BarCode

Chris Glanden

Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe.  Hosted by Chris Glanden.

  1. Red Pill

    4D AGO

    Red Pill

    In this conversation, Chris Glanden interviews Matt Brown, a cybersecurity professional with extensive experience in both offensive and defensive security. Matt shares his journey into the cybersecurity field, discussing the importance of continuous learning, the transition from blue team to red team, and the critical skills needed for pen testing. They also explore the role of certifications, the evolution of online learning, and the impact of YouTube as a platform for education. Matt emphasizes the importance of understanding business operations in cybersecurity and shares insights on creating engaging content for aspiring professionals. 00:00 Introduction to Matt Brown and His Journey 03:50 Transitioning from Blue Team to Red Team 10:28 The Importance of Soft Skills in Pen Testing 11:28 Certifications vs. Practical Learning 15:21 The Rise of Online Education in Cybersecurity 20:19 YouTube Success and Audience Engagement 26:14 Future of Security Training 28:41 Fun and Unique Bar Experiences 31:37 Connecting with Matt Brown Online SYMLINKS [Brown Find Security Training] – https://brownfinesecurity.com/ An online, hands-on hardware hacking and IoT security training platform created by Matt Brown, designed to make practical offensive security training accessible without expensive in-person courses.  [Matt Brown YouTube Channel] – https://www.youtube.com/@mattbrwn A cybersecurity education channel focused on hardware hacking, IoT security, and penetration testing, known for long-form, unedited, real-world demonstrations and learning-through-problem-solving. matt-chris [Matt Brown on X (formerly Twitter)] – https://x.com/nmatt0 Matt Brown’s social platform where he shares insights, updates, and discussions related to cybersecurity, hardware hacking, and offensive security training. matt-chris [Matt Brown on LinkedIn] – https://www.linkedin.com/in/mattbrwn/ Matt Brown’s professional profile used for industry networking, sharing cybersecurity knowledge, and connecting with professionals interested in penetration testing and hardware security.

    32 min
  2. Trespass

    JAN 17

    Trespass

    In this episode, Corey LeBleu, a veteran penetration tester, shares a raw and intense story from his early days in offensive security. Corey walks through a social engineering engagement that took a sharp turn, from being closely watched by a security guard to receiving the call that changed everything. What followed was a confrontation with authority, handcuffs, and a moment that forced him to confront the legal and emotional consequences of impersonation. Through honest storytelling, Corey reflects on the pressure of physical security testing, the thin line between authorization and trouble, and the lessons he carried forward in his career. This episode serves as a cautionary tale about understanding boundaries, respecting authority, and the unseen risks behind revealing what’s hidden. 00:00 Introduction to Corey LeBleu and His Journey 03:34 Corey's Early Career and Learning Path 06:34 The Role of Mentorship in Pen Testing 09:19 Experiences in Social Engineering and Physical Pen Testing 12:22 The Handcuff Incident: A Lesson in Risk 15:12 Transitioning to Web Application Pen Testing 18:01 The Evolution of Pen Testing Practices 20:48 The Impact of AI on Pen Testing 23:42 The Future of Pen Testing and Learning for Beginners 26:28 Navigating Active Directory and Pen Testing Tools 27:35 Essential Training for Web App Pen Testing 30:34 Advice for Aspiring Pen Testers 32:30 Exploring AI and Learning Resources 37:05 Personal Interests and Hobbies 39:17 Living in Austin and Local Music Scene SYMLINKS [LinkedIn] – https://www.linkedin.com/in/coreylebleu/Primary platform Corey recommends for connecting with him professionally. [Relic Security] – https://www.relixsecurity.com/Cybersecurity consulting firm founded and run by Corey LeBleu, focused primarily on web application penetration testing and offensive security work. [PortSwigger Academy] – https://portswigger.net/web-securityA free and advanced online training platform for web application security, created by the makers of Burp Suite. Recommended by Corey as one of the best learning resources for modern web app pentesting. [Burp Suite] – https://portswigger.net/burpA widely used web application security testing tool. Corey emphasizes learning Burp Suite as a core skill for anyone entering web app penetration testing. [OWASP Juice Shop] – https://owasp.org/www-project-juice-shop/An intentionally vulnerable web application created by OWASP for learning and practicing web security testing. [OWASP – Open Web Application Security Project] – https://owasp.orgA global nonprofit organization focused on improving software security. Corey previously ran an OWASP project and references OWASP tools and resources throughout his career. [SANS Institute] – https://www.sans.orgA major cybersecurity training and certification organization, referenced in relation to early penetration testing education and the high cost of formal training. [Hack The Box] – https://www.hackthebox.comAn online platform for practicing penetration testing skills in simulated environments. [PromptFoo] – https://promptfoo.devA tool for testing, evaluating, and securing LLM prompts. Mentioned in the context of prompt injection and AI security experimentation. [PyTorch] – https://pytorch.orgAn open-source machine learning framework widely used for deep learning and AI research. Corey mentions it as part of his learning path for understanding how LLMs work. [Hugging Face] – https://huggingface.coAn AI platform providing open-source models, datasets, and tools for machine learning and LLM experimentation.

