tech? (Generalization) The message I would give is simple: Don't wait for permission to be smart, and don't shrink your ambition to fit someone else's expectations. Your unique perspective is your superpower; it will help you identify problems and solutions that others miss. Focus fiercely on building core technical skills, but also practice soft skills like negotiation and networking. Never internalize someone else's doubt; trust your abilities and remember that imposter syndrome is a liar.

    19 min
  3. 112 - From Quiet Developer to Visible Leader. How introverts and quiet types can lead in tech without pretending to be loud.

    24 SEPT

    112 - From Quiet Developer to Visible Leader. How introverts and quiet types can lead in tech without pretending to be loud.

    In this episode, we have Jeff Barr, the Vice President and Chief Evangelist at Amazon Web Services (AWS), Mike Fiedler, a PyPI Safety and Security Engineer at the Python Software Foundation and an AWS Hero, and Raphael Quisumbing, an AWS Hero, joining us to discuss the journey from quiet developer to visible leader. When mentoring young devs, how do you reassure them that being ‘quiet’ doesn’t mean they can’t lead? (Generalization) You can reassure them by redefining what leadership looks like. Emphasize that leadership isn't about being the loudest voice, but about influence, expertise, and impact. Highlight the value of their quiet strengths, such as being a deep thinker, a great listener, or a meticulous problem-solver. Give them specific examples of how their detailed insights or calm presence can guide a team more effectively than an extroverted style. Show them that true leadership earns respect through competence and consistency, not just charisma. What’s one small action a quiet developer can take that shows leadership without needing to be loud?(Generalization) One powerful, small action is to consistently write clear, concise documentation and detailed code comments. This act of "quiet leadership" shares knowledge and makes the codebase maintainable for the entire team, including their future selves. Another is to proactively offer help to a teammate who is stuck on a problem. By doing so, they demonstrate empathy, build trust, and establish themselves as a reliable and valuable resource without having to be the one presenting in a meeting. How can someone advocate for themselves in meetings or promotions if they’re not naturally outspoken? (Generalization) They can advocate for themselves by preparing in advance. Before a meeting, they can draft key points they want to make or questions they want to ask. In the meeting, they can wait for a natural pause to interject. For promotions, they should let their work speak for itself by meticulously documenting their accomplishments and the impact of their contributions. They can then share this information in one-on-one meetings with their manager, where they have more space to speak. This allows them to highlight their value without having to fight for airtime in a group setting. Why does the tech industry often equate leadership with charisma or visibility? (Generalization) The tech industry often equates leadership with charisma and visibility because these qualities are easy to see and measure in a fast-paced environment. An outspoken person may appear to be a decisive leader, and someone who gives a lot of public talks is seen as an expert. This creates a shortcut in a professional’s mind that equates visibility with competence. However, it's a flawed assumption, as many of the most impactful contributions to tech—like foundational code, systems architecture, and security protocols—are made by individuals who thrive on deep, focused, and often quiet work.

    22 min
  4. 110 - AI, Fraud & Vibe-Coded Threats

    17 SEPT

    110 - AI, Fraud & Vibe-Coded Threats

    On this episode, we have Ted Mathew Dela Cruz, Andresito De Guzman, Asi Guiang, and Kayne Rodrigo joining us to discuss AI, fraud, and vibe-coded threats. Cybercriminals are getting creative—using AI, social engineering, and “vibe-coded” online culture to launch new types of scams and attacks. This episode explores the strange but serious ways fraudsters operate today, and what IT professionals can do to keep ahead of the curve. What exactly are “vibe-coded” threats, and how do they differ from traditional scams? (Generalization) "Vibe-coded" threats are a new type of scam that leverages social engineering and a deep understanding of online culture to appear authentic and trustworthy. Unlike traditional scams that use generic, often poorly-written messages, vibe-coded threats are highly personalized and culturally aware. They mimic the language, humor, and social cues of specific online communities to build rapport and lower a victim's guard, making them much harder to detect with traditional security filters. How is AI changing the way fraud is carried out—and how it’s prevented? (Generalization) AI is a double-edged sword in the world of fraud. For attackers, it’s a powerful tool to create realistic deepfake videos, convincingly mimic voices, and write highly personalized phishing emails at scale. This lowers the barrier to entry for cybercriminals. However, AI is also a key tool for prevention. Machine learning models can analyze vast amounts of data in real-time to detect subtle anomalies in user behavior, identify fraudulent patterns, and block scams that would be invisible to traditional, rule-based security systems. Can you share a recent story of a surprising scam or fraud attempt you encountered? (Generalization) One surprising scam involves the use of AI to create fake resumes and professional profiles on platforms like LinkedIn. These "synthetic personas" can even pass initial screening tests and interviews, gaining access to a company's internal systems as a remote worker. The scammer isn't trying to steal money directly; they're trying to gain a foothold inside a company to sell access to malicious actors or deploy ransomware later. It’s a sophisticated and patient new form of insider threat. How can everyday internet users protect themselves without becoming paranoid? (Generalization) The key is to adopt a healthy sense of skepticism without becoming overly fearful. First, practice “digital hygiene,” which means using unique, strong passwords and multi-factor authentication on all critical accounts. Second, always verify requests for information, even if they seem to come from a trusted friend or colleague; a quick phone call can prevent a huge mistake. Lastly, stay educated on new threats, but focus on the fundamentals of smart online behavior—if something feels too good to be true or creates a sense of urgency, it almost always is.

