BarCode
BarCode

BarCode

Chris Glanden

Overview
Episodes

Details

Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.

Recent Episodes

Jim West
FEB 12, 2026
Jim West
The future of cybersecurity is not coming. It is already here. AI is writing code faster than humans. Deepfakes can impersonate your boss. Quantum computers threaten the encryption that protects everything we trust. And most organizations are still playing catch up.In this episode of BarCode, Chris sits down with Jim West, a 30 plus year cybersecurity veteran who has seen every wave of the industry. From building machines in the early days of dial up to advising on quantum risk and AI driven defense, Jim breaks down what is hype, what is real, and what is about to change everything. This is not theory. This is what comes next.If you want to understand how to think like an attacker, adapt like a defender, and prepare for a world where machines outpace humans, this conversation is your briefing.Welcome to the future of security.00:00 Introduction to Jim West and His Expertise04:59 Jim's Origin Story and Early Career10:36 The Importance of Certifications in Cybersecurity17:16 The Rise of Quantum Computing in Cybersecurity27:05 Preparing for Quantum Day and Its Implications28:28 Exploring Quantum Computing and Qiskit28:58 AI's Role in Cybersecurity Threats30:45 The Evolution of Deepfake Technology31:45 Quantum Computing as a Service33:09 The Intersection of AI and Quantum Computing34:34 Future Scenarios: AI and Quantum in Cyber Warfare38:39 AI's Impact on Society and Human Interaction39:24 The Creative Potential of AI46:41 Balancing AI and Human Interaction52:46 Unique Bar Experiences and Future Ventures[Facebook – Jim West Author] – https://www.facebook.com/jimwestauthorOfficial author page where Jim West shares updates about his books, cybersecurity insights, speaking engagements, and creative projects.[LinkedIn – Jim West] – https://www.linkedin.com/in/jimwest1Professional networking profile highlighting his cybersecurity leadership, certifications, conference speaking, mentoring, and industry experience.[Official Author Site – Jim West] – https://jimwestauthor.com/Personal website featuring his published works, cybersecurity thought leadership, creative projects, and links to his social platforms.[BookAuthority – 100 Best Cybersecurity Books of All Time] – https://bookauthority.orgA curated book recommendation platform that recognized Jim West’s work among the “100 Best Cybersecurity Books of All Time,” reflecting industry impact and credibility.[ISACA (Information Systems Audit and Control Association)] – https://www.isaca.orgA global professional association focused on IT governance, risk management, and cybersecurity, where Jim West has spoken at multiple regional and international events.[GRC (Governance, Risk, and Compliance) Conference – San Diego] – https://www.grcconference.comA cybersecurity conference centered on governance, risk management, and compliance practices, referenced in relation to industry speaking engagements.[EC-Council (International Council of E-Commerce Consultants)] – https://www.eccouncil.orgA cybersecurity certification organization known for programs such as CEH (Certified Ethical Hacker) and events like Hacker Halted, where Jim West has participated and spoken.
play-circle icon
59 MIN
Red Pill
FEB 2, 2026
Red Pill
In this conversation, Chris Glanden interviews Matt Brown, a cybersecurity professional with extensive experience in both offensive and defensive security. Matt shares his journey into the cybersecurity field, discussing the importance of continuous learning, the transition from blue team to red team, and the critical skills needed for pen testing. They also explore the role of certifications, the evolution of online learning, and the impact of YouTube as a platform for education. Matt emphasizes the importance of understanding business operations in cybersecurity and shares insights on creating engaging content for aspiring professionals.00:00 Introduction to Matt Brown and His Journey03:50 Transitioning from Blue Team to Red Team10:28 The Importance of Soft Skills in Pen Testing11:28 Certifications vs. Practical Learning15:21 The Rise of Online Education in Cybersecurity20:19 YouTube Success and Audience Engagement26:14 Future of Security Training28:41 Fun and Unique Bar Experiences31:37 Connecting with Matt Brown OnlineSYMLINKS[Brown Find Security Training] – https://brownfinesecurity.com/An online, hands-on hardware hacking and IoT security training platform created by Matt Brown, designed to make practical offensive security training accessible without expensive in-person courses. [Matt Brown YouTube Channel] – https://www.youtube.com/@mattbrwnA cybersecurity education channel focused on hardware hacking, IoT security, and penetration testing, known for long-form, unedited, real-world demonstrations and learning-through-problem-solving.matt-chris[Matt Brown on X (formerly Twitter)] – https://x.com/nmatt0Matt Brown’s social platform where he shares insights, updates, and discussions related to cybersecurity, hardware hacking, and offensive security training.matt-chris[Matt Brown on LinkedIn] – https://www.linkedin.com/in/mattbrwn/Matt Brown’s professional profile used for industry networking, sharing cybersecurity knowledge, and connecting with professionals interested in penetration testing and hardware security.