    42 min
  3. Panda

    11/21/2025

    Panda

    In the electric chaos of DEF CON—where dial tones, solder smoke, and hacker legends collide—one figure stands out: John Aff, aka PANDA. A veteran in the hacker community, he moves effortlessly between challenge design, telephony wizardry, mesh networking experiments, and the culture that surrounds it all. Behind the reputation is a journey that started with game hacking, shifted into enterprise security, and evolved into a life built around creativity, community, and technical obsession. It’s also a story of identity—of finding a place where personal expression and professional skill finally intersected. This conversation pulls back the curtain on a mind shaped by curiosity, lived experience, and a deep love for the craft. CHAPTERS 00:00 - Introduction to Barcode Podcast 00:24 - Meet Panda: Cybersecurity Icon 01:47 - Panda's Journey into Cybersecurity 10:12 - Creating Interactive Challenges for Conferences 22:11 - Badge Building: The Art and Science 28:00 - Lessons from Offensive Security for Defenders 30:11 - Winning the TeleChallenge: A Team Effort 35:10 - Nostalgia in Gaming: The Phone Verse Experience 37:30 - Understanding LoRa and Mesh Networking 43:20 - Real-World Applications of MeshTastic Technology 49:14 - The Intersection of Furry Culture and Cybersecurity 56:54 - Community Building and Future Aspirations in Tech LINKS TelePhreak – https://telephreak.org An informatione trading post for the computer enthusiast (the hacker), telephony technophiles (the phreak), radio junkies (the HAM). DEF CON – https://defcon.org/ The world’s largest hacker conference and the backdrop for many of Panda’s stories, competitions, and breakthroughs. RedSeer Security – https://redseersecurity.com The security practice Panda supports on the defensive and strategic side. Assura, Inc. – https://assurainc.com Where Panda leads offensive security operations and continuous testing programs. MeshTastic – https://meshtastic.org Open-source long-range mesh communication project central to Panda’s community work. Comms For All – https://commsforall.com Panda’s initiative focused on mesh networking, LoRa radios, and community education. B-Sides Jax – https://bsidesjax.org Conference where Panda built the interactive phone-based badge challenge. HackSpaceCon – https://hackspacecon.com The first conference where you and Panda crossed paths; a major Florida hacker gathering. JLCPCB – https://jlcpcb.com PCB manufacturing service used for producing custom badge hardware. EasyEDA – https://easyeda.com Design tool Panda uses to create the multilayer art and circuitry for badges. Vectorizer.AI – https://vectorizer.ai The AI-powered tool Panda relies on to convert artwork into vector format for PCB badge design. KiCad – https://kicad.org Open-source PCB design suite used for laying out circuits and prototyping badge hardware. Adtran – https://www.adtran.com Telecom hardware vendor whose legacy gateways were used in the BSides Jax phone challenge. QueerCon – https://www.queercon.org Long-running LGBTQ+ hacker community at DEF CON that collaborated with Panda on early badge projects. National Cyber Games (NCA Cyber Games) – https://nationalcybergames.org Competition platform where Panda designed MeshTastic-based CTF challenges. UNF Osprey Security – https://www.unf.edu University of North Florida’s student security group that runs CTFs and collaborated locally with Panda. HackRedCon – https://hackredcon.com Security conference where Panda volunteers and participates in community events. Jax2600 – https://2600.com Local chapter of the classic 2600 hacker community, part of Panda’s long-term involvement in grassroots infosec groups. Backdoors & Breaches – https://blackhillsinfosec.com/projects/backdoors-breaches Incident response card game Panda used for blue team development and tabletop exercises.