    17 min
  5. 109 - AI, Design, and Security: The Next Wave of IT Careers

    15 SEPT

    109 - AI, Design, and Security: The Next Wave of IT Careers

    Exploring how artificial intelligence, design thinking, and cybersecurity shape the future of work. On this episode, we have Luis Maverick Gabriel, Piolo Justin Cabigao, Jon Prado, and George Louis Jose joining us to discuss AI, design, security, and the next wave of IT careers. The future of IT isn't just about code—it's about the intersection of cutting-edge fields. This episode dives into the exciting career paths emerging from the fusion of artificial intelligence, design thinking, and cybersecurity. We'll explore how these disciplines are creating new roles and opportunities, from designing secure AI systems to building user-friendly security tools. Join us to learn how to prepare for the jobs of tomorrow by bridging the gap between these powerful fields. What new roles or specializations have you seen emerge at the intersection of these three fields? (Generalization) We're seeing exciting new roles emerge that bridge these disciplines. For instance, there's the AI Security Engineer, who works to secure machine learning models and data pipelines from adversarial attacks. Another is the UX Security Researcher, who designs user-friendly security features and studies how users interact with security prompts. We've also seen the rise of AI Ethicists, who ensure AI systems are fair, transparent, and don't introduce bias, a role that sits at the intersection of AI, design, and a broader, more philosophical type of security. For a student, what's a good first step to start building skills in all three areas? (Generalization) A great first step is to find a project that combines them. Instead of studying each field in isolation, try building a simple application that requires all three. For example, create a small web app with a machine learning component (AI), a straightforward user interface (design), and a focus on basic authentication and data protection (security). This project-based learning approach forces you to understand how the concepts interact in the real world, providing a holistic understanding that is highly valuable to employers. Can you describe a project where your team successfully integrated AI, design, and security from the start? (Generalization) A good example would be the development of an intelligent fraud detection system. From the outset, the security team worked with developers to secure the data pipeline that fed the AI model, ensuring it was encrypted and tamper-proof. The AI team focused not only on building an accurate model but also on making it explainable, so that a fraud analyst could understand why a transaction was flagged. The design team then created a user interface that clearly presented this information to the analyst, ensuring they could act quickly and confidently, turning complex data into a simple, actionable workflow. How has the rise of AI changed what's considered a "secure" product? (Generalization) The rise of AI has added new layers to what's considered a secure product. Beyond protecting against traditional attacks like SQL injection, we must now defend against data poisoning, where an attacker manipulates the data to corrupt the AI model's output. A secure product must also be robust against adversarial attacks, where an attacker feeds the model specially crafted inputs to make it fail. This means that security now extends to the integrity and reliability of the data and the model itself, not just the code or infrastructure.