play-circle icon
32 MIN
Trespass
JAN 17, 2026
Trespass
In this episode, Corey LeBleu, a veteran penetration tester, shares a raw and intense story from his early days in offensive security. Corey walks through a social engineering engagement that took a sharp turn, from being closely watched by a security guard to receiving the call that changed everything. What followed was a confrontation with authority, handcuffs, and a moment that forced him to confront the legal and emotional consequences of impersonation.Through honest storytelling, Corey reflects on the pressure of physical security testing, the thin line between authorization and trouble, and the lessons he carried forward in his career. This episode serves as a cautionary tale about understanding boundaries, respecting authority, and the unseen risks behind revealing what’s hidden.00:00 Introduction to Corey LeBleu and His Journey03:34 Corey's Early Career and Learning Path06:34 The Role of Mentorship in Pen Testing09:19 Experiences in Social Engineering and Physical Pen Testing12:22 The Handcuff Incident: A Lesson in Risk15:12 Transitioning to Web Application Pen Testing18:01 The Evolution of Pen Testing Practices20:48 The Impact of AI on Pen Testing23:42 The Future of Pen Testing and Learning for Beginners26:28 Navigating Active Directory and Pen Testing Tools27:35 Essential Training for Web App Pen Testing30:34 Advice for Aspiring Pen Testers32:30 Exploring AI and Learning Resources37:05 Personal Interests and Hobbies39:17 Living in Austin and Local Music SceneSYMLINKS[LinkedIn] – https://www.linkedin.com/in/coreylebleu/Primary platform Corey recommends for connecting with him professionally.[Relic Security] – https://www.relixsecurity.com/Cybersecurity consulting firm founded and run by Corey LeBleu, focused primarily on web application penetration testing and offensive security work.[PortSwigger Academy] – https://portswigger.net/web-securityA free and advanced online training platform for web application security, created by the makers of Burp Suite. Recommended by Corey as one of the best learning resources for modern web app pentesting.[Burp Suite] – https://portswigger.net/burpA widely used web application security testing tool. Corey emphasizes learning Burp Suite as a core skill for anyone entering web app penetration testing.[OWASP Juice Shop] – https://owasp.org/www-project-juice-shop/An intentionally vulnerable web application created by OWASP for learning and practicing web security testing.[OWASP – Open Web Application Security Project] – https://owasp.orgA global nonprofit organization focused on improving software security. Corey previously ran an OWASP project and references OWASP tools and resources throughout his career.[SANS Institute] – https://www.sans.orgA major cybersecurity training and certification organization, referenced in relation to early penetration testing education and the high cost of formal training.[Hack The Box] – https://www.hackthebox.comAn online platform for practicing penetration testing skills in simulated environments.[PromptFoo] – https://promptfoo.devA tool for testing, evaluating, and securing LLM prompts. Mentioned in the context of prompt injection and AI security experimentation.[PyTorch] – https://pytorch.orgAn open-source machine learning framework widely used for deep learning and AI research. Corey mentions it as part of his learning path for understanding how LLMs work.[Hugging Face] – https://huggingface.coAn AI platform providing open-source models, datasets, and tools for machine learning and LLM experimentation.
play-circle icon
42 MIN
Panda
NOV 21, 2025
Panda
In the electric chaos of DEF CON—where dial tones, solder smoke, and hacker legends collide—one figure stands out: John Aff, aka PANDA.A veteran in the hacker community, he moves effortlessly between challenge design, telephony wizardry, mesh networking experiments, and the culture that surrounds it all.Behind the reputation is a journey that started with game hacking, shifted into enterprise security, and evolved into a life built around creativity, community, and technical obsession. It’s also a story of identity—of finding a place where personal expression and professional skill finally intersected.This conversation pulls back the curtain on a mind shaped by curiosity, lived experience, and a deep love for the craft.CHAPTERS00:00 - Introduction to Barcode Podcast00:24 - Meet Panda: Cybersecurity Icon01:47 - Panda's Journey into Cybersecurity10:12 - Creating Interactive Challenges for Conferences22:11 - Badge Building: The Art and Science28:00 - Lessons from Offensive Security for Defenders30:11 - Winning the TeleChallenge: A Team Effort35:10 - Nostalgia in Gaming: The Phone Verse Experience37:30 - Understanding LoRa and Mesh Networking43:20 - Real-World Applications of MeshTastic Technology49:14 - The Intersection of Furry Culture and Cybersecurity56:54 - Community Building and Future Aspirations in TechLINKSTelePhreak – https://telephreak.org An informatione trading post for the computer enthusiast (the hacker), telephony technophiles (the phreak), radio junkies (the HAM).DEF CON – https://defcon.org/ The world’s largest hacker conference and the backdrop for many of Panda’s stories, competitions, and breakthroughs.RedSeer Security – https://redseersecurity.com The security practice Panda supports on the defensive and strategic side.Assura, Inc. – https://assurainc.com Where Panda leads offensive security operations and continuous testing programs.MeshTastic – https://meshtastic.org Open-source long-range mesh communication project central to Panda’s community work.Comms For All – https://commsforall.com Panda’s initiative focused on mesh networking, LoRa radios, and community education.B-Sides Jax – https://bsidesjax.org Conference where Panda built the interactive phone-based badge challenge.HackSpaceCon – https://hackspacecon.com The first conference where you and Panda crossed paths; a major Florida hacker gathering.JLCPCB – https://jlcpcb.com PCB manufacturing service used for producing custom badge hardware.EasyEDA – https://easyeda.com Design tool Panda uses to create the multilayer art and circuitry for badges.Vectorizer.AI – https://vectorizer.ai The AI-powered tool Panda relies on to convert artwork into vector format for PCB badge design.KiCad – https://kicad.org Open-source PCB design suite used for laying out circuits and prototyping badge hardware.Adtran – https://www.adtran.com Telecom hardware vendor whose legacy gateways were used in the BSides Jax phone challenge.QueerCon – https://www.queercon.org Long-running LGBTQ+ hacker community at DEF CON that collaborated with Panda on early badge projects.National Cyber Games (NCA Cyber Games) – https://nationalcybergames.org Competition platform where Panda designed MeshTastic-based CTF challenges.UNF Osprey Security – https://www.unf.edu University of North Florida’s student security group that runs CTFs and collaborated locally with Panda.HackRedCon – https://hackredcon.com Security conference where Panda volunteers and participates in community events.Jax2600 – https://2600.com Local chapter of the classic 2600 hacker community, part of Panda’s long-term involvement in grassroots infosec groups.Backdoors & Breaches – https://blackhillsinfosec.com/projects/backdoors-breaches Incident response card game Panda used for blue team development and tabletop exercises.
play-circle icon
74 MIN
Kinosa
NOV 12, 2025
Kinosa
Enter the mind of Amar Sonik - a DevOps engineer, community builder, and lifelong technologist whose journey spans from the help desk to the heart of cybersecurity. Known for shaping BSides Singapore and now lending his voice to The Borg Radio Hour, Sonic reveals how curiosity fueled his evolution, how mentorship from Len Noe helped him command the stage, and why community, creativity, and calm remain the true superpowers in tech. From meditation to zero days, from tabla rhythms to threat research - this conversation reminds us that behind every exploit, every innovation, and every line of code, lies a deeply human story.00:00 Introduction and Background01:43 The Journey into Public Speaking03:58 Experiences at CyberSecCon06:26 The Impact of the Documentary 'I Am Machine'08:58 The Role of Community in Technology10:04 The Importance of Informal Networks12:36 The Launch of Borg Radio Hour14:55 Personal Connections and Daily Affirmations19:23 Daily Affirmations and Positive Mindset23:21 Journey into Cybersecurity31:03 The Intersection of Music and Technology33:18 Creating a Cybersecurity Coffee ShopSYMLINKS[CyberSecCon] –CyberSecCon | Bringing Business & Tech Together A cybersecurity conference referenced as a major event in the guest’s professional community. The guest helped organize this event, and it serves as a hub for security professionals to collaborate and share insights.[B-Sides Singapore] – https://bsidessg.org/ A community-driven cybersecurity conference organized by the guest (“Sonic aka Kenosa”) for the past six years. B-Sides events are known globally for offering inclusive, grassroots spaces for learning and networking in information security.[I Am Machine Documentary] – https://i-am-machine.com/ A cybersecurity-themed documentary filmed in Las Vegas and released in August. It features interviews with industry professionals and was picked up by two film festivals, highlighting stories of technology, identity, and resilience in cybersecurity.[The Borg Radio Hour] – https://www.youtube.com/@TheBorgRadioHour An online radio program the guest is now an associate of. It appears to be connected to the cybersecurity or hacker community, serving as a creative platform for tech discussions or related storytelling.
play-circle icon
34 MIN