    1h 15m
  4. 11/12/2025

    Kinosa

    Enter the mind of Amar Sonik - a DevOps engineer, community builder, and lifelong technologist whose journey spans from the help desk to the heart of cybersecurity. Known for shaping BSides Singapore and now lending his voice to The Borg Radio Hour, Sonic reveals how curiosity fueled his evolution, how mentorship from Len Noe helped him command the stage, and why community, creativity, and calm remain the true superpowers in tech. From meditation to zero days, from tabla rhythms to threat research - this conversation reminds us that behind every exploit, every innovation, and every line of code, lies a deeply human story.00:00 Introduction and Background 01:43 The Journey into Public Speaking 03:58 Experiences at CyberSecCon 06:26 The Impact of the Documentary 'I Am Machine' 08:58 The Role of Community in Technology 10:04 The Importance of Informal Networks 12:36 The Launch of Borg Radio Hour 14:55 Personal Connections and Daily Affirmations 19:23 Daily Affirmations and Positive Mindset 23:21 Journey into Cybersecurity 31:03 The Intersection of Music and Technology 33:18 Creating a Cybersecurity Coffee Shop SYMLINKS [CyberSecCon] –CyberSecCon | Bringing Business & Tech Together A cybersecurity conference referenced as a major event in the guest’s professional community. The guest helped organize this event, and it serves as a hub for security professionals to collaborate and share insights. [B-Sides Singapore] – https://bsidessg.org/ A community-driven cybersecurity conference organized by the guest (“Sonic aka Kenosa”) for the past six years. B-Sides events are known globally for offering inclusive, grassroots spaces for learning and networking in information security. [I Am Machine Documentary] – https://i-am-machine.com/ A cybersecurity-themed documentary filmed in Las Vegas and released in August. It features interviews with industry professionals and was picked up by two film festivals, highlighting stories of technology, identity, and resilience in cybersecurity. [The Borg Radio Hour] – https://www.youtube.com/@TheBorgRadioHour An online radio program the guest is now an associate of. It appears to be connected to the cybersecurity or hacker community, serving as a creative platform for tech discussions or related storytelling.

    35 min
  5. YachtCast v3

    10/28/2025

    YachtCast v3

    Summary:Live from the BarCode YachtCast 2025, host Chris Glanden sits down with Krista Arndt, Associate CISO at St. Luke’s University Health Network and author of “Permission to Be Real.” In this raw and authentic conversation recorded aboard the SS McMenamin, Krista shares her journey from aspiring nurse to cybersecurity leader, the parallels between drag racing and infosec, and the art of blending authenticity with corporate leadership. This episode dives deep into risk, resilience, leadership, and the psychology of authenticity — while celebrating the Philly tech community, Titan 100 leaders, and the human side of cybersecurity. 00:00 – Opening freestyle & Philly Tech Council shout-out02:28 – Welcome aboard the BarCode YachtCast 202503:13 – Introducing Krista Arndt, “Awesome Sauce CISO”05:00 – Life in healthcare security: high stakes & human impact06:10 – From surviving to leading: Krista’s unconventional path07:36 – Drag racing & cybersecurity: managing risk in high-speed chaos09:55 – The psychology behind leadership under pressure10:49 – Being real: authenticity in corporate culture12:44 – Finding balance between personality and professionalism13:09 – About the book “Permission to Be Real”15:00 – The importance of culture fit and personal growth16:06 – Recognizing leadership beyond accolades18:30 – What Titan 100 really means for Philly tech leaders21:28 – “The language of the business” — redefined23:25 – Q&A, laughs, and book giveaways24:22 – Closing credits BarCode Podcast: https://barcodesecurity.com/podcastKrista Arndt – “Permission to Be Real” on Amazon: https://www.amazon.com/Permission-Be-RealConnect with Krista on LinkedIn: https://www.linkedin.com/in/kearndtPhilly Tech Council: https://phillytechcouncil.orgTitan 100 Philadelphia: https://www.titan100.biz/philadelphiaBarCode Events & Live Shows: https://barcodesecurity.com/events Subscribe to the BarCode Podcast for real conversations with the people shaping the future of cybersecurity, tech, and human resilience.

