In this episode, host Ron Eddings is joined by cybersecurity researcher and writer, Kim Crawley, to deep dive into one of her greatest passions; computing! From its origins to its newest capabilities in quantum and AI, Kim shares her love of computers as well as her passion for educating others through her writing. Lastly, Kim explains how she wrote her newest release, “Hacker Culture A-Z” while keeping it ADHD-friendly.
Impactful Moments
00:00 - Welcome
00:52 - Introducing guest, Kim Crawley
02:20 - Computers; A Forbidden Fruit
04:50 - Parents, PCs & Printers
10:44 - Why Hacker Culture?
14:34 - Join our Mastermind!
15:16 - Quantifying Quantum
21:53 - ”AI is like Fire”
26:45 - Playing with Chat & DALL-E
28:28 - ADHD & Work
33:22 - How to Become an Author
Links:
Connect with our guest Kim Crawley:
https://linkedin.com/in/kimcrawley
Pre-order “Hacker Culture A to Z” here:
https://www.amazon.com/Hacker-Culture-Fundamentals-Cybersecurity-Hacking/dp/1098145674/
Read “Hacker Culture A to Z” on the O’Reily Learning Platform:
https://www.oreilly.com/library/view/hacker-culture-a/9781098145668/
Join our creative mastermind and stand out as a cybersecurity professional:
https://www.patreon.com/hackervalleystudio
Become a sponsor of the show to amplify your brand:
https://hackervalley.com/work-with-us/
Love Hacker Valley Studio? Pick up some swag:
https://store.hackervalley.com
Continue the conversation by joining our Discord:
SaaS misconfigurations may be responsible for up to 63% of security incidents. Do your SaaS applications have risky OAuth grants and misconfigurations? Let’s not find out. We will unravel the complexities of OA...
In this episode, host Ron Eddings speaks with Chris Hughes, President at Aquia, Cyber Innovation Fellow at CISA, and cybersecurity legend. Special guest, Chris Hughes, was initially inspired to build a personal...
In this episode, host Ron Eddings is joined by Sr. Director of Red Team Operations at Coalfire, Pete Deros, to discuss the hottest topic around; adversarial AI. Ron and Pete discuss how AI is used and how the a...
In this episode, host Ron Eddings is joined by Metasploit creator, co-founder and CEO of runZero, HD Moore. HD changed the world with Metasploit and he’s doing it again with runZero. Attack Surface Management c...
In this episode, Ron Eddings is joined by Penetration Tester, Instructor, International Speaker, Best Selling Author, and Podcast Host, Phillip Wylie. Phillip shares how pen testing and the need to educate peop...
In this episode, Host Ron Eddings interviews Robert Kerbeck, author of Ruse: Lying the American Dream from Hollywood to Wall Street. Robert shares how his professional acting skills helped his career in corpora...
In this episode, host Ron Eddings is joined by cybersecurity researcher and writer, Kim Crawley, to deep dive into one of her greatest passions; computing! From its origins to its newest capabilities in quantum...
In this episode, host Ron Eddings is joined by Co-Founder and CEO of ThreatLocker, Danny Jenkins, to talk about his "Hero’s Journey" from IT to launching ThreatLocker. From spam emails, bots, and ransomware to ...
In this episode, host Chris is joined by Erika Eakins — a cybersecurity sales ninja, podcaster, and co-founder at Teach Kids Tech. Erika opens up about her challenges entering tech and cybersecurity as a woman ...
It’s a classic technologist conundrum: Should I build or buy the solution I need to solve a problem? The “Build vs. Buy” conundrum is faced by technology teams worldwide. To help approach this riddle, Chris Coc...
Are you the best kept secret in cybersecurity? Let's change that by partnering together for podcast ads, social campaigns, and your next event or keynote. Send us your details to get started.