    22 min
  6. 108 - Cybersecurity: From Classroom to Real-World Defense

    10 SEPT

    108 - Cybersecurity: From Classroom to Real-World Defense

    From theory to practice—how tomorrow’s defenders are forged today. On this episode, we have Ted Mathew Dela Cruz, Asi Guiang, and Kayne Rodrigo joining us to discuss the journey of cybersecurity, from the classroom to real-world defense. From the lecture hall to the SOC (Security Operations Center), how do students become front-line defenders of the digital world? This episode looks at the journey from learning the fundamentals of cybersecurity in school to applying them in real-world threats. Guests share their experiences, challenges, and tips for anyone aspiring to enter cybersecurity. What was your first real-world experience where classroom theory was tested? (Generalization) My first real-world experience was performing a vulnerability assessment on a company's network. In class, we learned about different types of attacks and how to identify weaknesses in a controlled lab environment. In the real world, the challenge was dealing with a live, complex network with a multitude of devices and legacy systems. It was a significant learning curve to apply textbook knowledge to a dynamic and messy environment, requiring a lot of on-the-spot critical thinking and adaptability. Which skills from school translated best into your job? (Generalization) The skills that translated best were not just technical, but also the fundamental problem-solving methodologies taught in school. While specific tools and techniques change rapidly, the core ability to break down a complex problem into smaller parts, analyze data logically, and document findings systematically is timeless. The foundational knowledge of networking protocols, operating systems, and basic programming principles also proved invaluable as a starting point for specialized real-world applications. What surprised you most when you first worked in cybersecurity professionally? (Generalization) What surprised me most was how much of the job is not just technical. I quickly learned that communication and collaboration are just as important as technical skills. In school, the focus was on finding the vulnerability. In the real world, a huge part of the job is effectively communicating risks to non-technical stakeholders, working with developers to fix issues, and building trust. The human element of cybersecurity—from social engineering to internal cooperation—was far more prominent than I ever anticipated. How should students prepare now if they want a strong start in this field? (Generalization) Students should prepare now by getting hands-on experience beyond classroom labs. This means participating in CTF (Capture The Flag) competitions, contributing to open-source projects, and setting up their own personal lab to practice. Gaining an industry certification, even an entry-level one, can be a major advantage. Most importantly, they should actively follow industry news, attend local security meetups, and network with professionals to understand the real-world landscape and identify a specialization that genuinely interests them.

    17 min
  7. 107 - Ethical Hacking: Breaking Systems to Make Them Safer

    8 SEPT

    107 - Ethical Hacking: Breaking Systems to Make Them Safer

    The good side of hacking—and why we need more of it. On this episode, we have Asi, Maki Villano, and Alfie Ordoña joining us to discuss the good side of hacking and why we need more of it. Hacking isn’t always a bad thing. This episode dives into the world of ethical hacking, where professionals deliberately exploit systems to identify vulnerabilities before malicious actors can. We’ll discuss the skills required to succeed in this field, how ethical hackers work with organizations, and why understanding your system’s weaknesses is one of the best ways to protect it from real-world threats. How does someone get into ethical hacking as a career? (Generalization) To get into ethical hacking, one must first build a strong foundation in IT fundamentals like networking, operating systems, and programming. From there, you can specialize in areas such as web application security, mobile security, or network defense. Pursuing industry certifications like the Certified Ethical Hacker (CEH) or Offensive Security Certified Professional (OSCP) is a great way to formalize your skills. Engaging in bug bounty programs on platforms like HackerOne or Bugcrowd also provides valuable real-world experience and a way to build a professional reputation. What makes ethical hacking different from penetration testing—or are they the same? (Generalization) While often used interchangeably, there's a subtle difference. Ethical hacking is a broad term for using hacking skills to find vulnerabilities, often in a continuous and general way. Penetration testing, or "pen testing," is a specific, formal, and time-bound type of ethical hacking. A pen test is typically a structured engagement with a defined scope, goals, and a formal report, conducted with the explicit permission of the organization. Think of it this way: all pen testers are ethical hackers, but not all ethical hacking is a formal pen test. What’s the most serious vulnerability you’ve ever found? (Generalization) While the specifics of a vulnerability are often confidential, the most serious ones typically involve an issue that could lead to complete system compromise or unauthorized data exfiltration. This could be a flaw that allows a remote attacker to gain administrative control of a server or a bug that exposes sensitive user data, like credit card numbers or personal health information. Such vulnerabilities are critical because they pose a direct threat to a company's integrity, customer trust, and financial stability. How should companies respond when ethical hackers report bugs or issues? (Generalization) When ethical hackers report issues, companies should respond with gratitude and professionalism. First, the company must have a clear and accessible vulnerability disclosure policy that outlines how a researcher can safely report findings without fear of legal action. The company should then promptly acknowledge the report, validate the findings, and work quickly to remediate the vulnerability. Providing credit to the ethical hacker and, in some cases, offering a financial reward or "bug bounty" helps foster a positive relationship with the security community.

    14 min

About

>> Episodes Drop Tuesday and Thursday Morning >> "🎙️ Dive into the digital world with KakaComputer! 💻 Your go-to podcast for tech tips, IT insights, and the latest in computing. Whether you're a newbie or a pro, we've got something for everyone. Tune in and level up your tech game!"