    26 min
  6. HOU.SEC.CON

    10/20/2025

    HOU.SEC.CON

    This week, Barcode hits the floor at HOU.SEC.CON2025, one of the most anticipated cybersecurity gatherings in Texas, to capture real conversations with the people driving the industry forward. The energy was high, the community was buzzing, and the insights were overflowingas host Chris Glandon connected with innovators, educators, founders, and practitioners who are redefining what it means to build and protect intoday’s digital landscape. From AI ethics and automation fears to hands-onmentorship and community leadership, this episode dives deep into the evolving culture of cybersecurity — not just the tools and tech, but the humans behind it all. Whether it’s Dope Security shaking up the web gateway market, Fulcrum fostering collaboration through engineering excellence, or CyberSec Community empowering the next generation through YouthSecCon, every voice in this episode reflects a shared purpose: to make cybersecurity smarter, moreconnected, and more human. Recorded live amid the pulse of HOU.SEC.CON 2025, thisspecial on-site feature showcases the passion, collaboration, and innovation that keep the infosec world thriving — one conversation (and one cocktail) at a time. 00:00 – Intro01:00 – Dope Security with George Georgopoulos05:25 – Sonic on AI, Fear, and the Future of Work11:40 – Philip Wiley: Mentorship, YouthSecCon, and CyberHackCon18:06 – Jacob & John from Fulcrum Technology Solutions24:45 – Eseeri’s First-Time Experience at HOU.SEC.CON27:00 – Michael Farnum: 15 Years of Building a Cyber Community35:20 – Closing SYMLINKS [BarcodeSecurity.com] - https://barcodesecurity.com/The official home of the Barcode Podcast, featuring all episodes, cybersecurity insights, and event updates. [Dope Security] - https://dope.security/A next-gen Secure Web Gateway platform simplifying secure connectivity with a “fly direct” approach — eliminating stopover delays and enhancing user experience. [CyberSec Community] - https://www.cybrseccon.com/The organization behind HOU.SEC.CON, YouthSecCon, and CyberSecCon — building bridges between professionals, educators, and aspiring cybersecurity talent. [The Hacker Maker – Philip Wiley] -https://thehackermaker.com/Official site of Philip Wiley — author, mentor, and conference speaker dedicated to educating the next generation of ethical hackers and pen testers. [Fulcrum Technology Solutions] - https://ftsc.com/A Houston-based cybersecurity and IT solutions firm focused on managed services, consulting, and community-driven events like F-CON. [Prophit (Chris Glanden) ] - https://pr0ph-1t.com/The host’s personal website and cybersecurity brand hub, featuring thought leadership content, event appearances, and contact info. [Michael Farnum on LinkedIn] - https://www.linkedin.com/in/mfarnumFollow the co-founder of HOU.SEC.CON and CEO of CyberSec Community for updates on events, education, and community growth.

    36 min
  7. Flow State

    10/09/2025

    Flow State

    “Flow State” isn’t just a nod to the psychological zone of peak focus — it reflects Yuriy Sibere’s entire approach to life and work. From tinkering with a ZX Spectrum in Ukraine to managing cross-functional security products at ThreatLocker, Yuriy embodies adaptability, alignment, and precision amid complexity.He thrives where vision meets implementation — translating abstract strategy into tangible, human-centric security products. Calm under shifting priorities, relentlessly curious, and articulate in execution, Yuriy represents the discipline behind today’s most effective cybersecurity innovation. In this conversation, host Chris sits down with Yuriy to trace his path from IT operations to product leadership in cybersecurity. They explore how early curiosity shaped his mindset, how communication builds trust across teams, and how to balance security with usability under real-world pressures. Tune in to discover how clarity, collaboration, and human-centered design fuel success in modern security product management. 00:00 Yuriy's Journey into Cybersecurity 04:52 Effective Product Management in Cybersecurity 09:05 Overcoming Collaboration Challenges 11:04 Managing Technical Debt 13:21 User Experience in Security Products 15:39 Communication in Global Teams 16:01 Closing Thoughts and Future Connections   SYMLINKS [ThreatLocker] - https://www.threatlocker.comThreatLocker is a cybersecurity company specializing in endpoint security and zero trust solutions. In the episode, Yuriy Tsibere shares his experience as a Product Manager at ThreatLocker and discusses how the company buildsuser-focused security products. [LinkedIn – Yuriy Tsibere] - https://www.linkedin.com/in/yuriytsibereYuriy’s professional profile where listeners can learn more about his background, connect with him, and follow his work in cybersecurity and productmanagement. [LinkedIn – ThreatLocker] - https://www.linkedin.com/company/threatlockerThe official LinkedIn page for ThreatLocker, offering updates, company insights, and product news related to cybersecurity innovation. [Zero Trust World Conference] -https://zerotrustworld.comAn annual event hosted by ThreatLocker that brings together IT professionals, cybersecurity experts, and technology leaders to discuss advancements in zerotrust security.

    17 min
  8. Revelation

    09/10/2025

    Revelation

    "Revelation" is about exposing what’s hidden: Vulnerabilities, Truths, and the role of hackers in revealing them.In this conversation, Casey John Ellis, founder of Bugcrowd, shares his journey from a curious child fascinated by technology to a pioneer in crowdsourced security. He discusses the evolution of bug bounty programs, the importance of community in cybersecurity, and the challenges of scaling a startup. Casey also emphasizes the need for good faith hackers, the role of AI in security, and the importance of mentorship in entrepreneurship. He reflects on the changing landscape of cybersecurity and the necessity for collaboration between generations in the field. 00:00 - Introduction and Technical Challenges 02:02 - Casey Ellis: A Journey into Hacking 04:50 - Pioneering Crowdsourced Security with Bug Crowd 07:36 - Building a Community of Hackers 10:36 - Scaling Bug Crowd: Achievements and Growth 13:35 - Unexpected Bug Bounty Submissions 16:32 - Testing Infrastructure: Virtualization and Real-World Applications 19:14 - Advocating for Good Faith Cybersecurity Research 22:11 - Government Engagement and Cyber Policy 25:03 - Adapting to the Current Threat Landscape 26:41 - The Evolving Landscape of Cybersecurity 29:58 - AI and Human Collaboration in Security 34:22 - The Gray Areas of Cyber Ethics 39:50 - Lessons in Entrepreneurship and Leadership 44:17 - Generational Shifts in Cybersecurity Media 46:40 - Finding Balance: Hobbies and Downtime 48:24 - Imagining a Cybersecurity-Themed Bar SYMLINKS[ Casey John Ellis Blog - https://cje.io ]The personal website of Casey John Ellis, featuring his writings and insights on cybersecurity, hacker rights, and vulnerability research. [ LinkedIn - https://www.linkedin.com/in/caseyjohnellis ]Casey’s professional profile where he shares career updates and connects with the cybersecurity community. [ Bluesky - https://caseyjohnellis.bsky.social ]Casey’s Bluesky account for sharing thoughts and engaging with the infosec community. [ Mastodon - https://infosec.exchange/@caseyjohnellis ]Casey’s Mastodon profile on Infosec Exchange, where he posts updates and insights for the federated social community. [ X/Twitter - https://x.com/caseyjohnellis ]Casey’s main microblogging profile where he actively shares cybersecurity insights and hacker advocacy. [ Linktree - https://linktr.ee/caseyjohnellis ]A hub linking to all of Casey’s active social profiles and resources. [ BugCrowd - https://www.bugcrowd.com ]A leading crowdsourced security platform that connects organizations with a global hacker community to find and fix vulnerabilities. [ Disclose.io - https://disclose.io ]An open-source project standardizing best practices for vulnerability disclosure programs, enabling safe collaboration between researchers and organizations.

    50 min
5
out of 5
26 Ratings

About

Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe.  Hosted by Chris Glanden.

You Might Also Like